CN106412887B - A kind of fast authentication method, system, server and the terminal of virtual SIM card - Google Patents

A kind of fast authentication method, system, server and the terminal of virtual SIM card Download PDF

Info

Publication number
CN106412887B
CN106412887B CN201610422338.5A CN201610422338A CN106412887B CN 106412887 B CN106412887 B CN 106412887B CN 201610422338 A CN201610422338 A CN 201610422338A CN 106412887 B CN106412887 B CN 106412887B
Authority
CN
China
Prior art keywords
sim card
server
authentication
terminal
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610422338.5A
Other languages
Chinese (zh)
Other versions
CN106412887A (en
Inventor
杨玉魁
姜新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Changtu Network Technology Co Ltd
Original Assignee
Suzhou Changtu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Changtu Network Technology Co Ltd filed Critical Suzhou Changtu Network Technology Co Ltd
Priority to CN201610422338.5A priority Critical patent/CN106412887B/en
Publication of CN106412887A publication Critical patent/CN106412887A/en
Application granted granted Critical
Publication of CN106412887B publication Critical patent/CN106412887B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data
    • H04W8/245Transfer of terminal data from a network towards a terminal

Abstract

This application discloses a kind of fast authentication methods of virtual SIM card, and the server with multiple SIM cards initializes one or more SIM cards first, and the EF file of each SIM card of cache initialization completion;When any terminal to server requests virtual SIM card, server is one SIM card of terminal distribution, and the EF file that the SIM card distributed caches on the server is issued the terminal;The terminal accesses mobile communication network using the EF file of received SIM card, and the authentication calculations in access procedure are carried out by the SIM card in server.The application does not need to store the sensitive datas such as authentication key in the server, can greatly reduce the time of whole authentication process.

Description

A kind of fast authentication method, system, server and the terminal of virtual SIM card
Technical field
This application involves a kind of authentication schemes of virtual SIM card.
Background technique
In broad terms, SIM (subscriber identity module, subscriber identity module) card refers to mobile terminal institute The smart card used, wherein user identity identification data, authentication arithmetic and corresponding secret key etc. are stored with, for connecing to mobile terminal Enter mobile communication network to be identified and authenticated.The SIM card of early stage is only applicable to GSM terminal, and SIM card piece and SIM are applied It binds together, " SIM card " can both refer to physics card, can also refer to that SIM is applied.It is realized in the cdmaOne terminal of early stage " SIM card " function is R-UIM (Removable User Identity Module) card, also referred to as UIM (User Identity Module) block.Nowadays the SIM card and R-UIM card of early stage has been eliminated.
Into after the 3G epoch, SIM card is practical to refer to that (Universal Integrated Circuit Card leads to UICC With integrated circuit card).On hardware view, UICC card mainly includes CPU (central processing unit), ROM (read-only memory), RAM (random access memory), EEPROM (electrically erasable programmable read-only memory), I/O (input/output) circuit etc..In software In level, UICC card saves following four partial datas at least to realize authentication.
First, being used to access one or more applications of different mobile communication networks.For example, SIM application can access GSM network, USIM (UMTS subscriber identity module) application can access GSM network and W-CDMA network And TD-SCDMA network, CSIM (CDMA subscriber identity module) application can access cdmaOne network and CDMA2000 network, ISIM (IP Multimedia Services Identity Module) application can access IMS (IP Multimedia Subsystem, IP multimedia subsystem).For ease of description, above-mentioned each application is read-write comprising user EF file (Elementary File, constituent instruments), these EF files be stay net necessary to.
Second, Encryption Algorithm, such as algorithm disclosed in 3GPP, 3GPP2 standard.
Third, authentication key, uses for Encryption Algorithm.E.g. Ki key (Key identifier, root key).It is mobile Communication operator will not usually disclose authentication key, and user can not also directly acquire authentication key.The Authentication Center of network side (AuC, Authentication Center) preserves the authentication key of all legitimate users.SIM application (or USIM application, CSIM application etc.) with network side transmitting data when, sender encrypts the data with authentication key, and recipient is with the same authentication Data key decryption, being achieved in ensures that user identity is legal with authentication key.
Fourth, STK apply (Sim application Tool Kit), for establishes application and user interactive operation, And how definition application accesses or controls network.
Referring to Fig. 1, this is the main flow schematic diagram of the method for authenticating between existing mobile terminal and Authentication Center. Described method includes following steps.
Step 1 S101:SIM card powers on, and sends ATR (Answer to Reset, reset answer) message to terminal.It is described SIM card is generalized concept, smart card used in the mobile terminals such as SIM card, R-UIM card, UICC card including narrow sense.The present age refers to When UICC card, SIM card is primarily referred to as SIM application, USIM application, CSIM application and/or ISIM application therein.
Step 2 S102: PPS (ProtocolandParameters Selection, agreement are carried out between terminal and SIM card And parameter selection) negotiate.
Step 3 S103: terminal sends first message to SIM card, obtains the type of SIM card.The type master of the SIM card It to include three kinds: SIM card (i.e. the SIM card of early stage), R-UIM card or the UICC card of narrow sense.When the present age refers to UICC card, SIM card master Refer to SIM application, USIM application, CSIM application and/or ISIM application therein.
Step 4 S104: the basic EF file in terminal reading SIM card.The basic EF file refers to master file grade The not EF file of (MF level, Master File level), that is, it is not belonging to USIM catalogue, CSIM catalogue, ISIM mesh Record, SIM catalogue, RUIM catalogue EF file, including EF_ICCID, EF_PL, EF_ARR, EF_DIR etc..
Step 5 S105: the PIN code (Personal Identification Number) of terminal check SIM card, which is protected, is No opening further carries out PIN code verification to SIM card if opening in PIN code protection.If PIN code protection is not switched on, PIN is omitted Code check.
Step 6 S106: terminal to SIM card send initialization SIM application (or USIM application, CSIM application, ISIM application Deng) instruction.
Step 7 S107: under the SIM application (or USIM application, CSIM application, ISIM application etc.) in terminal reading SIM card Necessary EF file.The necessary EF file refers to application dedicated file rank (ADF Level, Application Dedicated File) or telecommunications rank (TELECOM level) EF file, that is, belong to USIM catalogue, CSIM catalogue, EF file under ISIM catalogue, SIM catalogue, RUIM catalogue or under their subdirectory, for example including IMSI code (International mobile subscriber identity, international mobile subscriber identity), FPLMN table (forbidden public land mobile network, the public land mobile network of disabling), EHPLMN table (Equivalent Home Public Land Mobile Network, equivalent home public land mobile network), UST (USIM Service Table, USIM agent list), SST (SIM Service Table, SIM agent list), ACC (Access Control Class, access construction quality) in it is one or more.
Step 8 S108: it is initial that terminal to SIM card sends SIM application (or USIM application, CSIM application, ISIM application etc.) Change and completes instruction.
Step 9 S109: the Authentication Center of network side sends authorization data to terminal, and authorization data is sent to SIM by terminal Card.
Step 10 S110:SIM card carries out corresponding authentication operation, generates Authentication Response data and is sent to terminal, terminal will Authentication Response data are sent to the Authentication Center of network side.
In above-mentioned method for authenticating, step 1 to step 8 is the process of SIM card initialization and caching EF file, and step 9 is extremely Step 10 is authentication process.Before existing method for authenticating is authenticated between SIM card and the Authentication Center of network side, need By the waiting SIM card initialization of long period and the process of caching EF file.
Other than part cdmaOne terminal and CDMA2000 terminal, remaining mobile terminal is mainly used with physics card For the SIM card of carrier, referred to as entity SIM card or physical SIM card.As technology develops, nowadays also there is virtual SIM The technologies such as (Virtual SIM) card, soft SIM (Multi SIM) card, cloud SIM card, eSIM (or e-SIM).Although these technology names Claim different, core content is closely similar, carrier of the physics card as SIM card is exactly omitted, can in advance it is mobile eventually The information of the internal write-in SIM card in end, and then the SIM card information inside mobile terminal can increased by network remote The operation such as add, modify, deleting.To keep statement simple, it is used uniformly " virtual SIM card " below to represent above-mentioned various omission physics The SIM card technology of card.
The Chinese invention patent application that application publication number is CN105263133A, data of publication of application is on January 20th, 2016 Disclose a kind of implementation of virtual SIM card.The program is that virtual SIM card data are first stored in cloud server, described Virtual SIM card data include card number code, authorization data, key.Then mobile terminal reads the virtual SIM card in cloud server Data establish mapping relations with virtual SIM card by authentication.
The Chinese invention patent application that application publication number is CN105451213A, data of publication of application is on March 30th, 2016 Disclose a kind of implementation of virtual subscriber identification module card (i.e. virtual SIM card).The program is from server to electronics Equipment distributes virtual SIM card data, wherein including Ki key;Electronic equipment utilizes received virtual SIM card data and network side It is authenticated, to access network.
Above-mentioned two parts of documents need mobile communications operator by sensitive datas such as authentication key to mobile terminal manufacturer or void Quasi- SIM card operator discloses, this is difficult to realize in level of practice.It is mobile communication operation by the authentication key of representative of Ki key The critical asset of quotient is ready that the mobile communications operator for providing Ki key is very few, the user covered in the world Quantity is even more limited.The sensitive datas such as authentication key are also stored in the server of oneself by above-mentioned two parts of documents, these services The network safety prevention of device is often difficult to reach the equal extent of the Authentication Center of mobile communications operator.Once server is entered It invades, the leakage of the sensitive datas such as authentication key then may cause SIM card and the serious consequences such as be copied freely.
The Chinese invention patent application that application publication number is CN105101167A, data of publication of application is on November 25th, 2015 Disclose a kind of implementation of virtual SIM card.This method need mobile terminal there are two modem module (i.e. MODEM), the 2nd MODEM is used to load the entity SIM card of user or is the virtual SIM card comprising authentication key, to build Vertical first communication link.Mobile terminal, which is obtained using the first communication link from server, does not include the second virtual of authentication key SIM card establishes the second communication link after the authentication is passed to the second virtual SIM card.The second virtual SIM card in the document does not need The sensitive datas such as authentication key are obtained and stored, the permission for obtaining mobile communications operator is not needed, more likely realizes. But the document is not related to how the second virtual SIM card is initialized and cached the processes such as EF file.
In fact, the method for authenticating of entity SIM card is fixed and invariable when mobile terminal uses entity SIM card.Work as shifting Dynamic terminal is using after virtual SIM card, and a large amount of SIM card resource is located at the server on network, at this time to the authentication of virtual SIM card Method can be carried out optimizing, to reduce the waiting time of the SIM card initialization before authentication and caching EF file.
Summary of the invention
The technical problem to be solved by the application is to provide a kind of fast authentication methods of virtual SIM card.For this purpose, the application Also provide fast authentication system, server and the terminal of a kind of virtual SIM card.
In order to solve the above technical problems, the fast authentication method of the application virtual SIM card are as follows: the clothes with multiple SIM cards Business device initializes one or more SIM cards, and the EF file of each SIM card of cache initialization completion.When any terminal When requesting virtual SIM card to server, server is one SIM card of the terminal distribution, and by the SIM card distributed in server The EF file of upper caching issues the terminal.The terminal accesses mobile communication network using the EF file of received SIM card, accesses Authentication calculations in journey are carried out by the SIM card in server.
The application realizes that the server of virtual SIM card fast authentication has multiple SIM cards, at least one in these SIM cards Part be initialised and EF file cache in the server.The server is terminal distribution SIM card, and the SIM that will be distributed Block the EF file cached in the server and issues terminal.The authentication from Authentication Center of the server receiving terminal forwarding Data, and transfer to SIM card to carry out authentication calculations and obtain Authentication Response data, Authentication Response data are transmitted to authentication by terminal Center.
The application realizes that the terminal to server of virtual SIM card fast authentication requests virtual SIM card, and receives server hair The EF file that the SIM card distributed sent caches in the server.The terminal receives the authorization data of Authentication Center transmission simultaneously It is transmitted to server, also receive the Authentication Response data that server is sent and is transmitted to Authentication Center.
The fast authentication system of the application virtual SIM card includes above-mentioned server and terminal.
The application is also to provide a kind of implementation of virtual SIM card, is that a large amount of SIM card resource is arranged in the server Great amount of terminals is supplied to by network to use.If needing the SIM card in terminal and server using existing authentication scheme Between carry out multiple data interaction, it is contemplated that network delay factor, it will entire authorizing procedure is caused to take a long time.Use this Shen instead After authentication scheme please, server has carried out multiple data interaction between SIM in advance and has cached useful data, can be with It allows between terminal and server and required useful data is just only obtained by a data interaction, to greatly reduce whole The required time of authentication process.If be arranged in the server based on entity SIM card, there is no need to deposit in the server for that The sensitive datas such as the authentication key of SIM card are stored up, the risk of leakage of these significant datas is avoided.
Detailed description of the invention
Fig. 1 is the flow chart of the method for authenticating between existing mobile terminal and Authentication Center.
Fig. 2 is the flow chart of the fast authentication method of the virtual SIM card of the application.
Fig. 3 is the flow chart of one embodiment of the fast authentication method of the virtual SIM card of the application.
Specific embodiment
Referring to Fig. 2, this is the flow chart of the fast authentication method of the virtual SIM card of the application comprising following steps.
Step 1 S201: the server with multiple SIM cards initializes one or more SIM cards, and cache initialization The EF file for each SIM card completed.
Preferably, the server in the step with multiple SIM cards initializes all SIM cards, and caches just The EF file for all SIM cards that beginningization is completed.
Step 2 S202: when any terminal to server requests virtual SIM card, server is one SIM of the terminal distribution Card, and the EF file that the SIM card distributed caches on the server is issued into the terminal.
In the step, if the SIM card distributed not yet initializes, distributed SIM card is first initialized, is then existed The EF file for the distributed SIM card that cache initialization is completed on server.
In the step, if the SIM card distributed has been completed to initialize, but not yet caches ED file on the server, Then will first on the server cache initialization complete distributed SIM card EF file.
In the step, server is preferably the SIM card according to the geographical location of terminal for its distribution with lower rate. For example, terminal report cell information, wired or wireless LAN the information such as IP address can reflect its geographical location, that Server preferably by terminal at that time where the SIM of city or country distribute to terminal, work as to enable the terminals to enjoy When where city or country minimum rate.
Step 3 S203: the terminal attempts access mobile communication network using the EF file of received SIM card, is accessing The authorization data that Authentication Center is sent in journey is close according to authenticating by the SIM card in server by being transmitted to server in terminal Key carries out authentication calculations and simultaneously obtains Authentication Response data, which issues the terminal transfer and final by server again Issue Authentication Center.
In the step, since the sensitive datas such as authentication key are encrypted be stored in SIM card, authentication calculations will be placed on It is carried out in SIM card, the transfer matchmaker that terminal is intended only as authorization data and Authentication Response data are transmitted between Authentication Center and SIM It is situated between.This authentication scheme is referred to as remote authentication.During remote authentication, terminal inner is not inserted into entity SIM card, therefore It is a kind of implementation of virtual SIM card.
Server corresponding with the fast authentication method of the SIM card is: in a first aspect, there are multiple SIM cards, these At least part in SIM card initialized in advance and by EF file cache in the server.Second aspect is terminal distribution SIM card, and the EF file that the SIM card distributed caches in the server is issued into terminal.The third aspect receives terminal forwarding From the authorization data of Authentication Center, and transfers to SIM card to carry out authentication calculations according to authentication key and obtains Authentication Response data, Authentication Response data are transmitted to Authentication Center by terminal.
Multiple SIM cards possessed by the server can be entity SIM card and/or the virtual SIM comprising authentication key Card.The authentication key of the not open authorization virtual SIM card of certain mobile communications operators, then server just inserts these operators Entity SIM card.The authentication key of the open authorization virtual SIM card of other mobile communications operators, then server or slotting There is the entity SIM card of these operators, or is stored with the virtual SIM card comprising authentication key of these operators.All adopt It is preferred embodiment with entity SIM card, the authentication key of SIM card each in this way is stored in each entity SIM card, is deposited without worrying Store up the safety of the server of authentication key.
If some entity SIM card is distributed to some terminal as virtual SIM card, finally by the entity by server SIM card carries out authentication calculations.If some data for including the virtual SIM card of authentication key is distributed to some terminal by server As virtual SIM card, then finally carrying out authentication calculations by the virtual SIM card that this includes authentication key.
Preferably, all SIM cards are initialized in advance and the EF file cache for the SIM card that initialization is completed exist by server In server.If can only be initialized in advance since various limitations can not be accomplished to initialize and cache all SIM cards in advance And part SIM card is cached, it can initialize in advance for different city or countries at this time and cache the SIM of approximately same number Card perhaps initializes and caches in advance the lower SIM card of rate or with combining the distribution of SIM card comprehensive with two factors of rate Close the SIM card for considering to determine to initialize and cache in advance.
Terminal corresponding with the fast authentication method of the SIM card is: in a first aspect, requesting virtual SIM to server Card, and the EF file that the SIM card distributed for receiving server transmission caches in the server.Second aspect receives in authentication The authorization data of heart transmission is simultaneously transmitted to server, also receives the Authentication Response data that server is sent and is transmitted in authentication The heart.
In order to connect server and communicate, terminal needs first to establish network connection, this can be there are many implementation. For example, the terminal has a modem and a wired or wireless network adapter, first connect by network adapter Enter wired or wireless local area network, the network is recycled to carry out subsequent operation.For another example, there are two modulation /demodulation for the terminal tool Device is inserted with entity SIM card in the first modem, first accesses mobile communication network by entity SIM card, recycle the network into Row subsequent operation.For another example, there are two modems for the terminal tool, and preserve the void comprising authentication key in nonvolatile manner Quasi- SIM card first accesses mobile communication network by the first modem by the virtual SIM card comprising authentication key, recycles The network carries out subsequent operation.
Above-mentioned server and terminal just constitute the fast authentication system of the virtual SIM card of the application.
Referring to Fig. 3, this is the method for authenticating between the mobile terminal and Authentication Center using virtual SIM card of the application One embodiment.Described method includes following steps.
Step 1 S301:SIM card powers on, and sends ATR message to server.The SIM card is generalized concept, including narrow sense The mobile terminals such as SIM card, R-UIM card, UICC card used in smart card.When the present age refers to UICC card, SIM card is primarily referred to as it In SIM application, USIM application, CSIM application and/or ISIM application.
Step 2 S302: PPS negotiation is carried out between server and SIM card.
Step 3 S303: server sends first message to SIM card, obtains the type of SIM card.
Step 4 S304: the basic EF file in server reading SIM card, and cache in the server.
Step 5 S305: the PIN code guard mode of server confirmation SIM card.Further to SIM if opening in PIN code protection Card carries out PIN code verification.If PIN code protection is not switched on, PIN code verification is omitted.
Step 6 S306: server to SIM card send initialization SIM application (or USIM application, CSIM application, ISIM application Deng) instruction.
Step 7 S307: the SIM application (or USIM application, CSIM application, ISIM application etc.) in server reading SIM card Under necessary EF file, and cache in the server.
Step 8 S308: server sends SIM application (or USIM application, CSIM application, ISIM application etc.) just to SIM card Beginningization completes instruction.
Step 9 S309: any terminal to server requests virtual SIM card.
Step 10 S310: server is to one SIM card of terminal distribution, and by the SIM card distributed in server buffer EF file is sent to terminal.
Step 11 S311: the Authentication Center of network side sends authorization data to terminal, and authorization data is sent to clothes by terminal Authorization data is sent to SIM card by business device, server.
Step 12 S312:SIM card carries out corresponding authentication operation, generates Authentication Response data and is sent to server, services Authentication Response data are sent to terminal by device, and Authentication Response data are sent to the Authentication Center of network side by terminal.
Compared with the implementation of existing virtual SIM card, the application has following technical advantage.
First, server has multiple SIM cards, if be just not required to using the preferred embodiment for being entirely entity SIM card The authorization for obtaining mobile communications operator can be realized.Authentication key is encrypted be stored in each entity SIM card, gets compromised Risk be much smaller than by multiple authentication key it is centrally stored in the server.
Second, the authentication scheme of existing entity SIM card or virtual SIM card, needs to carry out between terminal and SIM multiple Data interaction, such as step S101 shown in FIG. 1 to step S108.Each data interaction will expend certain time, therefore whole The authentication process needs of body consume a longer time.
The fast authentication scheme of the virtual SIM card of the application, SIM card is initialized and is cached the processes such as EF file in advance into Row, being equivalent in advance is active each SIM card.Once there is terminal to need virtual SIM card, server will just delay in advance The EF file for the SIM card distributed deposited is sent to rapidly terminal, immediately enters subsequent authentication process, to greatly reduce The time of whole authentication process.
The above is only preferred embodiment of the present application, it is not used to limit the application.Come for those skilled in the art It says, various changes and changes are possible in this application.Within the spirit and principles of this application, made any modification, equivalent Replacement, improvement etc., should be included within the scope of protection of this application.

Claims (10)

1. a kind of fast authentication method of virtual SIM card, characterized in that first with multiple SIM cards server to one or Multiple SIM card initialization, and the EF file of each SIM card of cache initialization completion;When any terminal to server is requested When virtual SIM card, server is one SIM card of the terminal distribution, and the EF text that the SIM card distributed is cached on the server Part issues the terminal;The terminal accesses mobile communication network, Authentication Center in access procedure using the EF file of received SIM card The authorization data of transmission is transmitted to server by the terminal, and authentication calculations are by the SIM card for distributing to the terminal in server Authentication Response data are carried out and obtain, Authentication Response data are transmitted to Authentication Center by the terminal by server again.
2. the fast authentication method of virtual SIM card according to claim 1, characterized in that described with multiple SIM cards When server initializes one or more SIM cards, it is initial to refer to that the server with multiple SIM cards carries out all SIM cards Change, and the EF file of all SIM cards of cache initialization completion.
3. the fast authentication method of virtual SIM card according to claim 1, characterized in that if what server was distributed SIM card not yet initializes, then server first initializes distributed SIM card, then on the server cache initialization complete The EF file of distributed SIM card.
4. the fast authentication method of virtual SIM card according to claim 1, characterized in that if what server was distributed SIM card has been completed to initialize, but not yet caches EF file on the server, then first cache initialization on the server is completed The EF file of distributed SIM card.
5. a kind of server for realizing virtual SIM card fast authentication, characterized in that the server has multiple SIM cards, these At least part in SIM card be initialised and by EF file cache in the server;The server is that terminal distribution is virtual SIM card, and the EF file that the virtual SIM card distributed caches in the server is issued into terminal;The server receiving terminal The authorization data from Authentication Center of forwarding, and transfer to the SIM card for distributing to the terminal to carry out authentication calculations and authenticated Authentication Response data are transmitted to Authentication Center by terminal by response data.
6. the server according to claim 5 for realizing virtual SIM card fast authentication, characterized in that the server institute The multiple SIM cards having either entity SIM card, or the virtual SIM card comprising authentication key.
7. the server according to claim 5 for realizing virtual SIM card fast authentication, characterized in that described with multiple The server of SIM card all SIM cards are initialized in advance and by EF file cache in the server.
8. the server according to claim 5 for realizing virtual SIM card fast authentication, characterized in that described with multiple The server of SIM card is according to the distribution of SIM card and/or rate selected section SIM card initializes and taking EF file cache It is engaged in device.
9. a kind of terminal for realizing virtual SIM card fast authentication, characterized in that the terminal to server requests virtual SIM card, And the EF file that the SIM card distributed for receiving server transmission caches in the server;The terminal receives Authentication Center hair The authorization data that send simultaneously is transmitted to server, also the Authentication Response data that send of reception server and is transmitted to Authentication Center.
10. a kind of virtual SIM card fast authentication system, characterized in that the system comprises any one of such as claims 5~8 The server and terminal as claimed in claim 9.
CN201610422338.5A 2016-06-15 2016-06-15 A kind of fast authentication method, system, server and the terminal of virtual SIM card Active CN106412887B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610422338.5A CN106412887B (en) 2016-06-15 2016-06-15 A kind of fast authentication method, system, server and the terminal of virtual SIM card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610422338.5A CN106412887B (en) 2016-06-15 2016-06-15 A kind of fast authentication method, system, server and the terminal of virtual SIM card

Publications (2)

Publication Number Publication Date
CN106412887A CN106412887A (en) 2017-02-15
CN106412887B true CN106412887B (en) 2019-11-26

Family

ID=58006681

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610422338.5A Active CN106412887B (en) 2016-06-15 2016-06-15 A kind of fast authentication method, system, server and the terminal of virtual SIM card

Country Status (1)

Country Link
CN (1) CN106412887B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107027115B (en) * 2017-04-18 2020-06-16 深圳融卡智能科技有限公司 Equipment and method for safely realizing soft SIM card

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101039480A (en) * 2007-04-11 2007-09-19 重庆重邮信科(集团)股份有限公司 Method for accessing quickly USIM card basic document of user terminal
CN103987025A (en) * 2014-06-06 2014-08-13 熊文俊 Roaming communication method based on mobile two-channel virtual card number authentication and roaming communication equipment based on mobile two-channel virtual card number authentication
CN104469771A (en) * 2014-12-12 2015-03-25 深圳市宜联畅游技术有限公司 Data transmission method for having access to cellular mobile network system and associated equipment
CN105101153A (en) * 2015-07-28 2015-11-25 集怡嘉数码科技(深圳)有限公司 Data roaming method, device and system
CN105208548A (en) * 2014-06-23 2015-12-30 香港优克网络技术有限公司 Data processing method, apparatus and terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102067474B1 (en) * 2012-08-29 2020-02-24 삼성전자 주식회사 Method for managing shared files and subscriber identidy apparatus embedded in user terminal using the method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101039480A (en) * 2007-04-11 2007-09-19 重庆重邮信科(集团)股份有限公司 Method for accessing quickly USIM card basic document of user terminal
CN103987025A (en) * 2014-06-06 2014-08-13 熊文俊 Roaming communication method based on mobile two-channel virtual card number authentication and roaming communication equipment based on mobile two-channel virtual card number authentication
CN105208548A (en) * 2014-06-23 2015-12-30 香港优克网络技术有限公司 Data processing method, apparatus and terminal
CN104469771A (en) * 2014-12-12 2015-03-25 深圳市宜联畅游技术有限公司 Data transmission method for having access to cellular mobile network system and associated equipment
CN105101153A (en) * 2015-07-28 2015-11-25 集怡嘉数码科技(深圳)有限公司 Data roaming method, device and system

Also Published As

Publication number Publication date
CN106412887A (en) 2017-02-15

Similar Documents

Publication Publication Date Title
US10362485B2 (en) Delegated profile and policy management
US10768918B2 (en) Method and device for downloading profile of operator
US10206106B2 (en) Methods and apparatus for delivering electronic identification components over a wireless network
US9817993B2 (en) UICCs embedded in terminals or removable therefrom
US10334443B2 (en) Method for configuring profile of subscriber authenticating module embedded and installed in terminal device, and apparatus using same
JP6035443B2 (en) Storage medium
US9754097B2 (en) Method for peer to peer mobile context authentication
US9705883B2 (en) Communications terminal and system and rights management method
CN104396289B (en) Allocate embedded user identity module
US10111089B2 (en) Method and apparatus for downloading a profile in a wireless communication system
US9769660B2 (en) Method for implementing SIM card function on terminal, terminal, and UICC
EP3041164B1 (en) Subscriber profile transfer method, subscriber profile transfer system, and user equipment
EP2861002B1 (en) Virtual user identification data distributing method and obtaining method, and devices
CA2869189C (en) Service sharing system and apparatus
KR101611773B1 (en) Methods, apparatuses and computer program products for identity management in a multi-network system
US10511959B2 (en) Method and terminal for keeping subscriber identity module card in standby state
EP2905715B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN104205891B (en) Virtual SIM card cloud platform
EP1601225B1 (en) Method and apparatus for secure duplication of SIM card informations
CN101202977B (en) Method and terminal for implementation of information sharing in mobile communication
CN101120569B (en) Remote access system and method for user to remotely access terminal equipment from subscriber terminal
JP5601729B2 (en) How to log into a mobile radio network
RU2415470C2 (en) Method of creating security code, method of using said code, programmable device for realising said method
JP5199132B2 (en) Method, apparatus, software for authentication of a device temporarily provided with a SIM to store a challenge response
CN103067381B (en) Usage platform side's account logs in the mthods, systems and devices of third party's service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant