EP1782647A1 - Reutilisation de donnees d'identite d'un module d'identite dans un equipement d'usager par un dispositif peripherique - Google Patents

Reutilisation de donnees d'identite d'un module d'identite dans un equipement d'usager par un dispositif peripherique

Info

Publication number
EP1782647A1
EP1782647A1 EP05752778A EP05752778A EP1782647A1 EP 1782647 A1 EP1782647 A1 EP 1782647A1 EP 05752778 A EP05752778 A EP 05752778A EP 05752778 A EP05752778 A EP 05752778A EP 1782647 A1 EP1782647 A1 EP 1782647A1
Authority
EP
European Patent Office
Prior art keywords
peripheral device
identity
identifiers
identity module
dpj
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05752778A
Other languages
German (de)
English (en)
French (fr)
Inventor
Mireille Pauliac
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemplus Card International SA
Gemplus SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus Card International SA, Gemplus SA filed Critical Gemplus Card International SA
Publication of EP1782647A1 publication Critical patent/EP1782647A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/43Security arrangements using identity modules using shared identity modules, e.g. SIM sharing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/10Mobility data transfer between location register and external networks

Definitions

  • the present invention generally relates to the interoperability between services offered via a user equipment communications network, for example a mobile radio network for mobile user terminals, and the functionalities of the network. access to a wireless local area network from a peripheral device connected to a user equipment. More particularly, the invention relates to reuse of identity data stored in a SIM card-like identity module of user equipment by a peripheral device, as recommended in the Technical Report 3GPP TR 33.817 V6 .0.0, "Feasibility Study on (U) SIM Reuse Security by Peripheral Devices on Local Interfaces", March 2004.
  • the aim of the invention is to provide a method that automatically and selectively allows a peripheral device to reuse identity data in an identity module of a user equipment, with a high level of security, so that the peripheral device can require the establishment of a call as if the user equipment had itself required the call.
  • the reuse of the identity data by the peripheral device is performed without any user intervention and under the supervision of the operator of the network. communications to which the identity module is attached.
  • a method for reusing identity data of an identity module in a user equipment by a peripheral device is characterized in that it comprises the following steps: prior storage of peripheral device identifiers in the identity module, transmission of the identifier of the peripheral device to the identity module during a communication establishment and authentication between the identity module and the peripheral device, comparing the identifier transmitted from the peripheral device to the identifiers previously stored in the identity module, and - transmitting the identity data by the identity module to the peripheral device when the transmitted identifier is recognized as one of the identifiers previously stored.
  • respective sets of identity identifiers of the identity module of the identity module are previously stored in association respectively with the identifiers of the peripheral devices in the identity module.
  • the method of reutilizing the identity data then comprises the following steps: after comparing peripheral device identifiers, transmitting a request including predetermined identity data identifiers from the peripheral device to the an identity module following a response of the identity module signaling that the transmitted identifier of the peripheral device belongs to the list, comparison of the identity data identifiers predetermined in the request to the identity data identifiers previously stored in the an identity module, and when all the predetermined identity data identifiers are recognized as identity data identifiers previously stored, transmission of the identity data designated by the recognized transmitted data identifiers among the data identifiers of identity associated with the device identifier, from the identity module to the peripheral device.
  • FIG. 1 is a block diagram of a telecommunications system for carrying out the method of reusing identity data according to the invention
  • FIG. 2 shows an algorithm of main steps of the method of reuse of identity data.
  • the entities are mainly a UE user equipment equipped with an identity module MI, one or more peripheral devices DP1 to DPJ, and a PF identifier management platform dedicated in particular to a reuse service of identity data.
  • the user equipment UE is a mobile radiocommunication terminal in which a removable user's smart card has been inserted attached to a digital radiocommunication network.
  • RR whose operator supplied the card as a removable identity module MI.
  • the smart card is a Subscriber Identity Module (SIM) card when the RR network is a second generation network of GSM or GSM / GPRS type, or a Universal Integred Circuit Card (UICC) when the RR network is of the third generation.
  • SIM Subscriber Identity Module
  • UICC Universal Integred Circuit Card
  • the cellular radiocommunication network RR is schematically represented in the context of a GSM network by principal means to which the UE user equipment is temporarily attached, such as a BTS base station, a BSC base station controller, an MSC mobile service switch associated with a VLR visitor location recorder, and a location recorder nominal HLR.
  • the base station is a node (NodeB)
  • the base station controller is a RNC (Radio Network Controller) network controller.
  • RNC Radio Network Controller
  • the network RI temporarily serves the user equipment UE when it is for example abroad and is connected in known manner to the home radio network RR.
  • Each peripheral device DPj is a device designated by the user of the identity module MI which can be connected to the equipment UE through a link LI, simultaneously or not to a communication radio between the EU equipment and the RR radio network.
  • Each peripheral device DPj may for example be a laptop, a personal digital assistant PDA, another mobile terminal for wireless LAN WLAN (WireLess Area Network), or a mobile terminal type GSM or UMTS.
  • the type of the communication link LI between the user equipment UE and the peripheral device DPj depends on the interfaces available in the equipment UE and the device DPj.
  • the link LI is a Bluetooth link or according to the 802.11b standard, or an infrared link or any other wireless link, or else is wired of the USB bus type (Universal Serial Bus).
  • the UE user equipment comprises not only a radio interface with the cellular network RR, but also a proximity link interface with at least one peripheral device DPj.
  • the proximity link interface allows the UE user equipment to simultaneously communicate with a plurality of peripheral devices.
  • the PF management platform and user equipment UE exchange requests and responses in the form of Short Message Service Center (CM) short messages through a short message center CM.
  • CM Short Message Service Center
  • the latter is connected directly or indirectly to the mobile service switch MSC in the home network RR and serves the platform PF through a high-speed telecommunications network RT such as the Internet.
  • the PF management platform is also connected to the home location register HLR directly or indirectly via the internet or a signaling network specific to the operator of the RR network, as well as peripheral devices DP1 to DPJ through the Internet RT and a wireless local area network RL of the WLAN type.
  • the RL short-range wireless LAN can comply with one of the 802.1Xx standards and can also meet the WiFi label.
  • the local short-range network RL is installed for example in a company, a hotel, or a public place such as a station or a shopping mall.
  • the local area network RL comprises several AP radio access points constituting radio terminals that can communicate with peripheral devices DP1 to DPJ within a radius of a few tens of meters.
  • the AP access points are interconnected by a distribution network, for example an intranet, through an access server connected to the Internet RT through xDSL lines, in order to offer packet communications to broadband to peripheral devices.
  • peripheral devices connected to the user equipment EU to the Internet RT so that this communication is equivalent to communication between the user equipment UE and the internet RT, the user equipment UE being then transparent to the network operator Radiocommunication RR.
  • Three types of communications can be initialized and used from the peripheral device DPj to the Internet RT: a communication through the user equipment UE via the link LI and through the fixed part of the network RR to which the identity module MI is connected, via the OTAl (Over The Air) radio interface, or - a communication directly with the RR network without using the EU equipment, or - a communication via OTA2 radio interface through the wireless local area network RL whose operator has signed an agreement with the operator of the RR network to which the identity module MI is attached, after allowing such communication via exchanges of requests and responses between the peripheral device DPj, the identity module MI in the UE user equipment and the RR network via the LI link and the first OTAl radio interface; simultaneously with this communication, the identity module MI can participate in a conventional communication via the UE user equipment, the
  • the identity module MI Prior to any communication from any peripheral device DP, the identity module MI stores in the EEPROM IDP IDI devices IDPJ DPl devices to DPJ that the user selects to connect them to the EU equipment and allow them to reuse respective identity data read in the MI identity module, and IDIj identifier sets of several identity data DI of the identity module MI associated respectively IDP IDPJ IDPJ peripheral devices DPl to DPJ in the identity module, as shown schematically in steps EOl and E02 in Figure 2.
  • IDPj identifier peripheral device DPj may be analogous to a MAC (Medium Access Control) address including a device manufacturer's identifier, a peripheral device type identifier and a serial number of the peripheral device.
  • MAC Medium Access Control
  • the identifier IDPj is the identifier which is included in a certificate of the peripheral device furthermore comprising a private key and a public key and registered in a secure module incorporated in the peripheral device DPj, of the TPM module type. (Trusted Platform Module).
  • the peripheral device DPj accesses a predetermined list of identity data of the identity module, regardless of the index j of the peripheral device. For example, the identity data that a peripheral device is likely to access is selected from the International Mobile Subscriber (IMSI) identifier.
  • IMSI International Mobile Subscriber
  • each peripheral device DPj whose identifier IDPj has been previously stored in the identity module MI in step E01 is only allowed to reuse a respective part DIj, or possibly the entire identity data of the identity module MI.
  • the association of the peripheral device identifier IDPj with identity data identifiers IDIj is stored in the identity module MI in step E02.
  • the operator of the home network RR registers in the platform PF the association of a identifier of the user identity module MI, such as the international identifier IMSI provided by the recorder HLR, to the list of identifiers IDPl to IDPJ communicated by the user in step EO1 and also the association of each IDPj identifier the
  • the list of identifiers of IDPJ IDPJ authorized peripheral devices and the IDIj list of identity data identifiers for each peripheral device DPj are then transmitted by the platform PF via the RR network, the radio interface OATl and the user equipment UE to the identity module MI which stores them, in steps E01 and E02.
  • the lists of identifiers are transmitted by the platform PF in response to a request to update the location of the mobile terminal, or following an authentication request, or after powering up the mobile terminal.
  • the user can modify the content of the list of identifiers IDPL IDPJ devices in the identity module MI devices by modifying the bit state of one activation / deactivation respectively associated with IDPL identifiers IDPJ.
  • An activation / deactivation is selected via the user graphical interface including in particular the keyboard and screen of the user equipment EU and is signaled by request to the platform PF via the OTAl interface, the RR network. and the center of short messages CM.
  • the PF platform follows, validates and thus makes any modification relating to the activations / deactivations decided by the user and possibly corrects them according to the user subscription profile that the platform PF can read in the home location register HLR.
  • the activation / deactivation bit of the identifier IDPj of the peripheral device DPj is set to the state " i " / "0" in the identity module MI from the user equipment UE after validation by the platform PF to retain / remove IDPj from IDP IDPJs previously stored in the identity module and peripheral devices that are allowed to reuse some identity data of the IM identity module.
  • the user of the identity module MI also has the option of selecting certain identity data identifiers previously stored in the identity module in order to add or remove certain identity data identifiers from the list of identity identifiers.
  • Each addition or removal of identity data identifier is validated by the PF platform.
  • an enable / disable bit is associated with each of the identity data identifiers previously stored IDIj.
  • the ID / ID identity data enable / disable bit is set to the "I" / "0" state in the MI identity module from the UE user equipment after validation by the platform.
  • PF to keep / remove the identifier IDIj from identity data identifiers previously stored in the identity module and associated with the peripheral device DPj.
  • the method of reusing identity data by any peripheral device DP identified by an IDP includes steps E1 to E9.
  • step E1 communication is established between the peripheral device DP and the identity module MI in the UE user equipment.
  • the link LI between the peripheral device DP and the user equipment EU is a Bluetooth link
  • a PIN identification code is entered both in the user equipment UE and the peripheral device DP which each establishes a link key according to parameters such as random numbers exchanged between them, the PIN code and their Bluetooth addresses.
  • the identity module MI authenticates the peripheral device DP by comparing a response it has determined and a response it has received from the peripheral device depending on the aforementioned parameters.
  • the peripheral device DP can proceed in a manner analogous to authentication of the identity module MI.
  • the peripheral device DP transmits its IDP ID to the identity module MI which stores it.
  • authentication of the peripheral device by the MI module, or mutual authentication between them is of the Transport Layer Security (TLS) type and can replace the previous authentication or complete it.
  • the identity module MI compares the transmitted identifier IDP of the peripheral device DP with the previously stored identifiers IDP1 to IDPJ of the peripheral devices DP1 to DPJ which have been previously authorized to reuse respective identity data in the identity module MI, in step E2.
  • the identity module MI commands a break of the communication with the DP device in the device. user equipment UE, and signals the user for example by displaying a message of the type "DP device not allowed" on the screen of the user equipment, in step E3.
  • the peripheral device DPj is not capable of selectively requesting identity data according to identity data identifiers, and the response REPL also contains the predetermined list of identity data of the identity module; the process then goes directly from step E4 to step E9, as indicated by dashed lines in FIG. 2.
  • the peripheral device DPj following the REPL response containing only the IDPj identifier, the peripheral device DPj establishes and transmits a request RQ including predetermined identity data identifiers IDI to the identity module DI, in step E5.
  • the identity module MI compares the IDI predetermined identity data identifiers transmitted in the request RQ by the peripheral device DPj, identity data identifiers pre-stored and associated with the identifier IDPj. If at least one of the identifiers IDI is not recognized in the list of identifiers IDIj, the identity module MI controls in step E7 in a manner analogous to step E3, a break of the communication with the device DPj in the user equipment UE, and signals it to the user for example by displaying a message of the type "reading of unauthorized identity data" on the screen of the user equipment US.
  • the identity module MI controls the transmission of a response REP2 to the peripheral device DPj.
  • step E9 following the response REP1 with the predetermined list of identity data of the identity module transmitted in step E4 according to the simple variant, or following the response REP2 transmitted to the step E8 with the identity data DIj designated respectively by the identifiers the
  • the peripheral device DPj can fulfill the identification functions initially provided by the identity module MI by reusing at least part of the identity data DIj transmitted in the REPL / 2 response in particular so that the recorder nominal localization HLR in the network RR authenticates the peripheral device DPj, that is to say the user of the module MI, to establish a communication especially to the Internet RT, or with the network RR through the link LI, the EU user equipment and the OTAl radio interface, either with the wireless LAN RL through the OTA2 radio interface.
  • the invention is not limited to the short-range network as an RL network.
  • the second network RL may be another communications network, for example a cellular or cellular telephone network of the GSM or UMTS type.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)
EP05752778A 2004-06-28 2005-05-19 Reutilisation de donnees d'identite d'un module d'identite dans un equipement d'usager par un dispositif peripherique Withdrawn EP1782647A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR0407047A FR2872366B1 (fr) 2004-06-28 2004-06-28 Reutilisation de donnees d'identite d'un module d'identite dans un equipement d'usager par un dispositif peripherique
PCT/EP2005/052308 WO2006000502A1 (fr) 2004-06-28 2005-05-19 Reutilisation de donnees d'identite d'un module d'identite dans un equipement d'usager par un dispositif peripherique

Publications (1)

Publication Number Publication Date
EP1782647A1 true EP1782647A1 (fr) 2007-05-09

Family

ID=34946368

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05752778A Withdrawn EP1782647A1 (fr) 2004-06-28 2005-05-19 Reutilisation de donnees d'identite d'un module d'identite dans un equipement d'usager par un dispositif peripherique

Country Status (6)

Country Link
US (1) US8700000B2 (ja)
EP (1) EP1782647A1 (ja)
JP (1) JP4729664B2 (ja)
CN (1) CN101006739B (ja)
FR (1) FR2872366B1 (ja)
WO (1) WO2006000502A1 (ja)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8270947B2 (en) * 2005-12-19 2012-09-18 Motorola Solutions, Inc. Method and apparatus for providing a supplicant access to a requested service
US7831237B2 (en) 2006-02-03 2010-11-09 Broadcom Corporation Authenticating mobile network provider equipment
CN101419651A (zh) * 2007-10-23 2009-04-29 鸿富锦精密工业(深圳)有限公司 具有外设使用权管理功能的电子装置及方法
US20100079239A1 (en) * 2008-09-29 2010-04-01 Riddhiman Ghosh Repurposing User Identity Tokens
US8571522B2 (en) * 2008-11-27 2013-10-29 Zte Corporation Authentication method for the mobile terminal and a system thereof
JP5424025B2 (ja) * 2009-04-20 2014-02-26 日本電気株式会社 移動通信システム、主携帯通信端末、副携帯通信端末および移動通信方法
EP2460371B1 (en) * 2009-07-31 2020-04-08 Samsung Electronics Co., Ltd. Method and apparatus for creating security context and managing communication in mobile communication network
JP5430668B2 (ja) * 2009-10-20 2014-03-05 キヤノン株式会社 周辺装置と通信する情報処理装置、方法、制御プログラム
CN113536276A (zh) * 2013-01-15 2021-10-22 施耐德电气美国股份有限公司 安全访问可编程装置的系统和方法
EP3005765A4 (en) * 2013-05-29 2016-06-29 Visa Int Service Ass VERIFICATION SYSTEMS AND METHODS EXECUTED AT A SECURE ELEMENT
JP6318868B2 (ja) * 2014-05-30 2018-05-09 凸版印刷株式会社 認証システム、及び携帯通信端末
JP2017073611A (ja) * 2015-10-05 2017-04-13 任天堂株式会社 情報処理システム、無線通信チップ、周辺機器、サーバ、アプリケーションプログラム、および情報処理方法
US9838991B1 (en) 2016-08-15 2017-12-05 At&T Intellectual Property I, L.P. Method and apparatus for managing mobile subscriber identification information according to registration requests
US9967732B2 (en) 2016-08-15 2018-05-08 At&T Intellectual Property I, L.P. Method and apparatus for managing mobile subscriber identification information according to registration errors
US9843922B1 (en) 2016-09-14 2017-12-12 At&T Intellectual Property I, L.P. Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration errors
US9814010B1 (en) 2016-09-14 2017-11-07 At&T Intellectual Property I, L.P. Method and apparatus for utilizing mobile subscriber identification information with multiple devices based on registration requests
US9924347B1 (en) 2016-09-14 2018-03-20 At&T Intellectual Property I, L.P. Method and apparatus for reassigning mobile subscriber identification information
US9794905B1 (en) * 2016-09-14 2017-10-17 At&T Mobility Ii Llc Method and apparatus for assigning mobile subscriber identification information to multiple devices according to location
US10015764B2 (en) 2016-09-14 2018-07-03 At&T Intellectual Property I, L.P. Method and apparatus for assigning mobile subscriber identification information to multiple devices
US9906943B1 (en) 2016-09-29 2018-02-27 At&T Intellectual Property I, L.P. Method and apparatus for provisioning mobile subscriber identification information to multiple devices and provisioning network elements
US9918220B1 (en) 2016-10-17 2018-03-13 At&T Intellectual Property I, L.P. Method and apparatus for managing and reusing mobile subscriber identification information to multiple devices
US10070303B2 (en) 2016-11-11 2018-09-04 At&T Intellectual Property I, L.P. Method and apparatus for provisioning of multiple devices with mobile subscriber identification information
US10341842B2 (en) 2016-12-01 2019-07-02 At&T Intellectual Property I, L.P. Method and apparatus for using temporary mobile subscriber identification information in a device to provide services for a limited time period
US10070407B2 (en) 2016-12-01 2018-09-04 At&T Intellectual Property I, L.P. Method and apparatus for using active and inactive mobile subscriber identification information in a device to provide services for a limited time period
US10136305B2 (en) 2016-12-01 2018-11-20 At&T Intellectual Property I, L.P. Method and apparatus for using mobile subscriber identification information for multiple device profiles for a device
US10231204B2 (en) 2016-12-05 2019-03-12 At&T Intellectual Property I, L.P. Methods, systems, and devices for registering a communication device utilizing a virtual network
CN113692729A (zh) 2019-04-26 2021-11-23 飞力凯网路股份有限公司 信息处理设备、信息处理方法和程序
KR20220052115A (ko) * 2020-10-20 2022-04-27 삼성전자주식회사 디스플레이 장치, 전자 장치 및 그 동작 방법

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2806568A1 (fr) * 2000-03-14 2001-09-21 Bosch Gmbh Robert Procede pour generer des donnees d'identification et d'authentification
WO2004002176A1 (en) * 2002-06-24 2003-12-31 Kabushiki Kaisha Toshiba Authenticating multiple devices simultaneously using a single wireless subscriber identity module

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5553314A (en) * 1994-04-12 1996-09-03 Motorola, Inc. Method of configuring a communication unit using a wireless portable configuration device
FI109445B (fi) * 1999-08-06 2002-07-31 Nokia Corp Menetelmä käyttäjän tunnistetietojen välitämiseksi langattomaan viestimeen
JP3711394B2 (ja) * 2000-05-15 2005-11-02 株式会社神戸製鋼所 無線通信システム,それを構成する携帯電話機,外部機器,及び無線通信方法
US6871243B2 (en) * 2000-12-28 2005-03-22 Kabushiki Kaisha Toshiba Image processing system that communicates with a portable device having user information
JP2003143326A (ja) * 2001-11-07 2003-05-16 Canon Inc 無線通信システム、情報機器、公衆回線端末、電子認証カード、ペアリングid設定方法、記憶媒体、及びプログラム
SE0104325D0 (sv) * 2001-12-20 2001-12-20 Ericsson Telefon Ab L M A method and apparatus for switching access between mobile networks
WO2004019566A2 (en) * 2002-08-23 2004-03-04 Matsushita Electric Industrial Co., Ltd. Wireless communication system
DE602004025952D1 (de) * 2003-08-13 2010-04-22 Roamware Inc Signalisierungs-Gateway mit einem Mehrfach-Imsi-Mit-Mehrfach-MSISDN (MIMM) Dienst in einem einzigen SIM für mehrere Roaming-Partner
WO2005017693A2 (en) * 2003-08-13 2005-02-24 Roamware, Inc. Multiple imsi multiple/single msisdn (mimm/mism) on multiple sims for a single operator
TWI252645B (en) * 2004-12-30 2006-04-01 Inventec Appliances Corp Method for automatically restoring the communication settings for mobile device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2806568A1 (fr) * 2000-03-14 2001-09-21 Bosch Gmbh Robert Procede pour generer des donnees d'identification et d'authentification
WO2004002176A1 (en) * 2002-06-24 2003-12-31 Kabushiki Kaisha Toshiba Authenticating multiple devices simultaneously using a single wireless subscriber identity module

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2006000502A1 *

Also Published As

Publication number Publication date
JP2008504759A (ja) 2008-02-14
JP4729664B2 (ja) 2011-07-20
CN101006739A (zh) 2007-07-25
FR2872366A1 (fr) 2005-12-30
WO2006000502A1 (fr) 2006-01-05
US20080293377A1 (en) 2008-11-27
CN101006739B (zh) 2013-05-22
FR2872366B1 (fr) 2006-08-18
US8700000B2 (en) 2014-04-15

Similar Documents

Publication Publication Date Title
EP1782647A1 (fr) Reutilisation de donnees d'identite d'un module d'identite dans un equipement d'usager par un dispositif peripherique
KR101438243B1 (ko) Sim 기반 인증방법
CN101606372B (zh) 支持无uicc呼叫
US5991407A (en) Subscriber authentication in a mobile communications system
US8792641B2 (en) Secure wireless communication
FI110974B (fi) Laskurin alustaminen, erityisesti radiokehyksiä varten
JP4263384B2 (ja) ユーザ加入識別モジュールの認証についての改善された方法
EP1758417B1 (en) Authentication method
US9668139B2 (en) Secure negotiation of authentication capabilities
US20050239441A1 (en) Subscriber authentication for unlicensed mobile access signaling
US20070115886A1 (en) Method of verifying integrity of an access point on a wireless network
AU2005317777B2 (en) Method for producing authentication information
AU5718599A (en) Efficient authentication with key update
US20070213029A1 (en) System and Method for Provisioning of Emergency Calls in a Shared Resource Network
WO2000002407A3 (en) Authentication in a telecommunications network
WO2004006532A1 (fr) Procede et organe pour controler l'acces a un systeme cellulaire de radiocommunication a travers un reseaju local sans fil
US7630345B2 (en) HRPD network access authentication method based on CAVE algorithm
JP2003501891A (ja) 安全に通信するための方法及び装置
CN101163003A (zh) Sim卡使用umts终端和umts系统时终端认证网络的系统和方法
CN102318386A (zh) 向网络的基于服务的认证
KR20040053353A (ko) 이동 전화기의 인증
CN101926188A (zh) 对通信终端的安全策略分发
US20220279471A1 (en) Wireless communication method for registration procedure
CN104982053A (zh) 用于获得认证无线设备的永久身份的方法和网络节点
US20030105962A1 (en) Apparatus, and associated method, for facilitating authentication of a mobile station with a core network

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070127

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR

17Q First examination report despatched

Effective date: 20070702

DAX Request for extension of the european patent (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: GEMALTO SA

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20130405