WO2010139170A1 - 锁卡方法、客户识别模块卡以及移动终端 - Google Patents

锁卡方法、客户识别模块卡以及移动终端 Download PDF

Info

Publication number
WO2010139170A1
WO2010139170A1 PCT/CN2009/075777 CN2009075777W WO2010139170A1 WO 2010139170 A1 WO2010139170 A1 WO 2010139170A1 CN 2009075777 W CN2009075777 W CN 2009075777W WO 2010139170 A1 WO2010139170 A1 WO 2010139170A1
Authority
WO
WIPO (PCT)
Prior art keywords
sim card
mobile terminal
key
key information
group
Prior art date
Application number
PCT/CN2009/075777
Other languages
English (en)
French (fr)
Inventor
张更
赖敏
范雪峰
杨淑娟
李新宇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2010139170A1 publication Critical patent/WO2010139170A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications

Definitions

  • Lock card method customer identification module card and mobile terminal
  • the present invention relates to the field of communications, and in particular to a lock card method, a SIM (Subscriber Identity Module) card, and a mobile terminal.
  • a lock card method a SIM (Subscriber Identity Module) card
  • SIM Subscriber Identity Module
  • Step 1 Send a terminal configuration instruction to a SIM card through a mobile terminal;
  • Step 2 The SIM card receives the terminal configuration command and requests the mobile terminal to return an IMEI (International Mobie Equipment Identity) number;
  • IMEI International Mobie Equipment Identity
  • Step 3 The mobile terminal returns an encrypted IMEI number to the SIM card.
  • the SIM card stores the decrypted encrypted IMEI number and performs step 4;
  • the IMEI number in the SIM card is not empty and is the same as the decrypted encrypted IMEI number, step 4 is performed;
  • step four performing normal initialization of the mobile terminal.
  • the present invention has been made in view of the problem of the lack of a method for implementing a multi-to-many locking of a mobile terminal and a SIM card in the related art. Accordingly, it is a primary object of the present invention to provide an improved locking scheme involving a card locking method, a SIM card, and a mobile Terminal to solve the above problem.
  • a lock card method comprising:
  • the SIM card sends an authorization command and an authorization feature value to the mobile terminal, where the authorization feature value is data for locking the mobile terminal and the SIM card;
  • the SIM card verifies the key information, and encrypts the authorization feature value according to the key corresponding to the key information that is verified to generate a second group of ciphertexts;
  • the SIM card compares the first group of ciphertexts with the second group of ciphertexts, and the SIM card and the mobile terminal are normally initialized when the comparison result is consistent.
  • the method further includes:
  • the mobile terminal encrypts the authorization feature value by using a key corresponding to the key information according to the authorization instruction, to obtain the first group of ciphertexts, and sending the first group of ciphertexts to the SIM card.
  • the process of verifying the key information by the SIM card includes:
  • the SIM card determination office Whether the key of the mobile terminal is a locally stored SIM card key, and if so, the key information is verified to pass, otherwise, the key information is not verified.
  • the process of verifying the key information by the SIM card includes:
  • the SIM card determines whether the key group number is a key group number of a locally stored SIM card, and if yes, verifying the key information. Pass, otherwise, the key information insurance certificate does not pass.
  • the method further includes:
  • the SIM card sets the network rights flag to FALSE.
  • the method further includes:
  • the SIM card sets the network rights flag to TRUE; if the results of the comparison are inconsistent, the SIM card sets the network rights flag to FALSE.
  • a SIM card including:
  • a first sending module configured to send an authorization command and an authorization feature value to the mobile terminal, where the authorization feature value is a set of data used to lock the mobile terminal and the SIM card;
  • a verification module configured to verify the key information
  • the encryption module is configured to encrypt the authorization feature value according to the key corresponding to the key information verified by the verification module to generate a second group of ciphertexts;
  • the verification module includes:
  • a first verification submodule configured to determine, if the key information is a key of the mobile terminal, whether the key of the mobile terminal is a locally stored SIM card key, and if yes, The key information 3 is passed through, otherwise, the key information 3 is not passed.
  • the verification module includes:
  • a second verification submodule configured to determine, in the case that the key information is a key group number, whether the key group number is a key group number of a locally stored SIM card, and if yes, The key information is verified, otherwise, the key information is not verified.
  • a setting module for setting a network rights flag for setting a network rights flag.
  • a mobile terminal includes:
  • a second receiving module configured to receive an authorization command and an authorization feature value from the SIM card, where the authorization feature value is data used to lock the mobile terminal and the SIM card; Encrypting the authorization feature value according to the authorization instruction received by the second receiving module to obtain the first group of ciphertexts;
  • a second sending module configured to send the key information of the key and the first set of ciphertext to the SIM card.
  • the invention adopts the SIM card to verify the ciphertext sent by the mobile terminal according to the key information sent by the mobile terminal, and solves the problem of multi-to-many locking of the mobile terminal and the SIM card in the related art, and realizes the mobile terminal and the SIM card. Many-to-many locking.
  • FIG. 1 is a flow chart of a method of locking a card according to an embodiment of the present invention
  • FIG. 2 is a specific flow chart of a lock card method according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram showing the structure of a SIM card according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of a specific structure of a SIM card according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a structure of a mobile terminal according to an embodiment of the present invention.
  • the embodiment provides a lock card solution.
  • the processing principle of the solution is as follows: During the boot process, the SIM card sends the authorization command and the authorized feature value to the mobile terminal; after the authorization command received by the mobile terminal is saved by itself
  • the key encrypts the authorization feature value and generates a set of ciphertext; the mobile terminal sends the ciphertext result of the group and the key information held by the mobile terminal to the SIM card; and the SIM card performs legality verification on the received key information;
  • the SIM card encrypts the authorized feature value according to the received legal key information and generates a set of ciphertexts.
  • the SIM card compares the two sets of ciphertext results. When the results are consistent, the mobile terminal initializes normally.
  • FIG. 1 is a flowchart of a lock card method according to an embodiment of the present invention. As shown in FIG. 1, the method includes the following steps S102 to S108:
  • Step S102 The client identification module sends a authorization command and an authorization feature value to the mobile terminal, where the authorization feature value is a set of data used for locking the mobile terminal.
  • step S102 the SIM card sets the network rights flag to FALSE.
  • the mobile terminal After the SIM card sends the authorization command and the authorization feature value to the mobile terminal, the mobile terminal receives the authorization command and the authorization feature value, and encrypts the authorization feature value according to the authorization command using the key corresponding to the key information to obtain the first group of secrets. Text, and send the first set of ciphertext to the SIM card.
  • Step S104 The SIM card receives the first group of ciphertext and key information from the mobile terminal, where The first set of ciphertext is a ciphertext obtained by the mobile terminal encrypting the authorized feature value according to the key information.
  • Step S106 The SIM card verifies the key information, and encrypts the authorization feature value according to the key information verified by the verification, to generate a second group of ciphertext, where the key information may be the key of the mobile terminal or the secret of the SIM. Key group number. Therefore, the SIM card verifies the key information in two cases:
  • the SIM card determines whether the key of the mobile terminal is a locally stored SIM card key (ie, when the key information is the key of the mobile terminal) The SIM card performs matching verification on the key of the mobile terminal and the SIM card key. If yes, the key information 3 passes the certificate, otherwise, the key information 3 fails to pass the certificate.
  • the SIM card determines whether the key group number is the key group number of the locally stored SIM card, and if so, the key information is verified (SIM) The card extracts the corresponding SIM card key according to the key group number. Otherwise, the key information verification fails.
  • Step S108 The SIM card compares the first group of ciphertexts with the second group of ciphertexts. If the comparison result is consistent, the SIM card sets the network rights identification flag to TRUE, and then the SIM card and the mobile terminal are normally initialized; if the comparison result is inconsistent , the SIM card sets the network rights flag to FALSE.
  • N sets of keys for authorizing the mobile terminal are saved, and a set of keys held by the mobile terminal itself are saved in the mobile terminal, and the set of keys can be saved in the NV (Non-Volatile) memory or in the program; N sets of keys in the SIM card are provided by the operator, and the operator assigns a set of keys to each mobile terminal setting manufacturer.
  • FIG. 2 is a specific flowchart of a method for locking a card according to an embodiment of the present invention. As shown in FIG. 2, the method for locking a card disclosed in the present invention includes the following steps:
  • Step S201 After the power is turned on, the SIM card sets the network rights identification flag to FALSE, that is, the SIM card is temporarily not allowed to perform network rights authentication, and the mobile terminal waits for the SIM card authorization command after being powered on;
  • STK SIM Tool Kit
  • Step S203 After receiving the authorization command sent by the SIM card and the random number of the 16 Bytes, the mobile terminal encrypts the random number of 16 Bytes by using the key saved by itself; when using the ICCID (ICCID), the integrated circuit card is first used for encryption.
  • the identification code is used as a decentralization factor to distribute the key, generate a distributed key, and then encrypt the 16 Bytes random number by using the distributed key; the generated ciphertext data includes the encryption result and the key group number used by the mobile terminal;
  • the terminal does not allow the mobile terminal to use the authorization command from the SIM card during the boot process (emergency call only).
  • Step S204 The mobile terminal returns the ciphertext result as a return value of the SIM card authorization command to the SIM card.
  • Step S205 After receiving the ciphertext result returned by the mobile terminal, the SIM card performs the same encryption process as the terminal by using the same key according to the key group number indicated in the ciphertext, and generates a set of ciphertext results; The two sets of ciphertext results are compared. If the structure is consistent, step S206 is performed. Otherwise, the SIM card network right identification flag is still set to FALSE, and the SIM card is not allowed to perform network rights authentication.
  • Step S206 The SIM card sets the network rights flag to TRUE, and then performs network rights check. At the same time, sends a REFRESH command to the mobile terminal, requesting the terminal to restart hotly, so as to register to the network.
  • Step S207 After the mobile terminal is warmed up, the SIM card is re-initialized, registered to the network, and the terminal starts normally.
  • the SIM card performs a multi-to-many locking of the card to the mobile terminal, thereby effectively protecting the security of the internal card of a certain group.
  • Device embodiment 1
  • FIG. 3 is a schematic diagram of a structure of a SIM card according to an embodiment of the present invention.
  • the SIM card includes: a first sending module 32, and a first receiving. Module 34, verification module 36, encryption module 38, comparison module 30. The structure will be described in detail below.
  • the first sending module 32 is configured to send an authorization command and an authorization feature value to the mobile terminal, where the authorization feature value is a set of data used for locking the mobile terminal and the SIM card; and the first receiving module 34 is configured to receive the a first set of ciphertext and key information of the mobile terminal, where the first set of ciphertext is a ciphertext obtained by the mobile terminal encrypting the authorized feature value according to the key information;
  • the verification module 36 is connected to the first receiving module 34, For verifying the key information received by the first receiving module 34, the encryption module 38 is connected to the verification module 36 for encrypting the authorized feature value according to the key information verified by the verification module 36 (ie, according to the received The legal key information encrypts the authorized feature value and generates a set of ciphertexts to generate a second set of ciphertexts;
  • the comparison module 30 is connected to the ciphering module 38 for comparing the first ciphertext and the second ciphertext. If the comparison results are consistent, the SIM
  • the key information may be the key of the mobile terminal or the key group number of the SIM.
  • FIG. 4 is a schematic diagram of a specific structure of a SIM card according to an embodiment of the present invention. As shown in FIG. 4, the SIM card further includes: a first verification submodule 44 and a second verification submodule 46. The structure will be described in detail below.
  • the first verification sub-module 44 is configured to determine, if the key information is a key of the mobile terminal, whether the key of the mobile terminal is a locally stored SIM card key, and if yes, verify the key information, Otherwise, the verification of the key information does not pass.
  • the second verification sub-module 46 is configured to determine, if the key information is a key group number, whether the key group number is a key group number of the locally stored SIM card, and if yes, verify the key information. After (the SIM card extracts the corresponding SIM card key according to the key group number), otherwise, the key information verification fails.
  • the SIM card further includes: a setting module 42.
  • the setting module 42 is connected to the first transmitting module 32 and the comparing module 30 for setting the network authority flag.
  • the network rights flag bit is set to FALSE before the authorization command and the authorization feature value are sent to the mobile terminal.
  • the setting module 42 is further configured to: when the comparison module 30 compares the first group of ciphertexts with the second group of ciphertexts, If the comparison result is consistent, the SIM card sets the network rights flag to TRUE. If the comparison result is inconsistent, the SIM card sets the network rights flag to FALSE.
  • the multi-to-many locking of the machine card is realized by the authorization of the SIM card to the mobile terminal.
  • FIG. 5 is a schematic diagram of a structure of a mobile terminal according to an embodiment of the present invention.
  • the mobile terminal includes a second receiving module 52, an encryption module 54, The second transmitting module 56 will be described in detail below.
  • the second receiving module 52 is configured to receive an authorization command and an authorization feature value from the SIM card, where the authorization feature value is a set of data used to lock the mobile terminal and the SIM card;
  • the encryption module 54 is connected to the second receiving The module 52 is configured to encrypt the authorization feature value by using the key according to the authorization instruction received by the second receiving module 52 to obtain the first group of ciphertexts;
  • the second sending module 56 is connected to the encryption module 54 for transmitting the secret to the SIM card.
  • the key information of the key and the first set of ciphertext is configured to receive an authorization command and an authorization feature value from the SIM card, where the authorization feature value is a set of data used to lock the mobile terminal and the SIM card;
  • the encryption module 54 is connected to the second receiving The module 52 is configured to encrypt the authorization feature value by using the key according to the authorization instruction received by the second receiving module 52 to obtain the first group of ciphertexts;
  • the second sending module 56 is connected to the encryption module 54 for transmitting the secret to the SIM card.
  • the key information may be a key of the mobile terminal or a key group number of the SIM.
  • each terminal since each terminal has a set of valid keys, when the SIM card is used on all of the specific types of mobile terminal devices, the authorization is successful, and Ordinary terminal equipment will fail to authorize, thus achieving a "" ⁇ lock on multiple machines; at the same time, because during the boot process, the mobile terminal needs to wait for a valid authorization command, so Realize the locking of one machine to multiple cards; thus realize the many-to-many locking of the machine cards in the fixed group, and allow the machine cards to be used interchangeably within the group.
  • the SIM card uses multiple sets of keys, and the mobile terminal uses the SIM card, the operator can assign the manufacturing of the terminal settings to different terminal device manufacturers without affecting the many-to-many locking of the card.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device, or they may be separately fabricated into individual integrated circuit modules, or they may be Multiple modules or steps are made into a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Description

锁卡方法、 客户识别模块卡以及移动终端 技术领域
本发明涉及通信领域, 具体而言, 涉及一种锁卡方法、 SIM ( Subscriber Identity Module, 客户识别模块)卡以及移动终端。 背景技术
现在运营商为了发展自己的用户群体, 通常会通过定制的方式将特殊 的服务提供给固定群体(例如, 某企业内部), 允许该群体内的人员享受这 种服务,为了防止将这种定制的话机被运用到其他的网络,或者专用的 SIM 卡被用于别的移动终端, 就要求移动终端具有锁卡的功能。 现有大多技术 都是通过自动 PIN码, 或者, 机卡一方保存一份唯一识别对方的标识来实 现机卡的锁定。
相关技术中公开了一种移动终端锁卡方法, 该方法包括以下几个步骤: 步骤一, 通过一移动终端向一 SIM卡发送一终端配置指令;
步骤二, 所述 SIM卡接收所述终端配置指令并请求所述移动终端返回 一力口密 IMEI ( International Mobie Equipment Identity, 国际移动装备识别码 ) 号;
步骤三,所述移动终端返回一加密 IMEI号给所述 SIM卡, 当所述 SIM 卡中的 IMEI号为空时,所述 SIM卡存入经过解密的所述加密 IMEI号并执 行步骤四;当所述 SIM卡中的 IMEI号不为空且与经过解密的所述加密 IMEI 号相同时, 执行步骤四;
及步骤四, 进行所述移动终端正常初始化。
可见目前的技术中, 一旦锁定机卡双方就会锁死, 即, 被锁定的机子 不能再使用其他的卡, 被锁定的卡也不允许被使用到其他的机子上。 针对相关技术中缺少移动终端和 SIM 卡多对多锁定的实现方法的问 题, 目前尚未提出有效的解决方案。 发明内容
针对相关技术中缺少移动终端和 SIM卡多对多锁定的实现方法的问题 而提出本发明, 为此, 本发明的主要目的在于提供一种改进的锁定方案, 涉及锁卡方法、 SIM卡以及移动终端, 以解决上述问题。
为了实现上述目的, 本发明的技术方案是这样实现的:
一种锁卡方法, 包括:
SIM 卡向移动终端发送授权指令和授权特征值, 其中, 所述授权特征 值是用于对所述移动终端和所述 SIM卡进行锁定的数据;
所述 SIM卡接收来自所述移动终端的第一组密文和密钥信息, 其中, 所述第一组密文为所述移动终端根据所述密钥信息对应的密钥对所述授权 特征值进行加密得到的密文;
所述 SIM卡对所述密钥信息进行验证, 并根据验证通过的所述密钥信 息对应的密钥对所述授权特征值进行加密, 生成第二组密文;
所述 SIM卡比较所述第一组密文和所述第二组密文, 在比较结果一致 时该 SIM卡和所述移动终端正常初始化。
在所述 SIM卡向所述移动终端发送所述授权指令和所述授权特征值之 后, 该方法还包括:
所述移动终端接收所述授权指令和所述授权特征值;
所述移动终端根据所述授权指令使用所述密钥信息对应的密钥对所述 授权特征值进行加密, 得到所述第一组密文, 并将所述第一组密文发送给 所述 SIM卡。
所述 SIM卡对所述密钥信息进行验证的过程包括:
在所述密钥信息为所述移动终端的密钥的情况下, 所述 SIM卡判断所 述移动终端的密钥是否为本地存储的 SIM卡密钥, 如果是, 则对所述密钥 信息验证通过, 否则, 对所述密钥信息验证不通过。
所述 SIM卡对所述密钥信息进行验证的过程包括:
在所述密钥信息为密钥组号的情况下, 所述 SIM卡判断所述密钥组号 是否为本地存储的 SIM卡的密钥组号, 如果是, 则对所述密钥信息验证通 过, 否则, 对所述密钥信息险证不通过。
在所述 SIM卡向所述移动终端发送所述授权指令和所述授权特征值之 前, 该方法还包括:
所述 SIM卡将网络权鉴标志位设置为 FALSE。
在所述 SIM卡比较所述第一组密文和所述第二组密文时, 该方法还包 括:
如果所述比较的结果一致, 则所述 SIM卡将所述网络权鉴标志为设置 为 TRUE; 如果所述比较的结果不一致, 则所述 SIM卡将网络权鉴标志位 设置为 FALSE。
一种 SIM卡, 包括:
第一发送模块, 用于向移动终端发送授权指令和授权特征值, 其中, 所述授权特征值是用于对所述移动终端和本 SIM卡进行锁定的一组数据; 第一接收模块, 用于接收来自于所述移动终端的第一组密文和密钥信 息, 其中, 所述第一组密文为所述移动终端根据所述密钥信息对应的密钥 对所述授权特征值进行加密得到的密文;
验证模块, 用于对所述密钥信息进行验证;
加密模块, 用于根据所述验证模块验证通过的所述密钥信息对应的密 钥对所述授权特征值进行加密, 生成第二组密文;
比较模块, 用于比较所述第一组密文和所述第二组密文, 在比较结果 一致时触发本 SIM卡和所述移动终端正常初始化。 所述验证模块包括:
第一验证子模块, 用于在所述密钥信息为所述移动终端的密钥的情况 下, 判断所述移动终端的密钥是否为本地存储的 SIM卡密钥, 如果是, 则 对所述密钥信息 3全证通过, 否则, 对所述密钥信息 3全证不通过。
所述验证模块包括:
第二验证子模块, 用于在所述密钥信息为密钥组号的情况下, 判断所 述密钥组号是否为本地存储的 SIM卡的密钥组号, 如果是, 则对所述密钥 信息验证通过, 否则, 对所述密钥信息验证不通过。
还包括:
设置模块, 用于设置网络权鉴标志位。
一种移动终端, 包括:
第二接收模块, 用于接收来自于 SIM卡的授权指令和授权特征值, 其 中,所述授权特征值是用于对所述移动终端和所述 SIM卡进行锁定的数据; 加密模块, 用于根据所述第二接收模块接收的所述授权指令使用密钥 对所述授权特征值进行加密, 得到所述第一组密文;
第二发送模块, 用于向所述 SIM卡发送所述密钥的密钥信息和所述第 一组密文。
通过本发明, 采用了 SIM卡根据移动终端发送的密钥信息对该移动终 端发送的密文进行验证, 解决了相关技术中移动终端和 SIM卡多对多锁定 的问题, 实现了移动终端和 SIM卡多对多的锁定。 附图说明
图 1是根据本发明实施例的锁卡方法的流程图;
图 2是根据本发明实施例的锁卡方法具体的流程图;
图 3是根据本发明实施例的 SIM卡的结构的示意图;
图 4是根据本发明实施例的 SIM卡的具体结构的示意图; 图 5是根据本发明实施例的移动终端的结构的示意图。 具体实施方式 本实施例提供了一种锁卡方案, 该方案的处理原则如下: 在开机过程 中, SIM 卡发送授权指令和授权特征值给移动终端; 移动终端收到的授权 指令后利用自身保存的密钥对授权特征值进行加密并生成一组密文; 移动 终端将该组密文结果和自身所持的密钥信息发送给 SIM卡; SIM卡对收到 的密钥信息进行合法性验证; SIM 卡根据收到的合法密钥信息加密对所述 的授权特征值进行加密并生成一组密文; SIM 卡比较两组密文结果, 当结 果一致时, 移动终端正常初始化。
需要说明的是, 在不沖突的情况下, 本申请中的实施例及实施例中的 特征可以相互组合。 下面将参考附图并结合实施例来详细说明本发明。
需要说明的是, 在附图的流程图示出的步骤可以在诸如一组计算机可 执行指令的计算机系统中执行, 并且, 虽然在流程图中示出了逻辑顺序, 但是在某些情况下, 可以以不同于此处的顺序执行所示出或描述的步骤。
根据本发明的实施例, 提供了一种锁卡方法, 图 1 是根据本发明实施 例的锁卡方法的流程图, 如图 1所示, 该方法包括如下的步骤 S102至步骤 S108:
步骤 S102,客户识别模块 SIM卡向移动终端发送授权指令和授权特征 值, 其中, 授权特征值是用于对移动终端进行锁卡的一组数据。
需要说明的是, 在步骤 S102之前, SIM 卡将网络权鉴标志位设置为 FALSE。
在 SIM卡向移动终端发送授权指令和授权特征值之后, 移动终端接收 该授权指令和授权特征值, 并根据授权指令使用密钥信息对应的密钥对授 权特征值进行加密, 得到第一组密文, 并将第一组密文发送给 SIM卡。
步骤 S104, SIM卡接收来自移动终端的第一组密文和密钥信息,其中, 第一组密文为移动终端根据密钥信息对授权特征值进行加密得到的密文。 步骤 S106, SIM卡对密钥信息进行验证, 并根据验证通过的密钥信息 对授权特征值进行加密, 生成第二组密文, 密钥信息可以是移动终端的密 钥也可以是 SIM的密钥组号。 因此, SIM卡对密钥信息进行验证分为两种 情况:
第一种情况, 在密钥信息为移动终端的密钥的情况下, SIM 卡判断移 动终端的密钥是否为本地存储的 SIM卡密钥 (即, 当密钥信息为移动终端 的密钥时, SIM卡对移动终端的密钥和 SIM卡密钥进行匹配验证 ),如果是, 则对密钥信息 3全证通过, 否则, 对密钥信息 3全证不通过。
第二种情况, 在密钥信息为密钥组号的情况下, SIM 卡判断密钥组号 是否为本地存储的 SIM卡的密钥组号,如果是,则对密钥信息验证通过( SIM 卡则根据该密钥组号提取相应的 SIM卡密钥), 否则, 对密钥信息验证不通 过。
步骤 S108, SIM卡比较第一组密文和第二组密文,如果比较结果一致, 则 SIM卡将网络权鉴标志为设置为 TRUE, 然后, SIM卡和移动终端正常 初始化;如果比较结果不一致,则 SIM卡将网络权鉴标志位设置为 FALSE。 本实施例在实施时, 首先在 SIM卡特定文件中保存 N组用于授权移动 终端的密钥, 并在移动终端中保存一组移动终端自身持有的密钥, 该组密 钥可以保存在 NV ( Non- Volatile, 非易失)存储器中或程序中; SIM卡中的 N组密钥由运行商提供, 运营商为每个移动终端设置制造商分配一组密钥。
图 2是根据本发明实施例的锁卡方法具体的流程图, 如图 2所示, 本 发明所公开的锁卡方法包括以下几个步骤:
步骤 S201: 开机后, SIM卡设置网络权鉴标志位为 FALSE, 即, 暂时 不允许 SIM卡进行网络权鉴, 移动终端开机后等待 SIM卡授权指令; 步骤 S202: SIM卡通过一条 STK( SIM Tool Kit, SIM工具包)命令(即, 授权指令)发送一个 16 Bytes字节的随机数 (即, 授权特征值)给移动终 端, 并要求移动终端返回一个用于授权的密文结果。
步骤 S203: 移动终端接收到 SIM卡发送的授权指令及该 16Bytes的随 机数后, 利用自身保存的密钥对该 16Bytes的随机数进行加密; 加密时首先 利用 ICCID ( Integrated Circuit Card Identity, 集成电路卡识别码)作为分散 因子对密钥进行分散, 生成分散密钥, 然后利用分散密钥对 16 Bytes随机 数进行加密; 生成的密文数据包括加密结果及移动终端使用的密钥组号; 如果移动终端在开机过程中没有收到来自 SIM卡的授权指令则移动终端不 允许使用(只限紧急呼叫)。
步骤 S204: 移动终端将密文结果作为 SIM卡授权指令的返回值, 返回 给 SIM卡。
步骤 S205: SIM卡接收到移动终端返回的密文结果后, 根据密文中所 指示的密钥组号, 利用同样的密钥进行与终端同样的加密过程, 生成一组 密文结果; SIM 对这两组密文结果进行对比, 如果结构一致则执行步骤 S206, 否则仍然设置 SIM卡网络权鉴标志位为 FALSE, 不允许 SIM卡进行 网络权鉴。
步骤 S206: SIM卡将网络权鉴标志为设置为 TRUE, 此时进行网络权 鉴; 同时, 向移动终端发送一条 REFRESH指令, 要求终端热重启, 以便注 册到网络。
步骤 S207: 移动终端热启后重新初始化 SIM卡, 注册到网络, 终端正 常启动。
通过本实施例的锁卡方法, 在开机过程中 SIM卡对移动终端的一个授 权过程, 筒便地实现了机卡多对多的锁定, 有效地保护了一定群体内部机 卡的安全性。 装置实施例一
根据本发明的实施例, 提供了一种 SIM卡, 图 3是根据本发明实施例 的 SIM卡的结构的示意图,如图 3所示,该 SIM卡包括:第一发送模块 32、 第一接收模块 34、 验证模块 36、 加密模块 38、 比较模块 30。 下面对该结 构进行详细的说明。
第一发送模块 32, 用于向移动终端发送授权指令和授权特征值, 其中, 授权特征值是用于对移动终端和 SIM卡进行锁定的一组数据; 第一接收模 块 34, 用于接收来自于移动终端的第一组密文和密钥信息, 其中, 第一组 密文为移动终端根据密钥信息对授权特征值进行加密得到的密文; 验证模 块 36连接至第一接收模块 34, 用于对第一接收模块 34接收到的密钥信息 进行验证, 加密模块 38连接至验证模块 36, 用于根据验证模块 36验证通 过的密钥信息对授权特征值进行加密 (即, 根据接收到的合法密钥信息对 授权特征值进行加密并生成一组密文), 生成第二组密文; 比较模块 30连 接至加密模块 38, 用于比较第一组密文和第二组密文, 如果比较结果一致, 则 SIM卡和移动终端正常初始化。
需要说明的是密钥信息可以是移动终端的密钥, 也可以是 SIM的密钥 组号。
图 4是根据本发明实施例的 SIM卡具体结构的示意图, 如图 4所示, 上述 SIM卡还包括: 第一验证子模块 44、 第二验证子模块 46。 下面对该结 构进行详细的说明。
第一验证子模块 44, 用于在密钥信息为移动终端的密钥的情况下, 判 断移动终端的密钥是否为本地存储的 SIM卡密钥, 如果是, 则对密钥信息 验证通过, 否则, 对密钥信息验证不通过。
第二验证子模块 46, 用于在密钥信息为密钥组号的情况下, 判断密钥 组号是否为本地存储的 SIM卡的密钥组号, 如果是, 则对密钥信息验证通 过( SIM卡则 ^据该密钥组号提取相应的 SIM卡密钥), 否则, 对密钥信息 验证不通过。
如图 4所示, 上述 SIM卡还包括: 设置模块 42。
设置模块 42连接至第一发送模块 32和比较模块 30, 用于设置网络权 鉴标志位。 其中, 在向移动终端发送授权指令和授权特征值之前, 将网络 权鉴标志位设置为 FALSE; 设置模块 42还用于在比较模块 30比较第一组 密文和第二组密文时, 如果比较结果一致, 则 SIM卡将网络权鉴标志为设 置为 TRUE, 如果比较结果不一致, 则 SIM 卡将网络权鉴标志位设置为 FALSE。
在本实施例中, 通过 SIM卡对移动终端的授权, 实现了机卡多对多的 锁定。
装置实施例二
根据本发明的实施例, 提供了一种移动终端, 图 5是根据本发明实施 例的移动终端的结构的示意图, 如图 5 所示, 该移动终端包括第二接收模 块 52、 加密模块 54、 第二发送模块 56, 下面对该结构进行详细的说明。
第二接收模块 52, 用于接收来自于 SIM卡的授权指令和授权特征值, 其中, 授权特征值是用于对移动终端和 SIM卡进行锁定的一组数据; 加密 模块 54连接至第二接收模块 52, 用于根据第二接收模块 52接收的授权指 令使用密钥对授权特征值进行加密, 得到第一组密文; 第二发送模块 56连 接至加密模块 54, 用于向 SIM卡发送密钥的密钥信息和第一组密文。
其中, 密钥信息可以是移动终端的密钥也可以是 SIM的密钥组号。 综上所述, 通过本发明的上述实施例, 由于每一个终端都拥有一组有 效的密钥, 所以将 SIM卡使用到所有该特定类型的移动终端设备上时, 都 能授权成功, 而对于普通终端设备则会授权失败, 这样实现了一"" ^对多机 的锁定; 同时由于在开机过程中, 移动终端需等待有效的授权指令, 这样 实现一机对多卡的锁定; 从而实现在固定群体内部机卡多对多的锁定, 在 群体内部允许机卡互换使用。 同时由于 SIM卡持用多组密钥, 而移动终端 以使用该 SIM卡, 这样运营商就可以将终端设置的制造分配给不同终端设 备制造商来完成, 而不影响机卡多对多的锁定功能。
显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤 可以用通用的计算装置来实现, 它们可以集中在单个的计算装置上, 或者 分布在多个计算装置所组成的网络上, 可选地, 它们可以用计算装置可执 行的程序代码来实现, 从而, 可以将它们存储在存储装置中由计算装置来 执行, 或者将它们分别制作成各个集成电路模块, 或者将它们中的多个模 块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任何特 定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于 本领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精 神和原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明 的保护范围之内。

Claims

权利要求书
1.一种锁卡方法, 其特征在于, 包括:
SIM 卡向移动终端发送授权指令和授权特征值, 其中, 所述授权特征 值是用于对所述移动终端和所述 SIM卡进行锁定的数据;
所述 SIM卡接收来自所述移动终端的第一组密文和密钥信息, 其中, 所述第一组密文为所述移动终端根据所述密钥信息对应的密钥对所述授权 特征值进行加密得到的密文;
所述 SIM卡对所述密钥信息进行验证, 并根据验证通过的所述密钥信 息对应的密钥对所述授权特征值进行加密, 生成第二组密文;
所述 SIM卡比较所述第一组密文和所述第二组密文, 在比较结果一致 时, 触发所述 SIM卡和所述移动终端正常初始化。
2.根据权利要求 1所述的方法, 其特征在于, 在所述 SIM卡向所述移 动终端发送所述授权指令和所述授权特征值之后, 所述方法还包括:
所述移动终端接收所述授权指令和所述授权特征值;
所述移动终端根据所述授权指令使用所述密钥信息对应的密钥对所述 授权特征值进行加密, 得到所述第一组密文, 并将所述第一组密文发送给 所述 SIM卡。
3.根据权利要求 1所述的方法, 其特征在于, 所述 SIM卡对所述密钥 信息进行验证的过程包括:
在所述密钥信息为所述移动终端的密钥的情况下, 所述 SIM卡判断所 述移动终端的密钥是否为本地存储的 SIM卡密钥, 如果是, 则对所述密钥 信息验证通过, 否则, 对所述密钥信息验证不通过。
4.根据权利要求 1所述的方法, 其特征在于, 所述 SIM卡对所述密钥 信息进行验证的过程包括:
在所述密钥信息为密钥组号的情况下, 所述 SIM卡判断所述密钥组号 是否为本地存储的 SIM卡的密钥组号, 如果是, 则对所述密钥信息验证通 过, 否则, 对所述密钥信息险证不通过。
5.根据权利要求 1至 4任一项所述的方法, 其特征在于, 在所述 SIM 卡向所述移动终端发送所述授权指令和所述授权特征值之前, 所述方法还 包括:
所述 SIM卡将网络权鉴标志位设置为 FALSE。
6.根据权利要求 5中所述的方法, 其特征在于, 在所述 SIM卡比较所 述第一组密文和所述第二组密文时, 所述方法还包括:
如果所述比较的结果一致, 则所述 SIM卡将所述网络权鉴标志为设置 为 TRUE; 如果所述比较的结果不一致, 则所述 SIM卡将网络权鉴标志位 设置为 FALSE。
7.—种 SIM卡, 其特征在于, 包括:
第一发送模块, 用于向移动终端发送授权指令和授权特征值, 其中, 所述授权特征值是用于对所述移动终端和本 SIM卡进行锁定的一组数据; 第一接收模块, 用于接收来自于所述移动终端的第一组密文和密钥信 息, 其中, 所述第一组密文为所述移动终端根据所述密钥信息对应的密钥 对所述授权特征值进行加密得到的密文;
验证模块, 用于对所述密钥信息进行验证;
加密模块, 用于根据所述验证模块验证通过的所述密钥信息对应的密 钥对所述授权特征值进行加密, 生成第二组密文;
比较模块, 用于比较所述第一组密文和所述第二组密文, 在比较结果 一致时, 触发所述 SIM卡和所述移动终端正常初始化。
8.根据权利要求 7所述的 SIM卡,其特征在于,所述验证模块还包括: 第一验证子模块, 用于在所述密钥信息为所述移动终端的密钥的情况 下, 判断所述移动终端的密钥是否为本地存储的 SIM卡密钥, 如果是, 则 对所述密钥信息 3全证通过, 否则, 对所述密钥信息 3全证不通过。
9.根据权利要求 7所述的 SIM卡,其特征在于,所述验证模块还包括: 第二验证子模块, 用于在所述密钥信息为密钥组号的情况下, 判断所 述密钥组号是否为本地存储的 SIM卡的密钥组号, 如果是, 则对所述密钥 信息验证通过, 否则, 对所述密钥信息验证不通过。
10. 根据权利要求 7至 9任一项所述的 SIM卡, 其特征在于, 所述 SIM卡还包括:
设置模块, 用于设置网络权鉴标志位。
11. 一种移动终端, 其特征在于, 包括:
第二接收模块, 用于接收来自于 SIM卡的授权指令和授权特征值, 其 中,所述授权特征值是用于对所述移动终端和所述 SIM卡进行锁定的数据; 加密模块, 用于根据所述第二接收模块接收的所述授权指令使用密钥 对所述授权特征值进行加密, 得到所述第一组密文;
第二发送模块, 用于向所述 SIM卡发送所述密钥的密钥信息和所述第 一组密文。
PCT/CN2009/075777 2009-06-04 2009-12-21 锁卡方法、客户识别模块卡以及移动终端 WO2010139170A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2009102031696A CN101583126B (zh) 2009-06-04 2009-06-04 锁卡方法、客户识别模块卡以及移动终端
CN200910203169.6 2009-06-04

Publications (1)

Publication Number Publication Date
WO2010139170A1 true WO2010139170A1 (zh) 2010-12-09

Family

ID=41365028

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/075777 WO2010139170A1 (zh) 2009-06-04 2009-12-21 锁卡方法、客户识别模块卡以及移动终端

Country Status (2)

Country Link
CN (1) CN101583126B (zh)
WO (1) WO2010139170A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2567045A (en) * 2017-08-07 2019-04-03 Motorola Solutions Inc Method and apparatus for associating SIM card with a group of mobile communications devices

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101583126B (zh) * 2009-06-04 2013-11-06 中兴通讯股份有限公司 锁卡方法、客户识别模块卡以及移动终端
CN101808320A (zh) * 2010-02-01 2010-08-18 中兴通讯股份有限公司 一种加密方法及系统
CN102281529A (zh) * 2010-06-13 2011-12-14 厦门敏讯信息技术股份有限公司 一种进入手持设备生产维护状态的方法
CN102088692B (zh) * 2011-01-14 2013-09-11 华为终端有限公司 锁卡的方法和设备
CN103200312B (zh) * 2013-03-01 2015-04-01 宁波萨瑞通讯有限公司 多卡移动电话快速写imei码方法
CN104811926A (zh) * 2014-01-26 2015-07-29 中兴通讯股份有限公司 移动终端锁网锁卡的方法、装置及移动终端、sim卡
CN104967516B (zh) * 2015-07-24 2018-04-24 四川理工学院 多用户加密数据可比较加密方法及加密数据比较方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842187A (zh) * 2005-04-01 2006-10-04 希姆通信息技术(上海)有限公司 移动终端、用户识别模块卡以及用于它们的验证方法
CN101141718A (zh) * 2006-09-04 2008-03-12 中兴通讯股份有限公司 一种移动终端锁卡方法
CN101155212A (zh) * 2006-09-30 2008-04-02 中兴通讯股份有限公司 一种限制移动终端使用的方法
CN101163290A (zh) * 2006-10-09 2008-04-16 中兴通讯股份有限公司 一种通过机卡相互认证限制移动终端使用的方法
CN101163289A (zh) * 2006-10-09 2008-04-16 中兴通讯股份有限公司 一种限制移动终端使用区域的方法
CN101583126A (zh) * 2009-06-04 2009-11-18 中兴通讯股份有限公司 锁卡方法、客户识别模块卡以及移动终端

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330387B (zh) * 2008-07-24 2010-12-08 华为终端有限公司 一种机卡认证的方法、通讯设备和认证系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1842187A (zh) * 2005-04-01 2006-10-04 希姆通信息技术(上海)有限公司 移动终端、用户识别模块卡以及用于它们的验证方法
CN101141718A (zh) * 2006-09-04 2008-03-12 中兴通讯股份有限公司 一种移动终端锁卡方法
CN101155212A (zh) * 2006-09-30 2008-04-02 中兴通讯股份有限公司 一种限制移动终端使用的方法
CN101163290A (zh) * 2006-10-09 2008-04-16 中兴通讯股份有限公司 一种通过机卡相互认证限制移动终端使用的方法
CN101163289A (zh) * 2006-10-09 2008-04-16 中兴通讯股份有限公司 一种限制移动终端使用区域的方法
CN101583126A (zh) * 2009-06-04 2009-11-18 中兴通讯股份有限公司 锁卡方法、客户识别模块卡以及移动终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2567045A (en) * 2017-08-07 2019-04-03 Motorola Solutions Inc Method and apparatus for associating SIM card with a group of mobile communications devices
GB2567045B (en) * 2017-08-07 2020-01-01 Motorola Solutions Inc Method and apparatus for associating SIM card with a group of mobile communications devices

Also Published As

Publication number Publication date
CN101583126A (zh) 2009-11-18
CN101583126B (zh) 2013-11-06

Similar Documents

Publication Publication Date Title
US8724819B2 (en) Credential provisioning
US9705673B2 (en) Method, device, and system of provisioning cryptographic data to electronic devices
CN102017578B (zh) 用于在令牌与验证器之间进行认证的网络助手
US9450759B2 (en) Apparatus and methods for controlling distribution of electronic access clients
US6192474B1 (en) Method for establishing a key using over-the-air communication and password protocol and password protocol
CN111512608B (zh) 基于可信执行环境的认证协议
WO2010139170A1 (zh) 锁卡方法、客户识别模块卡以及移动终端
JP2020508017A (ja) サーバ及びユーザ装置間の通信を管理する方法
US20100135491A1 (en) Authentication method
US20120300927A1 (en) Method of registering smart phone when accessing security authentication device and method of granting access permission to registered smart phone
US20110271330A1 (en) Solutions for identifying legal user equipments in a communication network
KR102173534B1 (ko) 이동통신사업자 정보 제공 방법 및 이를 수행하는 장치
JP2007519308A (ja) アプリケーションの認証方法
CN108769029B (zh) 一种对应用系统鉴权认证装置、方法及系统
US20130097427A1 (en) Soft-Token Authentication System
CN101621794A (zh) 一种无线应用服务系统的安全认证实现方法
US20090044007A1 (en) Secure Communication Between a Data Processing Device and a Security Module
CN114765534A (zh) 基于国密标识密码算法的私钥分发系统
US10785193B2 (en) Security key hopping
CN110287725B (zh) 一种设备及其权限控制方法、计算机可读存储介质
CN110807854B (zh) 一种开锁策略配置方法及设备
GB2526619A (en) Service provisioning
JP2016515778A (ja) アプリケーション暗号化処理方法、装置及び端末
CN111182483A (zh) 终端及其呼叫限制补充业务重置密码的方法和系统
KR20200085230A (ko) 디바이스에 대한 총체적 모듈 인증

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09845450

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09845450

Country of ref document: EP

Kind code of ref document: A1