WO2011144129A2 - 机卡互锁的方法、用户识别模块卡和终端。 - Google Patents

机卡互锁的方法、用户识别模块卡和终端。 Download PDF

Info

Publication number
WO2011144129A2
WO2011144129A2 PCT/CN2011/075046 CN2011075046W WO2011144129A2 WO 2011144129 A2 WO2011144129 A2 WO 2011144129A2 CN 2011075046 W CN2011075046 W CN 2011075046W WO 2011144129 A2 WO2011144129 A2 WO 2011144129A2
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
module card
user
identification module
user identification
Prior art date
Application number
PCT/CN2011/075046
Other languages
English (en)
French (fr)
Other versions
WO2011144129A3 (zh
Inventor
俞鹏
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Priority to CN2011800005758A priority Critical patent/CN102204298A/zh
Priority to PCT/CN2011/075046 priority patent/WO2011144129A2/zh
Publication of WO2011144129A2 publication Critical patent/WO2011144129A2/zh
Publication of WO2011144129A3 publication Critical patent/WO2011144129A3/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method for interlocking a machine card, a user identification module card, and a terminal. Background technique
  • the IMEI International Mobile Equipment Identity
  • the subscriber identity module card obtains the IMEI of the terminal it uses, and compares the IMEI with the IMEI of the dedicated terminal it stores. When the two are the same, the subscriber identity module card can be used normally by the terminal.
  • the dedicated subscriber identity module card the key corresponding to the dedicated terminal to which it is bound is stored, and the terminal using the dedicated subscriber identity module card encrypts the specific information by using its own key, and the dedicated subscriber identity module card utilizes the The stored key encrypts the same specific information and compares the encrypted information with the encrypted information of the terminal.
  • the user identification module card can be used normally by the terminal.
  • the above two methods of the prior art can only implement a single lock card, and can not implement the card and card lock (Phone and Card Mutual Lock), that is, only the dedicated user identification module card can only be bound to it. It is used on a dedicated terminal, but there is no restriction on the dedicated terminal.
  • the dedicated terminal can use any user identification module card. Therefore, the legitimate rights of the operator and the security of the card binding service cannot be effectively guaranteed. Summary of the invention
  • a main object of the embodiments of the present invention is to provide a method for interlocking a machine card, a user identification module card, and a terminal, which can implement interlocking of the machine card and effectively ensure the security of the service.
  • a method for interlocking a machine card comprising:
  • the user identification module card receives the identity of the terminal, and the user identification module card stores an identity of at least one legal terminal;
  • a method for interlocking a machine card comprising:
  • the terminal sends the identity of the terminal to the user identification module card, so that the user identification module card determines that the terminal is a legal terminal according to the identity identifier, and the terminal stores at least one user of the legal user identification module card.
  • a subscriber identity module card includes:
  • a storage unit configured to store an identity of at least one legal terminal
  • a receiving unit configured to receive an identity of the terminal
  • a terminal comprising:
  • a storage unit configured to store a user identifier of the at least one legal subscriber identity module card
  • a sending unit configured to send the identity identifier of the terminal to the subscriber identity module card, so that the subscriber identity module card determines the location according to the identity identifier
  • the terminal is a legal terminal
  • a receiving unit configured to receive a user identifier of the user identification module card
  • a determining unit configured to determine whether a user identifier of the at least one legal subscriber identity module card stored in the storage unit has received with the receiving unit The user identifier with the same user ID, and if so, the user identification module card is determined to be a legitimate user identification module card.
  • the user identification module card can determine whether the terminal is an illegal terminal by using the identity of the terminal, so that the user identification module card cannot It is used on an illegal terminal.
  • the terminal can determine the legal user identification module card through the user identification of the user identification module card, so that the terminal cannot use the illegal user identification module card, thereby realizing the interlocking of the machine card, thereby effectively avoiding the machine card.
  • the user identification module card or terminal of the bound service is stolen, which effectively ensures the security of the service.
  • FIG. 1 is a flowchart of a method for interlocking a machine card according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for interlocking a machine card according to an embodiment of the present invention
  • FIG. 4 is a structural block diagram of a user identification module card according to an embodiment of the present invention
  • FIG. 5 is a structural block diagram of a user identification module card according to an embodiment of the present invention
  • FIG. 6 is a structural block diagram of a terminal according to an embodiment of the present invention
  • FIG. 7 is a structural block diagram of a terminal according to an embodiment of the present invention.
  • FIG. 8 is a structural block diagram of a terminal according to an embodiment of the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The technical solutions in the embodiments of the present invention will be clearly and completely described in the following with reference to the accompanying drawings.
  • the user identification module card in the embodiment of the present invention includes a communication smart card such as a SIM (Subscriber Identity Module) card and a UIM (User Identity Model) card, which is in the embodiment of the present invention.
  • the terminal the terminal for communicating by using the subscriber identity module card, including a mobile phone, a computer, a personal communication service (PCS), a cordless telephone, a SIP (Session Initiation Protocol) telephone, and a personal digital assistant (PDA, Personal Digital Assistant) and other devices.
  • the terminal that is bound to the user identification module card is called a legal terminal
  • the user identification module card that is bound to the terminal is called a legal user identification module card.
  • it is called an illegal user identification module card.
  • an embodiment of the present invention provides a method for interlocking a machine card.
  • the user identification module card is installed in the terminal based on the user identification module card.
  • the embodiment includes the following steps:
  • the user identification module card receives an identity of the terminal, where the user identification module card stores an identity identifier of at least one legal terminal.
  • the identity of the terminal such as IMEI (International Mobile Equipment Identity)
  • IMEI International Mobile Equipment Identity
  • the user identification module card is pre-stored with its legal terminal.
  • the identity identifier, the legal terminal of the user identification module card may be one or a group. Therefore, the user identification module card pre-stores the identity identifier of at least one legal terminal.
  • the identity identifier stored in the subscriber identity module card is used to authenticate the terminal.
  • the subscriber identity module card can determine whether the terminal is illegal based on the stored identity of the legitimate terminal and the identity of the identity sent by the terminal.
  • the subscriber identity module card determines whether an identity identifier of the at least one legal terminal that is stored has the same identity identifier as the received identity identifier.
  • the user identification module card compares the stored identity of the at least one legal terminal with the identity identifier sent by the terminal, and determines whether the stored identity identifies the identity of the terminal. Identifies the same identity.
  • the subscriber identity module card determines that the terminal is an illegal terminal.
  • the subscriber identity module card sends the subscriber identity of the subscriber identity module card to the terminal, so that the terminal can determine that the subscriber identity module card is a legitimate subscriber identity module card according to the subscriber identity.
  • the subscriber identity module card will unambiguously determine that the terminal is An illegal terminal, such that the subscriber identity module card will reject the use of the terminal, ie the subscriber cannot use the subscriber identity module card. If the identity of the at least one legal terminal stored in the subscriber identity module card has the same identity as the received identity, the subscriber identity module card considers the terminal to be a legitimate terminal, and the subscriber The identifier is sent to the terminal, thereby effectively ensuring that the subscriber identity module card can only be used on its legitimate terminal.
  • the user identifier of the subscriber identity module card such as IMSI (International Mobile Subscriber Identity) is uniquely associated with the subscriber identity module card, and each subscriber identity module The card's identity is different from other subscriber identity module cards.
  • IMSI International Mobile Subscriber Identity
  • the user identifier of the legal user identification module card is pre-stored in the terminal, and after the user identification module card sends the user identifier to the terminal, the terminal can compare The user identifier of the user identification module card and the user identifier of the legal user identification module card stored therein determine whether the user identification module card is a legitimate user identification module card, and when it is determined that the user identification module card is illegal, The terminal will refuse to use, so as to effectively ensure that the terminal can only use the legitimate user identification module card.
  • the user identification module card passes the steps
  • the identity identifier of the at least one legal terminal stored in the subscriber identity module card may have the same identity identifier as the received identity identifier.
  • the subscriber identity module card will The illegal terminal sends the user identifier of the user identification module card, so that the illegal terminal can apply the user identifier to log in to the network, thereby causing the illegal terminal to steal the user identification module card.
  • the user identification module card may specifically send user authentication information to the terminal, where the user authentication information includes the The user identifies the user identifier of the module card, and the user identifier is located at a predetermined byte position of the user authentication information.
  • the user authentication information is a 20-byte number consisting of a 12-byte random number and an 8-byte user identifier, and the 8-byte user identifier is located at the last 8 bytes of the user authentication information.
  • the legal terminal can know the byte length of the user identifier and the location of the user identifier in the user authentication information according to the pre-configuration. Therefore, after receiving the user authentication information, the correct user identifier can be decomposed.
  • the illegal terminal will not be able to know the byte length of the user identifier and/or the location of the user identifier in the user authentication information. Therefore, the correct user identifier may not be decomposed, thereby effectively avoiding the illegal terminal identifying the module card. Theft.
  • the user identification module card can determine whether the terminal is an illegal terminal by using the identity of the terminal, so that the user identification module card cannot be used on the illegal terminal, and the terminal can pass the user.
  • the user identification of the identification module card determines the legal user identification module card, so that the terminal cannot use the illegal user identification module card, thereby realizing the interlocking of the machine card, and effectively avoiding the theft of the user identification module card or the terminal for performing the card binding service. , effectively guarantee the security of the business.
  • the terminal When the subscriber identity module card is installed in the terminal, when the power is initialized, the terminal reads the identity of the subscriber identity module card from the subscriber identity module card, and uses the identity identifier to log in to the network. Since the boot-up initialization, the subscriber identity module card has not identified whether the terminal is In order to prevent the illegal terminal from reading the user identifier, the method for interlocking the card in the embodiment of the present invention may further include: before the step 101, the user identification module card receiving the terminal reading station The user identification module sends a pseudo user identifier to the terminal.
  • the user identifier sent by the user identification module card to the terminal is a pseudo user identifier. Therefore, when the user identification module card has not identified whether the terminal is a legal terminal, the terminal may be a legal terminal or an illegal terminal.
  • the pseudo-user ID is used to log in to the network, thereby effectively avoiding the theft of the user identification module card by the illegal terminal, and further ensuring the security of the card-binding service.
  • the method for interlocking the machine card in the embodiment of the present invention may further include a random number authentication link.
  • the specific step may include the following steps: the user identification module card receives the ciphertext data sent by the terminal, and the ciphertext data is obtained by the terminal encrypting the user identifier by using a specified encryption rule; the user identification module Determining, by the card, whether the received ciphertext data is the same as the ciphertext data obtained by encrypting the user identifier by using the specified encryption rule by the user identification module card;
  • the subscriber identity module card determines that the terminal is an illegal terminal; if yes, the subscriber identity module card determines that the terminal is a legitimate terminal, and the terminal is allowed to use.
  • the specified encryption rule used by the user identification module card is the same as the specified encryption rule used by the legal terminal. Therefore, the ciphertext data obtained by the user identification module card and the legal terminal are the same, and the user identification module card is Allow legitimate terminals to use. If the terminal is an illegal terminal, the specified encryption rules used by the two are different, and the ciphertext data obtained by the user identification module card and the illegal terminal are different. Therefore, even if the illegal terminal falsifies the identity, the user identification module card is used. The identity identifier is sent to the illegal terminal, and the user identification module card can also determine the illegal terminal through the random number authentication link, thereby further preventing the illegal terminal from stealing the user identification module card.
  • the encryption rule used by the user identification module card is not limited, but needs to be slightly different from the existing standard encryption algorithm, so that the existing illegal terminal that forges the standard encryption algorithm is invalid, further preventing the user identification module card from being stolen.
  • an existing encryption rule is to use the user identification and random number of the subscriber identity module card as plaintext data, and use the 3DES-ECB (Data Encryption Standard- Electronic Code Book) algorithm.
  • the encryption data is performed on the plaintext data, and in the embodiment of the present invention, the encryption rule that can be used by the user identification module card is:
  • the data and the random number obtained by inverting the user identifier of the subscriber identity module card are used as plaintext data, and the plaintext data is encrypted by using a 3DES-ECB algorithm.
  • a pirate card player obtains the subscriber identity module card B in the embodiment of the present invention, and obtains a terminal C having a forged identity identifier IMEI, and inserts the card B into the terminal C, and the card B executes the card of the embodiment of the present invention.
  • steps 101, 102, and 104 are performed.
  • the forged terminal C fools the IMEI check in step 102, after 104, the random number authentication link is executed, and the forged terminal C is calculated because of the ciphertext.
  • the data is different from the result calculated by the card B.
  • the card B recognizes that C is an illegal terminal and refuses to use it. Therefore, the terminal C cannot use the card B, that is, the network cannot be normally accessed, called, and texted.
  • the present invention further provides a method for interlocking a machine card. Based on the terminal, as shown in FIG. 2, the method includes the following steps:
  • the terminal sends the identity of the terminal to the user identification module card, so that the user identification module card determines that the terminal is a legal terminal according to the identity identifier, and the terminal stores at least one legal user identification module card.
  • User identification the user identification module card pre-stores an identity identifier of its legal terminal, the terminal sends its identity identifier to a user identification module card, and the user identification module card can compare the identity of the terminal And the identity of the legal terminal that it stores, when the identity of the legal terminal that it stores has the same identity as the terminal, the user identification module card determines that it is a legal terminal, and sends the user identifier to the Said terminal.
  • the user identification module card will determine that the terminal is an illegal terminal, thereby rejecting the use of the terminal, so as to effectively ensure that the user identification module card can only be used on its legal terminal.
  • the terminal has its legal user identification module card pre-stored therein.
  • the user identifier, the legal subscriber identity module card of the terminal may be one or a group. Therefore, the terminal identifier of the at least one legal subscriber identity module card is pre-stored in the terminal.
  • the user identifier stored by the terminal is used for authenticating the user identification module card. Since the user identifier uniquely corresponds to the user identification module card, the user identifier of the illegal user identification module card and the user identifier of the legal user identification module card are affirmed.
  • the terminal can determine whether the user identification module card is illegal based on the comparison between the stored user identifier of the legal subscriber identity module card and the user identifier sent by the subscriber identity module card, so as to effectively ensure the The terminal can only use the legal user identification module card.
  • the terminal receives the user identifier of the user identification module card.
  • the user identification module card determines that the terminal is a legal terminal, the user identifier of the user identification module card is sent to the legal terminal.
  • the legal terminal receives the user authentication information sent by the user identification module card, where the user authentication information includes a user identifier of the user identification module card, where the user identifier is located in the user The specified byte position of the authentication information.
  • the legal terminal Since the legal terminal knows the byte length of the user identifier corresponding to the legal user identification module card and the location of the user identifier in the user authentication information, after receiving the user authentication information, the legal terminal can decompose the correct user. Logo.
  • the illegal terminal will not be able to know the byte length of the user identifier and the location of the user identifier in the user authentication information. Therefore, the correct user identifier may not be decomposed, thereby effectively preventing the unauthorized terminal from stealing the user identification module card.
  • the terminal determines whether the user identifier of the stored at least one legal subscriber identity module card has the same user identifier as the received subscriber identity.
  • the terminal determines that the subscriber identity module card is an illegal subscriber identity module card.
  • the terminal determines that the subscriber identity module card is a legitimate subscriber identity module card.
  • the terminal can determine the illegal user identification module card by using the user identifier of the user identification module card, so that the terminal cannot use the illegal user identification module card, and the user identification module card can pass the terminal.
  • the identity identifies the illegal terminal, so that the user identification module card cannot be used on the illegal terminal, thereby realizing the interlock of the machine card, and effectively avoiding the theft of the user identification module card or the terminal for performing the card binding service. Effectively guarantee the security of the business. For example, a pirate player obtains the terminal A in the embodiment of the present invention, and obtains the illegal SIM card B.
  • the card B is inserted into the A, and the result is that the card B is an illegal IMSI. Rejected by the terminal, unable to make calls and send text messages. Further, before the step 201, the method for interlocking the card of the embodiment of the present invention may further include:
  • the terminal receives the pseudo user identifier sent by the subscriber identity module card.
  • the user identifier sent by the user identification module card to the terminal is a pseudo user identifier. Therefore, when the user identification module card has not identified whether the terminal is a legal terminal, the terminal may be a legal terminal or an illegal terminal.
  • the pseudo-user ID is used to log in to the network. Therefore, the fraudulent use of the user identification module card by the illegal terminal is effectively avoided, and the security of the card-binding service is further ensured.
  • the method for interlocking the machine card of the embodiment of the present invention may further include:
  • the terminal encrypts the user identifier by using a specified encryption rule; the terminal sends the ciphertext data obtained by the encryption operation to the user identification module card, so that the user identification module card determines the The ciphertext data and the ciphertext data obtained by the user identification module card using the specified encryption rule to encrypt the user identifier are the same, so that the user identification module card further determines that the terminal is a legitimate terminal.
  • the encryption rule used by the terminal is not limited, but needs to be slightly different from the existing standard encryption algorithm, so that the existing illegal terminal that forges the standard encryption algorithm is invalid, and the user identification module card is further prevented from being stolen.
  • the encryption rule used by the terminal includes: the data obtained by inverting the received user identifier and the random number are used as plaintext data, and the plaintext data is encrypted by using a 3DES-ECB algorithm.
  • the user identification module card is a SIM card
  • the user ID of the SIM card is IMSI
  • the identity of the terminal is IMEI
  • the SIM card is installed in the terminal
  • the IMSI stores the IMSI of the legal terminal
  • the terminal stores the legal SIM.
  • the IMSI of the card as shown in FIG. 3, this embodiment includes:
  • Step 301 After initial booting, the terminal first initiates an instruction to read the ICCID (Integrated Circuit Card Identity) and the IMSI in the SIM card to the SIM card;
  • ICCID Integrated Circuit Card Identity
  • Step 302 The SIM card receives the command of the terminal to read the IMSI, and returns the pseudo IMSI to the terminal, so as to prevent the illegal terminal from directly using the real IMSI to directly log in to the network;
  • steps 301 and 302 are the first layer of lock card protection, so as to prevent the real IMSI of the SIM card from being stolen by the illegal terminal and directly using the real IMSI to log in to the network;
  • Step 303 The terminal sends a terminal configuration command TERMINAL PROFILE to the SIM card.
  • the above steps 303 to 305 are the second layer of lock card protection.
  • the SIM authenticates the terminal through the IMEI returned by the terminal and the IMEI of the legal terminal stored by the terminal, and can determine an illegal terminal, such as a forged illegal terminal, so that the illegal terminal cannot be used.
  • SIM card ;
  • Step 306 After the SIM card considers that the terminal is legal, the user sends the user authentication information to the terminal by using the send command GETINPUT.
  • the user authentication information is a 20-byte number, and the first 12-byte random number is added with the last 8-byte SIM card.
  • the real IMSI is composed;
  • Step 307 After receiving the 20-byte user authentication information sent by the SIM card through the GETINPUT command, the terminal first decomposes the 8-IMS real IMSI according to the preset, and stores it with the terminal.
  • the legal IMSI value is compared, the legal IMSI value is at least one, and the SIM card is determined to be legal. If the IMSI value of the received IMSI is found in the IMSI value stored in the terminal, the terminal determines that the SIM card is legal, and step 308 is performed.
  • Anti The terminal is determined to be an illegal SIM card, and step 313 is performed;
  • the above steps 306 to 307 are the third layer lock protection.
  • the terminal authenticates the SIM card through the IMSI sent by the SIM card and the IMSI of the legal SIM card stored by itself, and can determine the illegal SIM card, so that the terminal cannot use the illegal SIM card. For example, a forged SIM card is obtained.
  • Step 308 After the terminal considers that the SIM card is legal, the data obtained by inverting the IMSI and the random number are used as plaintext data, and the plaintext data is encrypted by using a 3DES-ECB algorithm to obtain ciphertext data. ;
  • Step 309 The terminal sends the obtained ciphertext data to the SIM card by using the terminal response command TERMINAL RESPONSE;
  • Step 310 After obtaining the ciphertext data sent by the terminal, the SIM card compares the data with the ciphertext data obtained by encrypting the SIM card pair. If the two are the same, the terminal is determined to be legal, and step 31 1 is performed; Then, step 313 is performed; wherein, when the SIM card performs the encryption operation, the data and the random number obtained by inverting the IMSI are also used as the plaintext data, and the plaintext data is encrypted by the 3DES-ECB algorithm to obtain the ciphertext data.
  • Steps 306 to 310 above are the fourth layer random number authentication protection.
  • Step 311 The SIM card uses the recovery command REFRESH to notify the terminal to perform a warm restart WarmReset, and set the IMSI in the terminal to the real IMSI;
  • Step 312 After the terminal responds to the REFRESH command and WarmReset, the terminal is normally powered on and initialized. Step 313: End.
  • the method for interlocking the card of the embodiment through the four layers of protection, enables the terminal to use only the legal SIM card, and at the same time, the SIM card can only be used on the legal terminal, thereby realizing the interlocking of the card, effectively avoiding the machine.
  • the SIM card or terminal of the card binding service is stolen, which effectively ensures the security of the service.
  • the embodiment of the present invention further provides a user identification module card, as shown in FIG. 4, including:
  • the storage unit 10 is configured to store an identity of at least one legal terminal.
  • the receiving unit 1 1 is configured to receive an identity of the terminal
  • the determining unit 12 is configured to determine whether the identity of the at least one legal terminal stored in the storage unit 10 has the same identity as the identity received by the receiving unit 11;
  • the sending unit 13 is configured to determine the storage unit in the determining unit 12 When the identity of the at least one legal terminal that is stored has the same identity as the identity received by the receiving unit 11, the user identifier of the subscriber identity module card is sent to the terminal, so that the terminal can Determining that the user identification module card is a legal user identification module card;
  • the user identification module card provided by the embodiment of the present invention can determine an illegal terminal by using the identity of the terminal, so that the user identification module card cannot be used on the illegal terminal, and at the same time, the user identifier can be sent to the terminal, so that the terminal can pass the
  • the user identifier determines that the user identification module card is legal, so that the terminal cannot use the illegal user identification module card, thereby realizing the interlocking of the machine card, thereby effectively preventing the user identification module card or the terminal of the card binding service from being stolen, effectively Guarantee the security of the business.
  • the receiving unit 1 1 is further configured to: before receiving the identity of the terminal, receive a command that the terminal reads the user identifier of the user identity module card;
  • the sending unit 13 is further configured to send a pseudo user identifier to the terminal.
  • the user identifier sent by the sending unit 13 to the terminal is a pseudo user identifier. Therefore, when the user identification module card has not identified whether the terminal is a legal terminal, whether the terminal is a legal terminal or an illegal terminal, The pseudo-user ID cannot be used to log in to the network. Therefore, the illegal terminal can effectively avoid the theft of the user identification module card, thereby further ensuring the security of the card binding service.
  • the user identification module card further includes:
  • the encryption unit 14 is configured to perform an encryption operation on the user identifier by using a specified encryption rule.
  • the receiving unit 11 is further configured to: after the sending unit 13 sends the user identifier of the user identification module card to the terminal, receive the terminal.
  • the ciphertext data that is sent, and the ciphertext data is obtained by the terminal encrypting the user identifier by using a predetermined encryption rule;
  • the determining unit 12 is further configured to determine whether the ciphertext data received by the receiving unit 11 is the same as the ciphertext data obtained by encrypting the user identifier by the encryption unit 14, and if not, determining that the terminal is an illegal terminal, and if so, It is determined that the terminal is a legal terminal.
  • the specified encryption rule used by the encryption unit 14 includes: using the data and the random number obtained by inverting the user identifier of the user identification module card as plaintext data, and performing encryption operation on the plaintext data by using a 3DES-ECB algorithm.
  • the sending unit 13 is configured to send user authentication information to the terminal, where the user authentication information includes a user identifier and a random number of the user identification module card, where the user identifier is located in the user authentication. The specified byte position of the message.
  • the embodiment of the present invention further provides a terminal, as shown in FIG. 6, including:
  • a storage unit 20 configured to store a user identifier of the at least one legal subscriber identity module card; the sending unit 21, configured to send the identity identifier of the terminal to the subscriber identity module card, so that the subscriber identity module card is identified according to the identity identifier Determining that the terminal is a legal terminal; the receiving unit 22 is configured to receive a user identifier of the user identification module card;
  • the determining unit 23 is configured to determine whether the user identifier of the at least one legal subscriber identity module card stored in the storage unit 20 has the same user identifier as the user identifier received by the receiving unit 22, and if yes, determine that the subscriber identity module card is Legal user identification module card.
  • the terminal provided by the embodiment of the present invention can determine whether the user identification module card is legal through the user identifier of the user identification module card, so that the terminal cannot use the illegal user identification module card, and the terminal can send the identity identifier to the terminal.
  • the user identification module card enables the user identification module card to determine that the terminal is a legal terminal by using the identity of the terminal, so that the user identification module card cannot be used on the illegal terminal, thereby realizing the interlocking of the machine card, thereby effectively avoiding The user identification module card or terminal of the card binding service is stolen, which effectively ensures the security of the service.
  • the sending unit 21 is further configured to send a read to the user identification module card before sending the identity identifier of the terminal to the user identification module card. Taking the command of the user identification of the user identification module card;
  • the receiving unit 22 is further configured to receive the pseudo user identifier sent by the subscriber identity module card. Further, in an embodiment of the present invention, as shown in FIG. 5, the terminal further includes:
  • the encryption unit 24 is configured to determine, in the determining unit 23, the user identifier of the at least one legal subscriber identity module card stored in the storage unit 20, having the same user identifier as the user identifier received by the receiving unit 22, using the specified encryption rule The user identifier is used for the encryption operation.
  • the sending unit 21 is further configured to send the ciphertext data obtained by the encryption unit to the user identification module card.
  • the specified encryption rule used by the encryption unit 24 includes: using the data obtained by inverting the user identifier received by the receiving unit and the random number as plaintext data, and performing encryption operation on the plaintext data by using a 3DES-ECB algorithm. .
  • the receiving unit 22 is specifically configured to receive user authentication information sent by the subscriber identity module card, where the user authentication information includes a user of the subscriber identity module card. An identifier and a random number, where the user identifier is located at a predetermined byte position of the user authentication information;
  • the determining unit 23 includes:
  • the decomposition module 230 is configured to decompose the user identifier from the user authentication information according to a predetermined rule
  • the determining module 231 is configured to determine whether the user identifier of the at least one legal user identification module card stored in the storage unit 20 has the same user identifier as the user identifier decomposed by the decomposition module 210.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明的实施例提供了一种机卡互锁的方法、用户识别模块卡和终端,为实现机卡互锁,有效保证业务的安全性而发明。所述机卡互锁的方法,包括:用户识别模块卡接收终端的身份标识,所述用户识别模块卡中存储有至少一个合法终端的身份标识;所述用户识别模块卡确定在所述存储的至少一个合法终端的身份标识中,具有与所述接收的身份标识相同的身份标识时,所述用户识别模块卡向所述终端发送所述用户识别模块卡的用户标识,以使所述终端能够根据所述用户标识确定所述用户识别模块卡为合法用户识别模块卡。本发明可用于移动通信业务中。

Description

机卡互锁的方法、 用户识别模块卡和终端 技术领域 本发明涉及通信技术领域, 尤其涉及一种机卡互锁的方法、 用户识 别模块卡和终端。 背景技术
目前, 随着通信业务的发展和用户需求的不断提高, 通信运营商出 于业务推广需要, 推出了资费具有较大优惠的机卡绑定业务。 这种机卡 绑定业务, 需要终端和用户识别模块卡配合使用, 用户需要使用互相绑 定的专用终端与专用用户识别模块卡。 实现这种机卡绑定业务首先要求 专用用户识别模块卡只能在与其绑定的专用终端上使用, 在普通终端上 不能使用, 其次, 为了保障运营商的合法权益和机卡绑定业务的安全性, 还要求专用终端只能使用与其绑定的用户识别模块卡, 不能使用普通用 户识别模块卡。
现有技术中, 通常具有两种方法实现机卡绑定业务, 其一, 在专用 用户识别模块卡中存储与其绑定的专用终端的 IMEI (国际移动设备身份 码 , International Mobile Equipment Identity ) , 专用用户识别模块卡获取 其使用的终端的 IMEI , 并将该 IMEI与其存储的专用终端的 IMEI对比, 两者相同时, 用户识别模块卡才能正常被终端使用。 其二, 在专用用户 识别模块卡中存储与其绑定的专用终端对应的密钥, 使用专用用户识别 模块卡的终端利用其自身的密钥对特定信息进行加密, 专用用户识别模 块卡利用其所存储的密钥对相同的特定信息进行加密, 并对比自己加密 后的信息和终端加密的信息, 两者相同时, 用户识别模块卡才能正常被 终端使用。 但是, 现有技术的上述两种方法, 只能实现单一的锁卡, 均不能实 现机卡互锁 ( Phone and Card Mutual Lock ) , 即只能使专用用户识别模 块卡只能在与其绑定的专用终端上使用, 但对专用终端没有限制, 专用 终端可以使用任何用户识别模块卡, 因此, 无法有效保证运营商的合法 权益和机卡绑定业务的安全性。 发明内容
本发明的实施例的主要目的在于, 提供一种机卡互锁的方法、 用户 识别模块卡和终端, 能够实现机卡互锁, 有效保证业务的安全性。
为达到上述目的, 本发明的实施例釆用如下技术方案: 一种机卡互锁的方法, 包括:
用户识别模块卡接收终端的身份标识, 所述用户识别模块卡中存储 有至少一个合法终端的身份标识;
当所述用户识别模块卡确定在所述存储的至少一个合法终端的身份 标识中, 具有与所述接收的身份标识相同的身份标识时, 所述用户识别 模块卡向所述终端发送所述用户识别模块卡的用户标识, 以使所述终端 能够根据所述用户标识确定所述用户识别模块卡为合法用户识别模块 卡。 一种机卡互锁的方法, 包括:
终端向用户识别模块卡发送所述终端的身份标识, 以使所述用户识 别模块卡根据所述身份标识确定所述终端为合法终端, 所述终端中存储 有至少一个合法用户识别模块卡的用户标识,
所述终端接收所述用户识别模块卡的用户标识;
当所述终端确定在所述存储的至少一个合法用户识别模块卡的用户 标识中, 具有与所述接收的用户标识相同的用户标识时, 所述终端确定 所述用户识别模块卡为合法用户识别模块卡。 一种用户识别模块卡, 包括:
存储单元, 用于存储至少一个合法终端的身份标识;
接收单元, 用于接收终端的身份标识;
确定单元, 用于确定在所述存储单元存储的至少一个合法终端的身 份标识中是否具有与所述接收单元接收的身份标识相同的身份标识; 发送单元, 用于在确定单元确定所述存储单元存储的至少一个合法 终端的身份标识中具有与所述接收单元接收的身份标识相同的身份标识 时, 向所述终端发送所述用户识别模块卡的用户标识, 以使所述终端能 够根据所述用户标识确定所述用户识别模块卡为合法用户识别模块卡。 一种终端, 包括:
存储单元, 用于存储至少一个合法用户识别模块卡的用户标识; 发送单元, 用于向用户识别模块卡发送所述终端的身份标识, 以使 所述用户识别模块卡根据所述身份标识确定所述终端为合法终端;
接收单元, 用于接收所述用户识别模块卡的用户标识; 确定单元, 用于确定在所述存储单元存储的至少一个合法用户识别 模块卡的用户标识中, 是否具有与所述接收单元接收的用户标识相同的 用户标识, 若是, 确定所述用户识别模块卡为合法用户识别模块卡。
釆用上述技术方案后, 本发明实施例提供的机卡互锁的方法、 用户 识别模块卡和终端, 用户识别模块卡能够通过终端的身份标识确定终端 是否为非法终端, 使得用户识别模块卡不能在非法终端上使用, 同时, 终端能够通过用户识别模块卡的用户标识确定出合法用户识别模块卡, 使得终端不能使用非法用户识别模块卡, 从而实现了机卡互锁, 有效避 免了进行机卡绑定业务的用户识别模块卡或终端被盗用, 有效保证了业 务的安全性。 附图说明 为了更清楚地说明本发明实施例中的技术方案, 下面将对实施例所 需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是 本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性 劳动性的前提下, 还可以根据这些附图获得其他的附图。 图 1为本发明实施例提供的机卡互锁的方法的一种流程图; 图 2为本发明实施例提供的机卡互锁的方法的一种流程图; 图 3为本发明实施例提供的机卡互锁的方法的一种流程图; 图 4为本发明实施例提供的用户识别模块卡的一种结构框图; 图 5为本发明实施例提供的用户识别模块卡的一种结构框图; 图 6为本发明实施例提供的终端的一种结构框图;
图 7为本发明实施例提供的终端的一种结构框图;
图 8为本发明实施例提供的终端的一种结构框图。 具体实施方式 下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案 进行清楚、 完整地描述。
显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的 实施例。 基于本发明中的实施例, 本领域普通技术人员在没有做出创造 性劳动前提下所获得的所有其他实施例, 都属于本发明保护的范围。
需要说明的是, 本发明实施例中的用户识别模块卡, 包括 SIM ( Subscriber Identity Module , 客户识别模块) 卡和 UIM ( User Identity Model, 用户识别模块)卡等通信智能卡, 本发明实施例中的终端, 为使 用所述用户识别模块卡进行通信的终端, 包括手机、 计算机、 个人通信 业务 ( PCS , Personal Communication Service ) 电话、 无绳电话、 会话发 起协议 ( SIP , Session Initiation Protocol ) 话机、 个人数字助理 (PDA, Personal Digital Assistant ) 等设备。 本发明实施例中, 将与用户识别模块卡绑定使用的终端称之为合法 终端, 反之, 称为非法终端, 将与终端绑定使用的用户识别模块卡称之 为合法用户识别模块卡, 反之, 称为非法用户识别模块卡。
如图 1 所示, 本发明实施例提供了一种机卡互锁的方法, 基于用户 识别模块卡, 所述用户识别模块卡安装于终端中, 本实施例包括以下步 骤:
101 , 用户识别模块卡接收终端的身份标识, 所述用户识别模块卡中 存储有至少一个合法终端的身份标识。 其中, 终端的身份标识, 例如 IMEI ( 国际移动设备身份码, International Mobile Equipment Identity ) , 是与终端是唯一对应的, 每台 终端的身份标识与其他终端不同。 本发明实施例中, 所述用户识别模块卡中预先存储有其合法终端的 身份标识, 所述用户识别模块卡的合法终端可以为一个, 也可以为一组, 因此, 所述用户识别模块卡中预先存储有至少一个合法终端的身份标识。 所述用户识别模块卡所存储的身份标识用于对终端的鉴权, 在非法 终端未伪造身份标识的正常情况下, 由于身份标识与终端唯一对应, 非 法终端的身份标识与合法终端的身份标识肯定不同, 因此, 用户识别模 块卡能够基于所存储的合法终端的身份标识和所述终端发送的身份标识 的对比, 确定出所述终端是否非法。
102 ,所述用户识别模块卡确定在所述存储的至少一个合法终端的身 份标识中, 是否具有与所述接收的身份标识相同的身份标识。
本步骤中, 所述用户识别模块卡分别将所述存储的至少一个合法终 端的身份标识和所述终端发送的身份标识进行比较, 确定在存储的身份 标识中, 是否具有与所述终端的身份标识相同的身份标识。
103 , 若否, 所述用户识别模块卡确定所述终端为非法终端。
104 , 若是, 所述用户识别模块卡向所述终端发送所述用户识别模块 卡的用户标识, 以使所述终端能够根据所述用户标识确定所述用户识别 模块卡为合法用户识别模块卡。
显然, 如果在所述用户识别模块卡存储的至少一个合法终端的身份 标识中, 没有与所述接收的身份标识相同的身份标识, 所述用户识别模 块卡将毫无疑义的确定所述终端为非法终端, 从而所述用户识别模块卡 将拒绝所述终端的使用, 即所述终端无法使用该用户识别模块卡。 如果 在所述用户识别模块卡存储的至少一个合法终端的身份标识中, 具有与 所述接收的身份标识相同的身份标识, 所述用户识别模块卡将认为所述 终端为合法终端, 将其用户标识发送给所述终端, 从而有效保证所述用 户识别模块卡只能在其合法终端上使用。 需要说明的是, 和终端的身份标识类似, 用户识别模块卡的用户标 识, 例如 IMSI ( 国际移动用户标识, International Mobile Subscriber Identity ) , 是与用户识别模块卡是唯一对应的, 每个用户识别模块卡的 身份标识与其他用户识别模块卡不同。
所述终端中预先存储有其合法用户识别模块卡的用户标识, 在所述 用户识别模块卡将用户标识发送给所述终端后, 所述终端能够通过比较 所述用户识别模块卡的用户标识和其存储的合法用户识别模块卡的用户 标识, 确定出所述用户识别模块卡是否为合法用户识别模块卡, 当确定 所述用户识别模块卡非法时, 所述终端将拒绝使用, 以有效保证所述终 端只能使用合法用户识别模块卡。
如果非法终端伪造了身份标识, 因此, 在用户识别模块卡通过步骤
102进行终端鉴权时,在所述用户识别模块卡存储的至少一个合法终端的 身份标识中, 可能具有与所述接收的身份标识相同的身份标识, 这时, 所述用户识别模块卡将向该非法终端发送所述用户识别模块卡的用户标 识, 这样, 所述非法终端将可以应用所述用户标识登陆网络, 从而将造 成非法终端对所述用户识别模块卡的盗用。 可选的, 为了有效避免非法终端对所述用户识别模块卡的盗用, 本 步骤中, 所述用户识别模块卡具体可以向所述终端发送用户鉴权信息, 所述用户鉴权信息包括所述用户识别模块卡的用户标识, 且所述用户标 识位于所述用户鉴权信息的规定字节位置上。 例如, 所述用户鉴权信息 为一个 20字节数, 由 12字节的随机数和 8字节的用户标识组成, 8字节 的用户标识位于用户鉴权信息的最后 8字节的位置。 其中, 合法终端能够根据预先配置能够获知用户标识的字节长度和 用户标识在用户鉴权信息中的位置, 因此, 在收到用户鉴权信息后, 能 够分解出正确的用户标识。 而非法终端将无法获知用户标识的字节长度 和 /或用户标识在用户鉴权信息中的位置, 因此, 可能无法分解出正确的 用户标识, 从而有效避免了非法终端对所述用户识别模块卡的盗用。 本发明实施例提供的机卡互锁的方法, 用户识别模块卡能够通过终 端的身份标识确定所述终端是否为非法终端, 使得用户识别模块卡不能 在非法终端上使用, 同时, 终端能够通过用户识别模块卡的用户标识确 定出合法用户识别模块卡, 使得终端不能使用非法用户识别模块卡, 从 而实现了机卡互锁, 有效避免了进行机卡绑定业务的用户识别模块卡或 终端被盗用, 有效保证了业务的安全性。
在所述用户识别模块卡安装于终端时, 开机初始化时, 终端将从用 户识别模块卡中读取用户识别模块卡的身份标识, 并使用该身份标识登 陆网络。 由于开机初始化时, 用户识别模块卡尚未鉴定出所述终端是否 为合法终端, 因此, 为了避免非法终端读取到用户标识, 本发明实施例 的机卡互锁的方法, 在步骤 101前, 还可包括: 所述用户识别模块卡接收所述终端读取所述用户识别模块卡的用户 标识的命令; 所述用户识别模块卡向所述终端发送伪用户标识。
由于用户识别模块卡向所述终端发送的用户标识为伪用户标识, 因 此, 在用户识别模块卡尚未鉴定出所述终端是否为合法终端时, 无论所 述终端为合法终端或非法终端, 均无法使用该伪用户标识登陆网络, 因 此, 从而有效避免了非法终端对用户识别模块卡的盗用, 进一步保证了 机卡绑定业务的安全性。 进一步的, 在步骤 104所述用户识别模块卡向所述终端发送所述用 户识别模块卡的用户标识后, 本发明实施例的机卡互锁的方法, 还可包 括随机数鉴权环节, 该环节具体可包括以下步骤: 所述用户识别模块卡接收所述终端发送的密文数据, 该密文数据由 该终端使用规定加密规则对所述用户标识进行加密运算后得到; 所述用户识别模块卡确定所述接收的密文数据与所述用户识别模块 卡使用规定加密规则对所述用户标识进行加密运算后得到的密文数据是 否相同;
若否, 所述用户识别模块卡确定所述终端为非法终端; 若是, 所述用户识别模块卡确定所述终端为合法终端, 将允许所述 终端使用。
其中, 所述用户识别模块卡使用的规定加密规则与合法终端使用的 规定加密规则相同, 因此, 所述用户识别模块卡和合法终端得到的密文 数据是相同的, 所述用户识别模块卡将允许合法终端使用。 而如果终端 为非法终端, 两者使用的规定加密规则不同, 所述用户识别模块卡和非 法终端得到的密文数据是不同的, 因此, 即使非法终端通过伪造身份标 识使所述用户识别模块卡将其身份标识发送给所述非法终端, 所述用户 识别模块卡还可以通过随机数鉴权环节确定出非法终端, 进一步防止了 非法终端对用户识别模块卡的盗用。 具体的, 用户识别模块卡所使用的加密规则不限, 但需要与现有标 准加密算法略有不同, 以使现有伪造此标准加密算法的非法终端失去效 用, 进一步防止用户识别模块卡被盗用。 例如, 现有的一种加密规则为 将所述用户识别模块卡的用户标识及随机数作为明文数据, 利用 3 重数 据加密标准电子密本方式 3DES-ECB ( Data Encryption Standard- Electronic Code Book ) 算法对所述明文数据进行加密运算, 而本发明实 施例中, 用户识别模块卡可使用的加密规则为:
将所述用户识别模块卡的用户标识取反后得到的数据及随机数作为 明文数据, 利用 3DES-ECB算法对所述明文数据进行加密运算。 举例说明, 某盗卡分子拿到本发明实施例中的用户识别模块卡 B , 又拿到了具有伪造身份标识 IMEI的终端 C , 将卡 B插入终端 C , 卡片 B 执行本发明实施例的机卡互锁的方法, 执行步骤 101、 102、 104, 虽然伪 造终端 C骗过了步骤 102的 IMEI校验的环节, 但是在 104后, 执行随机 数鉴权环节,伪造终端 C由于计算出的密文数据与卡 B计算的结果不同, 卡 B认出 C是非法终端, 拒绝使用, 因此, 终端 C不能使用卡 B , 即不 能正常登网、 打电话和发短信。
与图 1 所示的方法相对应, 本发明又提供了一种机卡互锁的方法, 基于终端, 如图 2所示, 包括以下步骤:
201 , 终端向用户识别模块卡发送所述终端的身份标识, 以使所述用 户识别模块卡根据所述身份标识确定所述终端为合法终端, 所述终端中 存储有至少一个合法用户识别模块卡的用户标识; 所述用户识别模块卡中预先存储有其合法终端的身份标识, 所述终 端将其身份标识发送给用户识别模块卡, 所述用户识别模块卡能够通过 比较所述终端的身份标识和其存储的合法终端的身份标识, 当其存储的 合法终端的身份标识中具有和所述终端相同的身份标识时, 所述用户识 别模块卡确定其为合法终端, 将其用户标识发送给所述终端。 反之, 所 述用户识别模块卡将确定所述终端为非法终端, 从而拒绝所述终端的使 用, 以有效保证所述用户识别模块卡只能在其合法终端上使用。 本发明实施例中, 所述终端中预先存储有其合法用户识别模块卡的 用户标识, 所述终端的合法用户识别模块卡可以为一个, 也可以为一组, 因此, 所述终端中预先存储有至少一个合法用户识别模块卡的用户标识。 其中, 所述终端所存储的用户标识用于对用户识别模块卡的鉴权, 由于 用户标识与用户识别模块卡唯一对应, 非法用户识别模块卡的用户标识 与合法用户识别模块卡的用户标识肯定不同, 因此, 所述终端能够基于 所存储的合法用户识别模块卡的用户标识和所述用户识别模块卡发送的 用户标识的对比, 确定出所述用户识别模块卡是否非法, 以有效保证所 述终端只能使用合法用户识别模块卡。
202 , 所述终端接收所述用户识别模块卡的用户标识; 当所述用户识别模块卡确定所述终端为合法终端时, 将所述用户识 别模块卡的用户标识发送给该合法终端。
具体的, 本步骤中, 所述合法终端接收所述用户识别模块卡发送的 用户鉴权信息, 所述用户鉴权信息包括所述用户识别模块卡的用户标识, 所述用户标识位于所述用户鉴权信息的规定字节位置上。
由于合法终端已知其合法用户识别模块卡对应的用户标识的字节长 度和用户标识在用户鉴权信息中的位置, 因此, 在收到用户鉴权信息后, 合法终端能够分解出正确的用户标识。 而非法终端将无法获知用户标识 的字节长度和用户标识在用户鉴权信息中的位置, 因此, 可能无法分解 出正确的用户标识, 从而有效避免了非法终端对用户识别模块卡的盗用。
203 ,所述终端确定在所述存储的至少一个合法用户识别模块卡的用 户标识中, 是否具有与所述接收的用户标识相同的用户标识;
204 , 若否, 所述终端确定所述用户识别模块卡为非法用户识别模块 卡。
205 , 若是, 所述终端确定所述用户识别模块卡为合法用户识别 模块卡。
本发明实施例提供的机卡互锁的方法, 终端能够通过用户识别模块 卡的用户标识确定出非法用户识别模块卡, 使得终端不能使用非法用户 识别模块卡, 同时, 用户识别模块卡能够通过终端的身份标识确定出非 法终端, 使得用户识别模块卡不能在非法终端上使用, 从而实现了机卡 互锁, 有效避免了进行机卡绑定业务的用户识别模块卡或终端被盗用, 有效保证了业务的安全性。 举例说明, 某盗机分子拿到本发明实施例中的终端 A, 又拿到了非 法 SIM卡 B , 为了享受运营商提供的优惠资费, 将卡片 B插入 A, 结果 由于是卡 B为非法的 IMSI被终端拒绝, 不能打电话和发短信。 进一步的, 在步骤 201前, 本发明实施例的机卡互锁的方法, 还可 包括:
所述终端向所述用户识别模块卡发送读取所述用户识别模块卡的用 户标识的命令;
所述终端接收所述用户识别模块卡发送的伪用户标识。 由于用户识别模块卡向所述终端发送的用户标识为伪用户标识, 因 此, 在用户识别模块卡尚未鉴定出所述终端是否为合法终端时, 无论所 述终端为合法终端或非法终端, 均无法使用该伪用户标识登陆网络, 因 此, 有效避免了非法终端对用户识别模块卡的盗用, 进一步保证了机卡 绑定业务的安全性。
进一步的, 在步骤 205后, 本发明实施例的机卡互锁的方法, 还可 包括:
所述终端使用规定加密规则对所述用户标识进行加密运算; 所述终端将所述加密运算后得到的密文数据发送给所述用户识别模 块卡, 以使所述用户识别模块卡确定所述密文数据与所述用户识别模块 卡使用规定加密规则对其用户标识进行加密运算的到的密文数据是否相 同, 从而使得用户识别模块卡进一步确定所述终端为合法终端。 其中, 所述终端使用的加密规则不限, 但需要与现有标准加密算法 略有不同, 以使现有伪造此标准加密算法的非法终端失去效用, 进一步 防止用户识别模块卡别盗用。 具体的, 所述终端使用的加密规则包括: 将所述接收的用户标识取反后得到的数据及随机数作为明文数据, 利用 3DES-ECB算法对所述明文数据进行加密运算。
法进行进一步的详 细说明 本实施例中,用户识别模块卡为 SIM卡 , SIM卡的用户标识为 IMSI, 终端的身份标识为 IMEI, SIM卡安装于终端, SIM卡中存储有合法终端 的 IMSI, 终端中存储有合法 SIM卡的 IMSI; 如图 3所示, 本实施例包 括:
步骤 301 :初始开机后,终端首先向 SIM卡发起读取 SIM卡内 ICCID ( Integrate circuit card identity 集成电路卡识别码 ) 和 IMSI的命令;
步骤 302: SIM卡接收到终端读取 IMSI的命令,向终端返回伪 IMSI, 避免非法终端直接使用真实 IMSI直接登陆网络;
以上步骤 301和 302为第一层锁卡保护, 避免 SIM卡的真实 IMSI 被非法终端盗用而直接使用真实 IMSI登陆网络;
步骤 303 : 终端向 SIM卡发送终端配置指令 TERMINAL PROFILE; 步骤 304: SIM 卡收到终端配置指令后, 向终端返回提供本地信息 命令 PROVIDE LOCAL INFORMATION, 要求终端返回终端的 IMEI; 步骤 305: SIM卡接收终端返回的 IMEI值, 通过将其与卡内存储的 合法 IMEI值进行对比, 所述合法 IMEI值为至少一个, 确定终端是否合 法; 如果可以在卡内存储的 IMEI值中找到与接收的 IMEI相同的 IMEI 值, SIM卡执行步骤 306; 反之, SIM卡确定终端为非法终端, 执行步骤 313 ;
以上步骤 303至 305为第二层锁卡保护, SIM通过终端返回的 IMEI 和自身存储的合法终端的 IMEI对终端进行鉴权, 能够确定出非法终端, 例如伪造的非法终端, 使得非法终端不能使用 SIM卡;
步骤 306: SIM卡认为终端合法后, 使用传送命令 GETINPUT向终 端发送用户鉴权信息, 所述用户鉴权信息为一 20字节数, 由前 12字节 随机数加上后 8字节 SIM卡内真实 IMSI组成; 步骤 307: 终端在接收 SIM卡通过 GETINPUT指令发送的 20字节 的用户鉴权信息后, 首先根据预先设定从中分解出 8字节的真实 IMSI, 并通过将其与终端存储的合法 IMSI值进行对比, 所述合法 IMSI值为至 少一个, 确定 SIM卡是否合法; 如果可以在终端存储的 IMSI值中找到与 接收的 IMSI相同的 IMSI值, 终端确定 SIM卡合法, 执行步骤 308; 反 之, 终端确定为非法 SIM卡, 执行步骤 313 ;
以上步骤 306至 307 为第三层锁机保护, 终端通过 SIM卡发送的 IMSI和自身存储的合法 SIM卡的 IMSI对 SIM卡进行鉴权, 能够确定出 非法 SIM卡, 使得终端不能使用非法 SIM卡, 例如伪造的 SIM卡; 步骤 308: 终端认为 SIM卡合法后, 将 IMSI取反后得到的数据及随 机数作为明文数据, 利用 3DES-ECB算法对所述明文数据进行加密运算, 得到密文数据;
步骤 309:终端使用终端响应命令 TERMINAL RESPONSE将得到的 密文数据发送给 SIM卡;
步骤 310: SIM卡获得终端发送的密文数据后, 将该数据与 SIM卡 对进行加密运算得到的密文数据进行比对, 如果两者相同, 则确定终端 合法, 执行步骤 31 1 ; 反之, 则执行步骤 313 ; 其中, SIM卡进行加密运 算时同样将 IMSI取反后取反后得到的数据及随机数作为明文数据, 利用 3DES-ECB算法对所述明文数据进行加密运算, 得到密文数据, 以上步骤 306 至 310 为第四层随机数鉴权保护, 通过改变标准 3DES-ECB算法中的明文数据,避免目前市面上伪造此标准加密算法的非 法 SIM卡贴片对 SIM卡进行盗用。
步骤 311 : SIM 卡使用恢复命令 REFRESH 通知终端进行热启动 WarmReset, 并将终端内 IMSI置为真实 IMSI;
步骤 312: 终端在响应 REFRESH命令并 WarmReset后, 正常开机 初始化。 步骤 313 : 结束。
本实施例的机卡互锁的方法, 通过 4层保护, 使得终端只能使用合 法 SIM卡, 同时, SIM卡只能在合法终端上使用, 从而实现了机卡互锁, 有效避免了进行机卡绑定业务的 SIM卡或终端被盗用, 有效保证了业务 的安全性。
与前述方法相对应, 本发明实施例还提供了一种用户识别模块卡, 如图 4所示, 包括: 存储单元 10 , 用于存储至少一个合法终端的身份标识;
接收单元 1 1 , 用于接收终端的身份标识;
确定单元 12 , 用于确定在存储单元 10存储的至少一个合法终端的 身份标识中是否具有与接收单元 1 1接收的身份标识相同的身份标识; 发送单元 13 , 用于在确定单元 12确定存储单元 10存储的至少一个 合法终端的身份标识中具有与接收单元 1 1接收的身份标识相同的身份标 识时, 向所述终端发送所述用户识别模块卡的用户标识, 以使所述终端 能够根据所述用户标识确定所述用户识别模块卡为合法用户识别模块 卡;
本发明实施例提供的用户识别模块卡, 能够通过终端的身份标识确 定出非法终端, 使得用户识别模块卡不能在非法终端上使用, 同时, 能 够将其用户标识发送给终端, 使得终端能够通过其用户标识确定出所述 用户识别模块卡合法, 使得终端不能使用非法用户识别模块卡, 从而实 现了机卡互锁, 有效避免了进行机卡绑定业务的用户识别模块卡或终端 被盗用, 有效保证了业务的安全性。
进一步的, 接收单元 1 1还用于在接收终端的身份标识前, 接收所述 终端读取所述用户识别模块卡的用户标识的命令;
此时, 发送单元 13还用于向所述终端发送伪用户标识。 由于发送单元 13向所述终端发送的用户标识为伪用户标识, 因此, 在所述用户识别模块卡尚未鉴定出所述终端是否为合法终端时, 无论所 述终端为合法终端或非法终端, 均无法使用该伪用户标识登陆网络, 因 此, 有效避免了非法终端对用户识别模块卡的盗用, 进一步保证了机卡 绑定业务的安全性。 进一步的, 在本发明的一个实施例中, 如图 5所示, 所述用户识别 模块卡还包括:
加密单元 14 ,用于使用规定加密规则对所述用户标识进行加密运算; 接收单元 1 1还用于在发送单元 13向所述终端发送所述用户识别模 块卡的用户标识后, 接收所述终端发送的密文数据, 所述密文数据由所 述终端使用规定加密规则对所述用户标识进行加密运算后得到; 确定单元 12还用于确定接收单元 1 1接收的密文数据与加密单元 14 对所述用户标识进行加密运算后得到的密文数据是否相同, 若否, 确定 所述终端为非法终端, 若是, 确定所述终端为合法终端。
从而使得所述用户识别模块能够进一步确定所述终端是否为合法终 端。
可选的, 加密单元 14使用的规定加密规则包括: 将所述用户识别模 块卡的用户标识取反后得到的数据及随机数作为明文数据, 利用 3DES-ECB算法对所述明文数据进行加密运算。 可选的, 发送单元 13具体用于向所述终端发送用户鉴权信息, 所述 用户鉴权信息包括所述用户识别模块卡的用户标识和随机数, 所述用户 标识位于所述用户鉴权信息的规定字节位置上。
与前述方法相对应, 本发明实施例还提供了一种终端, 如图 6所示, 包括:
存储单元 20 , 用于存储至少一个合法用户识别模块卡的用户标识; 发送单元 21 , 用于向用户识别模块卡发送所述终端的身份标识, 以 使所述用户识别模块卡根据所述身份标识确定所述终端为合法终端; 接收单元 22 , 用于接收所述用户识别模块卡的用户标识;
确定单元 23 , 用于确定在存储单元 20存储的至少一个合法用户识 别模块卡的用户标识中, 是否具有与接收单元 22接收的用户标识相同的 用户标识, 若是, 确定所述用户识别模块卡为合法用户识别模块卡。 本发明实施例提供的终端, 能够通过用户识别模块卡的用户标识确 定出用户识别模块卡是否合法, 使得所述终端不能使用非法用户识别模 块卡, 同时, 所述终端能够将其身份标识发送给用户识别模块卡, 使得 所述用户标识模块卡能够通过终端的身份标识确定出所述终端为合法终 端, 使得用户识别模块卡不能在非法终端上使用从而实现了机卡互锁, 有效避免了进行机卡绑定业务的用户识别模块卡或终端被盗用, 有效保 证了业务的安全性。
进一步的, 在本发明的一个实施例中, 发送单元 21还用于在向用户 识别模块卡发送所述终端的身份标识前, 向所述用户识别模块卡发送读 取所述用户识别模块卡的用户标识的命令;
接收单元 22还用于接收所述用户识别模块卡发送的伪用户标识。 进一步的, 在本发明的一个实施例中, 如图 5所示, 所述终端还包 括:
加密单元 24 , 用于在确定单元 23确定在存储单元 20存储的至少一 个合法用户识别模块卡的用户标识中, 具有与接收单元 22接收的用户标 识相同的用户标识后, 使用规定加密规则对所述用户标识进行加密运算; 此时,发送单元 21还用于将所述加密单元进行加密运算后得到的密 文数据发送给所述用户识别模块卡。
可选的, 加密单元 24使用的规定加密规则包括: 将所述接收单元接 收的的用户标识取反后得到的数据及随机数作为明文数据, 利用 3DES-ECB算法对所述明文数据进行加密运算。
在本发明的一个实施例中, 如图 8所示, 接收单元 22具体用于接收 所述用户识别模块卡发送的用户鉴权信息, 所述用户鉴权信息包括所述 用户识别模块卡的用户标识和随机数, 所述用户标识位于所述用户鉴权 信息的规定字节位置上;
这时, 确定单元 23包括:
分解模块 230 , 用于根据预先规定从所述用户鉴权信息中分解出用 户标识;
确定模块 231 , 用于确定在存储单元 20存储的至少一个合法用户识 别模块卡的用户标识中, 是否具有与分解模块 210 分解出的用户标识相 同的用户标识。
本领域普通技术人员可以理解: 实现上述方法实施例的全部或部分 流程可以通过计算机程序指令相关的硬件来完成, 前述的程序可以存储 于一计算机可读取存储介质中, 该程序在执行时, 执行包括上述方法实 施例的步骤; 而前述的存储介质包括: ROM、 RAM, 磁碟或者光盘等各 种可以存储程序代码的介质。
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不 局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本 发明的保护范围应以所述权利要求的保护范围为准。

Claims

权 利 要 求 书
1、 一种机卡互锁的方法, 其特征在于, 包括:
用户识别模块卡接收终端的身份标识, 所述用户识别模块卡中存储 有至少一个合法终端的身份标识;
当所述用户识别模块卡确定在所述存储的至少一个合法终端的身份 标识中, 具有与所述接收的身份标识相同的身份标识时, 所述用户识别 模块卡向所述终端发送所述用户识别模块卡的用户标识, 以使所述终端 能够根据所述用户标识确定所述用户识别模块卡为合法用户识别模块 卡。
2、 根据权利要求 1所述的方法, 其特征在于, 在所述用户识别模块 卡接收终端的身份标识前, 所述方法还包括:
所述用户识别模块卡接收所述终端读取所述用户识别模块卡的用户 标识的命令;
所述用户识别模块卡向所述终端发送伪用户标识,
3、 根据权利要求 1或 2所述的方法, 其特征在于, 在所述用户识别 模块卡向所述终端发送所述用户识别模块卡的用户标识后, 所述方法还 包括:
所述用户识别模块卡接收所述终端发送的密文数据, 所述密文数据 由所述终端使用规定加密规则对所述用户标识进行加密运算后得到; 所述用户识别模块卡确定所述接收的密文数据与所述用户识别模块 卡使用规定加密规则对所述用户标识进行加密运算后得到的密文数据是 否相同;
若否, 所述用户识别模块卡确定所述终端为非法终端;
若是, 所述用户识别模块卡确定所述终端为合法终端。
4、 根据权利要求 3所述的方法, 其特征在于, 所述用户识别模块卡 使用的规定加密规则包括: 将所述用户识别模块卡的用户标识取反后得 到的数据及随机数作为明文数据, 利用 3DES-ECB算法对所述明文数据 进行加密运算。
5、 根据权利要求 1所述的方法, 其特征在于, 所述用户识别模块卡 向所述终端发送所述用户识别模块卡的用户标识包括:
所述用户识别模块卡向所述终端发送用户鉴权信息, 所述用户鉴权 信息包括所述用户识别模块卡的用户标识, 所述用户标识位于所述用户 鉴权信息的规定字节位置上。
6、 一种机卡互锁的方法, 其特征在于, 包括:
终端向用户识别模块卡发送所述终端的身份标识, 以使所述用户识 别模块卡根据所述身份标识确定所述终端为合法终端, 所述终端中存储 有至少一个合法用户识别模块卡的用户标识;
所述终端接收所述用户识别模块卡的用户标识;
当所述终端确定在所述存储的至少一个合法用户识别模块卡的用户 标识中, 具有与所述接收的用户标识相同的用户标识时, 所述终端确定 所述用户识别模块卡为合法用户识别模块卡。
7、 根据权利要求 6所述的方法, 其特征在于, 在终端向用户识别模 块卡发送所述终端的身份标识前, 所述方法还包括:
所述终端向所述用户识别模块卡发送读取所述用户识别模块卡的用 户标识的命令;
所述终端接收所述用户识别模块卡发送的伪用户标识。
8、 根据权利要求 6或 7所述的方法, 其特征在于, 所述终端确定所 述用户识别模块卡为合法用户识别模块卡后, 所述方法还包括:
所述终端使用规定加密规则对所述用户标识进行加密运算; 所述终端将所述加密运算后得到的密文数据发送给所述用户识别模 块卡。
9、 根据权利要求 8所述的方法, 其特征在于, 所述规定加密规则包 括: 将所述接收的用户标识取反后得到的数据及随机数作为明文数据, 利用 3DES-ECB算法对所述明文数据进行加密运算。
10、 根据权利要求 6所述的方法, 其特征在于,
所述终端接收所述用户识别模块卡的用户标识包括:
所述终端接收所述用户识别模块卡发送的用户鉴权信息, 所述用户 鉴权信息包括所述用户识别模块卡的用户标识, 所述用户标识位于所述 用户鉴权信息的规定字节位置上;
当所述终端确定在所述存储的至少一个合法用户识别模块卡的用户 标识中, 具有与所述接收的用户标识相同的用户标识的步骤包括:
所述终端根据预先规定从所述用户鉴权信息中分解出用户标识; 所述终端确定在所述存储的至少一个合法用户识别模块卡的用户标 识中, 是否具有与所述分解出的用户标识相同的用户标识。
1 1、 一种用户识别模块卡, 其特征在于, 包括:
存储单元, 用于存储至少一个合法终端的身份标识;
接收单元, 用于接收终端的身份标识;
确定单元, 用于确定在所述存储单元存储的至少一个合法终端的身 份标识中是否具有与所述接收单元接收的身份标识相同的身份标识; 发送单元, 用于在确定单元确定所述存储单元存储的至少一个合法 终端的身份标识中具有与所述接收单元接收的身份标识相同的身份标识 时, 向所述终端发送所述用户识别模块卡的用户标识, 以使所述终端能 够根据所述用户标识确定所述用户识别模块卡为合法用户识别模块卡。
12、 根据权利要求 1 1所述的用户识别模块卡, 其特征在于, 所述接收单元还用于在接收终端的身份标识前, 接收所述终端读取 所述用户识别模块卡的用户标识的命令;
13、 根据权利要求 1 1或 12所述的用户识别模块卡, 其特征在于, 所述用户识别模块卡还包括加密单元, 用于使用规定加密规则对所 述用户标识进行加密运算; 模块卡的用户标识后, 接收所述终端发送的密文数据, 所述密文数据由 所述终端使用规定加密规则对所述用户标识进行加密运算后得到;
所述确定单元还用于确定所述接收单元接收的密文数据与所述加密 单元对所述用户标识进行加密运算后得到的密文数据是否相同, 若否, 确定所述终端为非法终端, 若是, 确定所述终端为合法终端。
14、 根据权利要求 13所述的用户识别模块卡, 其特征在于, 所述加 密单元使用的规定加密规则包括: 将所述用户识别模块卡的用户标识取 反后得到的数据及随机数作为明文数据, 利用 3DES-ECB算法对所述明 文数据进行加密运算。
15、 根据权利要求 1 1所述的用户识别模块卡, 其特征在于, 所述发 送单元具体用于向所述终端发送用户鉴权信息, 所述用户鉴权信息包括 所述用户识别模块卡的用户标识, 所述用户标识位于所述用户鉴权信息 的规定字节位置上。
16、 一种终端, 其特征在于, 包括:
存储单元, 用于存储至少一个合法用户识别模块卡的用户标识; 发送单元, 用于向用户识别模块卡发送所述终端的身份标识, 以使 所述用户识别模块卡根据所述身份标识确定所述终端为合法终端;
接收单元, 用于接收所述用户识别模块卡的用户标识;
确定单元, 用于确定在所述存储单元存储的至少一个合法用户识别 模块卡的用户标识中, 是否具有与所述接收单元接收的用户标识相同的 用户标识, 若是, 确定所述用户识别模块卡为合法用户识别模块卡。
17、 根据权利要求 16所述的终端, 其特征在于, 所述发送单元还用 于在向用户识别模块卡发送所述终端的身份标识前, 向所述用户识别模 块卡发送读取所述用户识别模块卡的用户标识的命令;
所述接收单元还用于接收所述用户识别模块卡发送的伪用户标识。
18、 根据权利要求 16或 17所述的终端, 其特征在于,
所述终端还包括:
加密单元, 用于在所述确定单元确定在所述存储单元存储的至少一 个合法用户识别模块卡的用户标识中, 具有与所述接收单元接收的用户 标识相同的用户标识后, 使用规定加密规则对所述用户标识进行加密运 此时, 所述发送单元还用于将所述加密单元进行加密运算后得到的 密文数据发送给所述用户识别模块卡。
19、 根据权利要求 15所述的终端, 其特征在于, 所述加密单元使用 的规定加密规则包括: 将所述接收单元接收的的用户标识取反后得到的 数据及随机数作为明文数据, 利用 3DES-ECB算法对所述明文数据进行 力口密运算。
20、 根据权利要求 15所述的终端, 其特征在于,
所述接收单元具体用于接收所述用户识别模块卡发送的用户鉴权信 息, 所述用户鉴权信息包括所述用户识别模块卡的用户标识, 所述用户 标识位于所述用户鉴权信息的规定字节位置上;
所述确定单元包括:
分解模块, 用于根据预先规定从所述用户鉴权信息中分解出用户标 识;
确定模块, 用于确定在所述存储单元存储的至少一个合法用户识别 模块卡的用户标识中, 是否具有与所述分解单元分解出的用户标识相同 的用户标识。
PCT/CN2011/075046 2011-05-31 2011-05-31 机卡互锁的方法、用户识别模块卡和终端。 WO2011144129A2 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2011800005758A CN102204298A (zh) 2011-05-31 2011-05-31 机卡互锁的方法、用户识别模块卡和终端
PCT/CN2011/075046 WO2011144129A2 (zh) 2011-05-31 2011-05-31 机卡互锁的方法、用户识别模块卡和终端。

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/075046 WO2011144129A2 (zh) 2011-05-31 2011-05-31 机卡互锁的方法、用户识别模块卡和终端。

Publications (2)

Publication Number Publication Date
WO2011144129A2 true WO2011144129A2 (zh) 2011-11-24
WO2011144129A3 WO2011144129A3 (zh) 2012-04-26

Family

ID=44662840

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/075046 WO2011144129A2 (zh) 2011-05-31 2011-05-31 机卡互锁的方法、用户识别模块卡和终端。

Country Status (2)

Country Link
CN (1) CN102204298A (zh)
WO (1) WO2011144129A2 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3030819A1 (fr) * 2014-12-19 2016-06-24 Orange Interaction securisee entre un equipement et une carte sim
CN104661220B (zh) * 2015-03-13 2019-02-26 中国联合网络通信集团有限公司 一种实现鉴权处理的方法及装置
CN109714753A (zh) * 2017-10-25 2019-05-03 北京握奇智能科技有限公司 一种网络终端与物联网sim卡认证的方法和系统
CN108197940A (zh) * 2018-01-17 2018-06-22 武汉轻工大学 移动终端的支付请求响应方法、移动终端及可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083816A (zh) * 2007-07-30 2007-12-05 中兴通讯股份有限公司 一种无线终端及其和用户识别卡互锁及解锁的方法
CN101155212A (zh) * 2006-09-30 2008-04-02 中兴通讯股份有限公司 一种限制移动终端使用的方法
CN101163290A (zh) * 2006-10-09 2008-04-16 中兴通讯股份有限公司 一种通过机卡相互认证限制移动终端使用的方法
CN101686572A (zh) * 2008-09-26 2010-03-31 中国移动通信集团公司 无线终端机卡互锁的方法、系统和管理平台

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282518B (zh) * 2007-04-03 2011-10-19 展讯通信(上海)有限公司 一种手机设备开机时保护用户隐私的方法及智能卡

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101155212A (zh) * 2006-09-30 2008-04-02 中兴通讯股份有限公司 一种限制移动终端使用的方法
CN101163290A (zh) * 2006-10-09 2008-04-16 中兴通讯股份有限公司 一种通过机卡相互认证限制移动终端使用的方法
CN101083816A (zh) * 2007-07-30 2007-12-05 中兴通讯股份有限公司 一种无线终端及其和用户识别卡互锁及解锁的方法
CN101686572A (zh) * 2008-09-26 2010-03-31 中国移动通信集团公司 无线终端机卡互锁的方法、系统和管理平台

Also Published As

Publication number Publication date
WO2011144129A3 (zh) 2012-04-26
CN102204298A (zh) 2011-09-28

Similar Documents

Publication Publication Date Title
CN101641976B (zh) 认证方法
JP4786190B2 (ja) 認証ベクトル生成装置、加入者認証モジュール、無線通信システム、認証ベクトル生成方法、演算方法及び加入者認証方法
EP3099090B1 (en) Network locking or card locking method and device for a mobile terminal, terminal, sim card, storage media
EP1886438B1 (en) Method for inclusive authentication and management of service provider, terminal and user identity module, and system and terminal device using the method
JP4263384B2 (ja) ユーザ加入識別モジュールの認証についての改善された方法
CN110192381B (zh) 密钥的传输方法及设备
US20160119316A1 (en) Wireless network authentication method and wireless network authentication apparatus
KR101630913B1 (ko) 통신 세션을 검증하기 위한 방법, 디바이스 및 시스템
EP2384038B1 (en) Method and system for realizing network locking and unlocking by a terminal device
JP4664050B2 (ja) 認証ベクトル生成装置、加入者認証モジュール、移動通信システム、認証ベクトル生成方法、演算方法及び加入者認証方法
CN101366299A (zh) 使用特殊随机询问的引导认证
CN105828332A (zh) 一种无线局域网认证机制的改进方法
WO2006060943A1 (en) Authentication method
MX2007009790A (es) Secreto compartido de contexto limitado.
WO2009094886A1 (fr) Procédé pour bloquer un programme d'application
CN102318386A (zh) 向网络的基于服务的认证
KR100847145B1 (ko) 불법 액세스 포인트 검출 방법
CN106304264B (zh) 一种无线网络接入方法及装置
KR101281099B1 (ko) 스마트폰 분실 및 도난의 피해 방지를 위한 인증방법
WO2019109640A1 (zh) 一种锁定sim卡的方法及装置
TW201729562A (zh) 伺服器、行動終端機、網路實名認證系統及方法
CN101841814B (zh) 终端鉴权方法及系统
WO2013185709A1 (zh) 一种呼叫认证方法、设备和系统
CN105119716A (zh) 一种基于sd卡的密钥协商方法
WO2012122782A1 (zh) 一种获取解锁码的方法及移动终端

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180000575.8

Country of ref document: CN

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11783046

Country of ref document: EP

Kind code of ref document: A2