×

Authentication method for the mobile terminal and a system thereof

  • US 8,571,522 B2
  • Filed: 11/27/2008
  • Issued: 10/29/2013
  • Est. Priority Date: 11/27/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method for authenticating a mobile terminal, the method comprising:

  • the mobile terminal using a pre-set password P to decrypt a key A stored in a subscriber information file to obtain a key Ki which is used in authentication;

    in a process of authentication, the mobile terminal using the key Ki and a random number sent by a network side to generate encrypted authentication response data, and sending the encrypted authentication response data to the network side; and

    the network side verifying the encrypted authentication response data sent by the mobile terminal, and returning an authentication success acknowledgement to the mobile terminal after the verification succeeds;

    before the process of authentication begins, the mobile terminal sending an International Mobile Subscriber Identity (IMSI) stored in said subscriber information file to the network side; and

    after verifying the encrypted authentication response data sent by the mobile terminal successfully, the network side judging whether there is another mobile terminal using the same IMSI to access the network and carrying out the following operations if yes;

    breaking a connection with an accessed mobile terminal, and/or sending a notification message that there is another mobile terminal using the same IMSI to access the network to the mobile terminal by which the encrypted authentication response data is sent;

    wherein said subscriber information file is stored in a local memory of the mobile terminal, or a mobile memory device connected with the mobile terminal, and said subscriber information file further includes an identification number which is used for uniquely identifying different subscriber information files belonging to the same IMSI;

    and wherein the network side records a corresponding relationship between said identification number and the IMSI when the mobile terminal accesses the network; and

    the mobile terminal sends said identification number together with said encrypted authentication response data to the network side, and the network side judges whether there is another mobile terminal using the same IMSI to access the network according to the identification number.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×