WO2002082825A2 - Method and apparatus for authentication using remote multiple access sim technology - Google Patents
Method and apparatus for authentication using remote multiple access sim technology Download PDFInfo
- Publication number
- WO2002082825A2 WO2002082825A2 PCT/US2002/010175 US0210175W WO02082825A2 WO 2002082825 A2 WO2002082825 A2 WO 2002082825A2 US 0210175 W US0210175 W US 0210175W WO 02082825 A2 WO02082825 A2 WO 02082825A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- client device
- server device
- response
- user unit
- unit code
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
Definitions
- the present invention relates generally to mobile telecommunications systems utilizing a subscriber identity module, and in particular, the present invention relates to a method and apparatus for remote access to a subscriber identity module.
- a mobile device In a Global System for Mobile Communications (GSM) system and in other telecommunications systems, a mobile device includes hardware and software specific to a radio interface, along with subscriber specific data located in a subscriber identity module, or "SIM".
- SIM can either be a smart card having physical dimensions similar to the well-known size of credit cards, or alternately can be "cut” to a much smaller format, commonly referred to as a "plug-in SIM".
- the SIM card contains and organizes information, such as identity information identifying the subscriber as a valid subscriber, subscriber supplied information, such as telephone numbers, for example, operator specific information, and a certain subset of mobility management state information, such as information about the last public land mobile network in which the mobile device was registered.
- the SIM card when inserted within a mobile device in a cellular network, the SIM card enables the mobile device to be personalized, or associated with subscriber specific information. However, once the SIM card is removed, the mobile device cannot be used, except, if permitted by the network, for emergency related transmissions.
- FIG. 1 is a schematic diagram of known system architecture of a SLVI card interface within a mobile device.
- a SIM card 100 interfaces with a software component portion 102 of a mobile device through an electrical interface 104 that is coupled to a SIM physical data interchange layer 106 of software component portion 102.
- Software component portion 102 also includes a SIM authentication and ciphering unit 108, a SIM command/response interface 110, and a SIM physical presence detection unit 112. Commands corresponding to authentication and ciphering requests that are received and transmitted internally by the mobile device are converted by SIM command/response interface 110 to a standardized command format.
- the standardized command is then transmitted to SIM authentication and ciphering unit 108 for authentication and cipher key generation, and is then transmitted to SIM physical data interchange layer 106.
- Commands corresponding to requests other than authentication and ciphering requests that are received and transmitted internally by the mobile device are converted by SIM command/response interface 110 to a standardized command format, and the standardized command is then transferred directly to physical data interchange layer 106.
- Physical data interchange layer 106 formats the standardized command received from either SIM authentication and ciphering unit 108 or directly from SIM command/response interface 110 into physical data according to GSM required electronic signals and transmission protocols.
- the physical data is then transmitted from SIM physical data interchange layer 106 to SIM card 100 through electrical interface 104.
- SIM card 100 Upon receiving the command, SIM card 100 subsequently transmits physical data corresponding to a response to the command from SIM card 100 to physical data interchange layer 106, through electrical interface 104.
- Physical data interchange layer 106 formats the physical data into a standardized response.
- the standardized response if made in response to an authentication and ciphering command, is transmitted to SIM authentication and enciphering unit 108 for authentication and cipher key generation, and then to SIM command/response interface 110, which converts the standardized response to a format required internally by the mobile station.
- Standardized responses to commands corresponding to requests other than authentication and ciphering requests are transmitted directly from physical data interchange layer 106 to SIM command/response interface 110, which converts the standardized response to a format required internally by the mobile device.
- electrical interface 104 continuously transmits a physical presence signal to a physical presence detection unit 112 to indicate that SIM card 100 is inserted and is in electrical contact with electrical interface, and that S card 100 is functioning properly.
- physical presence detection unit 112 transmits an interrupt signal indicating the absence of SIM card 100, and service access to the mobile device is interrupted.
- the SIM card as defined by GSM specifications, has been further enhanced in terms of information organization and functionality for use with other services. For example, work for the Telecommunications Industry Association/Electronics Industry
- TIA/EIA TIA/EIA 136 Enhanced General Packet Radio Services (EGPRS) for
- TIA/EIA 136 proposes the use of the European GSM SIM card plus enhancements for use by the American time division multiple access (TDM A) proposed high-speed wireless data service.
- TDM A American time division multiple access
- the current GSM definition of the SIM card will likely be expanded to include other services as well, such as third generation mobile voice and data services.
- SIM card enabled subscriber devices One of the disadvantages that will result as the SIM card is utilized in more and more subscriber devices, is that a separate SIM card will be required for use in each subscriber device, and therefore a user of multiple SIM card enabled devices will be required to utilize a multiple number of SIM cards. Accordingly, what is needed is a method and apparatus that enables multiple SIM card enabled subscriber devices to be utilized using a single SIM card.
- FIG. 1 is a schematic diagram of known system architecture of a SIM card interface within a mobile device.
- FIG. 2 is a schematic diagram of a communications system enabling remote multiple access to a single SIM card device, according to the present invention.
- FIG. 3 A is a schematic diagram of system architecture of a server device enabling remote multiple access to a SIM card, according to the present invention.
- FIG. 3B is a schematic diagram of system architecture of a client device, according to the present invention.
- FIG. 4 is a flowchart of processing of a SIM command message by a remote client device, according to the present invention.
- FIG. 5 is a flowchart of processing a SIM command received by a server device, according to the present invention.
- FIG. 6 is a flowchart of routing of a received SIM command by a server device, according to the present invention.
- FIG. 7 is a schematic diagram of authentication of remotely executed transactions according to the present invention.
- FIG. 8 is a schematic diagram of message sequencing during a key synchronization process for authentication of remote multiple access to a single SIM card device, according to the present invention.
- FIG. 9 is a schematic diagram of message sequencing for authentication of remote multiple access to a single SIM card device, according to the present invention.
- FIGS. 10 and 11 are flowcharts of a key synchronization process for authentication of remote multiple access to a single SIM card device, according to the present invention.
- FIGS. 12 and 13 are flowcharts of authentication of remote multiple access to a single SIM card device, according to the present invention.
- the present invention is a method and apparatus for authenticating a mobile device, in a mobile telecommunications system that enables a client device to remotely access a packet data network through a server device, during a transaction requiring increased security over and above the security inherent in the remote access to the packet data network.
- An authentication application unit positioned within the client device transmits a first synchronization command to the server device over the packet data network
- an authentication application unit positioned within the server device generates a user unit code and transmits the generated user unit code to the client device over the packet data network in response to the first synchronization
- FIG. 2 is a schematic diagram of a communications system enabling remote multiple access to a single SEVI card device, according to the present invention. As illustrated in FIG.
- a communication system 201 includes a server device 200, such as a mobile subscriber unit, having a SIM card 202 intended for use by a single user inserted within server device 200.
- Other client devices such as a personal computer 204, another mobile subscriber unit 206, and a personal digital assistant (PDA) 208, which are intended to operate utilizing a SIM card, interface with server device 200 via local links 210.
- local links 210 can be hardwire connections or wireless connections, such as Bluetooth links, pico-radio, or other known wireless transmission technology. Therefore, although the present invention will be described below as utilizing a wireless local link for transmitting commands and responses between server device 200 and client devices 204, 206 and 208, it is understood that the present invention could also be realized using a hardwire connection as local link 210.
- Server device 200 may be a mobile subscriber unit that is intended for General Packet Radio Service (GPRS) data interchange, while mobile subscriber unit 206 may be capable of voice-only service. It is understood that while three client devices 204, 206 and 208 are shown in FIG. 2, the present invention is intended to include any number of and/or variety of client devices that utilize a SIM card.
- GPRS General Packet Radio Service
- each of client devices 204, 206 and 208 is able to access SIM card 202 in server device 200 via wireless link 210, as will be described below, thereby alleviating the need for a separate SIM card to be inserted within each of client devices 204, 206 and 208.
- the present invention enables GSM and Universal Mobile Telephone System (UMTS) operators to offer their customers multiple services, or services that would span more than one physical terminal unit, with provisioning of a single SIM card. Since the range of the wireless local link 210 is limited, the operator has a built-in device which limits the usage of the multiple subscriptions to a single user, or to a very small multiuser environment.
- UMTS Universal Mobile Telephone System
- FIG. 3 A is a schematic diagram of system architecture of a server device enabling remote multiple access to a SIM card, according to the present invention.
- server device 200 includes a SIM card interface 214 and a router unit 226.
- An electrical interface 212 enables hardware associated with SIM card 202 to interface with SIM card interface 214 of server device 200.
- SIM card interface 214 includes a SIM physical data interchange layer 216 that receives electrical signals from electrical interface 212, and a SIM authentication and ciphering unit 218 which establishes an authenticated connection prior to the provision of information services to client devices 204, 206 and 208.
- SIM command/response interface 220 of SIM card interface 214 receives commands from router unit 226 and converts response information, formatted internally by SIM card interface 214, to standardized responses which are sent to a router unit 226.
- SIM card interface 214 includes a physical presence detection unit 228 that receives an electrical signal transmitted directly from electrical interface 212 when SIM card 202 is inserted within server device 200 to indicate the physical presence of SIM card 202 within server device 202. As long as the physical presence signal is detected, physical presence detection unit 228 continuously transmits a physical presence indication signal to a physical presence processor 260 of router unit 226.
- server device 200 When SIM card 202 is not inserted in server device 200, receipt of the physical presence indication signal from physical presence detection unit 228 is interrupted, and physical presence processor 260 transmits a broadcast message along local link 210 through a local link transceiver 230. In this way, server device 200 transmits the broadcast message to each of client device 204, 206 and 208 that are currently attached to server device 200 via local link 210, indicating that SIM card 202 is not electrically coupled at electrical interface 212 of SIM interface 214 of - server device 200.
- Local link transceiver 230 within router unit 226 performs local link and address management and authentication to enable data to be interchanged via local link 210, between server device 200 and any one of multiple client devices 204, 206 and 208.
- a local link data interface 234 performs bi-directional conversion of commands from client devices 204, 206 and 208 that are received by router unit 226, and of responses transmitted from router unit 226 to client devices 204, 206 and 208 to a message format that is meaningful and useful to a client address manager 236 and local link transceiver 230, respectively.
- Local link data interface 234 formats the commands from local link transceiver 230 and converts the responses to the commands from SIM card 202 and the broadcast message from physical presence processor 260 to a format corresponding to local link transceiver 230, and local link transceiver 230 transmits the responses to the commands from local link data interface 234 to client devices 204, 206 and 208 along local link 210.
- Client address manager 236 receives commands from data interface 234, associates the commands with a local link address to determine whether the client devices from which the commands originated are permitted client devices 204, 206 and 208, and determines whether a number of allowed remote SIM clients has been exceeded by server device 200. In this way, valid commands are formed when the commands are determined to originate from permitted client devices 204, 206 and 208, and server device 200 has service capacity, as provisioned by a service provider. As a result, if a command is received and server device 200 is serving a maximum number of client devices 204, 206 and 208, or a client device associated with the command is not permitted service, the command is discarded by server device 200.
- server device 200 includes a maximum response timer 224 that determines the amount of time between the transmission of commands by router unit 226 to SIM card 202, and receipt of responses to the commands from SIM card 202. If timer 224 exceeds a predetermined amount of time, the commands are discarded. Although timer 224 is shown in FIG. 3A as being located in message serializer and router unit 240, it is understood that, according to the present invention, timer 224 may be positioned at other locations within router unit 226. As commands are received by client address manager 238, the received - commands are stored in order of receipt in a command queue buffer 238, with the first command received being located at a head 239 of command queue 238.
- the received commands are each processed individually by a message serializer and router unit 240, as described below, and the processed commands are sent from message serializer and router unit 240 to a command processor 242.
- Command processor 242 formats the commands and sends a corresponding command to SIM card 202 via command/response interface 220, SIM authentication and ciphering unit 212, data interchange layer 216, and electrical interface 212.
- a response processor 244 receives and formats a response to the command from SIM card 202 via command/response interface 220, and sends the response to message serializer and router 240.
- Message serializer and router 240 associates the response with client device address information, and transmits the response to a response formatter 246.
- Response formatter 246 formats and converts the response and the associated address to a response message that is transmitted to data interface 234 and sent to client devices 204, 206 and 208 corresponding to the associated address via local link 210 by transceiver 230.
- FIG. 3B is a schematic diagram of system architecture of a client device, according to the present invention. It is understood that, according to the present invention, each of client devices 204, 206 and 208 is capable of interfacing with server device 200, as illustrated in FIG. 2. However, since client devices 204, 206, and 208 each include system architecture corresponding to the present invention, only one client device 256 is shown in FIG. 3B, merely to simplify the discussion, and the description of client device 256 therefore is intended to describe features associated with each of client devices 204, 206, and 208.
- a local link data interface 248 of client device 256 performs bi-directional conversion of internal messages to and from router unit 226 through a local link transceiver 232 in a message format that is meaningful and useful to router unit 226 and to a command/response interface 250 of client device 256.
- Transceiver 232 performs local link and address management and authentication of the broadcast message and the responses to the commands received along local link 210 from server device 200 via transceiver 230.
- Data interface 248 converts the commands from addresser 252 to a format corresponding to transceiver 232 to enable - transceiver 232 to transmit the commands from data interface 248 to transceiver 230 of server device 200 along local link, and converts the broadcast message and the responses to the commands from SIM card 202 to a format corresponding to command response interface 250.
- Command/response interface 250 converts command and response information that has been formatted internally by client device 256 to standardized commands and responses specified for SIM card interchange. In this way, command/response interface 250 converts internal information to form the commands, and links the responses to the commands from SIM card 202 with the internal information.
- the standard SIM commands from command/response interface 250 are received by an addresser 252, which associates a local client address to the command.
- the commands are then output by transceiver 232 of client device 256 along local link 210, and are received through transceiver 230 by router unit 226 and routed to SIM card 202 through electrical interface 212.
- Client device 256 includes a remote SIM physical presence processor 254 that receives the broadcast message transmitted along local link 210 from server device 200 in response to SIM card 202 not being electrically coupled at electrical interface 212 of SIM interface 214 of server device 200.
- physical presence detection unit 228 will not received the physical presence signal from electrical interface 212, so that the transmission of the physical presence indication signal to physical presence processor 260 will be interrupted, thereby causing the broadcast message to be transmitted from physical presence processor 260 to physical presence processor 254, which in turn transmits the indication signal informing client device 256 of the absence or failure of SIM card 202.
- a maximum response timer 222 determines the amount of time between the commands being transmitted by client devices 204, 206 and 208 along local link 210 to server device 200, and receipt of the responses to the commands from SIM card 202 transmitted along local link 210 from router unit 226. If timer 224 exceeds a predetermined period of time, timer 222 transmits a timeout message to physical presence processor 254, which then transmits the indication signal informing client device 256 of the absence or failure of SIM card 202.
- physical presence processor 260 detects the presence of the actual SIM card 202, and if SIM card 202 is removed from server device 200, physical presence processor 260 transmits the broadcast message, via wireless link 210, to all client devices 204, 206 and 208 informing of the absence of SIM card 202.
- Remote physical absence processor 254 of each client device 204, 206 and 208 transmits an indication signal, upon receipt of the broadcast message form physical presence processor 260 or the timeout message from timer 222, internally indicating to client devices 204, 206 and 208 that SIM card 202 was removed from server device 200, or that server device 200 has not responded to a command within a predetermined period of time.
- SIM card 202 appears logically to client device 256 as SIM card 202 resides within client device 256.
- FIG. 4 is a flowchart of processing of a SIM command message by a remote client device, according to the present invention.
- client device 256 waits to receive an internal SEM command message, Step 300, and once a SIM command message is received, Step 302, the received SIM command message is converted by command response interface 250 into a command packet, Step 304, that is usable by interface 248.
- the command packet is transmitted to addresser 252, which associates a local address identifying client device 256 with the command packet, and the command packet and local address is then transmitted to server device 200 via local link 210 and transceivers 230, 232 in Step 306.
- Step 306 Once the command packet has been transmitted to server device 200 in Step 306, maximum response timeout timer 222 positioned within client device 256 is started, Step 308, to keep track of the amount of time between the sending of the command packet to server device 200 and receipt of a response to the command from SIM card 202 from server device 200.
- Step 310 A determination is made in Step 310 as to whether maximum response timeout timer 222 has expired, i.e., whether the amount of time between the sending of the command packet to server device 200 and receipt of a response to the command message from server device 200 is greater than or has exceeded a predetermined amount of time. If timer 222 has not exceeded the predetermined time period, a determination is then made as to whether a response from server device 200 to the command packet from SIM card202 has been received by client device 256 from
- timer 222 is cleared and the received response is transmitted internally within client device 256 via command response interface 250, Step 314. However, if, prior to determining in Step 312 that a response has been received, it is determined in
- Step 310 that maximum response timeout timer 222 has exceeded the predetermined time period, a timeout status is asserted to remote physical absence processor 254 in Step 316, which in turn internally signals client device 256 to indicate to client device 256 that there was a response failure.
- FIG. 5 is a flowchart of processing of a SIM command received by a server device, according to the present invention.
- client address manager 236 waits to receive a command packet from client device 256, Step 320, and once a command packet is received, Step 322, client address manager 236 compares the local link address previously associated by addresser 252 with a list of permissible client devices, Step 324. Based upon this comparison by client address manager 236, a determination is made as to whether client device 256 is included in the list of permissible client devices and is therefore a permitted device, Step 326, and as to whether server device 200 has more than a maximum number of permissible client devices currently attached, Step 328.
- the maximum number of permissible client devices can be controlled by the GSM or UMTS operator, enabling the operator to limit the number of remote connections permissible, and that the number could be zero, so that the operator could permit or deny remote SIM operation.
- identification of the number of remote clients that SIM card 202 can support can be identified, for example, in an answer to reset, or ATR message, which is a response currently defined within GSM standards and in which there are currently several unused characters that are sent. Therefore, according to a preferred embodiment of the present invention, the identification of the number of remote clients that SIM card 202 can support is contained in an unused character of the ATR message. However, it is understood that the identification of the number of remote clients that SIM card 202 can support could be conveyed in other messages or by alternate procedures.
- Step 326 If it is determined in Step 326 that the associated client device is not permitted service, or if it is determined in Step 328 that server device 200 is currently serving a maximum number of client devices allowed for that server device, the command packet is discarded, Step 330 and the process returns to Step 320 to wait for receipt of a next command packet.
- FIG. 6 is a flowchart of routing of a received SIM command by a server device, according to the present invention. As illustrated in FIGS.
- message serializer and router 240 waits for a command packet to be inserted at head 239 of command queue buffer 238, Step 333, and once a determination is made in Step 334 that command packet is in head 239 of command queue buffer 238, message serializer and router 240 removes the command packet from head 239 of command queue buffer 238, forwards the command packet to command processor 242, and starts maximum response timer 224, Step 336.
- Maximum response timer 224 keeps track of the amount of time between transmission of the commands by router unit 226 to SIM card 202, and receipt of the responses to the commands from SIM card 202. In particular, timer 224 keeps track of the amount of time that expires between the forwarding of the command packet by message serializer and router 240 to command processor 242 and receipt of a response to the command packet by message serializer and router 240. Once timer 224 has been started, a determination is then made in Step 338 as to whether the time displayed by maximum response timer 224 is greater than a predetermined response time.
- Step 340 If the time displayed by the maximum response timer 224 is greater than the predetermined response time, the command packet is discarded, Step 340, the timer is cleared, Step 342, and the process returns to Step 333 and waits for a next command packet in head 239 of command queue buffer 238, Step 334.
- Step 344 determines whether a response to the command packet has been received. If a response has not been received, the process returns to Step 338 so that message serializer and router 240 waits until either a response is received, or until the amount of time that has expired since the command packet was forwarded to command processor 242 in Step 336 by message serializer and router 240 has exceeded a predetermined allowed response time.
- Step 344 if timer 224 has not exceeded the predetermined allowed response time and it is determined in Step 344 that a response to the command packet was received, the response is formatted and routed to the requesting client device 256, Step 346, via response formatter 246, interface 234, and transceiver 230. Maximum response timer 224 is then cleared, Step 342, and the process returns to Step 333 and waits for a next command packet in head 239 of command queue buffer 238, Step 334.
- FIG. 7 is a schematic diagram of authentication of remotely executed transactions according to the present invention.
- server device 200 includes a man- machine interface 400, a radio interface 402 including a General Packet Radio Service (GPRS) user data stack 404, along with several functional layers arranged in hierarchical form, such as, for example, a radio interface layer, a data link layer, and a physical layer (not shown), all located hierarchically above a radio frequency (RF) hardware layer 406, and an authenticator application Unit 408.
- Packet data is transmitted between server device 200 and a packet data network 424 via RF hardware layer 406.
- GPRS General Packet Radio Service
- client device 256 includes a SIM card interface 410, similar to SIM card interface 214 of server device 200, a man- machine interface 412, a radio interface 414 including a General Packet Radio Service (GPRS) user data stack 416, along with several functional layers arranged in hierarchical form, such as, for example, a radio interface layer, a data link layer, and a - physical layer (not shown), all located hierarchically above a radio frequency (RF) hardware layer 418, and an authenticator application unit 420. Packet data is transmitted between client device 256 and packet data network 424 via RF hardware layer 418.
- GPRS General Packet Radio Service
- a certain degree of security or access restriction is desired, over and above the security inherent in the required close proximity of the multiple devices resulting from the limitations of the wireless local link 210. For example, increased security is desired when executing transactions related to accessing an automotive vehicle, home, hotel room or other facility, and so forth.
- authentication includes a key synchronization process, which requires that both the client and server devices have a priori knowledge of specific information, such as a "key” or “unit user code” (UUC), and an authentication and operation logic process, corresponding to the normal operational mode by which the basic authentication and processing of commands is performed.
- a key synchronization process which requires that both the client and server devices have a priori knowledge of specific information, such as a "key” or "unit user code” (UUC)
- UUC unit user code
- the combination of the authentication and operation logic process and the synchronization process performed prior to the authentication and operation logic process of the present invention reduces the probability of the system being compromised by the interception and/or decoding of messages during the system's operational phase.
- FIG. 8 is a schematic diagram of message sequencing during a key synchronization process for authentication of remote multiple access to a single SIM card device, according to the present invention.
- the present invention avoids inadvertent synchronization of client device 256 and server device 200, and enables both server device 200 and client device 256 to have knowledge of the same user code information.
- timers 409 and 411 are started upon receipt of synchronization command 500 at authenticator application units 420 and 408 of client device 256 and server device 200, respectively.
- synchronization command 500 is then sent from authenticator application unit 420 to cellular packet data network 424 via GPRS/EDGE user data stack 416 and RF hardware layer 418, and from cellular packet data network 424 to authenticator application unit 408 of server device 200 via RF hardware layer 406 and GPRS/EDGE user data stack 404.
- authenticator application unit 420 Upon receipt of synchronization command 500, authenticator application unit
- UUC user unit code
- a message 502 containing the user unit code is sent from authenticator application unit 408 to GPRS/EDGE user data stack 404 and transmitted to client device 256 over an encrypted GPRS/EDGE link via RF hardware layer 406, cellular packet data network 424, and RF hardware layer 418.
- authenticator application unit 420 Upon receipt of message 502 by authenticator application unit 420 of client device 256 from GPRS/EDGE user data stack 416, authenticator application unit 420 stores the user unit code in a storage device or memory 415, stops timer 411, and sends a synchronization acknowledgement message 504 to server device 200 via GPRS/EDGE user data stack 416, RF hardware layer 418 and cellular packet data network 424.
- synchronization acknowledgement message 504 is sent to authenticator application unit 408 of server device 200 from GPRS/EDGE user data stack 404.
- Authenticator application unit 408 then moves the new user unit code from temporary storage to long-term storage in memory 413, making the user unit code available for operational use, and stops timer 409.
- FIG. 9 is a schematic diagram of message sequencing for authentication of remote multiple access to a single SIM card device, according to the present invention.
- a command 506 associated with a transaction requiring increased security or access restriction on man-machine interface 400 which then sends command 506 to authentication application unit 408.
- a timer 417 located in authentication application unit 408 is started and authenticator application unit 408 combines command 506 with the stored user unit code.
- a message 508 containing the combined command and user unit code (CMD + UCC) is sent from authenticator application unit 408 to
- GPRS/EDGE user data stack 404 and is transmitted to client device 256 over the encrypted GPRS/EDGE link via RF hardware layer 406, cellular packet data network 424, and RF hardware layer 418.
- authenticator application unit 420 Upon receipt of message 508 from GPRS/EDGE user data stack 416 of client device 256, authenticator application unit 420 compares the user unit code of message 508 to the user unit code previously stored by authenticator application unit 420 in memory 415, and if the user unit code received with the control command in message 508 is the same as the user unit code stored in memory 415, a command message 510 is sent from authenticator application unit 420 to actuator 422 and the execution of the control command is performed. However, if the user unit code received with the control command in message 508 is determined by authenticator application unit 420 not to be the same as the user unit code stored in memory 415, execution of the control command is terminated and actuator 422 is not operated.
- authenticator application unit 420 updates the user unit code stored in memory 415, using a predetermined algorithm that moves the value of the user unit code to the next value in a non-sequential manner, and sends an acknowledgement message 512 to server device 200 via GPRS/EDGE user data stack 416, RF hardware layer 418 and cellular packet data - network 424.
- acknowledgement message 512 is sent from GPRS/EDGE user data stack 404 of server device 200 to authenticator application unit 408.
- authentication application unit 408 Upon receipt of acknowledgement message 512, authentication application unit 408 sends a command message 514 to man-machine interface 400 which displays an indication informing the user that command 506 was completed successfully, stops timer 417, and updates the user unit code stored in memory 413 using the same predetermined algorithm as authenticator application unit 420 to change the value of the user unit code to the next value in a non-sequential manner.
- the present invention alleviates the need to transmit the updated user unit code over a public or semi-public medium, thereby increasing security.
- FIGS. 10 and 11 are flowcharts of a key synchronization process for authentication of remote multiple access to a single SIM card device, according to the present invention.
- a user initially enters a synchronization command at server device 200, Step 600, and at client device 256, Step 602, which causes timers 409 and 411 in server device 200 and client device 256 to be started, Steps 604 and 606, respectively.
- Client device 256 then transmits the synchronization command to server device 200 over the encrypted GPRS/EDGE cellular packet data network, Step 608.
- Step 604 server device 200 determines whether the synchronization command has been received from client device 256, Step 610. If the synchronization command has not been received, a determination is made as to whether timer 409 has expired, Step 612. If timer 409 has expired, the synchronization process is terminated, Step 614. On the other hand, if it is determined in Step 612 that timer 409 has not expired, the synchronization process returns to Step 610. In this way, if the synchronization command is not received by server device 200 from client device 256 within a predetermined time period, the synchronization process is aborted, Step 614.
- Step 610 If it is determined in Step 610 that the synchronization command has been received and it is determined in Step 612 that timer 409 has not expired, the synchronization command has been received within the predetermined time period.
- Server device 200 then computes the pseudorandom user unit code, Step 616, and transmits the user unit code to client device 256 over the encrypted GPRS/EDGE cellular packet data network, Step 618.
- client device 256 determines whether the user unit code has been received from server device 200, Step 620. If the user unit code has not been received, a determination is made as to whether timer 411 has expired, Step 622, and if timer 411 has expired, the synchronization process is terminated, Step 624. On the other hand, if it is determined in Step 622 that timer 411 has not expired, the synchronization process returns to Step 620. In this way, if the user unit code is not received by client device 256 from server device 200 within a predetermined time period, the synchronization process is aborted, Step 624.
- Step 620 If it is determined in Step 620 that the user unit code has been received and it is determined in Step 622 that timer 411 has not expired, the user unit code has been received by client device 256 within the predetermined time period.
- Client device 200 then transmits an acknowledgement message to server device 200 over the encrypted GPRS/EDGE cellular packet data network, Step 626, stores the user unit code, Step 628, and stops timer 411, Step 630.
- server device After transmitting the user unit code to client device, Step 618, server device makes a determination as to whether the acknowledgement message has been received from client device 256, Step 632. If it is determined in Step 632 that the acknowledgement message has not been received from client device 256, a determination is then made as to whether timer 409 has expired, Step 634. If timer 409 has not expired, the synchronization process returns to Step 632. On the other hand, if it is determined in Step 634 that timer 409 has expired, the synchronization process is terminated, Step 614.
- server device 200 If it is determined in Step 632 that the acknowledgement message has been received from client device 256, server device 200 stores the user unit code in memory 413, Step 636, and stops timer 409, Step 638, to end the synchronization process.
- the synchronization process causes server device 200 and client device 256 to synchronize their knowledge of specific information, in this case the last user unit code that was used to authenticate the user, and avoids inadvertent synchronization between server device 200 and client device 256.
- FIGS. 12 and 13 are flowcharts of authentication of remote multiple access to a single SIM card device, according to the present invention.
- Step 640 timer 417 in server device 200 is started, Step 642.
- Server device 200 then sends the command, along with the computed user unit code to client device 256 over the encrypted GPRS/EDGE cellular packet data network, Step 644.
- client device 256 makes a determination as to whether the user unit code is the same as the user unit code stored in memory 415 of client device 256, Step 648. If the received user unit code is not the same as the user unit code stored in memory 415, the procedure is terminated, Step 650. However, if the received user unit code is determined in Step 648 to be the same as the user unit code stored in memory 415, actuator 422 of client device 256 is operated, Step 652 and the execution of the control command associated with the transaction is performed.
- Client device 256 uses a predetermined algorithm to update the user unit code stored in memory 415 by changing the user unit code to the next non-sequential value, Step 654, and sends a control command acknowledgement message to server device 200 over the encrypted GPRS/EDGE cellular packet data network, Step 656.
- Step 644server device 200 After transmitting the control command and user unit code to client device 256, Step 644server device 200 makes a determination as to whether the control command acknowledgement message has been received, Step
- Step 658 If it is determined that the control command acknowledge message has not been received from client device 256, server device 200 then makes a determination as to whether timer 417 has expired, Step 660, and if timer 417 is determined to have expired, the process is terminated, Step 662. However, if it is determined in Step 658 that the control command acknowledgement message has been received from client device 256, server device 200 sends a message to man-machine interface 400, which then displays information informing the user that the entered command has been successfiilly performed, Step 664.
- Server device 200 stops timer 417, Step 666, and updates the user unit code stored in memory 413 by changing the user unit code to the next non-sequential value using the same predetermined algorithm used by client device 256, Step 668.
- the present invention also protects against the retention of a false start, and once timer 417 is expired, the system is returned to a predictable state.
- the present invention By enabling remote multiple access to a single SIM card device for simultaneous operation of multiple SIM enabled devices, the present invention creates a platform on which to construct new telephony and data services which were not previously possible in the known environment in which a SIM card is only accessible by a single user equipment device.
- the present invention enables the simultaneous operation of multiple devices by a single user, in different domains and for different purposes, on a single user subscription requiring authentication, via the device in which the SIM card is physically located.
- the present invention enables simultaneous circuit-switched voice and packet-switched data services using multiple user devices so that a mobile device is able to operate a voice telephone while the same user operates a computer, within close proximity to the mobile device, for transmitting and receiving data.
- a single user is able to participate in a voice conversation while reading or writing electronic email, researching material on the Internet, and so forth.
- the present invention reduces the probability of the integrity of information being compromised as' a result of the interception and/or decoding of messages, and therefore increases security.
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP02763886A EP1384348A4 (en) | 2001-04-04 | 2002-03-29 | Method and apparatus for authentication using remote multiple access sim technology |
AU2002338385A AU2002338385A1 (en) | 2001-04-04 | 2002-03-29 | Method and apparatus for authentication using remote multiple access sim technology |
BR0208692-1A BR0208692A (en) | 2001-04-04 | 2002-03-29 | Method and apparatus for authentication using sim remote multiple access technology |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/826,181 | 2001-04-04 | ||
US09/826,181 US20020147926A1 (en) | 2001-04-04 | 2001-04-04 | Method and apparatus for authentication using remote multiple access SIM technology |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002082825A2 true WO2002082825A2 (en) | 2002-10-17 |
WO2002082825A3 WO2002082825A3 (en) | 2003-05-01 |
Family
ID=25245914
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2002/010175 WO2002082825A2 (en) | 2001-04-04 | 2002-03-29 | Method and apparatus for authentication using remote multiple access sim technology |
Country Status (8)
Country | Link |
---|---|
US (1) | US20020147926A1 (en) |
EP (1) | EP1384348A4 (en) |
CN (1) | CN1502188A (en) |
AU (1) | AU2002338385A1 (en) |
BR (1) | BR0208692A (en) |
RU (1) | RU2003132167A (en) |
TW (1) | TWI231130B (en) |
WO (1) | WO2002082825A2 (en) |
Families Citing this family (45)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2797968B1 (en) * | 1999-08-24 | 2001-10-12 | Schlumberger Systems & Service | DEVICE AND METHOD FOR LOADING CONTROLS IN AN INTEGRATED CIRCUIT CARD |
ATE291807T1 (en) * | 2001-05-08 | 2005-04-15 | Ericsson Telefon Ab L M | SECURE ACCESS TO A REMOTE SUBSCRIBER MODULE |
US20020188736A1 (en) * | 2001-06-11 | 2002-12-12 | Nokia Corporation | System and method for controlling terminal application usage through subscriber-application association |
SE519929C2 (en) * | 2001-07-26 | 2003-04-29 | Ericsson Telefon Ab L M | Procedure, system and terminal for changing or updating during ongoing calls eg. avatars on other users' terminals in a mobile telecommunications system |
GB2387001B (en) * | 2001-10-22 | 2005-02-02 | Apple Computer | Intelligent interaction between media player and host computer |
US20030152231A1 (en) * | 2002-02-07 | 2003-08-14 | Minolta Co., Ltd. | Verification system, server, and electronic instrument |
US7218915B2 (en) * | 2002-04-07 | 2007-05-15 | Arris International, Inc. | Method and system for using an integrated subscriber identity module in a network interface unit |
US8060139B2 (en) * | 2002-06-24 | 2011-11-15 | Toshiba American Research Inc. (Tari) | Authenticating multiple devices simultaneously over a wireless link using a single subscriber identity module |
US7296152B1 (en) * | 2002-07-09 | 2007-11-13 | Cisco Technology, Inc. | System and method for providing access to a network in a communications environment |
US20040185855A1 (en) * | 2002-12-31 | 2004-09-23 | Storm Brian D. | Method and apparatus for continuing a call |
US20040185888A1 (en) * | 2003-03-18 | 2004-09-23 | Nokia Corporation | Solving mobile station identity in a multi-SIM situation |
CN1274181C (en) * | 2004-06-25 | 2006-09-06 | 华为技术有限公司 | Method for managing local terminal equipment accessing network |
US7562218B2 (en) * | 2004-08-17 | 2009-07-14 | Research In Motion Limited | Method, system and device for authenticating a user |
US7469291B2 (en) * | 2004-09-22 | 2008-12-23 | Research In Motion Limited | Apparatus and method for integrating authentication protocols in the establishment of connections between computing devices |
US20060114883A1 (en) * | 2004-12-01 | 2006-06-01 | Mehta Pratik M | System and method for wireless cellular enabled information handling system router |
EP1834465B1 (en) * | 2004-12-28 | 2012-11-07 | Telecom Italia S.p.A. | Remote access system and method for enabling a user to remotely access a terminal equipment from a subscriber terminal |
FR2880716A1 (en) * | 2005-01-13 | 2006-07-14 | Gemplus Sa | CUSTOMIZATION OF SERVICE IN A TERMINAL DEVICE |
US20060174084A1 (en) * | 2005-01-31 | 2006-08-03 | Suban Krishnamoorthy | Storage system configuration validation |
ES2299293B1 (en) * | 2005-05-06 | 2009-04-01 | Vodafone España, S.A. | REMOTE ACCESS SYSTEM TO MOBILE PHONE SERVICES OF A MOBILE EQUIPMENT. |
CN1937611B (en) * | 2005-09-22 | 2012-12-26 | 上海怡得网络有限公司 | Information subscribing system for portable device with direct network connection function |
CN100456887C (en) * | 2006-04-21 | 2009-01-28 | 江苏移动通信有限责任公司 | Method and system of realizing data synchronization of user's terminal and server |
EP1865656A1 (en) * | 2006-06-08 | 2007-12-12 | BRITISH TELECOMMUNICATIONS public limited company | Provision of secure communications connection using third party authentication |
WO2008052004A1 (en) | 2006-10-23 | 2008-05-02 | T-Mobile Usa, Inc. | System and method for managing access point functionality and configuration |
WO2008156392A1 (en) * | 2007-06-18 | 2008-12-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Security for software defined radio terminals |
US8195233B2 (en) * | 2007-07-30 | 2012-06-05 | Motorola Mobility, Inc. | Methods and systems for identity management in wireless devices |
EP2071898A1 (en) * | 2007-12-10 | 2009-06-17 | Telefonaktiebolaget LM Ericsson (publ) | Method for alteration of integrity protected data in a device, computer program product and device implementing the method |
US20090322560A1 (en) * | 2008-06-30 | 2009-12-31 | General Motors Corporation | In-vehicle alert delivery maximizing communications efficiency and subscriber privacy |
US8885635B2 (en) * | 2008-07-17 | 2014-11-11 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network using a subscriber identifier |
US8619545B2 (en) | 2008-07-17 | 2013-12-31 | T-Mobile Usa, Inc. | System and method for selectively provisioning telecommunications services between an access point and a telecommunications network based on landline telephone detection |
US8320344B2 (en) | 2009-02-27 | 2012-11-27 | T-Mobile Usa, Inc. | System and method for provisioning telecommunications services between an access point and a telecommunications network and providing a missing information notification |
US8484457B2 (en) * | 2009-03-10 | 2013-07-09 | T-Mobile Usa, Inc. | Method of securely pairing devices with an access point for an IP-based wireless network |
US8244181B2 (en) * | 2009-05-26 | 2012-08-14 | Qualcomm Incorporated | Portable personal SIM card |
WO2011007963A2 (en) * | 2009-07-13 | 2011-01-20 | Lg Electronics Inc. | Method and device for controlling ad-hoc network in cpns enabler |
US8660533B2 (en) | 2011-03-01 | 2014-02-25 | Tracfone Wireless, Inc. | System, method and apparatus for pairing SIM or UICC cards with authorized wireless devices |
WO2012149219A2 (en) * | 2011-04-26 | 2012-11-01 | Apple Inc. | Electronic access client distribution apparatus and methods |
US20130124327A1 (en) * | 2011-11-11 | 2013-05-16 | Jumptap, Inc. | Identifying a same user of multiple communication devices based on web page visits |
US9774608B2 (en) * | 2012-08-07 | 2017-09-26 | Panasonic Intellectual Property Management Co., Ltd. | Device control method, device control system, and server device |
US9615222B2 (en) * | 2013-08-05 | 2017-04-04 | GTA Wireless Direct Ltd. | System and method for simplifying mobile device account creation and verification |
EP4137987A1 (en) * | 2014-11-06 | 2023-02-22 | Altria Client Services LLC | Methods and products for product tracing and authentication using conductive inks |
US9825963B2 (en) * | 2015-08-03 | 2017-11-21 | Bank Of America Corporation | Encapsulating commands within a control wrapper for multiple level review |
US9838393B2 (en) * | 2015-08-03 | 2017-12-05 | Bank Of America Corporation | Encapsulating commands within a control wrapper for split entry or approval |
US9843885B2 (en) * | 2015-08-12 | 2017-12-12 | Apple Inc. | Methods, procedures and framework to provision an eSIM and make it multi-SIM capable using primary account information |
JP6833906B2 (en) * | 2019-05-28 | 2021-02-24 | Necプラットフォームズ株式会社 | Wireless systems, wireless system control methods and wireless system control programs |
CN112188473B (en) * | 2020-09-18 | 2023-07-14 | 青岛海信电子产业控股股份有限公司 | Customer prepositive device and method for monitoring USIM card |
US11818143B1 (en) * | 2021-09-01 | 2023-11-14 | T-Mobile Usa, Inc. | Authenticator application for wireless communication devices and networks |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5091942A (en) * | 1990-07-23 | 1992-02-25 | Ericsson Ge Mobile Communications Holding, Inc. | Authentication system for digital cellular communications |
US5857024A (en) * | 1995-10-02 | 1999-01-05 | International Business Machines Corporation | IC card and authentication method for information processing apparatus |
US5991881A (en) * | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
US6119020A (en) * | 1997-12-16 | 2000-09-12 | Motorola, Inc. | Multiple user SIM card secured subscriber unit |
US6141544A (en) * | 1998-11-30 | 2000-10-31 | Telefonaktiebolaget Lm Ericsson | System and method for over the air activation in a wireless telecommunications network |
US6173172B1 (en) * | 1996-05-31 | 2001-01-09 | Nippon Shinpan Co., Ltd. | System and method for preventing the unauthorized use of a mobile communication device |
US6178173B1 (en) * | 1996-12-30 | 2001-01-23 | Paradyne Corporation | System and method for communicating pre-connect information in a digital communication system |
US6201958B1 (en) * | 1997-04-02 | 2001-03-13 | U.S. Philips Corporation | Telecommunications system, mobile terminal and method of registration of a terminal with a telecommunications network |
US6397337B1 (en) * | 1998-04-30 | 2002-05-28 | Compaq Computer Corporation | Unified password prompt of a computer system |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5167035A (en) * | 1988-09-08 | 1992-11-24 | Digital Equipment Corporation | Transferring messages between nodes in a network |
DE69314804T2 (en) * | 1992-11-11 | 1998-02-12 | Finland Telecom Oy | METHOD FOR CARRYING OUT FINANCIAL TRANSACTIONS BY MEANS OF A MOBILE TELEPHONE SYSTEM |
FI95984C (en) * | 1994-04-08 | 1996-04-10 | Nokia Telecommunications Oy | Method and arrangement for location management in connection with packet data transmission in a mobile communication system |
FI98694C (en) * | 1994-08-23 | 1997-07-25 | Nokia Telecommunications Oy | Location update in a mobile communication system |
US6466783B2 (en) * | 1995-12-11 | 2002-10-15 | Openwave Systems Inc. | Visual interface to mobile subscriber account services |
FI102235B (en) * | 1996-01-24 | 1998-10-30 | Nokia Telecommunications Oy | Management of authentication keys in a mobile communication system |
US6373946B1 (en) * | 1996-05-31 | 2002-04-16 | Ico Services Ltd. | Communication security |
US6092111A (en) * | 1996-11-19 | 2000-07-18 | Motorola, Inc. | Data communications system with session control |
FI104139B (en) * | 1996-11-27 | 1999-11-15 | Nokia Telecommunications Oy | Use two SIM cards with the same MSISDN number |
US6023708A (en) * | 1997-05-29 | 2000-02-08 | Visto Corporation | System and method for using a global translator to synchronize workspace elements across a network |
FR2771585B1 (en) * | 1997-11-24 | 2000-01-28 | Nortel Matra Cellular | PRIVATE BASE STATION FOR MOBILE RADIOTELEPHONE |
SE514433C2 (en) * | 1998-05-08 | 2001-02-26 | Ericsson Telefon Ab L M | Method and device in a wireless communication system |
US6799155B1 (en) * | 1998-12-11 | 2004-09-28 | Allied Signal Inc. | Replacement of externally mounted user interface modules with software emulation of user interface module functions in embedded processor applications |
US6434113B1 (en) * | 1999-04-09 | 2002-08-13 | Sharewave, Inc. | Dynamic network master handover scheme for wireless computer networks |
AU4278600A (en) * | 1999-04-27 | 2000-11-10 | Brian De Champlain | Single receiver wireless tracking system |
FI19991833A (en) * | 1999-08-30 | 2001-02-28 | Nokia Mobile Phones Ltd | A method for connecting calls in a mobile communication system |
US6587694B1 (en) * | 1999-09-24 | 2003-07-01 | Agere Systems Inc. | Clock synchronization between wireless devices during cradled time |
US6823454B1 (en) * | 1999-11-08 | 2004-11-23 | International Business Machines Corporation | Using device certificates to authenticate servers before automatic address assignment |
US7773972B2 (en) * | 2002-05-15 | 2010-08-10 | Socket Mobile, Inc. | Functionality and policies based on wireless device dynamic associations |
US9606714B2 (en) * | 2003-12-17 | 2017-03-28 | Nokia Technologies Oy | Terminal, method and computer program product for interacting with a physical entity |
-
2001
- 2001-04-04 US US09/826,181 patent/US20020147926A1/en not_active Abandoned
-
2002
- 2002-03-29 RU RU2003132167/09A patent/RU2003132167A/en not_active Application Discontinuation
- 2002-03-29 CN CNA028079205A patent/CN1502188A/en active Pending
- 2002-03-29 BR BR0208692-1A patent/BR0208692A/en not_active Application Discontinuation
- 2002-03-29 WO PCT/US2002/010175 patent/WO2002082825A2/en not_active Application Discontinuation
- 2002-03-29 EP EP02763886A patent/EP1384348A4/en not_active Withdrawn
- 2002-03-29 AU AU2002338385A patent/AU2002338385A1/en not_active Abandoned
- 2002-04-03 TW TW091106756A patent/TWI231130B/en not_active IP Right Cessation
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5091942A (en) * | 1990-07-23 | 1992-02-25 | Ericsson Ge Mobile Communications Holding, Inc. | Authentication system for digital cellular communications |
US5857024A (en) * | 1995-10-02 | 1999-01-05 | International Business Machines Corporation | IC card and authentication method for information processing apparatus |
US6173172B1 (en) * | 1996-05-31 | 2001-01-09 | Nippon Shinpan Co., Ltd. | System and method for preventing the unauthorized use of a mobile communication device |
US5991881A (en) * | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
US6178173B1 (en) * | 1996-12-30 | 2001-01-23 | Paradyne Corporation | System and method for communicating pre-connect information in a digital communication system |
US6201958B1 (en) * | 1997-04-02 | 2001-03-13 | U.S. Philips Corporation | Telecommunications system, mobile terminal and method of registration of a terminal with a telecommunications network |
US6119020A (en) * | 1997-12-16 | 2000-09-12 | Motorola, Inc. | Multiple user SIM card secured subscriber unit |
US6397337B1 (en) * | 1998-04-30 | 2002-05-28 | Compaq Computer Corporation | Unified password prompt of a computer system |
US6141544A (en) * | 1998-11-30 | 2000-10-31 | Telefonaktiebolaget Lm Ericsson | System and method for over the air activation in a wireless telecommunications network |
Non-Patent Citations (2)
Title |
---|
ANONYMOUS: 'Smart card & security basics', April 2000, CARDLOGIX XP002957622 * page 16 - page 20 * * |
See also references of EP1384348A2 * |
Also Published As
Publication number | Publication date |
---|---|
WO2002082825A3 (en) | 2003-05-01 |
EP1384348A2 (en) | 2004-01-28 |
US20020147926A1 (en) | 2002-10-10 |
CN1502188A (en) | 2004-06-02 |
EP1384348A4 (en) | 2009-09-30 |
TWI231130B (en) | 2005-04-11 |
BR0208692A (en) | 2004-03-30 |
RU2003132167A (en) | 2005-04-10 |
AU2002338385A1 (en) | 2002-10-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20020147926A1 (en) | Method and apparatus for authentication using remote multiple access SIM technology | |
US6466804B1 (en) | Method and apparatus for remote multiple access to subscriber identity module | |
US8769616B2 (en) | Authentication of devices in a wireless network | |
US7158756B2 (en) | Method and system for establishing short-range service sessions | |
CN100433616C (en) | Method for authenticating a user in a terminal, an authentication system, a terminal, and an authorization device | |
US7631186B2 (en) | Mobile terminal authentication method capable of reducing authentication processing time and preventing fraudulent transmission/reception of data through spoofing | |
DE60308355T2 (en) | INCREASED MESSAGE SAFETY | |
US9058372B2 (en) | Database management in a wireless communication system | |
JP2002513261A (en) | Management of user information authentication and encryption used for digital user terminals | |
CN104980899A (en) | Communication method and system for mobile terminal, mobile terminal and server | |
KR20090052400A (en) | Proxy smart card applications | |
US20040266433A1 (en) | Method and registration server for activating a radio interface provided in a radio user terminal | |
KR101671188B1 (en) | Method and system for certificating universal subscriber identity module | |
CN103108316A (en) | Authentication method, device and system for aerial card writing | |
JPWO2002082852A1 (en) | Portable information terminal, wireless communication system, and link establishment method | |
JP3851781B2 (en) | Wireless communication apparatus, wireless communication system, and connection authentication method | |
JP2002044251A (en) | Method for radio terminal procedure and radio terminal system | |
WO2001069864A2 (en) | Method and apparatus for detecting bluetooth communications | |
JPWO2008075626A1 (en) | Communication terminal authentication system, Internet telephone system | |
JP2937924B2 (en) | Mobile terminal system | |
KR20030011638A (en) | Method for subscription between a terminal and a base station in a telecommunication system | |
KR100563722B1 (en) | Method and System for sharing the E-mail address between mobile phone and personal computer | |
EP1760944B1 (en) | Controlling visibility of a wireless device in discoverable mode | |
JP2003263412A (en) | Method of merging confidential information and general- purpose information, and device for connection between closed area network and wide area network | |
KR20050005121A (en) | The system and the method of guiding location information using a smart-card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1597/DELNP/2003 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 028079205 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002763886 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2002763886 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: JP |