{"title":"LTE/SAE中USIM抗克隆方法研究","authors":"Wu Shao-bo, Li Chengshu","doi":"10.1109/ICISE.2010.5689638","DOIUrl":null,"url":null,"abstract":"According to the status of mobile phone user card security. This article analyzes the security mechanism of SIM and USIM. Aim at some cloning methods of SIM cards, after studying the actual usage of cloning card. A solution is proposed based on the location to judge which can identify the user's USIM card is cloned or not. This method both for the user to reduce losses, but also to protect user privacy, and basic process changes to existing communications smaller, it has many purposes.","PeriodicalId":206435,"journal":{"name":"The 2nd International Conference on Information Science and Engineering","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A method of USIM anti-cloning in LTE/SAE\",\"authors\":\"Wu Shao-bo, Li Chengshu\",\"doi\":\"10.1109/ICISE.2010.5689638\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"According to the status of mobile phone user card security. This article analyzes the security mechanism of SIM and USIM. Aim at some cloning methods of SIM cards, after studying the actual usage of cloning card. A solution is proposed based on the location to judge which can identify the user's USIM card is cloned or not. This method both for the user to reduce losses, but also to protect user privacy, and basic process changes to existing communications smaller, it has many purposes.\",\"PeriodicalId\":206435,\"journal\":{\"name\":\"The 2nd International Conference on Information Science and Engineering\",\"volume\":\"114 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The 2nd International Conference on Information Science and Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISE.2010.5689638\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 2nd International Conference on Information Science and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISE.2010.5689638","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
According to the status of mobile phone user card security. This article analyzes the security mechanism of SIM and USIM. Aim at some cloning methods of SIM cards, after studying the actual usage of cloning card. A solution is proposed based on the location to judge which can identify the user's USIM card is cloned or not. This method both for the user to reduce losses, but also to protect user privacy, and basic process changes to existing communications smaller, it has many purposes.