![]() This number is relayed back to the network. The phone receives A from the network and forwards it to the SIM card, which signs it with its own authentication key to create a new number, C. This is the response it would expect if the SIM card is legitimate. The network generates a random number, A, and signs it with the authentication key to create a new number, B. The network takes the IMSI and looks in its internal database for that IMSI's known authentication key. Think of this as the "request for access." On startup, the phone obtains the IMSI from the SIM card and relays it to the network. If you're interested in the nitty-gritty, SIM authentication goes like this: What information does a SIM card hold? The most important bits of data include the IMSI (International Mobile Subscriber Identity) and the authentication key that validates the IMSI.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |