Skip to main content

WHAT ARE SIM CARDS USED FOR

A SIM - short for Subscriber Identity Module - is a piece of plastic that slots into your  mobile phone.It acts as your unique ID and helps you  connect to, make calls over  a particular mobile phone network.Most SIM cards have a capacity between 32 to 128 KB.They store contacts and messages which can be transferred easily from one mobile to another.

SIM also stores the ‘key’ needed to decrypt data that is encrypted when voice is trransfered from a phone to another.A unique ID called the IMSI (International Mobile Subscriber Identity)  is used to connect someone calling your mobile number to your phone. GSM phones are the ones that utilize SIM cards .The most important bits of data include the IMSI (International Mobile Subscriber Identity) and the authentication key that validates the IMSI. This authentication key is provided by the carrier
SIM authentication goes like this:
On startup, the phone obtains the IMSI from the SIM card and relays it to the network,known as“request for access.”
The network takes the IMSI and looks in its internal database for that IMSI’s known authentication key.
The network generates a random number, A, and signs it with the authentication key to create a new number, B. This is the response it would expect if the SIM card is legitimate.
The phone receives A from the network and forwards it to the SIM card, which signs it with its own authentication key to create a new number, C. This number is relayed back to the network.
If the network’s number A matches the SIM card’s number C, then the SIM card is declared legitimate and access is granted.
 If the phone and SIM card do not match up, the phone won’t operate. This is what it means when a phone is “locked.”

Comments

Popular posts from this blog

Fatal exception errors and how to fix them

              'A fatal exception XY has occured at xxxx:xxxxxxxx' What is it? A fatal exception error is an error that causes a program to abort,returning the user to the operating system.When program encounters an exception that is invalid or unknown,fatal exception error(fatal 0E) is thrown.It mainly occurs during the computer's booting process,shutdown process or while trying to launch a program in windows.The processor exception(XY value) ranges from  00 to 0F. xxxx:xxxxxxxx represents the 32-bit address where the actual exception has occured. 00-Divide fault 02-NMI interrupt 04-overflow trap 05-bounds check fault 07-coprocesser not available 08-double fault 09-coprocesser segment overrun 0A-invalid task state segment 0B-Not present fault 0C-stack fault 0D-general protection fault 0E-page fault 10-coprocessor error fault 11-Alignment check fault When it occurs? Attempting an illegal instruction or operation accessin...

Mobile Number Portability-Same Mobile Number over different Network Operators

Mobile number portability (MNP) enables mobile telephone users to retain their mobile telephone numbers when changing from one mobile network operator to another. Mobile number portability is implemented in different ways across the globe. The International and European standard is for a customer wishing to port his/her number to contact the new network (recipient), which then sends the number portability request (NPR) to the current network (donor). This is known as "recipient-led" porting. The UK and India are the only exceptions to implement the donor-led system. The customer wishing to port his/her number is required to contact the donor to obtain a code (Porting Authorisation Code (PAC) in the UK and Unique Porting Code (UPC) in India) which is then given to the recipient network. The recipient continues the porting process by contacting the donor with porting code. This form of porting is known as "donor-led". A significant technical aspect of MNP is relat...

Test your anti virus software with eicar

Do you want to check whether you have deployed your anti virus(AV) software correctly? Checking your AV software with real virus is risky!What if you have an option to test with a file which the AV software detects as if it were a virus,but actually it is non-viral? EICAR(European Institution for Computer Anti virus Research) provides Anti-malware test file for this purpose.It provides four test files to check your anti virus software.A good anti virus scanner will believe that the file is virus-infected. To download the anti-malware test files,visit this website Please feel free to post your comments.