Skip to main content

WHAT ARE SIM CARDS USED FOR

A SIM - short for Subscriber Identity Module - is a piece of plastic that slots into your  mobile phone.It acts as your unique ID and helps you  connect to, make calls over  a particular mobile phone network.Most SIM cards have a capacity between 32 to 128 KB.They store contacts and messages which can be transferred easily from one mobile to another.

SIM also stores the ‘key’ needed to decrypt data that is encrypted when voice is trransfered from a phone to another.A unique ID called the IMSI (International Mobile Subscriber Identity)  is used to connect someone calling your mobile number to your phone. GSM phones are the ones that utilize SIM cards .The most important bits of data include the IMSI (International Mobile Subscriber Identity) and the authentication key that validates the IMSI. This authentication key is provided by the carrier
SIM authentication goes like this:
On startup, the phone obtains the IMSI from the SIM card and relays it to the network,known as“request for access.”
The network takes the IMSI and looks in its internal database for that IMSI’s known authentication key.
The network generates a random number, A, and signs it with the authentication key to create a new number, B. This is the response it would expect if the SIM card is legitimate.
The phone receives A from the network and forwards it to the SIM card, which signs it with its own authentication key to create a new number, C. This number is relayed back to the network.
If the network’s number A matches the SIM card’s number C, then the SIM card is declared legitimate and access is granted.
 If the phone and SIM card do not match up, the phone won’t operate. This is what it means when a phone is “locked.”

Comments

Popular posts from this blog

Fatal exception errors and how to fix them

              'A fatal exception XY has occured at xxxx:xxxxxxxx' What is it? A fatal exception error is an error that causes a program to abort,returning the user to the operating system.When program encounters an exception that is invalid or unknown,fatal exception error(fatal 0E) is thrown.It mainly occurs during the computer's booting process,shutdown process or while trying to launch a program in windows.The processor exception(XY value) ranges from  00 to 0F. xxxx:xxxxxxxx represents the 32-bit address where the actual exception has occured. 00-Divide fault 02-NMI interrupt 04-overflow trap 05-bounds check fault 07-coprocesser not available 08-double fault 09-coprocesser segment overrun 0A-invalid task state segment 0B-Not present fault 0C-stack fault 0D-general protection fault 0E-page fault 10-coprocessor error fault 11-Alignment check fault When it occurs? Attempting an illegal instruction or operation accessing junk or non-working secti

Everyday Cloud !!

Cloud Computing - delivering hosted services over the Internet. Cloud computing is getting IT services, such as email, customer relationship management or web conferencing, over the internet.Instead of buying hardware and software up front, you pay a monthly charge based on the number of users.In simple words,when you  type a query into Google, the computer does nothing with regards to answer, it's just a messenger. The words you type are sent over the Net to one of Google's numerous clustered PCs, which find  your results and send them promptly back to you. The real work in finding your answers might be done by a computer sitting in California, Dublin, Tokyo, or Beijing!!Preparing documents over the Net is a newer example of cloud computing. Simply log on to a web-based service such as Google Documents and you can create a document, spreadsheet or presentation. Instead of typing your words into a program like Microsoft Word or OpenOffice, running on your computer, you're