Supercharge Your Innovation With Domain-Expert AI Agents!

Mobile communication system and customer temporary identity distribution method

A technology of temporary identity and mobile communication network, which is applied in the field of mobile communication system and user temporary identity distribution, which can solve problems affecting user privacy and achieve the effect of reducing confidentiality protection requirements and encryption costs

Inactive Publication Date: 2007-10-03
HUAWEI TECH CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Attackers can track user's location by eavesdropping on user's identity, which affects user's privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile communication system and customer temporary identity distribution method
  • Mobile communication system and customer temporary identity distribution method
  • Mobile communication system and customer temporary identity distribution method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The core of the present invention is that when the temporary identity distribution entity assigns the user's temporary identity, it does not need to encrypt the signaling or only encrypts the temporary identity assignment signaling, thereby reducing the confidentiality protection requirements of the signaling and reducing the encryption cost of the system. The temporary identity distribution entity referred to generally refers to a base station or an access gateway, which will be described in specific embodiments below.

[0053] Referring to FIG. 1 , this figure is a flow chart of the first embodiment of the method for distributing user temporary identities in the mobile communication system of the present invention.

[0054]In this embodiment, the permanent identity and temporary identity of the user are stored in the user equipment, and the network entity responsible for distributing the temporary identity in the network is a Temporary Identity Distribution Entity (TID...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a mobile communication system and a distributing method for temporary identities of users, in which, a network and a user device negotiate on the distribution system of temporary identities, then they distribute temporary identities of users in terms of negotiated distribution system, which can be realized by encrypting the temporary identities distributed to users or evaluating temporary identities of users based on a shared cryptographic key and a random number, besides, this invention can assign signaling encryption to temporary identity only.

Description

technical field [0001] The present invention relates to the technical field of mobile communication, and more specifically, the present invention relates to a mobile communication system and a method for distributing temporary user identities. Background technique [0002] In a mobile communication system, every time a user accesses the network, he needs to show his identity to the network. An attacker can track the user's location by eavesdropping on the user's identity, which affects the user's privacy. Therefore, it is necessary to protect the confidentiality of the user's identity to prevent attackers from tracking the user's location by eavesdropping on the user's identity. [0003] At present, there are mainly two methods for protecting the confidentiality of user identities. The first method is to implement encryption, and the other method is to realize the protection of user identities by frequently changing user identities. [0004] For the first method to realize...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04Q7/38H04L9/00H04L29/06H04W12/02H04W12/03H04W12/0431
Inventor 陈璟黄迎新
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More