Method, system and device for protecting privacy of customer terminal

A user terminal, privacy technology, applied in the field of communication, can solve the problem of deleting user context, etc., to achieve the effect of protecting privacy and avoiding permanent identification

Active Publication Date: 2009-04-01
HUAWEI TECH CO LTD
View PDF0 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The disadvantage of this method is that the network side may delete the user context for some reason, including TMSI
[0007] The disadvantage of using this method is that if the pseudonym and the authent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device for protecting privacy of customer terminal
  • Method, system and device for protecting privacy of customer terminal
  • Method, system and device for protecting privacy of customer terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The implementation of the present invention will be further described below in conjunction with the drawings and examples.

[0042]In Embodiment 1 of the present invention, the privacy of the user terminal is protected by using a pseudonym on the user terminal. Specifically, when the temporary identity of the user terminal cannot be recognized by the network side, the previously assigned pseudonym replaces the permanent identity and is sent to the network side for authentication, preventing illegal terminals from pretending to be the network to send identity request information to obtain the UE's permanent identity. In specific implementation, in order to reduce the impact on the AKA protocol, after the HSS generates a pseudonym and sends it to the MME (Mobile Management Entity, mobile management entity), the MME does not issue the pseudonym during the AKA process, but saves it. When the AKA ends and the temporary identity is assigned to the UE, the pseudonym assigned b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for protecting user terminal comprising following step: network side successfully accesses to network at user terminal and assigns a false name to the user terminal; the network side receives the user terminal using the false name as information for marking user identity. The invention also discloses a method for protecting user terminal privacy comprising following steps: when the user terminal successfully access at user terminal, the user terminal receives temporary identity mark sent by network side and retention period of the identity mark; the user terminal receives request for reporting permanent identity mark sent by the network side; the user terminal judges if reporting response to permanent identity mark. The invention also discloses a system and device for protecting privacy of user terminal. The invention can effectively avoids attacker to take advantage of identity request information for acquiring permanent identity mark of user terminal, thereby protects privacy of user terminal.

Description

technical field [0001] The present invention relates to the technical field of communication, and in particular to a method, system and equipment for protecting the privacy of a user terminal. Background technique [0002] In mobile communications, a permanent identity of a UE (User Equipment, user equipment) is permanent information of a user, so it is generally regarded as private information and needs to be protected. Because if the attacker traces the user's behavior for a certain period of time and learns the correspondence between the user's real identity and the permanent identity at a certain opportunity, the user's privacy will be leaked. [0003] However, TMSI (Temporary Mobile Subscriber Identity) is adopted in UMTS (Universal Mobile Telecommunications System, Universal Wireless Communication System), so that permanent identifiers are transmitted over the air interface as little as possible, reducing the chance for attackers to track users. That is, when a user s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/06H04W12/72
Inventor 杨艳梅
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products