Mobile user identification code IMSI protection method based on pseudonym

A technology of mobile user identification and user identification, which is applied in the field of mobile communication security, and can solve problems such as costly, difficult to use, and insufficient compatibility of existing users

Active Publication Date: 2011-01-26
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In short, some of the current solutions require a relatively large upgrade of the system architecture, especially the upgrade of a large number of distributed systems such as VLR is very costly, and the compatibility with existing users is not st

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile user identification code IMSI protection method based on pseudonym
  • Mobile user identification code IMSI protection method based on pseudonym
  • Mobile user identification code IMSI protection method based on pseudonym

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0087] In order to better illustrate the working principle of the present invention, a specific embodiment is given below. Suppose a mobile user’s IMSI number is 460010911221001, then according to the first 3 digits of the IMSI number, it can be determined which country the user is from. According to the agreement, 460 means China, so when roaming anywhere in the world, after seeing the IMSI number, The route to find the HLR is first transferred to an interface in China according to the first three digits 460. Then determine the operator according to the next 2 digits 01, the next 2 digits 09 are fixed, the next 4 is the number 1122, which means the HLR logo in the operator represented by 01, and the last 4 digits are 1001 Indicates the user whose identification field is 1001 in the HLR. This embodiment considers the situation that the user pseudonym field has only 4 bits (that is, 16 bits).

[0088] When it is necessary to generate IMSA0 according to the IMSI, the first 11 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IMSI protection method based on pseudonym, belonging to the field of communication safety. The method comprises: in an initial network accessing stage for a user, the user sends IMSI to HLR for authentication; after authentication, a pseudonym is generated for the user and is recorded into a database; then, according to the user pseudonym, HLR generates an authentication vector and authenticates the user by VLR; finally HLR sends a user pseudonym field in the user pseudonym to the user; and the user reconstructs and records the user pseudonym. In a secondary networkaccessing stage for the user, the user sends the user pseudonym to the HLR for authentication; if a database does not have the user pseudonym, authentication is reported to fail, otherwise, HLR generates a new user pseudonym and updates the database; then, the user is authenticated like initial network accessing; finally, HLR sends the user pseudonym field in the user pseudonym which is newly generated to the user; and the user reconstructs and records the user pseudonym. The method greatly improves the safety of IMSI, and the system is convenient to update.

Description

technical field [0001] The invention belongs to the field of mobile communication security, and relates to a pseudonym-based IMSI information protection method; the invention does not change the communication process and data format of the existing mobile communication, and has perfect compatibility for existing users who do not use the invention. Background technique [0002] a) Description of prior art [0003] International Mobile Subscriber Identity (IMSI, International Mobile Subscriber Identity), or Subscriber Identity for short, is the unique identity of each mobile subscriber in the world. This identification enables a mobile user to roam anywhere in the world, and the network side can find the network home domain where the user is registered. As long as the user has applied for roaming services and has sufficient tariffs, he can use mobile communication and data services. In the second-generation GSM mobile communication system, the subscriber identification code I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W8/26H04W12/06
Inventor 武传坤
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products