User identity protection method based on public-key mechanism

A user identity and public key technology, applied in electrical components, wireless communications, security devices, etc., can solve problems such as inability to meet high-end users, imperfect protection of IMSI, ensure validity and legitimacy, increase the difficulty of deciphering, and facilitate maintenance effect

Active Publication Date: 2011-04-20
成都三零瑞通移动通信有限公司
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the GUTI mechanism is not perfect for protecting IMSI, and cannot meet the needs of some high-end users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity protection method based on public-key mechanism
  • User identity protection method based on public-key mechanism
  • User identity protection method based on public-key mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The specific implementation manners of the present invention will be described below in conjunction with the accompanying drawings.

[0036] The present invention provides a user identity protection method based on a public key mechanism, wherein the encryption and decryption and signature verification algorithms use the RSA algorithm, ECC algorithm or other asymmetric encryption algorithms. For the convenience of description, the implementation process in this embodiment uses the ECC algorithm as an example . The above method is the IMSI protection method based on the public key mechanism, such as figure 2 As shown, where: in ECC (PK, (IMSI||R||VER_PK)), ECC represents an asymmetric algorithm, PK represents a public key, and (IMSI||R||VER_PK) represents encrypted data; (PKFn) Indicates that the PKFn will be issued when the public key file needs to be updated, and this parameter will not be used if it is not needed; when the HSS transmits the IMSI to the MME, its ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the secret communication field of mobile communication technologies, and discloses a user identity protection method based on a public-key mechanism. The method comprises the following steps: an HSS (hierarchical service system) produces a pair of keys, namely, a public key PK and a secret key SK, then the public key PK is preset to a USIM (universal subscriber identity module) card of UE (user equipment) belonging to the public key PK in the form of a public key file PKF, and the secret key SK is stored in the HSS; a mobile phone sends the following information to anMME (mobility management entity), including HSS identification: HSS_ID, public-key PK version number: VER_PK; and data (IMSI || R|| VER_PK) encrypted by using an asymmetric encryption algorithm; after receiving the information, the MME sends the VER_PK and the (IMSI || R|| VER_PK) to the HSS according to the HSS_ID; and the HSS decrypts the VER_PK and the (IMSI || R|| VER_PK) by using the secret key SK. Because attackers do not know the secret key SK of the HSS, the attackers can not decrypt the (IMSI || R|| VER_PK).

Description

technical field [0001] The invention relates to the secure communication field of mobile communication technology, in particular to a user identity protection method based on a public key mechanism. Background technique [0002] The public key mechanism protects IMSI (International Mobile Subscriber Identity, a sign to distinguish mobile users) information, preventing mobile users from being illegally tracked and located by attackers. In mobile communication systems 3G (third-generation mobile communication technology: 3rd-generation), LTE (Long Term Evolution: long-term evolution), 4G (fourth-generation mobile communication technology: 4rd-generation), existing technologies generally use temporary users The identity GUTI mechanism (Globally Unique Temporary Identity: Globally Unique Temporary Identity) protects user identities. After passing the AKA (authentication and key agreement: Authentication and key agreement) authentication, the MME (Mobility Management Entity: Mob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W12/041H04W12/0433H04W12/106H04W12/122H04W12/40
Inventor 曾勇
Owner 成都三零瑞通移动通信有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products