3G accessed IMSI (international mobile subscriber identity) privacy protection method

A privacy protection and encryption key technology, applied in the field of 3G network communication security, can solve problems such as low efficiency, heavy computing burden of network equipment, and determination of user identity

Inactive Publication Date: 2013-06-12
SOUTHEAST UNIV
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in some cases, the system cannot determine the identity of the user through the TMSI, such as: when the user initially registers in the service network, or when the service network cannot retrieve the IMSI from the MS's TMSI, the service network still requires the MS to Provide IMSI, at this time, MS will respond to the IMSI information in plain text
[0003] The IMSI protection methods of some MSs are realized by encrypting IMSI information or assigning aliases, but the practicability is not strong, such as: using the public key of the Home Location Register (Home Location Register, HLR) to encrypt the IMSI information, and regularly updating the IMSI information of the HLR Public-private key pair, which will bring a large calculation burden to network equipment and increase the delay of authentication; HLR shares a key with all MSs belonging to it, and uses this shared key to generate a The encryption key is used to symmetrically encrypt the IMSI information, but this method has the risk of key exposure, and it is easy to attack all MSs belonging to the same HLR due to the key leakage of a certain MS; each MS uses own key K i Encrypt all stored (IMSI, K i ) records to traverse until the correct IMSI information is found
This method uses its own key for encryption. Although it can avoid the disadvantages of shared keys and ensure the confidentiality of MS identity, it requires a large amount of calculation on the network side and is inefficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 3G accessed IMSI (international mobile subscriber identity) privacy protection method
  • 3G accessed IMSI (international mobile subscriber identity) privacy protection method
  • 3G accessed IMSI (international mobile subscriber identity) privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Below in conjunction with specific embodiment, further illustrate the present invention, should be understood that these embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention, after having read the present invention, those skilled in the art will understand various equivalent forms of the present invention All modifications fall within the scope defined by the appended claims of the present application.

[0022] The implementation process of an IMSI privacy protection method for 3G access is as follows:

[0023] 1. System initialization

[0024] figure 1 It is a schematic diagram of an IMSI structure in an embodiment of the present invention, each MS has a different IMSI. Each HLR generates a keystore composed of multiple records. The size of the keystore is determined according to the number of MSs that the HLR belongs to. Each record includes four attributes, namely the key identification numbe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a 3G accessed IMSI (international mobile subscriber identity) privacy protection method. The method comprises the following steps that a VLR (visitor location register) sends a subscriber identity request, an MS (mobile subscriber) replies the subscriber identity response; the VLR / SGSN (serving GPRS supported node) sends an authentication data request to an HLR (home location register), and the HLR replies the authentication data response; and when the MS is authorized, the VLR / SGSN sends a subscriber authorization request to the MS, and the MS replies the subscriber authorization response. Through the method, the confidentiality of the IMSI is protected by means of key identifiers and key groups; and after the user transmitted IMSI information is encrypted, the information is transmitted by means of cipher texts, so that the IMSI is avoided from being leaked. At the same time, when the HLR generates an authentication vector for the user, an encryption key which is updated in real time is distributed, so that the representation forms are different after the user encrypts the IMSI information for each time, and the user can be avoided from being tracked.

Description

technical field [0001] The invention relates to the technical field of 3G network communication security, in particular to an IMSI privacy protection method for 3G access. Background technique [0002] In a 3G network, the identity of a mobile subscriber (Mobile Subscriber, MS) is uniquely determined globally by the International Mobile Subscriber Identification Number (IMSI). The identity authentication phase of MS accessing the 3G network is completed by using the authentication and key distribution protocol (AKA). Through the exchange of authentication information between the core network and the MS, the mutual authentication and negotiation of communication keys between the MS and the network are realized. During the entire verification process, the IMSI It is transmitted in the form of plain text. Therefore, although the AKA protocol has effectively improved the security loopholes of the GSM system, it also has the problem of MS identity leakage. For this reason, in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W12/0431H04W12/72
Inventor 黄杰张莎
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products