Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method for terminal temporary identifier, terminal, core network control entity and system

A technology for temporary identification and control of entities, which is applied in network data management, electrical components, wireless communication, etc. It can solve problems such as poor security and temporary identification cannot be updated in time, and achieve the effect of improving terminal security

Active Publication Date: 2017-02-08
CHINA MOBILE COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The present invention aims to overcome the defect of poor security caused by the lack of timely update of the temporary identification of the terminal in the prior art, and provides a protection method for the temporary identification of the terminal, a terminal, a core network control entity and a system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method for terminal temporary identifier, terminal, core network control entity and system
  • Protection method for terminal temporary identifier, terminal, core network control entity and system
  • Protection method for terminal temporary identifier, terminal, core network control entity and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0079] This embodiment provides a method for protecting a temporary identifier of a terminal, such as figure 1 As shown, the method includes:

[0080] 101. Set a lifetime for the first temporary identifier assigned to the terminal, and start a timer;

[0081] 102. When the timing of the timer reaches the lifetime, allocate a second temporary identifier to the terminal.

[0082] The above method can be implemented on the terminal alone, or on the core network control entity on the network side, or partly on the terminal and partly on the core network control entity through switching.

[0083] In the method provided by this embodiment, by setting a lifetime for the temporary identifier assigned by the terminal, when the lifetime of the temporary identifier expires, the network reassigns the temporary identifier to the terminal to solve the problem that the temporary identifier is caused by the mobility of the terminal. It solves the technical problem that it cannot be updated ...

Embodiment 2

[0091] This embodiment provides a method for protecting a temporary identifier of a terminal. The method is mainly deployed on the network side to implement a scheme in which the network side sets the lifetime of the temporary identifier and maintains and updates it. Such as figure 2 As shown, the method includes:

[0092] 201. After the core network control entity assigns a first temporary identifier to the terminal, the core network control entity sets a lifetime for the terminal;

[0093] In this embodiment and the following embodiments, after the core network control entity assigns the first temporary identifier to the terminal, it means that the core network control entity follows the normal temporary identifier allocation process (such as GUTI allocation process, Attach process or TAU process) ) after assigning a temporary identifier to the terminal, and after the terminal receives the assigned temporary identifier.

[0094]202. The core network control entity starts ...

Embodiment 3

[0101] This embodiment provides a method for protecting a temporary identifier of a terminal. The method is mainly deployed on the network side and the terminal respectively to implement a solution in which the network side sets the lifetime and the terminal maintains the lifetime update. Such as image 3 As shown, the method includes:

[0102] 301. When the core network control entity allocates the first GUTI to the terminal (the specific timing can be considered as before the core network entity sends the allocated first GUTI to the terminal), the core network control entity sets a lifetime for the terminal;

[0103] Specifically, in step 301, during the ongoing Attach or TAU process, or when the network is about to initiate a GUTI reallocation process, the core network control node allocates a first GUTI to the terminal and sets the lifetime of the first GUTI.

[0104] "When the core network control entity assigns the first temporary identifier to the terminal" mentioned i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protective method, terminal, core network control entity and system of terminal temporary identifications, and relates to the field of information safety. The protective method solves the technical problem that in the prior art, the temporary identifications can not be timely updated due to the low mobility of the terminal. The protective method mainly comprises the step of providing a device. The method comprises the steps of setting lift cycle for the first temporary identification allocated to the terminal, and starting a timer to conduct timing; when timing of the timer reaches the life cycle, allocating the second temporary identification to the terminal. The protective method is mainly used for protecting the terminal temporary identifications.

Description

technical field [0001] The invention relates to the field of information security in wireless communication network system technology, and in particular to a method for protecting a terminal temporary identifier, a terminal, a core network control entity and a system. Background technique [0002] In the 3GPP system, the IMSI is the globally unique identifier of the mobile network subscriber and is permanently valid. In order to protect the user's privacy, the wireless interface should try to avoid using the subscriber's permanent identifier IMSI to identify the user's terminal, so as to prevent the attacker from tracking the user after obtaining the terminal IMSI information through the air interface eavesdropping. [0003] Therefore, in response to the above phenomenon, the usual practice of the 3GPP system is: the core network control entity (MSC / VLR, SGSN and MME) assigns a temporary identity (TMSI, P-TMSI and GUTI) to the user terminal successfully attached to the netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/26
Inventor 田野齐旻鹏朱红儒
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products