Method for IMSI privacy protection of mobile communication system

A technology of mobile communication system and privacy protection, which is applied in the field of privacy protection of mobile communication system IMSI, which can solve problems such as the difficulty of adding real identities, and achieve the effect of meeting the national military-civilian integration strategy and having a wide range of applications

Active Publication Date: 2018-01-12
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF7 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In order to overcome the above-mentioned shortcomings of the prior art, the present invention provides a method for protecting the privacy of IMSI in a mobile communication system. It is difficult to capture IMSI or GUTI to track a specific user or deduce the real user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for IMSI privacy protection of mobile communication system
  • Method for IMSI privacy protection of mobile communication system
  • Method for IMSI privacy protection of mobile communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The method of the present invention follows the standard framework of international standards, and the functional entities include mobile terminal UE, radio access network RAN, access and mobility management function AMF, trusted unified data management / authentication service function UDM / AUSF, trusted network slice ( Trusted Session Management Function SMF, Trusted User Plane Function UPF) and application systems, such as figure 2 Shown:

[0022] The mobile terminal UE is used to perform an IMSI change behavior and initiate a network attachment request, and at the same time complete new security context negotiation based on the new IMSI.

[0023] The serving AMF / MME is used to actively (CP mode) or passively (UP mode) replace the IMSI information and its related GUTI information, and complete the security context negotiation based on the new IMSI.

[0024] The trusted UDM / AUSF / HSS is used to generate new IMSI information for the UE according to a certain strategy.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a method for IMSI privacy protection of a mobile communication system. A function entity includes UE, an access and mobility management function (AMF), a trusted UDM/AUSF, a trusted SMF and a trusted UPF. The UE is used for executing IMSI change behavior and initiating a network attachment request and completes a new security context negotiation based on a new IMSI at the same time. The AMF is used for replacing IMSI information and its associated GUTI information in a CP mode or a UP mode, and completes the secure context negotiation again based on the new IMSI. The UDM/AUSF is used for generating new IMSI information for UE. The SMF is used for notifying the trusted UPF to generate inband IMSI change control information under the UP mode. According to the invention, the difficulty of an attacker tracing a specific user or deriving real identity of the user is increased, the requirement for legal monitoring in the world is not violated, and at the same time, no consumption of an additional IMSI identification space is introduced.

Description

technical field [0001] The invention relates to a method for IMSI privacy protection in a mobile communication system. Background technique [0002] The mobile communication system has evolved from 2G to 4G, and has now reached the research and standardization stage of 5G. The standardization work of mobile communication systems is dominated by international standards. All research reports and standard specifications of international standards are based on the assumption that operators of mobile communication systems in various countries and network elements within their jurisdictions are equally credible. above. [0003] With the theoretical research and technological development in the field of mobile communication systems in my country, the national strategy of military-civilian integration has gradually been established. Mobile communication systems are no longer only for ordinary public users. The demand for applications is increasing, and at the beginning of the desig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W8/18
CPCH04W12/02H04W12/041H04W12/72
Inventor 王俊田永春张力
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products