Unlock instant, AI-driven research and patent intelligence for your innovation.

User identity information protection method and system based on HSS enhancement

A technology of user identity information and identity information, applied in the field of user identity information protection methods and systems, can solve the problems of inability to solve the security threat of user real identity information leakage, user location information leakage, etc., and avoid being actively or passively intercepted by malicious elements /monitor, improve the effect of protection

Active Publication Date: 2018-04-13
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Illegal use of user's real identity information may lead to leakage of user location information
Therefore, the current 4G mobile network mechanism still has certain flaws and cannot solve the security threats of user real identity information leakage and location tracking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity information protection method and system based on HSS enhancement
  • User identity information protection method and system based on HSS enhancement
  • User identity information protection method and system based on HSS enhancement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail together with the accompanying drawings.

[0047] 1) Dynamic identity information allocation process

[0048] Such as figure 2 As shown, the main steps of dynamic identity information allocation are as follows:

[0049] (1) When the user equipment is powered on or opens the mobile network connection, the protocol stack function on the user terminal equipment uses the long-term subscription identity information or the temporary subscription identity information to initiate the mobile network attachment process and complete the network attachment.

[0050] (2) After the attachment is completed, the user terminal sends an identity request message to the identity location protection server, and the identity request message includes the temporary subscription identity information (IMSIn) or long-term subscript...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user identity information protection method and system based on HSS enhancement. According to the method and the system, an existing mobile core network HSS function is enhanced; after an HSS receives a user identity information updating notice sent by a user identity position protection server, new temporary signing identity information of a user needs to be bound with permanent signing identity information or old signing identity information of the user. When the user accesses the HSS through utilization of the temporary signing identity information, if binding information related to the temporary signing identity information exists in the HSS, a user identity information authentication process is started, otherwise, the access to a mobile network by the user is directly rejected. According to the method and the system, the condition that the permanent signing identity information of the user is transmitted through an air interface in a plaintext form can be greatly reduced or completely avoided, the permanent signing identity information is prevented from being actively or passively intercepted / monitored by a malicious criminal, and the protection forprivacy information such as a user identity position is improved.

Description

technical field [0001] The invention belongs to the technical field of network communication security, and relates to a method and system for protecting user identity information in a mobile communication network. Background technique [0002] Due to its mobility and convenience, mobile communication network services have been widely used in people's daily life. With the large-scale deployment of 4G mobile communication networks, more and more people are beginning to use 4G network services. While enjoying the convenience brought by the mobile communication network, communication monitoring and personal privacy leakage have become increasingly serious problems. [0003] When mobile network users use 3G, 4G and other network services, malicious users intercept the user's access request to access the wireless network and have not yet protected the signaling message, analyze the signaling message to obtain user identity information, or use malicious software to imitate The co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/08H04W8/26H04W12/06H04W12/08H04W12/30H04W12/63
CPCH04W8/08H04W8/26H04W12/06H04W12/08
Inventor 张顺亮周卫华汪永明
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI