User identity information protection method and system based on HSS enhancement
A technology of user identity information and identity information, applied in the field of user identity information protection methods and systems, can solve the problems of inability to solve the security threat of user real identity information leakage, user location information leakage, etc., and avoid being actively or passively intercepted by malicious elements /monitor, improve the effect of protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0046] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail together with the accompanying drawings.
[0047] 1) Dynamic identity information allocation process
[0048] Such as figure 2 As shown, the main steps of dynamic identity information allocation are as follows:
[0049] (1) When the user equipment is powered on or opens the mobile network connection, the protocol stack function on the user terminal equipment uses the long-term subscription identity information or the temporary subscription identity information to initiate the mobile network attachment process and complete the network attachment.
[0050] (2) After the attachment is completed, the user terminal sends an identity request message to the identity location protection server, and the identity request message includes the temporary subscription identity information (IMSIn) or long-term subscript...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


