Privacy protection method and related equipment

A technology of privacy protection and equipment, applied in the field of electricity, can solve the problems of high risk of leakage

Active Publication Date: 2018-04-27
HUAWEI TECH CO LTD
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the prior art, the shared key is shared between the MNO and all UEs within its jurisdiction. If the PCA colludes with any UE to obtain the shared key, it can decrypt all the ciphertexts sent by the MNO to the PCA. The ciphertext is selected by PCA, so PCA decrypts the target ciphertext through the shared secret key to obtain the target PMSI and target authentication key, that is, PCA knows the use of PMSI of all UEs, and the risk of leakage is extremely high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and related equipment
  • Privacy protection method and related equipment
  • Privacy protection method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0164] Embodiments of the present invention provide a privacy protection method and related equipment, which are used to reduce the risk of leakage during ciphertext transmission.

[0165] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0166] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a privacy protection method and related equipment. The method is used for reducing leakage risk when ciphertext transmission is carried out. The method provided by the embodiment of the invention comprises the steps that operator equipment receives a blind ciphertext sent by user equipment (UE), wherein the blind ciphertext is an identity ID suite obtainedthrough encryption and blinding processing, and the ID suite comprises an identification code and authentication information; and the operator device decrypts the blind ciphertext according to a private key, thereby acquiring a blind plaintext, and the operator equipment sends the blind plaintext to the UE. The embodiment of the invention also provides the related equipment. According to the embodiment of the invention, the leakage risk when ciphertext transmission is carried out can be reduced.

Description

technical field [0001] The present invention relates to the field of electricity, in particular to a privacy protection method and related equipment. Background technique [0002] In a traditional network, user identification is accomplished through an International Mobile Subscriber Identification Number (IMSI, International Mobile Subscriber Identification Number). Each subscriber's Subscriber Identification Module (SIM, Subscriber Identification Module) card has an IMSI identifier, and the mobile operator (MNO, MobileNetwork Operator) stores the corresponding relationship between the IMSI and the subscriber's subscription. At the same time, the SIM card and the MNO reserve a shared key for the same IMSI, which is used for authentication between the network and the user. [0003] In the proprietary protocol of the Internet of Vehicles (LTE-V, Long Term Evolution to Vihicle), each user who joins the Internet of Vehicles has an application-layer user identity reserved for t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/069
CPCH04W12/02H04W12/06
Inventor 王江胜谢翔黄正安
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products