Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identity updating method of encryption transmission

A technology of user identity and encrypted transmission, applied in the field of user identity update, which can solve the problems of user permanent identity leakage, unable to prevent user billing, etc.

Active Publication Date: 2018-10-19
XINGTANG TELECOMM TECH CO LTD +1
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above analysis, the present invention aims to provide a user identity update method with encrypted transmission to solve the problem that the existing technology cannot prevent malicious visited networks from obtaining user identities from affecting user billing, etc. The problem of permanent identity disclosure of users due to their own security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity updating method of encryption transmission
  • User identity updating method of encryption transmission
  • User identity updating method of encryption transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] An embodiment 1 of the present invention discloses a user identity update method for encrypted transmission. The method is applied to the network side, and the network elements involved include SEAF (SEcurity Anchor Function, network security anchor function), AUSF (Authentication Server Function , authentication service function) and UDM (Unified Data Management, unified data management platform). . Such as figure 1 shown, including the following steps:

[0058] Step S1, receiving the user concealed identity SUCI (SUbscriber Concealed Identity) sent by the client;

[0059] This step includes:

[0060] According to the 3GPP standard process, when attaching, receive the user hidden identity SUCI sent by the user end;

[0061] According to the 3GPP standard procedure, SEAF initiates an authentication request and starts the authentication process. Send information such as SUCI and network name (SN-name) to the AUSF of the home network;

[0062] According to the 3GPP ...

Embodiment 2

[0103] In this embodiment, the feedback information calculated by the user terminal is RES*, such as figure 2 Shown, step 1-step 5 is identical with embodiment 1;

[0104] Step S6-2. Compare the RES* and XRES* sent by the user end, and if they are consistent, the authentication is passed.

[0105] This step includes:

[0106] SEAF receives the RES* sent by the client, SEAF calculates HRES* and compares it with HXRES*;

[0107] SEAF sends RES* to AUSF;

[0108] AUSF compares the RES* sent by the user end with the XRES*, if they are consistent, the authentication is passed, and the user identity SUPI is updated to SUPI_n. If not, the authentication fails, and the user identity is not updated successfully, and the authentication and authentication process is required to be initiated again.

Embodiment 3

[0110] In this embodiment, the feedback information calculated by the client is AUTS, and steps S1-S5 are the same as in Embodiment 1;

[0111] Step S6-3: The UDM receives the AUTS sent by the user end, and verifies the SQN in the AUTS in the UDM. If the verification is passed and the MAC-S in the AUTS is consistent with the MAC in the AUTN, the authentication is passed.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the user identity updating method of encryption transmission and belongs to the user identity updating technology field. In the prior art, a malicious visiting location network can not be prevented from carrying out user charging after receiving a user identity and the like, and a permanent user identity leakage problem caused by the safety problem of the visiting locationnetwork exists. In the invention, the above problems are solved. The user identity updating method of the encryption transmission comprises the following steps of receiving a user hidden identity SUCI sent by a client; calculating and caching a shared master secret key according to the received SUCI; decrypting the SUCI to acquire the user identity SUPI, and acquiring a new user identity SUPI_n according to the SUPI; generating an authentication vector AV through using the shared master secret key and the SUPI_n; sending AUTN and RAND in the authentication vector to the client, and calculating feedback information by the client; and according to the feedback information of the client, determining whether an authentication is passed, and if the authentication is passed, updating the user identity SUPI to SUPI_n. The on-line and insensitive user identity updating method with high efficiency and low system transformation of the encryption transmission is realized.

Description

technical field [0001] The invention relates to the technical field of user identity update, in particular to a user identity update method for encrypted transmission. Background technique [0002] In 3G and 4G mobile communication systems, when a user attaches to a cell, the user needs to report the permanent identity (IMSI) to the base station in plain text, and the base station sends it back to the home identity management device (HLR / HSS). The attribution finds the long-term key (Ki) through the user identity, and starts the authentication process. Since the user identity is transmitted in clear text over the air interface, there is a possibility of being eavesdropped. [0003] In 5G, in order to solve the privacy protection problem of user identity, 5G User Permanent Identity (SUPI) uses ECIES (Elliptic Curve Confidentiality and Integrity Protection Method) to negotiate keys and encrypt them, and use User Concealment Identity (SUCI) over the air interface. ) to avoid ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04W8/26H04W12/02H04W12/06H04W12/10H04W12/069H04W12/106
CPCH04L9/3242H04L9/3273H04W8/26H04W12/02H04W12/06H04W12/10H04L2209/80
Inventor 冯程叶琅罗维刘畅
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products