A User Identity Renewal Method with Encrypted Transmission

A technology of user identity and update method, which is applied in the field of user identity update in encrypted transmission, which can solve the problems of user permanent identity leakage and inability to prevent user billing, etc.

Active Publication Date: 2021-03-23
XINGTANG TELECOMM TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the above analysis, the present invention aims to provide a user identity update method with encrypted transmission to solve the problem that the existing technology cannot prevent malicious visited networks from obtaining user identities from affecting user billing, etc. The problem of permanent identity disclosure of users due to their own security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A User Identity Renewal Method with Encrypted Transmission
  • A User Identity Renewal Method with Encrypted Transmission
  • A User Identity Renewal Method with Encrypted Transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0057] An embodiment 1 of the present invention discloses a user identity update method for encrypted transmission. The method is applied to the network side, and the network elements involved include SEAF (SEcurity Anchor Function, network security anchor function), AUSF (Authentication Server Function , authentication service function) and UDM (Unified Data Management, unified data management platform). Such as figure 1 shown, including the following steps:

[0058] Step S1, receiving the user concealed identity SUCI (SUbscriber Concealed Identity) sent by the client;

[0059] This step includes:

[0060] According to the 3GPP standard process, when attaching, receive the user hidden identity SUCI sent by the user end;

[0061] According to the 3GPP standard procedure, SEAF initiates an authentication request and starts the authentication process. Send information such as SUCI and network name (SN-name) to the AUSF of the home network;

[0062] According to the 3GPP sta...

Embodiment 2

[0103] In this embodiment, the feedback information calculated by the user terminal is RES*, such as figure 2 Shown, step 1-step 5 is identical with embodiment 1;

[0104] Step S6-2. Compare the RES* and XRES* sent by the user end, and if they are consistent, the authentication is passed.

[0105] This step includes:

[0106] SEAF receives the RES* sent by the client, SEAF calculates HRES* and compares it with HXRES*;

[0107] SEAF sends RES* to AUSF;

[0108] AUSF compares the RES* sent by the user end with the XRES*, if they are consistent, the authentication is passed, and the user identity SUPI is updated to SUPI_n. If not, the authentication fails, and the user identity is not updated successfully, and the authentication and authentication process is required to be initiated again.

Embodiment 3

[0110] In this embodiment, the feedback information calculated by the client is AUTS, and steps S1-S5 are the same as in Embodiment 1;

[0111] Step S6-3: The UDM receives the AUTS sent by the user end, and verifies the SQN in the AUTS in the UDM. If the verification is passed and the MAC-S in the AUTS is consistent with the MAC in the AUTN, the authentication is passed.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user identity update method for encrypted transmission, which belongs to the technical field of user identity update, and solves the problem that the prior art cannot prevent a malicious visited network from obtaining the user's identity from affecting user billing, etc. The problem of permanent identity leakage of users caused by their own security problems. A method for updating user identity through encrypted transmission, receiving the hidden user identity SUCI sent by the client; calculating and caching a shared master key according to the received SUCI; decrypting the SUCI to obtain the user identity SUPI, and obtaining a new user identity SUPI according to the SUPI User identity SUPI_n; use the shared master key and SUPI_n to generate the authentication vector AV; send the AUTN and RAND in the authentication vector to the user terminal, and the user terminal calculates the feedback information; judge whether the authentication is passed according to the user terminal feedback information , if the authentication passes, update the user identity SUPI to SUPI_n. Realize the update method of encrypted transmission of user identity online, user-insensitive, high efficiency, and low system transformation.

Description

technical field [0001] The invention relates to the technical field of user identity update, in particular to a user identity update method for encrypted transmission. Background technique [0002] In 3G and 4G mobile communication systems, when a user attaches to a cell, the user needs to report the permanent identity (IMSI) to the base station in plain text, and the base station sends it back to the home identity management device (HLR / HSS). The attribution finds the long-term key (Ki) through the user identity, and starts the authentication process. Since the user identity is transmitted in clear text over the air interface, there is a possibility of being eavesdropped. [0003] In 5G, in order to solve the privacy protection problem of user identity, 5G User Permanent Identity (SUPI) uses ECIES (Elliptic Curve Confidentiality and Integrity Protection Method) to negotiate keys and encrypt them, and use User Concealment Identity (SUCI) over the air interface. ) to avoid ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04W8/26H04W12/02H04W12/03H04W12/06H04W12/10H04W12/069H04W12/106
CPCH04L9/3242H04L9/3273H04W8/26H04W12/02H04W12/06H04W12/10H04L2209/80
Inventor 冯程叶琅罗维刘畅
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products