Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

IMSI encryption method, core network, and user terminal

A user terminal and encryption method technology, applied in electrical components, wireless communication, transmission systems, etc., can solve the problems of key leakage, increasing the complexity of card replacement, and network elements that are not suitable for authentication and encryption.

Active Publication Date: 2018-11-23
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the key negotiation is performed through the air interface, there will be a risk of key leakage, which will still cause IMSI information leakage
If the key is built into the SIM (Subscriber Identification Module, user identification card) card, it will increase the complexity of changing the card, and the base station, as a wireless signal sending and receiving device, is not suitable as a network element for authentication and encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IMSI encryption method, core network, and user terminal
  • IMSI encryption method, core network, and user terminal
  • IMSI encryption method, core network, and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] It should be noted that, in the embodiments of the present invention, words such as "exemplary" or "for example" are used for example, illustration or illustration. Any embodiment or design solution described as "exemplary" or "for example" in the embodiments of the present invention shall not be construed as being more preferred or more advantageous than other embodiments or design solutions. Rather, the use of words such as "exemplary" or "such as" is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an IMSI encryption method, a core network, and a user terminal, and relates to the field of communication. The IMSI of a user can be prevented from being leaked in a network access process without increasing the load of a base station. The method comprises the following steps: the user terminal sends an own encryption protocol list and version information corresponding to an encryption protocol in the encryption protocol list to an HTTP AUSF network element via the base station; the HTTP AUSF network element selects a target encryption protocol from theencryption protocol list according to the version information, and sends the target encryption protocol and a CA certificate carrying a public key to the user terminal via the base station; the userterminal generates a key according to the target encryption protocol, simultaneously generates a key package by using an encryption key of a public key in the CA certificate, and sends the key packageto the HTTP AUSF network element via the base station; and the HTTP AUSF network element decrypts the key package by using an own pre-stored private key to obtain the key, and sends the key to an MMEnetwork element, wherein the public key corresponds to the private key.

Description

technical field [0001] The present invention relates to the communication field, in particular to an encryption method for an International Mobile Subscriber Identification Number (IMSI), a core network and a user terminal. Background technique [0002] The user IMSI (International Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number) information is the unique identifier of the user and plays an important role in the communication network. The transmission of IMSI information over the air interface may cause user privacy leakage and affect the operator's reputation. At present, both the attach message and the user identification message before authentication in the live network may carry the user's IMSI information, but because these messages are before the authentication, and the user's IMSI information needs to be identified before the authentication, the message is not carried out. Encryption means transmission over the air inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04L29/08H04L29/06H04W12/041H04W12/0431H04W12/069
CPCH04L63/0442H04L63/08H04L63/0823H04L63/083H04L67/02H04W12/02H04W12/06
Inventor 李京辉乔自知郭省力
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products