Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An imsi encryption method, core network and user terminal

A technology of user terminals and encryption methods, applied in electrical components, security devices, transmission systems, etc., can solve the problems of IMSI information leakage, increase the complexity of card replacement, network elements that are not suitable for authentication and encryption, and achieve the goal of avoiding IMSI leakage Effect

Active Publication Date: 2021-05-25
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the key negotiation is performed through the air interface, there will be a risk of key leakage, which will still cause IMSI information leakage
If the key is built into the SIM (Subscriber Identification Module, user identification card) card, it will increase the complexity of changing the card, and the base station, as a wireless signal sending and receiving device, is not suitable as a network element for authentication and encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An imsi encryption method, core network and user terminal
  • An imsi encryption method, core network and user terminal
  • An imsi encryption method, core network and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0054] It should be noted that, in the embodiments of the present invention, words such as "exemplary" or "for example" are used for example, illustration or illustration. Any embodiment or design solution described as "exemplary" or "for example" in the embodiments of the present invention shall not be construed as being more preferred or more advantageous than other embodiments or design solutions. Rather, the use of words such as "exemplary" or "such as" is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide an IMSI encryption method, a core network and a user terminal, which relate to the communication field and can prevent the user's IMSI from being leaked during the Internet access process without increasing the base station load. The method includes: the user terminal sends its own encryption protocol list and version information corresponding to the encryption protocols in the encryption protocol list to the HTTP AUSF network element via the base station; the HTTP AUSF network element selects the target encryption protocol from the encryption protocol list according to the version information , and send the target encryption protocol and the CA certificate carrying the public key to the user terminal via the base station; the user terminal generates a key according to the target encryption protocol, and uses the public key encryption key in the CA certificate to generate a key package, and sends the The key package is sent to the HTTP AUSF network element via the base station; the HTTP AUSF network element uses its pre-stored private key to decrypt the key package to obtain the key, and sends the key to the MME network element; the public key corresponds to the private key.

Description

technical field [0001] The invention relates to the communication field, in particular to an encryption method for an International Mobile Subscriber Identification Number (IMSI), a core network and a user terminal. Background technique [0002] The user IMSI (International Mobile Subscriber Identification Number, International Mobile Subscriber Identification Number) information is the unique identifier of the user and plays an important role in the communication network. The transmission of IMSI information over the air interface may cause user privacy leakage and affect the operator's reputation. At present, both the attach message and the user identification message before authentication in the live network may carry the user's IMSI information, but because these messages are before the authentication, and the user's IMSI information needs to be identified before the authentication, the message is not carried out. Encryption means transmission over the air interface. I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/069H04L29/08H04L29/06H04W12/041H04W12/0431
CPCH04L63/0442H04L63/08H04L63/0823H04L63/083H04L67/02H04W12/02H04W12/06
Inventor 李京辉乔自知郭省力
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products