Terminal initiated identity hiding method for mobile communication system subscriber

A mobile communication system and user identity technology, which is applied in the field of user identity concealment in mobile communication systems, can solve problems such as being unable to resist attacks or APT attacks, and security measures that are difficult to meet high-security users, and achieve a wide range of applications.

Active Publication Date: 2018-11-27
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP +1
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The mobile communication network is mainly for public users, and the security measures it provides cannot meet the needs of high-security users, nor can it resist organized attacks or APT attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal initiated identity hiding method for mobile communication system subscriber

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Aiming at the problem in the prior art that it is difficult to hide the real IMSI or SUPI of the UE in the service network, the present invention provides a method for concealing the IMSI or SUPI initiated by the terminal in the mobile communication system, which is based on the following foundations: Users who need this kind of identity concealment (referred to as special users) belong to the same industry or the same organization or the same group. They can be established by specific industries, party, government, military, government departments, large enterprises or operators for users who need special security services. Specific user groups (referred to as specific industries) have the same identity information concealment requirements, and the user's subscription information is invisible to mobile operators when they are not authorized; operators are willing to provide support for identity concealment for special users, providing additional IMSI or SUPI number reso...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a terminal initiated identity hiding method for a mobile communication system subscriber. The method comprises the steps of dynamically generating a novel legal IMSI or SUPI bya terminal, subjecting a network to information updating, synchronizing and collision elimination by the terminal through using the novel IMSI or SUPI so as to change an identity of the subscriber during communication and decouple the identity of the subscriber and a communication identity. According to the method, only through customizing a USIM / eSIM card of the terminal or subjecting a customizable firmware part in a communication processor to software customization and carrying out a little revision on rear-end HSS or AUSF / UDM / UDR, subscribers or special industries with high security requirements can achieve the effect that a corresponding relationship between the same subscriber and the IMSI or SUPI changes randomly in a manner of not changing mobile communication standard frameworksand standard protocol flows, and the difficulty in tracking of the subscribers or derivation of the subscribers in real spaces by attackers through trapping the IMSI or SUPI is improved.

Description

technical field [0001] The invention relates to a mobile communication system user identity concealment method initiated by a terminal. Background technique [0002] The first phase of the current 5G mobile communication system standard has been determined, but as a complex ecosystem, the 5G network has various types of participants such as infrastructure providers, mobile communication network operators, and virtual operators. It is stored, transmitted and processed in a complex network that interacts with multiple access technologies, multiple devices, and multiple participants, and faces many risks of privacy leakage. [0003] A large number of virtualization technologies are introduced into the 5G network to support various vertical industry applications. While bringing flexibility, it also makes the network security boundary more blurred. In the case of multi-tenant sharing of computing resources, users' private data is more vulnerable to attacks and leaked. Compared ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W8/26H04W60/00
CPCH04W12/02H04W12/06H04W8/26H04W60/00
Inventor 田永春王俊吴坤曾浩洋
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products