A mobile communication system user identity concealment method initiated by a terminal

A mobile communication system and user identity technology, applied in the field of user identity concealment in mobile communication systems, can solve the problems of inability to resist attacks or APT attacks, and security measures are difficult to meet high security users, and achieve the effect of a wide range of applications

Active Publication Date: 2021-02-12
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The mobile communication network is mainly for public users, and the security measures it provides cannot meet the needs of high-security users, nor can it resist organized attacks or APT attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile communication system user identity concealment method initiated by a terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Aiming at the problem in the prior art that it is difficult to hide the real IMSI or SUPI of the UE in the service network, the present invention provides a method for concealing the IMSI or SUPI initiated by the terminal in the mobile communication system, which is based on the following foundations: Users who need this kind of identity concealment (referred to as special users) belong to the same industry or the same organization or the same group. They can be established by specific industries, party, government, military, government departments, large enterprises or operators for users who need special security services. Specific user groups (referred to as specific industries) have the same identity information concealment requirements, and the user's subscription information is invisible to mobile operators when they are not authorized; operators are willing to provide support for identity concealment for special users, providing additional IMSI or SUPI number reso...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a mobile communication system user identity concealment method initiated by a terminal. The terminal dynamically generates a new legal IMSI or SUPI, and the terminal uses the new IMSI or SUPI to perform information update, synchronization and collision elimination to the network, thereby changing The identity in the user communication process decouples the user identity from the communication identity. The present invention only needs to customize the USIM / eSIM card of the terminal or customize the software of the customizable firmware part in the communication processor, and make a small amount of modification to the HSS or AUSF / UDM / UDR at the back end, so that users with high security requirements or special The industry can achieve the effect of random changes in the corresponding relationship between the same user and IMSI or SUPI in a way that does not change the mobile communication standard architecture and standard protocol process, increasing the chance for attackers to track users or deduce users in the real space by capturing IMSI or SUPI The difficulty of identity.

Description

technical field [0001] The invention relates to a mobile communication system user identity concealment method initiated by a terminal. Background technique [0002] The first phase of the current 5G mobile communication system standard has been determined, but as a complex ecosystem, the 5G network has various types of participants such as infrastructure providers, mobile communication network operators, and virtual operators. It is stored, transmitted and processed in a complex network that interacts with multiple access technologies, multiple devices, and multiple participants, and faces many risks of privacy leakage. [0003] A large number of virtualization technologies are introduced into the 5G network to support various vertical industry applications. While bringing flexibility, it also makes the network security boundary more blurred. In the case of multi-tenant sharing of computing resources, users' private data is more vulnerable to attacks and leaked. Compared ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/06H04W8/26H04W60/00
CPCH04W12/02H04W12/06H04W8/26H04W60/00
Inventor 田永春王俊吴坤曾浩洋
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products