Registration method of 5G user terminal, user terminal equipment and medium

A user terminal equipment, user terminal technology, applied in the field of user terminal equipment and media, to achieve the effect of improving security and confidentiality, security and confidentiality protection

Pending Publication Date: 2020-05-12
全链通有限公司
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the standard 5G registration process, a SIM card is inserted into the 5G user terminal equipment (referred to as UE), and the SIM card has the operator's public key, or the shared key between the 5G UE and the operator, and any middleman cannot modify the SIM card The built-in public key prevents man-in-the-middle attacks. However, in the no-SIM card access solution, when a 5G UE without a SIM card submits its own public key, a malicious middleman or listener can easily replace the public key. Operators are also unaware, so all confidential communications between 5G UEs and operators may be monitored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Registration method of 5G user terminal, user terminal equipment and medium
  • Registration method of 5G user terminal, user terminal equipment and medium
  • Registration method of 5G user terminal, user terminal equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] The terms "comprising" and "having" and any variations thereof in the description and claims of the present invention are intended to cover a non-exclusive inclusion, for example, a process comprising a series of steps or a device of structure need not be limited to the expressly listed Instead, those structures or steps may include other steps or structures not expressly listed or inherent to the process or device.

[0025] figure 1 It is a flow chart...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a registration method of a 5G user terminal, user terminal equipment and a medium, and the method comprises the steps of enabling the 5G user terminal equipment to send a registration application to a temporary identity registration server in a block chain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the equipment; receiving block information returned by the temporary identity registration server, and performing hash value verification on the block chain and blocks in the block chain according to the block information; when the verification is passed, searching for a public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator; and according to a preset encryption algorithm, encrypting a second public key of the target operator by adopting the public key of the target operator and the first public key, and sending encrypted data obtained by encryption to a temporary identity registration server for identity registration. According to the scheme provided by the embodiment of the invention, the data security and confidentiality of the 5G user terminal equipment during identity registration are improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of blockchain, and in particular, to a registration method of a 5G user terminal, user terminal equipment and a medium. Background technique [0002] In the standard 5G registration process, a SIM card is inserted into the 5G user terminal equipment (referred to as UE), and the SIM card has the operator's public key, or the shared key between the 5G UE and the operator, and any middleman cannot modify the SIM card The built-in public key prevents man-in-the-middle attacks. However, in the no-SIM card access solution, when a 5G UE without a SIM card submits its own public key, a malicious middleman or listener can easily replace the public key. Operators are also unable to perceive, so all confidential communications between 5G UEs and operators may be monitored. Contents of the invention [0003] Embodiments of the present invention provide a registration method for a 5G user ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/04H04W60/00H04L9/32H04W12/03H04W12/041
CPCH04W12/04H04W60/00H04L9/3236H04W12/75H04W12/0431H04L9/50
Inventor 路成业王凌
Owner 全链通有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products