Unlock instant, AI-driven research and patent intelligence for your innovation.

Safe HSS/UDM design method and system for achieving privacy protection function

A privacy protection and design method technology, applied in digital data protection, computer security devices, calculations, etc., can solve problems such as hidden dangers, small number of users, and difficult network access testing and maintenance for operators

Active Publication Date: 2020-07-14
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP +2
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the 5G network, IMSI / SUPI (International Mobile Subscriber Identity, International Mobile Subscriber Identity, Subscription Permanent Identifier, User Permanent Identifier) ​​is used as the identity identifier of the mobile terminal. Under the 3GPP R15 architecture, the IMSI / SUPI can be legally accessed by the visited network. Notified, but if there is a malicious administrator inside the operator visiting the network, there is a security risk of leakage to third parties
[0004] (1) Lack of specific methods for HSS / UDM transformation: It is necessary to explain how to transform the HSS / UDM (Home Subscriber Server, attributable subscriber server / Unified Data Management, unified data management) functional entity, and propose a device-level implementation that can be implemented Solution
[0005] (2) HSS / UDM with privacy protection capabilities needs to be able to serve multiple users in special industries at the same time: in the real 5G network of operators, the capacity and processing capacity of HSS / UDM are on the order of millions of users; In the 5G private network where industry users provide high-security services, the number of users in a single special industry is relatively small. If a modified HSS / UDM only serves a single user in a special industry, it will inevitably cause waste of HSS / UDM resources
[0007] (4) HSS / UDM with privacy protection capabilities needs to conform to the existing industry chain model: if HSS / UDM is developed and produced according to the model customized by industry users, it will have a major impact on the production model of equipment manufacturers and the operation and maintenance management of operators. It will produce a series of customized products that differ from industry users, and it will be difficult for operators to conduct network access testing and maintenance. These are not conducive to the implementation and promotion of privacy protection functions in 5G networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe HSS/UDM design method and system for achieving privacy protection function
  • Safe HSS/UDM design method and system for achieving privacy protection function
  • Safe HSS/UDM design method and system for achieving privacy protection function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to have a clearer understanding of the technical features, objectives and effects of the present invention, specific implementations of the present invention will now be described. It should be understood that the specific embodiments described here are only used to explain the present invention and not to limit the present invention, that is, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without creative work shall fall within the protection scope of the present invention.

[0055] This embodiment provides a secure HSS / UDM design method and system that implements privacy protection functions. The secure HSS / UDM system embeds protected IMSI / SUPI and Control information, the authentication vector is returned to other network elements of the core network for the main authentication fol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of wireless communication. The invention discloses a safe HSS / UDM design method and system for achieving a privacy protection function. The system comprises customized HSS / UDM equipment and at least one privacy protection equipment. HSS / UDM equipment is customized to complete the functions of the standard HSS / UDM except the authentication vector; and the privacy protection equipment dynamically and randomly selects a new IMSI / SUPI, securely encapsulates the new IMSI / SUPI into the authentication vector to complete the generation of the authenticationvector, and synchronously switches the new IMSI / SUPI with the terminal based on the main authentication success message. And the privacy protection function of the network side is cooperatively completed between the privacy protection equipment and the customized HSS / UDM equipment through a user-defined interface. According to the invention, privacy protection equipment with different security algorithms and IMSI / SUPI spaces can be realized according to user configurations with different security requirements; and, in this way, the requirement for the privacy protection function is met, the current development situation of an existing industrial chain is adapted to the maximum extent, one HSS / UDM can support multiple special industry users, and implementation and popularization of the privacy protection function are facilitated.

Description

Technical field [0001] The invention relates to the technical field of wireless communication networks, in particular to a safe HSS / UDM design method and system for realizing privacy protection functions. Background technique [0002] The 5G network uses IMSI / SUPI (International Mobile Subscriber Identity, Subscription Permanent Identifier) ​​as the identity identifier of the mobile terminal. Under the 3GPP R15 architecture, the IMSI / SUPI can be legally accessed by the visited network Known, but if there is a malicious administrator inside the operator visiting the network, there is a security risk of leaking to a third party. If privacy information such as the identity location of a security-sensitive terminal in some special industries is leaked, it can intercept the signaling and traffic information related to the terminal with IMSI / SUPI as the index on the visited network, and perform the terminal location, communication behavior, communication content, etc. Illegal monitori...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
CPCG06F21/6245
Inventor 杨信智张力田永春兰天苏自翔王志红叶雷
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP