A reliable and efficient 5g anonymous authentication method
An anonymous authentication and high-efficiency technology, applied in the field of privacy and security, can solve problems such as the loss of identity synchronization relationship, achieve the effect of preventing attackers from tracking, enabling attackers to track, and solving the effect of identity synchronization relationship loss
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] The present invention will be further clarified below with reference to the accompanying drawings and specific embodiments. It should be understood that the following specific embodiments are only used to illustrate the present invention and not to limit the scope of the present invention.
[0035] Several entities involved in the temporary identification management mechanism involved in the present invention.
[0036] The present invention involves two entities: the mobile user and the home network. The home network will randomly group with mobile users. And generate a random group identity pool, and generate a random identity pool for each user, use a bloom filter to map the group identity pool. After the user submits the authentication information, the home network verifies his identity, confirms the group to which the user belongs, verifies the user identity, and finally accesses the network.
[0037] The present invention includes two major parts: a temporary ide...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

