Unlock instant, AI-driven research and patent intelligence for your innovation.

A reliable and efficient 5g anonymous authentication method

An anonymous authentication and high-efficiency technology, applied in the field of privacy and security, can solve problems such as the loss of identity synchronization relationship, achieve the effect of preventing attackers from tracking, enabling attackers to track, and solving the effect of identity synchronization relationship loss

Active Publication Date: 2022-07-29
SOUTHEAST UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the above problems, the present invention discloses a reliable and efficient 5G anonymous authentication method, which realizes the need for privacy protection of mobile users in 5G access authentication, and well solves the problem of loss of identity synchronization relationship in existing 5G access authentication technologies , and greatly improve the authentication performance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A reliable and efficient 5g anonymous authentication method
  • A reliable and efficient 5g anonymous authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be further clarified below with reference to the accompanying drawings and specific embodiments. It should be understood that the following specific embodiments are only used to illustrate the present invention and not to limit the scope of the present invention.

[0035] Several entities involved in the temporary identification management mechanism involved in the present invention.

[0036] The present invention involves two entities: the mobile user and the home network. The home network will randomly group with mobile users. And generate a random group identity pool, and generate a random identity pool for each user, use a bloom filter to map the group identity pool. After the user submits the authentication information, the home network verifies his identity, confirms the group to which the user belongs, verifies the user identity, and finally accesses the network.

[0037] The present invention includes two major parts: a temporary ide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a reliable and efficient 5G anonymous authentication method, including a possible temporary identification management mechanism based on Bloom filter, hash chain and identification pool, and a corresponding anonymous authentication mechanism. The temporary ID management mechanism includes the following steps: grouping users; generating a random group ID pool; generating a user random ID pool; mapping the group ID pool using a Bloom filter; and using a Bloom filter to map the user ID pool. The anonymous authentication mechanism includes the following steps: user submits authentication information; home network verifies user identity; access authentication protocol design. The present invention fulfills the need for privacy protection of mobile users in 5G access authentication, well solves the problem of lost identification synchronization relationship in the existing 5G access authentication technology, and greatly improves authentication performance.

Description

technical field [0001] The invention belongs to the technical field of privacy security, and in particular relates to a reliable and efficient 5G anonymous authentication method. Background technique [0002] As mankind enters the 5G era, the new technology of 5G network brings new security risks and challenges. Compared with traditional 3G / 4G networks, the 5G core network is based on new technologies such as network function virtualization, providing more ubiquitous access support, more flexible control and forwarding mechanisms, and a more friendly capability opening method in terms of architecture and functions. . 5G network new technologies and new services bring convenience, but also security risks and challenges. Faced with these risks and challenges, it is necessary to conduct research on user anonymity. [0003] In 5G, when mobile users access the network, they will send their own hidden identity SUCI or temporary identity GUTI in plain text for authentication. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/08H04W12/122H04W12/75H04W12/76H04L9/32
CPCH04W12/02H04W12/06H04W12/08H04L9/3236
Inventor 万长胜董士洋
Owner SOUTHEAST UNIV