User identification identification method in roaming scenario
A user identification and identification technology, applied in the field of communication, can solve the problems of random deduction of roaming places, disadvantageous user SUPI privacy protection, etc., and achieve the effect of improving efficiency, ensuring security, and solving privacy protection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049]This embodiment provides a method for identifying a user ID in a roaming scenario, which is applied to a roaming network, such as figure 1 As shown, the method includes:
[0050] Step S102: Receive a registration request sent by the roaming terminal, the registration request carries a current SUCI identifier, and the current SUCI identifier includes an encryption mode identifier and a user identifier ciphertext.
[0051] In this embodiment, the terminal is a device with a wireless transceiver function, and the terminal may be a UE (User Equipment), a mobile phone, a tablet computer, a computer with a wireless transceiver function, a virtual reality terminal, an augmented reality terminal, an industrial Controlling wireless terminals, etc.
[0052] In this embodiment, the roaming terminal, that is, the terminal roams from the home network to the roaming network. Specifically, after the terminal roams to the roaming network, it determines whether it has roamed from a PLM...
Embodiment 2
[0071] like figure 2 As shown, this embodiment provides a method for identifying a user ID in a roaming scenario, which is applied to a roaming terminal, and includes the following steps:
[0072] Step S202: judging whether this roaming is the first roaming under the current roaming network;
[0073] Step S204: If it is not the first roaming, further judge whether the last SUCI identifier exceeds the update period;
[0074] Step S206: If the update period is not exceeded, generate a current SUCI ID according to the last SUCI, the current SUCI ID includes an encryption mode ID and a user ID ciphertext, the encryption mode ID of the current SUCI ID is a non-standard encryption mode ID, The user identification ciphertext identified by the current SUCI is the same as the user identification ciphertext of the last SUCI;
[0075] Step S208: Send a registration request to the roaming network, where the registration request carries the current SUCI identifier.
[0076] Preferably,...
Embodiment 3
[0088] like image 3 As shown, this embodiment provides a charging method in a roaming scenario, including:
[0089] Step S302: Obtain the current SUCI ID according to the user ID identification method in the roaming scenario described in Embodiment 1; and,
[0090] Step S304: Generate a bill file corresponding to the current SUCI identifier, wherein the file name of the bill file includes the current SUCI identifier;
[0091] Step S306: Obtain the SUPI identifier corresponding to the current SUCI identifier in the pre-stored SUCI and SUPI correspondence table;
[0092] Step S308: Perform billing processing on the user corresponding to the SUPI identifier according to the bill file corresponding to the current SUCI identifier.
[0093] Preferably, after the step of charging the user corresponding to the SUPI identifier according to the bill file corresponding to the current SUCI identifier, the method may further include:
[0094] Replace the last SUCI identifier in the fil...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


