Unlock instant, AI-driven research and patent intelligence for your innovation.

User identification identification method in roaming scenario

A user identification and identification technology, applied in the field of communication, can solve the problems of random deduction of roaming places, disadvantageous user SUPI privacy protection, etc., and achieve the effect of improving efficiency, ensuring security, and solving privacy protection.

Active Publication Date: 2022-04-15
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to aim at the above-mentioned deficiencies of the prior art, and provide a user identification identification method, a billing method, and AMF in a roaming scenario to solve the problem of using plain text SUPI as a user identification in a roaming scenario in the prior art. It is not conducive to the privacy protection of user SUPI in the roaming area, and the use of the TMSI of the roaming area as the user identification is likely to cause the problem of unilateral chargebacks in the roaming area

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification identification method in roaming scenario
  • User identification identification method in roaming scenario
  • User identification identification method in roaming scenario

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049]This embodiment provides a method for identifying a user ID in a roaming scenario, which is applied to a roaming network, such as figure 1 As shown, the method includes:

[0050] Step S102: Receive a registration request sent by the roaming terminal, the registration request carries a current SUCI identifier, and the current SUCI identifier includes an encryption mode identifier and a user identifier ciphertext.

[0051] In this embodiment, the terminal is a device with a wireless transceiver function, and the terminal may be a UE (User Equipment), a mobile phone, a tablet computer, a computer with a wireless transceiver function, a virtual reality terminal, an augmented reality terminal, an industrial Controlling wireless terminals, etc.

[0052] In this embodiment, the roaming terminal, that is, the terminal roams from the home network to the roaming network. Specifically, after the terminal roams to the roaming network, it determines whether it has roamed from a PLM...

Embodiment 2

[0071] like figure 2 As shown, this embodiment provides a method for identifying a user ID in a roaming scenario, which is applied to a roaming terminal, and includes the following steps:

[0072] Step S202: judging whether this roaming is the first roaming under the current roaming network;

[0073] Step S204: If it is not the first roaming, further judge whether the last SUCI identifier exceeds the update period;

[0074] Step S206: If the update period is not exceeded, generate a current SUCI ID according to the last SUCI, the current SUCI ID includes an encryption mode ID and a user ID ciphertext, the encryption mode ID of the current SUCI ID is a non-standard encryption mode ID, The user identification ciphertext identified by the current SUCI is the same as the user identification ciphertext of the last SUCI;

[0075] Step S208: Send a registration request to the roaming network, where the registration request carries the current SUCI identifier.

[0076] Preferably,...

Embodiment 3

[0088] like image 3 As shown, this embodiment provides a charging method in a roaming scenario, including:

[0089] Step S302: Obtain the current SUCI ID according to the user ID identification method in the roaming scenario described in Embodiment 1; and,

[0090] Step S304: Generate a bill file corresponding to the current SUCI identifier, wherein the file name of the bill file includes the current SUCI identifier;

[0091] Step S306: Obtain the SUPI identifier corresponding to the current SUCI identifier in the pre-stored SUCI and SUPI correspondence table;

[0092] Step S308: Perform billing processing on the user corresponding to the SUPI identifier according to the bill file corresponding to the current SUCI identifier.

[0093] Preferably, after the step of charging the user corresponding to the SUPI identifier according to the bill file corresponding to the current SUCI identifier, the method may further include:

[0094] Replace the last SUCI identifier in the fil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a user identification identification method, a billing method, and AMF in a roaming scene. The user identification identification method includes: receiving a registration request sent by a roaming terminal, the registration request carrying a current SUCI identification, and the current SUCI identification Including encryption mode identification and user identification ciphertext; judging whether the encryption mode identification is a standard encryption mode identification; if the judgment result is no, using the current SUCI identification as the user identification. The user identification identification method, billing method and AMF can solve the problem of using plaintext SUPI as the user identification in the roaming scene in the prior art, which is not conducive to the privacy protection of the user SUPI in the roaming area, and the use of the TMSI of the roaming area as the user identification is easy to cause problems in the roaming area. The problem of unilateral chargebacks.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a user identification identification method, a charging method and an AMF in a roaming scene. Background technique [0002] In order to protect the privacy of users, the 5G network encrypts the SUPI (Subscriber Permanent Identifier) ​​of the user into a SUCI (Subscription Concealed Identifier) ​​for transmission. However, when the user roams to a different network or abroad, since the SUCI is encrypted and changes dynamically , and the roaming public land mobile network (Visited Public Land Mobile Network, hereinafter referred to as roaming network) does not have the key of the home public land mobile network (Home Public Land Mobile Network, hereinafter referred to as home network). Therefore, SUCI cannot be decrypted in real time. In addition, if the plain text SUPI transmission scheme is adopted, in the roaming scenario, since its security level is not controll...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/24H04W8/20H04W12/03H04W12/06
CPCH04W4/24H04W12/02H04W12/06H04W8/205
Inventor 王鑫宋玉珊陈蛟
Owner CHINA UNITED NETWORK COMM GRP CO LTD