Unlock instant, AI-driven research and patent intelligence for your innovation.

Privacy protection method and device for terminal, and terminal

A privacy protection, terminal technology, applied in the field of communication, can solve problems such as IMSI leakage

Active Publication Date: 2021-05-28
CHINA TELECOM CORP LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the IMSI leakage problem that still exists when 5G terminals use 4G cards to access 5G networks, this disclosure provides a privacy protection scheme for terminals, which can improve user privacy protection capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection method and device for terminal, and terminal
  • Privacy protection method and device for terminal, and terminal
  • Privacy protection method and device for terminal, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. The description of the exemplary embodiments is illustrative only, and in no way restricts the disclosure, its application or uses. The present disclosure can be implemented in many different forms and is not limited to the embodiments described here. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art. It should be noted that the relative arrangements of parts and steps, compositions of materials and numerical values ​​set forth in these embodiments should be construed as illustrative only and not as limiting, unless specifically stated otherwise.

[0050] Words such as "comprising" or "comprising" used in the present disclosure mean that the elements preceding the word cover the elements listed after the word, and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy protection method and device for a terminal and the terminal. The privacy protection method comprises the following steps: acquiring encryption parameters of a user permanent identifier (SUPI) from a storage module of a terminal, wherein the encryption parameters comprise a default public key, an encryption algorithm and routing information; signing and encrypting the encryption parameter by using the terminal root key k to obtain encrypted data; sending the encrypted data to a storage module for storage; acquiring the encrypted data from the storage module under a specified condition; verifying and decrypting the signature of the encrypted data to obtain an encryption parameter; and calculating a user hidden identifier SUCI by using the user permanent identifier SUPI and the encryption parameter.

Description

technical field [0001] The present disclosure relates to the communication field, and in particular, to a terminal privacy protection method and device. Background technique [0002] In LTE, the terminal will directly send IMSI to the network when it first resides on the network or receives an Identity Request request. Hackers can intercept the IMSI (International Mobile Subscriber Identity) through the IMSI catcher, thereby sending forged text messages to users or tracking Geolocation, listening to communications, etc. [0003] In the 3GPP R15 specification, the SUPI (Subscriber Permanent Identifier, Subscriber Permanent Identifier) ​​encryption mechanism SUCI (Subscriber Concealed Identifier) ​​is introduced for 5G, which can effectively prevent IMSI leakage, but the realization of this capability must be provided by the 5G card. Key, routing ID and other information, 5G terminals can only use null-scheme (zero plan) when using 4G cards to access 5G networks, and there is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/03H04W12/0433H04L9/32
CPCH04W12/02H04L9/3247
Inventor 赵静陈平辉张荣
Owner CHINA TELECOM CORP LTD