Unlock instant, AI-driven research and patent intelligence for your innovation.

Secure communication method and device

A secure communication and trusted technology, applied in the field of communication, can solve problems such as leakage of user privacy and data

Active Publication Date: 2021-11-12
HUAWEI TECH CO LTD
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, there may be a risk of malicious disclosure of user privacy and data in network deployment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure communication method and device
  • Secure communication method and device
  • Secure communication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0132] In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings.

[0133]The terms "first" and "second" in the specification, claims and drawings of the present application are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, product or device comprising a series of steps or units is not limited to the listed steps or units, but optionally also includes unlisted steps or units, or optionally further includes For other steps or units inherent in these processes, methods, products or apparatuses.

[0134] Reference herein to an "embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a secure communication method and device. The method comprises the following steps that: a first NF sends a first request message to a third NF, the first request message carrying first pseudonym information of a first user identifier of a terminal device; in response to the first request message, the third NF determines a trusted attribute of the first user identifier; and if the credible attribute of the first user identifier meets a preset condition, the third NF sends a first response message to the first NF, the first response message carrying second pseudonym information of the first user identifier. According to the method, the first user identifier exists among different NFs in a pseudonymous manner, so that the first user identifier is prevented from being tampered or intercepted by an untrusted NF, and the security of the first user identifier is improved.

Description

technical field [0001] The present application relates to the technical field of communication, and in particular to a secure communication method and device. Background technique [0002] In a wireless communication system, a terminal device can communicate with one or more core devices through an access device in a wireless access network. Exemplarily, when a terminal device communicates with an application server, a message sent from the terminal device may pass through multiple core devices such as a first network function (network function, NF), a second NF, or a third NF, etc., to reach the application server. [0003] At the same time, operators and government agencies in various countries are more concerned about the security issues of the fifth-generation communication system (5th-generation, 5G). For example, there may be a risk of malicious leakage of user privacy and data during network deployment. [0004] Therefore, how to improve the trusted security level ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08
CPCH04W12/08
Inventor 周艳何承东林青春
Owner HUAWEI TECH CO LTD