Mobile terminal identity protection through home location register modification

一种寄存器、终端的技术,应用在通过路径配置进行数据交换、用户身份/权限验证、安全装置等方向,能够解决破坏用户身份机密性等问题

Inactive Publication Date: 2005-09-21
THOMSON LICENSING SA
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The mobile wireless terminal must respond with its permanent identity (IMSI) in plain text, breaking the confidentiality of the user's identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal identity protection through home location register modification
  • Mobile terminal identity protection through home location register modification
  • Mobile terminal identity protection through home location register modification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] figure 1 A block schematic diagram of a wireless telephone network 10 is shown having the same structure as proposed by the UMTS 3GPP standard. The wireless telephone network 10 includes at least one, preferably a plurality of radio access networks, such as the radio access network 12 1 and 12 2 as indicated. In a UMTS radio access network comprising a Node B and a Radio Network Controller (RNC), a UMTS Node B is used as an access point for a mobile wireless terminal 14 seeking to connect to (attach itself to) the network 10 . Each radio network controller (RNC) 16 1 and 16 2 Separately control the radio access network 12 1 and 12 2 A separate one for the purpose of allocating the necessary resources in each network.

[0012] 16 per RNC 1 and 16 2 Respectively with a corresponding Serving GPRS Support Node (SGSN) 20 1 and 20 2 Connected, the SGSN comprises part of the core of the wireless telephone network 10. Each SGSN manages packet and voice services for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Secure access by a mobile wireless terminal of a wireless telephony network is achieved by having a Home Location Register store the terminal's temporary and permanent identities. Upon accessing the network following initial registration, the terminal sends a temporary identity to a Serving GPRS Support Node (SGSN). If no serving node in the network knows the terminal, the terminal need not sent its permanent identity in clear as was previously required. Rather, the serving node need only query the HLR since the HLR can map the terminal's temporary identity to its permanent identity. In this way, the permanent identity of the mobile wireless terminal remains secure.

Description

technical field [0001] The present invention relates to a technique for protecting the identity of a mobile wireless terminal when accessing a wireless telephone network. Background technique [0002] In recent years, users seeking wireless telephone service have typically subscribed to one of several providers of such service. Today's wireless telephone service providers offer not only voice calls, but also General Packet Radio Service (GPRS) to enable the exchange of data packets through mobile wireless terminals. When GPRS exists in multiple areas, the data transfer rate typically does not exceed 56Kbs and the cost for the wireless network service provider to support the service remains high, making GPRS expensive. In order to provide enhanced data communications, efforts are now being made to establish new standards for wireless telephony. One such effort is the proposed "Universal Mobile Telecommunications System (UMTS)" standard developed by the Third Generation Part...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M3/00H04W8/04H04W8/18H04W8/26H04W12/00H04W12/02
CPCH04L63/0414H04W8/18H04W12/02H04L63/0407H04W88/02H04W8/04H04W8/26H04W12/75H04L9/32H04M3/16H04L12/28
Inventor 谢利·维尔马查尔斯·传铭·王张军标
Owner THOMSON LICENSING SA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products