User identity secret-keeping method in communication system

A communication system and user identity technology, which is applied in the field of keeping user identity confidential, can solve problems such as security identity information leakage, security damage, etc., and achieve the effect of meeting security requirements and good confidentiality

Active Publication Date: 2006-06-21
ZTE CORP
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious people can take the opportunity to eavesdrop on the user's identity information, causing security damage
If the malicious attacker has enough resources, he can also take a more direct attack method, build a fake network, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity secret-keeping method in communication system
  • User identity secret-keeping method in communication system
  • User identity secret-keeping method in communication system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0042] The specific embodiments of the present invention will be described in detail below to enable a full understanding of the technical effects and solutions of the present invention.

[0043] The main idea of ​​the present invention is to adopt asymmetric cryptography in cryptography in the process of identification of the communication system. In cryptography, asymmetric cryptography is relative to symmetric cryptography. The encryption and decryption of symmetric cryptography uses the same key, while the encryption and decryption process of asymmetric cryptography uses different keys. Common asymmetric cryptography Cryptographic algorithms such as RSA, etc. A pair of corresponding keys—public key and private key—is used in asymmetric cryptography. The public key is usually public and does not need to be kept secret; the private key needs to be kept carefully by the user, and only the user knows it. In normal applications, the public key is used to keep data confidential to p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed secret method for ID in communication system with at least a user terminal and an identification server comprises: the user terminal accesses into network; the provide network identification server asks user to provide ID information; the user terminal enciphers self ID information with public key from server to send to server; the server deciphers the ID information with self private key to identify ID and provide service and charge. This invention uses asymmetric cryptography technology to satisfy security request.

Description

technical field [0001] The invention relates to the security field of communication systems, in particular to a method for realizing confidentiality of user identities in the communication system. Background technique [0002] With the development of computer technology, communication technology has also achieved rapid development. Various communication methods have greatly facilitated human production and life, and have profoundly affected the way of human existence. Common communication network systems include fixed network communication systems, mobile communication systems (cellular systems), wireless local area networks (IEEE802.11), etc.; possible future communication systems include wireless metropolitan area networks (IEEE802.16), etc. [0003] At present, various communication systems are usually constructed, operated and managed by specialized operators. Operators invest a certain amount of funds to build and maintain communication networks, and charge fees by pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 赵志飞彭志威李卓明孙鲁东
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products