CN101552668A - Certificating method, user equipment and base station for accessing user equipment into network - Google Patents

Certificating method, user equipment and base station for accessing user equipment into network Download PDF

Info

Publication number
CN101552668A
CN101552668A CNA2008100432071A CN200810043207A CN101552668A CN 101552668 A CN101552668 A CN 101552668A CN A2008100432071 A CNA2008100432071 A CN A2008100432071A CN 200810043207 A CN200810043207 A CN 200810043207A CN 101552668 A CN101552668 A CN 101552668A
Authority
CN
China
Prior art keywords
base station
pki
certificate
identification information
described base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2008100432071A
Other languages
Chinese (zh)
Inventor
顾祥新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Spreadtrum Communications Shanghai Co Ltd
Original Assignee
Spreadtrum Communications Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Spreadtrum Communications Shanghai Co Ltd filed Critical Spreadtrum Communications Shanghai Co Ltd
Priority to CNA2008100432071A priority Critical patent/CN101552668A/en
Publication of CN101552668A publication Critical patent/CN101552668A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the field of mobile communication and discloses a certificating method, user equipment and a base station for accessing user equipment into the network. In the invention, the base station broadcasts the mark information and the certificate of the base station, the certificate is made by encrypting the mark information of the base station through a private key of CA, and the like, and UE approves the legality of the base station by the verification of the certificate. The base station also broadcasts a public key of the base station, the UE encrypts IMSI by using the public key after receiving the public key and sends the IMSI encrypted by the public key to the base station in accessing to transmit the terminal identity IMSI by cryptogram in air and protect the terminal identity.

Description

Authentication method during the subscriber equipment access network, subscriber equipment and base station
Technical field
The present invention relates to moving communicating field, particularly the access technology of subscriber equipment.
Background technology
Along with the business of mobile communication is enriched constantly, mobile communication system will be moved towards open further trend, and will be therefore just higher to the data safe requirement, be mainly reflected in several aspects such as authentication, mandate, data confidentiality, robustness.
In the means of protection information security, cryptographic technique is one of main means, confidentiality that not only can guarantee information, and integrality and certainty that can guarantee information, and the information that prevents is distorted, is forged and palmed off.A cryptographic system is made of these four fundamentals of plaintext information source, ciphertext, key and cryptographic calculation.Say that intuitively expressly information source is exactly expressly alphabet or expressly letter, ciphertext just is meant the information after the encryption; And key is to be used for selecting from a group encryption computing of cryptographic system a cryptographic calculation, and key allows you to change encryption according to the rule of former formulation, and the combination complexity of encryption method depends on the quantity of key under the method.Cryptographic system has symmetric key cipher technology and asymmetric key cipher technology, and symmetric key cipher specification requirement encrypting and decrypting both sides have identical key.Have key inequality and the asymmetric key cipher technology is the encrypting and decrypting both sides, encryption key and decruption key can not be calculated mutually.
Be in 5,864,667 the United States Patent (USP) in the patent No., also disclose and a kind of public and private key system has been applied in method in the secure communication, comprise that by distribution the key of PKI and private key is set up secure link.
Because at present in the 2G/3G mobile communications network, in starting up of terminal attach (adhering to) network and network initiation identity request (authentication request), because international mobile station identity number (the International Mobile Station Identity of marking terminal identity, be called for short " IMSI ") plaintext transmission aloft, therefore the leak that has the terminal identity exposure, thereby may cause tracked, eavesdropping, information interception or, even the situation of forging the terminal attacking network by dos attack.In addition, owing to terminal in start or fall net and initiate to look for when net owing to there is not the mechanism of authentication network, the leak that therefore exists terminal to be cheated to insert false network.
Summary of the invention
Authentication method, subscriber equipment and base station when the object of the present invention is to provide a kind of subscriber equipment access network solve terminal is inserted the potential safety hazard of false network by deception problem.
For solving the problems of the technologies described above, the authentication method when embodiments of the present invention provide a kind of subscriber equipment access network may further comprise the steps:
Subscriber equipment receives base station identification information and certificate from base station broadcast, this certificate uses its private key will comprise that the information encryption of base station identification information forms by authentication center;
PKI with the authentication center that sets in advance in the subscriber equipment is decrypted certificate, and with base station identification information the decrypted result of this certificate is verified;
Legal as checking by then assert the base station.
Embodiments of the present invention also provide a kind of subscriber equipment, comprising:
Receiving element is used for receiving base station identification information and certificate from base station broadcast, and this certificate is formed the information encryption that comprises base station identification information with its private key by authentication center;
Memory cell is used to preserve the PKI of authentication center;
Decrypting device, the PKI that is used for the authentication center that preserved with memory cell is decrypted the certificate that receiving element receives;
Authentication unit, the base station identification information that is used for receiving with receiving element are verified the decrypted result of decrypting device, and be legal by then assert the base station as checking.
Embodiments of the present invention also provide a kind of base station, comprising:
Memory cell is used to preserve certificate, and this certificate uses its private key that the information encryption that comprises base station identification information is formed by authentication center;
Transmitting element is used for the base station identification information of broadcast base station and the certificate that memory cell is preserved.
Embodiment of the present invention compared with prior art, the main distinction and effect thereof are:
Base station broadcast base station identification information and certificate, this certificate is formed information encryptions such as base station identification information with its private key by CA, UE is by the checking of certificate being assert the legitimacy of base station, because pseudo-base station can't obtain the certificate of CA, so the true and false that can discrimination natwork.
Further, the base station is the PKI of broadcast base station also, and UE receives behind this PKI with this public key encryption IMSI, and sends IMSI through this public key encryption to the base station when inserting, thereby terminal identity IMSI is aloft transmitted with ciphertext, has protected terminal identity.
Further, can be earlier the PKI of base station identification information and base station be carried out arithmetic operation, with the private key of CA operation result is encrypted again and obtained certificate.Because comprised the information of PKI two aspects of base station identification information and base station in the certificate, so UE by the checking to certificate, can examine the correctness of two information of PKI of base station identification information and base station.If the assailant has just duplicated the broadcast message of base station and has played back, then because the IMS that UE sends encrypts with the PKI of base station, so the assailant still can't obtain the IMSI of UE, can't be normally mutual with UE further.
Arithmetic operation can be the step-by-step XOR, with respect to the mode that only Generates Certificate with base station identification information, has increased the difficulty that cracks under the prerequisite that does not increase the data volume that needs broadcasting.Arithmetic operation can also be attended operation, and the PKI that is about to base station identification information and base station couples together, and such certificate that generates is longer, is difficult for being cracked, and fail safe is better.
The PKI of CA can be kept among the UE, like this after UE roams into the network that uses another CA, as long as the PKI of revising CA normal access network is just roamed more convenient.
Description of drawings
Fig. 1 is the authentication method flow chart during according to the UE access network of first embodiment of the invention;
Fig. 2 is the authentication method flow chart during according to the UE access network of second embodiment of the invention;
Fig. 3 is the authentication method flow chart during according to the UE access network of third embodiment of the invention;
Fig. 4 is the Verification System structure chart during according to the UE access network of four embodiment of the invention.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiments of the present invention are described in further detail below in conjunction with accompanying drawing.
In embodiments of the present invention, by authentication center's (Certificate Authority is called for short " CA ") is subscriber equipment (User Equipment is called for short " UE ") and a pair of PKI of base station assigns (Public Key, be called for short " PK ") private key (Secure Key is called for short " SK ").Because this is distributed by CA public, private key, therefore hereinafter it is abbreviated as (PKca, SKca).When the UE access network, by (PKca, SKca) legitimacy to the base station authenticates.
Authentication method when first execution mode of the present invention relates to a kind of UE access network, in the present embodiment, the user that PKca is preset at UE serves in the identification module (User Service Identify Module is called for short " USIM ").Certainly, PKca can not be kept among the USIM yet, but is kept in other module of UE.If the PKI of CA is kept among the UE, roam into the network that uses another CA at UE after, as long as the PKI of revising CA normal access network is just roamed more convenient.
The base station obtains certificate in advance from CA, this certificate is formed by utilizing SKca that base station identification information is encrypted by CA, this base station is by this certificate of broadcast channel broadcasts and this base station identification information, base station identification information can be the colour coding or the beacon channel of Base Station Identification, base station, or the information that other can this base station of unique identification.Because this certificate is encrypted base station identification information by SKca and is formed, and therefore, represents this certificate with SKca (base station identification information) in the present embodiment.
Identifying procedure during the UE access network as shown in Figure 1.In step 110, when UE because of start or fall net and initiate to look for when net, receive the broadcasting of base station, from this base station broadcast, obtain base station identification information and SKca (base station identification information).
Then, in step 120, UE verifies whether this base station is legal.Specifically, UE utilizes the PKca that sets in advance in the USIM of this UE behind identification information that gets access to this base station and SKca (base station identification information), SKca (base station identification information) is decrypted, and obtains base station identification information.Then, relatively after the deciphering base station identification information that obtains whether consistent with the base station identification information that from base station broadcast, obtains.Because pseudo-base station can't obtain the certificate of CA, promptly can't obtain correct SKca (base station identification information), thus UE can be in this way can discrimination natwork the true and false.If the comparative result unanimity illustrates that then this base station is legal, enter step 130; If inconsistent, illustrate that then this base station is illegal, be pseudo-base station, process ends.
In step 130, this UE initiates to adhere to request to the base station, adheres at this and carries the UE sign in request, as the IMSI of this UE.
Be not difficult to find that because in the present embodiment, therefore UE can solve because of being cheated the problem of the potential safety hazard that inserts false network by the checking of certificate being assert the legitimacy of base station.
Authentication method when second execution mode of the present invention relates to a kind of UE access network, present embodiment is on the basis of first execution mode, done further improvement, not only solve UE because of being cheated the problem of the potential safety hazard that inserts false network, also solved the problem of the potential safety hazard of UE identity exposure.In the present embodiment, preserve a pair of public, private key in the base station, promptly (PKnb, SKnb), certificate, the base station identification information obtained are not only broadcasted in the base station from CA when broadcasting, go back the PKI of broadcast base station, i.e. PKnb.UE is after the legitimacy of having verified the base station, and the PKnb that utilization is received from base station broadcast encrypts the IMSI of this UE, the IMSI after encrypting is carried at adheres in the request, sends to the base station.
Identifying procedure during the UE access network as shown in Figure 2.In step 210, when UE because of start or fall net and initiate to look for when net, receive the broadcasting of base station, from this base station broadcast, obtain base station identification information, SKca (base station identification information) and PKnb.
Then, in step 220, UE verifies whether this base station is legal.This step is similar with step 120, does not repeat them here.
Then, in step 230, this UE initiates to adhere to request to the base station, adheres to IMSI after carrying encryption in the request at this.That is to say that this UE need be when request be adhered in this base station transmission after definite base station is legitimate base station, the PKnb that utilization receives from base station broadcast encrypts the IMSI of this UE, and the IMSI after will encrypting, i.e. PKnb (IMSI) is carried to adhere to and sends to the base station in the request.
In step 240, the base station utilizes the SKnb that self preserves, and the PKnb (IMSI) that adheres in the request that receives is decrypted, and obtains the IMSI of UE.
Because the IMSI of sign UE identity is not to be to transmit in mode expressly, but transmits with ciphertext, has therefore protected the identity of UE, solved the problem of the potential safety hazard of UE identity exposure aloft.
Authentication method when the 3rd execution mode of the present invention relates to a kind of UE access network, the present embodiment and second execution mode are roughly the same, its difference is, in second execution mode, the certificate that the base station obtains from CA is encrypted base station identification information by SKca and is formed, and in the present embodiment, the certificate that the base station obtains from CA is by SKca the operation result of base station identification information and PKnb to be encrypted to form, therefore, represent this certificate with SKca (PKnb ‖ base station identification information) in the present embodiment.Wherein, " ‖ " represents concatenation operation, just PKnb and base station identification information directly linked together.Concatenation operation makes the certificate that is generated longer, is difficult for being cracked, and fail safe is better.
Except concatenation operation, can also carry out step-by-step xor operation, computings such as step-by-step and operation to PKnb and base station identification information.If use the step-by-step xor operation,, under the prerequisite that does not increase the data volume that needs broadcasting, increased the difficulty that cracks then with respect to the mode that only Generates Certificate with base station identification information.
Identifying procedure during the UE access network as shown in Figure 3.In step 310, when UE because of start or fall net and initiate to look for when net, receive the broadcasting of base station, from this base station broadcast, obtain base station identification information, SKca (PKnb ‖ base station identification information) and PKnb.
Then, in step 320, UE verifies whether this base station is legal.Specifically, UE is after getting access to the identification information of this base station, SKca (PKnb ‖ base station identification information) and PKnb, utilization sets in advance the PKca in the USIM of this UE, and SKca (PKnb ‖ base station identification information) is decrypted, and obtains PKnb ‖ base station identification information.Then, relatively whether the PKnb ‖ base station identification information that obtains after the deciphering is consistent with the PKnb ‖ base station identification information that obtains according to base station broadcast.If the comparative result unanimity illustrates that then this base station is legal, enter step 330; If inconsistent, illustrate that then this base station is illegal, be pseudo-base station, process ends.
Because pseudo-base station can't obtain the certificate of CA, promptly can't obtain correct SKca (PKnb ‖ base station identification information), thus UE can be in this way can discrimination natwork the true and false, thereby avoid the situation that inserted false network because of cheating.
Then, in step 330, this UE initiates to adhere to request to the base station, adheres to IMSI after carrying encryption in the request at this.This step is similar with step 230, does not repeat them here.
In step 340, the base station utilizes the SKnb that self preserves, and the PKnb (IMSI) that adheres in the request that receives is decrypted, and obtains the IMSI of UE.
Because comprised the information of PKI two aspects of base station identification information and base station in the certificate, so UE by the checking to certificate, can examine the correctness of two information of PKI of base station identification information and base station.If the assailant has just duplicated the broadcast message of base station and has played back, then because the IMS that UE sends encrypts with the PKI of base station, so the assailant still can't obtain the IMSI of UE, can't be normally mutual with UE further.
Need to prove that method execution mode of the present invention can be realized in software, hardware, firmware or the like mode.No matter the present invention be with software, hardware, or the firmware mode realize, instruction code can be stored in the memory of computer-accessible of any kind (for example permanent or revisable, volatibility or non-volatile, solid-state or non-solid-state, medium fixing or that change or the like).Equally, memory can for example be programmable logic array (Programmable Array Logic, be called for short " PAL "), random access memory (Random Access Memory, be called for short " RAM "), programmable read only memory (Programmable Read Only Memory, be called for short " PROM "), read-only memory (Read-Only Memory, be called for short " ROM "), Electrically Erasable Read Only Memory (Electrically Erasable Programmable ROM, be called for short " EEPROM "), disk, CD, digital versatile disc (Digital Versatile Disc is called for short " DVD ") or the like.
Verification System when the 4th execution mode of the present invention relates to a kind of UE access network as shown in Figure 4, comprises UE and base station.
Wherein, the base station comprises: memory cell, be used to preserve certificate, and this certificate is formed the information encryption that comprises base station identification information with its private key (SKca) by CA; Transmitting element is used for the base station identification information of broadcast base station and the certificate that memory cell is preserved.
UE comprises: receiving element, be used for receiving base station identification information and certificate from base station broadcast, and this certificate is formed the information encryption that comprises base station identification information by SKca; Memory cell is used to preserve the PKI (PKca) that CA distributes; Decrypting device, the PKca that is used for being preserved with memory cell is decrypted the certificate that receiving element receives; Authentication unit, the base station identification information that is used for receiving with receiving element are verified the decrypted result of decrypting device, and be legal by then assert this base station as checking.Because pseudo-base station can't obtain the certificate of CA, so UE can be by assert the legitimacy of base station to the checking of certificate, thereby solve because of being cheated the problem of the potential safety hazard that inserts false network.
What deserves to be mentioned is, memory cell in the base station also can be used for preserving the PKI and the private key of base station, and promptly (PKnb, SKnb), transmitting element in the base station also is used to broadcast the PKnb that memory cell is preserved, and the receiving element of UE also is used for receiving this PKnb from the broadcasting of base station.
At this moment, UE also comprises: ciphering unit, and the PKnb that is used for receiving with receiving element encrypts the sign (as the IMSI of UE) of UE; Transmitting element is used for the UE sign after the ciphering unit encryption is sent to the base station.
This base station also comprises: receiving element, and the UE that encrypts through PKnb that is used to receive from UE identifies (as the IMSI of UE); Decrypting device, the encrypted UE sign that the SKnb that is used for being preserved with memory cell receives receiving element is decrypted.Because the IMSI of sign UE identity is not to be to transmit in mode expressly, but transmits with ciphertext, has therefore protected the identity of UE, solved the problem of the potential safety hazard of UE identity exposure aloft.
If the transmitting element of base station also is used to broadcast the PKnb that memory cell is preserved, then this transmitting element certificate of broadcasting can be encrypted the operation result of base station identification information and PKnb by SKca and form; The authentication unit of UE is verified in the following manner: the base station identification information that receiving element is received and the PKI of base station carry out arithmetic operation; The decrypted result of decrypting device is compared with the operation result of arithmetic operation, verify if both are identical and pass through, assert that the base station is legal.Above-mentioned computing can be step-by-step xor operation or attended operation etc.If the computing of adopting is the step-by-step xor operation,, under the prerequisite that does not increase the data volume that needs broadcasting, increased the difficulty that cracks then with respect to the mode that only Generates Certificate with base station identification information.If the computing of adopting be expression be attended operation, the PKI that is about to base station identification information and base station couples together, then the certificate that is generated is longer, is difficult for being cracked, fail safe is better.
Need to prove, each unit of mentioning in the present embodiment all is a logical block, physically, a logical block can be a physical location, it also can be the part of a physical location, can also realize that the physics realization mode of these logical blocks itself is not most important with the combination of a plurality of physical locations, the combination of the function that these logical blocks realized is the key that just solves technical problem proposed by the invention.And for outstanding innovation part of the present invention, present embodiment will not introduced not too close unit with solving technical problem relation proposed by the invention, and this does not show that there is not other unit in the said equipment execution mode.For example, can also there be baseband processing unit, antenna or the like in the base station; UE can also have display screen, microphone, earphone, keyboard or the like.
In addition, the related equipment (as UE and base station) of present embodiment can be used for finishing the method flow that the 1-3 execution mode is mentioned.Therefore all ins and outs of mentioning in the 1-3 execution mode are still effective in the present embodiment, in order to reduce repetition, repeat no more here.
Though pass through with reference to some of the preferred embodiment of the invention, the present invention is illustrated and describes, but those of ordinary skill in the art should be understood that and can do various changes to it in the form and details, and without departing from the spirit and scope of the present invention.

Claims (10)

1. the authentication method during a subscriber equipment access network is characterized in that, may further comprise the steps:
Subscriber equipment receives base station identification information and certificate from base station broadcast, this certificate uses its private key will comprise that the information encryption of described base station identification information forms by authentication center;
PKI with the described authentication center that sets in advance in the described subscriber equipment is decrypted described certificate, and with described base station identification information the decrypted result of this certificate is verified;
It is legal to verify as described by then assert described base station.
2. the authentication method during subscriber equipment access network according to claim 1 is characterized in that, and is further comprising the steps of:
The PKI of this base station is also broadcasted in described base station;
Described subscriber equipment receives the PKI of this base station from the broadcasting of described base station, and with the PKI of this base station the sign of this subscriber equipment is encrypted, and the customer equipment identification after encrypting is sent to described base station;
Described base station is decrypted with the private key of this base station customer equipment identification after to described encryption, obtains described customer equipment identification.
3. the authentication method during subscriber equipment access network according to claim 2 is characterized in that, described certificate uses its private key that the operation result of the PKI of described base station identification information and described base station is encrypted by authentication center and forms.
4. the authentication method during subscriber equipment access network according to claim 3 is characterized in that, the computing of the PKI of described base station identification information and described base station is comprised one of following:
Step-by-step xor operation, attended operation.
5. according to the authentication method during each described subscriber equipment access network in the claim 1 to 4, it is characterized in that the user that the PKI of described authentication center sets in advance at described subscriber equipment serves in identification module or the subscriber equipment;
Described customer equipment identification can be international mobile station identity number.
6. a subscriber equipment is characterized in that, comprising:
Receiving element is used for receiving base station identification information and certificate from base station broadcast, and this certificate is formed the information encryption that comprises described base station identification information with its private key by authentication center;
Memory cell is used to preserve the PKI of described authentication center;
Decrypting device, the PKI that is used for the described authentication center that preserved with described memory cell is decrypted the certificate that described receiving element receives;
Authentication unit is used for the described base station identification information that described receiving element receives the decrypted result of described decrypting device being verified, and is legal by base station as described in then assert as checking.
7. subscriber equipment according to claim 6 is characterized in that, described receiving element also is used for receiving from the broadcasting of described base station the PKI of this base station;
Described subscriber equipment also comprises:
Ciphering unit, the PKI that is used for the described base station of receiving with described receiving element is encrypted the sign of described subscriber equipment;
Transmitting element is used for the customer equipment identification after the described ciphering unit encryption is sent to described base station.
8. subscriber equipment according to claim 7 is characterized in that, described certificate uses its private key that the operation result of the PKI of described base station identification information and described base station is encrypted by authentication center and forms;
Described authentication unit is verified in the following manner:
The described base station identification information that described receiving element is received and the PKI of described base station carry out arithmetic operation;
The decrypted result of described decrypting device is compared with the operation result of described arithmetic operation, verify if both are identical and pass through, assert that described base station is legal;
It is one of following that described arithmetic operation comprises:
Step-by-step xor operation, attended operation.
9. a base station is characterized in that, comprising:
Memory cell is used to preserve certificate, and this certificate uses its private key that the information encryption that comprises described base station identification information is formed by authentication center;
Transmitting element is used for broadcasting the base station identification information of described base station and the certificate that described memory cell is preserved.
10. base station according to claim 9 is characterized in that, described memory cell also is used to preserve the PKI and the private key of described base station;
Described certificate uses its private key that the operation result of the PKI of described base station identification information and described base station is encrypted by authentication center and forms;
Described transmitting element also is used to broadcast the PKI of the described base station that described memory cell preserves;
Described base station also comprises:
Receiving element is used to receive the customer equipment identification through the public key encryption of described base station from subscriber equipment;
Decrypting device is used for the encrypted customer equipment identification that the private key of the described base station of being preserved with described memory cell receives described receiving element and is decrypted.
CNA2008100432071A 2008-03-31 2008-03-31 Certificating method, user equipment and base station for accessing user equipment into network Pending CN101552668A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2008100432071A CN101552668A (en) 2008-03-31 2008-03-31 Certificating method, user equipment and base station for accessing user equipment into network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2008100432071A CN101552668A (en) 2008-03-31 2008-03-31 Certificating method, user equipment and base station for accessing user equipment into network

Publications (1)

Publication Number Publication Date
CN101552668A true CN101552668A (en) 2009-10-07

Family

ID=41156677

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2008100432071A Pending CN101552668A (en) 2008-03-31 2008-03-31 Certificating method, user equipment and base station for accessing user equipment into network

Country Status (1)

Country Link
CN (1) CN101552668A (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101917710A (en) * 2010-08-27 2010-12-15 中兴通讯股份有限公司 Method, system and related device for mobile internet encryption communication
CN101969638A (en) * 2010-09-30 2011-02-09 中国科学院软件研究所 Method for protecting international mobile subscriber identity (IMSI) in mobile communication
CN102036238A (en) * 2010-12-27 2011-04-27 中国科学院软件研究所 Method for realizing user and network authentication and key distribution based on public key
CN102045897A (en) * 2009-10-10 2011-05-04 中兴通讯股份有限公司 Group identification reporting method and device
WO2011054147A1 (en) * 2009-11-05 2011-05-12 华为技术有限公司 Method, device and communication system for service processing
CN102158856A (en) * 2011-02-21 2011-08-17 惠州Tcl移动通信有限公司 Mobile terminal identification code authentication system and method, server and terminal
CN102111922B (en) * 2009-12-25 2014-01-01 中兴通讯股份有限公司 Management method and system for M2M service signing data, and user signing data memory
CN104053156A (en) * 2014-04-28 2014-09-17 中国石油大学(华东) Automatic pseudo base station recognizing method and system
CN104168531A (en) * 2013-05-15 2014-11-26 Gn瑞声达A/S Hearing instrument with an authentication protocol
CN104270800A (en) * 2014-08-14 2015-01-07 平安科技(深圳)有限公司 Method and system for establishing communication connection with terminal
CN104349315A (en) * 2013-07-31 2015-02-11 普天信息技术研究院有限公司 Method and system for assuring information security for base station and user equipment
CN104581710A (en) * 2014-12-18 2015-04-29 中国科学院信息工程研究所 Method and system for securely transmitting IMSI of LTE user on idle port
CN106028340A (en) * 2016-07-29 2016-10-12 宇龙计算机通信科技(深圳)有限公司 Method and system for identifying pseudo base stations
CN106454842A (en) * 2016-10-28 2017-02-22 努比亚技术有限公司 Method for preventing disturbance of pseudo base stations and terminal
CN106576237A (en) * 2014-07-21 2017-04-19 宇龙计算机通信科技(深圳)有限公司 Mobility management entity, home server, terminal, and identity authentication system and method
CN107872793A (en) * 2016-09-26 2018-04-03 中国移动通信有限公司研究院 A kind of base station identification approach, terminal and server
WO2019024031A1 (en) * 2017-08-03 2019-02-07 于志 System and method for authenticating mobile phone number based on cn39 code
WO2019028698A1 (en) * 2017-08-09 2019-02-14 Apple Inc. Subscriber identity privacy protection
CN109451489A (en) * 2018-12-12 2019-03-08 南京熊猫电子股份有限公司 A method of the acquisition terminal IMSI based on blind redirection
CN110248359A (en) * 2018-03-07 2019-09-17 中国移动通信有限公司研究院 A kind of encipherment scheme, terminal, network element device and computer storage medium
CN110611911A (en) * 2019-10-18 2019-12-24 中国联合网络通信集团有限公司 Mobile communication method and device
WO2021103772A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Data transmission method and apparatus

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102045897B (en) * 2009-10-10 2014-08-13 中兴通讯股份有限公司 Group identification reporting method and device
CN102045897A (en) * 2009-10-10 2011-05-04 中兴通讯股份有限公司 Group identification reporting method and device
WO2011054147A1 (en) * 2009-11-05 2011-05-12 华为技术有限公司 Method, device and communication system for service processing
CN102111922B (en) * 2009-12-25 2014-01-01 中兴通讯股份有限公司 Management method and system for M2M service signing data, and user signing data memory
CN101917710A (en) * 2010-08-27 2010-12-15 中兴通讯股份有限公司 Method, system and related device for mobile internet encryption communication
WO2012024872A1 (en) * 2010-08-27 2012-03-01 中兴通讯股份有限公司 Method, system and related apparatus for encrypting communication in mobile internet
CN101969638A (en) * 2010-09-30 2011-02-09 中国科学院软件研究所 Method for protecting international mobile subscriber identity (IMSI) in mobile communication
CN101969638B (en) * 2010-09-30 2013-08-14 中国科学院软件研究所 Method for protecting international mobile subscriber identity (IMSI) in mobile communication
CN102036238A (en) * 2010-12-27 2011-04-27 中国科学院软件研究所 Method for realizing user and network authentication and key distribution based on public key
CN102036238B (en) * 2010-12-27 2013-12-11 中国科学院软件研究所 Method for realizing user and network authentication and key distribution based on public key
CN102158856A (en) * 2011-02-21 2011-08-17 惠州Tcl移动通信有限公司 Mobile terminal identification code authentication system and method, server and terminal
CN104168531A (en) * 2013-05-15 2014-11-26 Gn瑞声达A/S Hearing instrument with an authentication protocol
US10652673B2 (en) 2013-05-15 2020-05-12 Gn Hearing A/S Hearing instrument with an authentication protocol
CN104349315A (en) * 2013-07-31 2015-02-11 普天信息技术研究院有限公司 Method and system for assuring information security for base station and user equipment
CN104349315B (en) * 2013-07-31 2018-01-05 普天信息技术有限公司 It is a kind of to ensure base station and the method and system of user equipment information safety
CN104053156A (en) * 2014-04-28 2014-09-17 中国石油大学(华东) Automatic pseudo base station recognizing method and system
CN106576237B (en) * 2014-07-21 2020-10-16 宇龙计算机通信科技(深圳)有限公司 Mobile management entity, home server, terminal, identity authentication system and method
CN106576237A (en) * 2014-07-21 2017-04-19 宇龙计算机通信科技(深圳)有限公司 Mobility management entity, home server, terminal, and identity authentication system and method
CN104270800A (en) * 2014-08-14 2015-01-07 平安科技(深圳)有限公司 Method and system for establishing communication connection with terminal
CN104270800B (en) * 2014-08-14 2017-11-17 平安科技(深圳)有限公司 The method and system of communication connection are established with terminal
CN104581710A (en) * 2014-12-18 2015-04-29 中国科学院信息工程研究所 Method and system for securely transmitting IMSI of LTE user on idle port
CN104581710B (en) * 2014-12-18 2018-11-23 中国科学院信息工程研究所 It is a kind of in the method and system of upper safe transmission LTE user IMSI of eating dishes without rice or wine
CN106028340A (en) * 2016-07-29 2016-10-12 宇龙计算机通信科技(深圳)有限公司 Method and system for identifying pseudo base stations
CN107872793A (en) * 2016-09-26 2018-04-03 中国移动通信有限公司研究院 A kind of base station identification approach, terminal and server
CN106454842A (en) * 2016-10-28 2017-02-22 努比亚技术有限公司 Method for preventing disturbance of pseudo base stations and terminal
WO2019024031A1 (en) * 2017-08-03 2019-02-07 于志 System and method for authenticating mobile phone number based on cn39 code
WO2019028698A1 (en) * 2017-08-09 2019-02-14 Apple Inc. Subscriber identity privacy protection
CN110248359A (en) * 2018-03-07 2019-09-17 中国移动通信有限公司研究院 A kind of encipherment scheme, terminal, network element device and computer storage medium
CN109451489A (en) * 2018-12-12 2019-03-08 南京熊猫电子股份有限公司 A method of the acquisition terminal IMSI based on blind redirection
CN110611911A (en) * 2019-10-18 2019-12-24 中国联合网络通信集团有限公司 Mobile communication method and device
CN110611911B (en) * 2019-10-18 2022-08-26 中国联合网络通信集团有限公司 Mobile communication method and device
WO2021103772A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Data transmission method and apparatus

Similar Documents

Publication Publication Date Title
CN101552668A (en) Certificating method, user equipment and base station for accessing user equipment into network
Van Den Broek et al. Defeating IMSI catchers
CN101741555B (en) Method and system for identity authentication and key agreement
CN101822082B (en) Techniques for secure channelization between UICC and terminal
CN104584602B (en) Encrypting a service announcement message in a discovery packet
JP4263384B2 (en) Improved method for authentication of user subscription identification module
CN101969638B (en) Method for protecting international mobile subscriber identity (IMSI) in mobile communication
CN100589381C (en) User identity secret-keeping method in communication system
KR101270342B1 (en) Exchange of key material
CN102026178B (en) User identity protection method based on public-key mechanism
JP4002035B2 (en) A method for transmitting sensitive information using unsecured communications
CN105553951A (en) Data transmission method and data transmission device
CN103152731A (en) 3G accessed IMSI (international mobile subscriber identity) privacy protection method
CN114826673A (en) Protection system, method and device for transmission data
CN101808313B (en) Method for acquiring TMSI (Temporary Mobile Subscriber Identity), mobile station, home location register and communication system
US20120142315A1 (en) Method for authentication and key establishment in a mobile communication system and method of operating a mobile station and a visitor location register
WO2018076564A1 (en) Privacy protection method and privacy protection device in vehicle communication
CN106888092A (en) Information processing method and device
AU4476099A (en) Method for protecting mobile anonymity
Muthana et al. Analysis of user identity privacy in LTE and proposed solution
CN101784048B (en) Method and system for dynamically updating identity authentication and secret key agreement of secret key
KR100957044B1 (en) Method and system for providing mutual authentication using kerberos
KR100658300B1 (en) Authentication and key establishment method for wireless communication system
WO2017094833A1 (en) Mobile communication system, mobile station and communication network
Hori et al. Security Analysis of MIS Protocol on Wireless LAN comparison with IEEE802. 11i

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20091007