CN102026178A - User identity protection method based on public-key mechanism - Google Patents
User identity protection method based on public-key mechanism Download PDFInfo
- Publication number
- CN102026178A CN102026178A CN2010106159530A CN201010615953A CN102026178A CN 102026178 A CN102026178 A CN 102026178A CN 2010106159530 A CN2010106159530 A CN 2010106159530A CN 201010615953 A CN201010615953 A CN 201010615953A CN 102026178 A CN102026178 A CN 102026178A
- Authority
- CN
- China
- Prior art keywords
- ver
- pki
- hss
- imsi
- user identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to the secret communication field of mobile communication technologies, and discloses a user identity protection method based on a public-key mechanism. The method comprises the following steps: an HSS (hierarchical service system) produces a pair of keys, namely, a public key PK and a secret key SK, then the public key PK is preset to a USIM (universal subscriber identity module) card of UE (user equipment) belonging to the public key PK in the form of a public key file PKF, and the secret key SK is stored in the HSS; a mobile phone sends the following information to an MME (mobility management entity), including HSS identification: HSS_ID, public-key PK version number: VER_PK; and data (IMSI || R|| VER_PK) encrypted by using an asymmetric encryption algorithm; after receiving the information, the MME sends the VER_PK and the (IMSI || R|| VER_PK) to the HSS according to the HSS_ID; and the HSS decrypts the VER_PK and the (IMSI || R|| VER_PK) by using the secret key SK. Because attackers do not know the secret key SK of the HSS, the attackers can not decrypt the (IMSI || R|| VER_PK).
Description
Technical field
The present invention relates to the secure communication field of mobile communication technology, relate in particular to a kind of user identity protection method based on PKI mechanism.
Background technology
PKI mechanism protection IMSI(international mobile subscriber identity: International Mobile Subscriber Identity, difference mobile subscriber's sign) information is avoided mobile subscriber person under attack illegal tracking and location.Long Term Evolution), (the 4th third-generation mobile communication technology: 4rd-generation), prior art generally adopts casual user's identity GUTI mechanism to 4G in mobile communication system 3G(3G (Third Generation) Moblie technology: 3rd-generation), LTE(Long Term Evolution:
(The unique temporary identity in the whole world: Globally Unique Temporary Identity) user identity is protected.When passing through the AKA(Authentication and Key Agreement: MME(mobile management entity after authentication Authentication and key agreement): Mobility Management Entity) to the UE(subscriber equipment: User Equipment, comprise ME and USIM) distribute the interim identify label GUTI that distributes, and the corresponding relation between storage GUTI and the IMSI.The user uses GUTI and network foundation to get in touch afterwards, as asking access network, routing update, adhering to request, beep-page message etc.This mechanism has reduced the transmission of IMSI on wireless channel, has increased the difficulty that the assailant intercepts and captures, and certain effect has been played in protection to IMSI.Can't obtain GUTI but work as user or network, in the time of perhaps can't obtaining the corresponding relation of IMSI and GUTI, the user must use IMSI to identify own identity, and IMSI will be exposed in the air interface with the plaintext form this moment.
If the assailant obtains certain specific user's permanent identification IMSI by passive or active attack, and when getting access to the corresponding relation of user real identification and permanent identification, privacy of user will be leaked.Therefore GUTI mechanism is incomplete for protection IMSI, can not satisfy the demand of some high-end user.
Summary of the invention
Permanent identification IMSI at the user who exists in the prior art leaks the technical problem that causes privacy of user to be leaked, and therefore is necessary to provide a kind of user identity protection method based on PKI mechanism.
The invention provides a kind of user identity protection method based on PKI mechanism, the method includes the steps of:
(1) produce a pair of public private key pair PK and SK by HSS, PKI PK is preset in the usim card of its UE of ownership with the form of PKI file PKF, and private key SK is stored among the HSS;
(2) mobile phone of MME usim card in preserving step (1) sends the user identity request;
When (3) mobile phone networks with following message:
HSS sign: HSS_ID;
PKI PK version number: VER_PK;
Adopt rivest, shamir, adelman ciphered data (IMSI||R||VER_PK);
Send to MME;
Wherein R is a random number, mixes with IMSI before encrypting;
(4) after MME receives message in the step (3), VER_PK, (IMSI||R||VER_PK) are sent to corresponding HSS according to HSS_ID;
(5) HSS receives that VER_PK, (IMSI||R||VER_PK) back utilization private key SK that MME sends are decrypted judgement.
Preferably, the utilization private key SK in the described step (5) is decrypted and judges and may further comprise the steps:
At first differentiate PK version number, call corresponding private key SK (IMSI||R||VER_PK) is decrypted, decrypt IMSI and VER_PK*;
Deciphering VER_PK* that comes out and the plaintext VER_PK that receives are compared, if equate then represent that VER_PK is not distorted; If do not wait then represent that VER_PK is distorted, stop the IMSI guard method.
Preferably, described step (5) comprises that also HSS compares USIM VER_PK that reports and the VER_PK that oneself uses, if the VER_PK version number that USIM reports is current latest edition, then need not to upgrade the PKI file; If the VER_PK version number that USIM reports is an early version, then upgrade the PKI file.
Preferably, described method is further comprising the steps of:
HSS issues the IMSI data of mobile phone and the Ciphering Key that produces according to IMSI to MME, upgrades the PKI file if desired, then attaches issuing new PKI file PKFn; If do not need to upgrade the PKI file, then do not issue this parameter.
Preferably, described method is further comprising the steps of:
Enter authorizing procedure between mobile phone and the MME, and the authentication success.
Preferably, described method is further comprising the steps of:
MME distributes GUTI to MS, upgrades the PKI file if desired, then attaches issuing new PKI file PKFn; If do not need to upgrade the PKI file, then do not issue this parameter.
Preferably, described method is further comprising the steps of:
If mobile phone is received PKFn, USIM if checking gets nowhere then abandons this parameter, continues to use old PKI file PKFo with the signature of the new PKI file PKFn of old PKI file PKo checking; If be proved to be successful then replace old PKFo, adopt new PKn to encrypt IMSI when network next time.
Preferably, described method is further comprising the steps of:
Mobile phone reports the allocation result of GUTI and PKFn to MME.
Preferably, the asymmetric arithmetic in the described step (3) is a RSA Algorithm.
Preferably, the asymmetric arithmetic in the described step (3) is the ECC algorithm.
Beneficial effect of the present invention is: at first because the assailant does not know the private key of HSS, can not be decrypted (IMSI||R||VER_PK).Simultaneously in (IMSI||R||VER_PK), add random number R, made the assailant can not obtain the correlation of each reported data.Secondly: HSS will decipher the VER_PK data and compare with plaintext VER_PK data, guarantee the integrality of data, and prevent assailant's distorting data.When key was changed, HSS signed to PK and has guaranteed validity and the legitimacy that key is changed, and prevents to palm off the deception of network to mobile phone.The public private key pair of HSS is convenient to safeguard, management and changing, and SK is kept among the HSS forever, and the assailant can not derive SK by PK.Adopt key replacing mechanism that security intensity is further improved, increased assailant's decoding difficulty.Do not have private key at the usim card end, PKI can onlinely be changed.
Description of drawings
Fig. 1 is PKI file PKF structure among the present invention;
Fig. 2 is the IMSI guard method based on PKI mechanism.
Embodiment
Specify the specific embodiment of the present invention below in conjunction with Figure of description.
The invention provides a kind of user identity protection method based on PKI mechanism, wherein encryption and decryption and signature checking method adopt RSA Algorithm, ECC algorithm or other rivest, shamir, adelmans, and for ease of describing, the implementation procedure in the present embodiment adopts the ECC algorithm for example.Said method is the IMSI guard method based on PKI mechanism, as shown in Figure 2, wherein: at ECC(PK, (IMSI||R||VER_PK)) in ECC represent that asymmetric arithmetic, PK represent PKI, the encrypted data of (IMSI||R||VER_PK) expression; Just issue PKFn when (PKFn) the PKI file need is upgraded in expression, when not required this parameter not just; When HSS transmitted IMSI to MME, its fail safe was guaranteed by core net.It specifically comprises following steps:
(1) by the HSS(home subscriber server: Home Subscriber Server) produce a pair of public private key pair PK and SK, PKI PK is preset to the USIM(universal subscriber identity module of its UE of ownership with the form of PKI file PKF: Universal Subscriber Identity Module) in the card, private key SK is stored among the HSS.
(2) as UE first during access service network, the mobile phone transmission user identity request of MME usim card in preserving step (1); (referring to 3GPP TS33.401, the 6.1.3 joint)
When (3) mobile phone networks with following message:
HSS sign: HSS_ID;
PKI PK version number: VER_PK;
Adopt rivest, shamir, adelman, as the data of ECC algorithm for encryption: ECC(PK, (IMSI||R||VER_PK));
Send to MME;
Wherein R is a random number, mixes with IMSI before encrypting, and guarantees each encrypted result difference; It is for VER_PK is carried out integrity protection that VER_PK is encrypted.
(4) after MME receives message in the step (3), according to HSS_ID with VER_PK, ECC(PK, (IMSI||R||VER_PK)) send to corresponding HSS;
(5) HSS receives VER_PK, the ECC(PK that MME sends, (IMSI||R||VER_PK)) after carry out following operation:
At first differentiate the VER_PK of PK version number, call corresponding private key SK to ECC(PK, (IMSI||R||VER_PK) according to VER_PK) be decrypted, decrypt IMSI and VER_PK*; When HSS carried out the PK/SK replacing, presumable UE did not start shooting, and can not enter authorizing procedure, can not the PK that preserve in the USIM be changed.When UE started shooting, USIM can only encrypt (IMSI||R||VER_PK) data with the PK of former version.Even therefore PK/SK has upgraded, HSS also need preserve former PK/SK and corresponding version number, normally inserts in order to the user who does not upgrade PK.
Deciphering VER_PK* that comes out and the plaintext VER_PK that receives are compared,, can carry out subsequent operation if equate then represent that VER_PK is not distorted; If do not wait then represent that VER_PK is distorted, stop the IMSI guard method;
HSS compares USIM VER_PK that reports and the VER_PK that oneself uses, if the VER_PK version number that USIM reports is current latest edition, then need not to upgrade the PKI file,, then need to upgrade the PKI file if the VER_PK version number that USIM reports is an early version.
(6) HSS issues the IMSI data of mobile phone and the Ciphering Key that produces according to IMSI to MME, upgrades the PKI file if desired, then attaches issuing new PKI file PKFn, if do not need to upgrade the PKI file, does not then issue this parameter.PKI file PKF structure as shown in Figure 1.
(7) enter authorizing procedure between UE and the MME, and the authentication success.(referring to 3GPP TS33.401, the 6.1.1 joint)
(8) MME is to the ME(mobile device: Mobile Equipment) distribute GUTI, upgrade the PKI file if desired, then subsidiaryly issuing new PKI file PKFn, if do not need to upgrade the PKI file, then do not issue this parameter.
(9) if mobile phone is received PKFn, USIM if checking gets nowhere then abandons this parameter, continues to use old PKI file PKFo with the signature of the new PKI file PKFn of old PKI file PKo checking.If be proved to be successful then replace old PKFo, adopt new PKn to encrypt IMSI when network next time.
(10) mobile phone reports the allocation result of GUTI and PKFn in the step (9) to MME.
User identity protection method based on PKI mechanism of the present invention has the following advantages: at first because the assailant does not know the private key of HSS, can not be to ECC(PK, (IMSI||R||VER_PK)) be decrypted.Simultaneously at ECC(PK, (IMSI||R||VER_PK)) in added random number R, make the assailant can not obtain the correlation of each reported data.Secondly: HSS will decipher the VER_PK data and compare with plaintext VER_PK data, guarantee the integrality of data, and prevent assailant's distorting data.When key was changed, HSS signed to PK and has guaranteed validity and the legitimacy that key is changed, and prevents to palm off the deception of network to mobile phone.The public private key pair of HSS is convenient to safeguard, management and changing, and SK is kept among the HSS forever, and the assailant can not derive SK by PK.Adopt key replacing mechanism that security intensity is further improved, increased assailant's decoding difficulty.Do not have private key at the usim card end, PKI can onlinely be changed.
Above-described specific embodiment; purpose of the present invention, technical scheme and beneficial effect are further described; institute is understood that; the above only is specific embodiments of the invention; be not limited to the present invention; within the spirit and principles in the present invention all, any modification of being made, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. user identity protection method based on PKI mechanism, the method includes the steps of:
(1) produce a pair of public private key pair PK and SK by HSS, PKI PK is preset in the usim card of its UE of ownership with the form of PKI file PKF, and private key SK is stored among the HSS;
(2) mobile phone of MME usim card in preserving step (1) sends the user identity request;
When (3) mobile phone networks with following message:
HSS sign: HSS_ID;
PKI PK version number: VER_PK;
Adopt rivest, shamir, adelman ciphered data (IMSI||R||VER_PK);
Send to MME;
Wherein R is a random number, mixes with IMSI before encrypting;
(4) after MME receives message in the step (3), VER_PK, (IMSI||R||VER_PK) are sent to corresponding HSS according to HSS_ID;
(5) HSS receives that VER_PK, (IMSI||R||VER_PK) back utilization private key SK that MME sends are decrypted judgement.
2. the user identity protection method based on PKI mechanism as claimed in claim 1 is characterized in that utilization private key SK in the described step (5) is decrypted and judges and may further comprise the steps:
At first differentiate PK version number, call corresponding private key SK (IMSI||R||VER_PK) is decrypted, decrypt IMSI and VER_PK*;
3. the user identity protection method based on PKI mechanism as claimed in claim 2, it is characterized in that described step (5) comprises that also HSS compares USIM VER_PK that reports and the VER_PK that oneself uses, if the VER_PK version number that USIM reports is current latest edition, then need not to upgrade the PKI file; If the VER_PK version number that USIM reports is an early version, then upgrade the PKI file.
4. the user identity protection method based on PKI mechanism as claimed in claim 3 is characterized in that described method is further comprising the steps of:
HSS issues the IMSI data of mobile phone and the Ciphering Key that produces according to IMSI to MME, upgrades the PKI file if desired, then attaches issuing new PKI file PKFn; If do not need to upgrade the PKI file, then do not issue this parameter.
5. the user identity protection method based on PKI mechanism as claimed in claim 4 is characterized in that described method is further comprising the steps of:
Enter authorizing procedure between mobile phone and the MME, and the authentication success.
6. the user identity protection method based on PKI mechanism as claimed in claim 5 is characterized in that described method is further comprising the steps of:
MME distributes GUTI to MS, upgrades the PKI file if desired, then attaches issuing new PKI file PKFn; If do not need to upgrade the PKI file, then do not issue this parameter.
7. the user identity protection method based on PKI mechanism as claimed in claim 6 is characterized in that described method is further comprising the steps of:
If mobile phone is received PKFn, USIM if checking gets nowhere then abandons this parameter, continues to use old PKI file PKFo with the signature of the new PKI file PKFn of old PKI file PKo checking; If be proved to be successful then replace old PKFo, adopt new PKn to encrypt IMSI when network next time.
8. the user identity protection method based on PKI mechanism as claimed in claim 7 is characterized in that described method is further comprising the steps of:
Mobile phone reports the allocation result of GUTI and PKFn to MME.
9. the user identity protection method based on PKI mechanism as claimed in claim 1 is characterized in that the asymmetric arithmetic in the described step (3) is a RSA Algorithm.
10. the user identity protection method based on PKI mechanism as claimed in claim 1 is characterized in that the asymmetric arithmetic in the described step (3) is the ECC algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010615953.0A CN102026178B (en) | 2010-12-31 | 2010-12-31 | User identity protection method based on public-key mechanism |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201010615953.0A CN102026178B (en) | 2010-12-31 | 2010-12-31 | User identity protection method based on public-key mechanism |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102026178A true CN102026178A (en) | 2011-04-20 |
CN102026178B CN102026178B (en) | 2013-06-12 |
Family
ID=43866895
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201010615953.0A Active CN102026178B (en) | 2010-12-31 | 2010-12-31 | User identity protection method based on public-key mechanism |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102026178B (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102395121A (en) * | 2011-10-27 | 2012-03-28 | 大唐移动通信设备有限公司 | Method, system and device for resending Update-Location-Request information |
EP2775742A1 (en) | 2013-03-05 | 2014-09-10 | Sandeep Mittal | A method to launch an application on a mobile device using short code |
CN104955039A (en) * | 2014-03-27 | 2015-09-30 | 西安西电捷通无线网络通信股份有限公司 | Network authentication certification method and equipment |
CN104955040A (en) * | 2014-03-27 | 2015-09-30 | 西安西电捷通无线网络通信股份有限公司 | Network authentication certification method and equipment |
WO2016011588A1 (en) * | 2014-07-21 | 2016-01-28 | 宇龙计算机通信科技(深圳)有限公司 | Mobility management entity, home server, terminal, and identity authentication system and method |
CN106714159A (en) * | 2015-11-16 | 2017-05-24 | 普天信息技术有限公司 | Network access control method and system |
CN106878009A (en) * | 2017-02-21 | 2017-06-20 | 蔚来汽车有限公司 | Key updating method and system |
WO2018046017A1 (en) * | 2016-09-12 | 2018-03-15 | 中国移动通信有限公司研究院 | Information processing method, device, electronic equipment and computer storage medium |
CN108781366A (en) * | 2016-03-10 | 2018-11-09 | 华为技术有限公司 | Authentication mechanism for 5g technologies |
CN108880813A (en) * | 2017-05-08 | 2018-11-23 | 中国移动通信有限公司研究院 | A kind of implementation method and device of attachment flow |
WO2019029531A1 (en) * | 2017-08-07 | 2019-02-14 | 华为技术有限公司 | Method for triggering network authentication, and related device |
CN109905879A (en) * | 2019-03-23 | 2019-06-18 | 西安电子科技大学 | Transmission line of electricity based on ECC algorithm monitors terminal security cut-in method |
US10390224B2 (en) | 2014-05-20 | 2019-08-20 | Nokia Technologies Oy | Exception handling in cellular authentication |
US10484187B2 (en) * | 2014-05-20 | 2019-11-19 | Nokia Technologies Oy | Cellular network authentication |
US10873464B2 (en) | 2016-03-10 | 2020-12-22 | Futurewei Technologies, Inc. | Authentication mechanism for 5G technologies |
CN113132979A (en) * | 2019-12-30 | 2021-07-16 | 中移雄安信息通信科技有限公司 | Method for acquiring and issuing IMSI encrypted public key and equipment |
US12003957B2 (en) | 2018-10-04 | 2024-06-04 | Google Llc | Distributed network cellular identity management |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790984A (en) * | 2004-12-14 | 2006-06-21 | 中兴通讯股份有限公司 | User identity secret-keeping method in communication system |
WO2006129934A1 (en) * | 2005-06-03 | 2006-12-07 | Samsung Electronics Co., Ltd. | Method for inclusive authentication and management of service provider, terminal and user identity module, and system and terminal device using the method |
CN101616002A (en) * | 2008-06-23 | 2009-12-30 | 阿里巴巴集团控股有限公司 | A kind of user ID authentication method and device |
CN101720086A (en) * | 2009-12-23 | 2010-06-02 | 成都三零瑞通移动通信有限公司 | Identity protection method for mobile communication user |
-
2010
- 2010-12-31 CN CN201010615953.0A patent/CN102026178B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790984A (en) * | 2004-12-14 | 2006-06-21 | 中兴通讯股份有限公司 | User identity secret-keeping method in communication system |
WO2006129934A1 (en) * | 2005-06-03 | 2006-12-07 | Samsung Electronics Co., Ltd. | Method for inclusive authentication and management of service provider, terminal and user identity module, and system and terminal device using the method |
CN101616002A (en) * | 2008-06-23 | 2009-12-30 | 阿里巴巴集团控股有限公司 | A kind of user ID authentication method and device |
CN101720086A (en) * | 2009-12-23 | 2010-06-02 | 成都三零瑞通移动通信有限公司 | Identity protection method for mobile communication user |
Cited By (31)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102395121B (en) * | 2011-10-27 | 2014-06-04 | 大唐移动通信设备有限公司 | Method, system and device for resending update-location-request information |
CN102395121A (en) * | 2011-10-27 | 2012-03-28 | 大唐移动通信设备有限公司 | Method, system and device for resending Update-Location-Request information |
EP2775742A1 (en) | 2013-03-05 | 2014-09-10 | Sandeep Mittal | A method to launch an application on a mobile device using short code |
CN104955039A (en) * | 2014-03-27 | 2015-09-30 | 西安西电捷通无线网络通信股份有限公司 | Network authentication certification method and equipment |
CN104955040A (en) * | 2014-03-27 | 2015-09-30 | 西安西电捷通无线网络通信股份有限公司 | Network authentication certification method and equipment |
CN104955039B (en) * | 2014-03-27 | 2019-10-25 | 西安西电捷通无线网络通信股份有限公司 | A kind of method and apparatus of network authentication certification |
CN104955040B (en) * | 2014-03-27 | 2019-12-24 | 西安西电捷通无线网络通信股份有限公司 | Network authentication method and equipment |
US10484187B2 (en) * | 2014-05-20 | 2019-11-19 | Nokia Technologies Oy | Cellular network authentication |
US10390224B2 (en) | 2014-05-20 | 2019-08-20 | Nokia Technologies Oy | Exception handling in cellular authentication |
WO2016011588A1 (en) * | 2014-07-21 | 2016-01-28 | 宇龙计算机通信科技(深圳)有限公司 | Mobility management entity, home server, terminal, and identity authentication system and method |
CN106714159B (en) * | 2015-11-16 | 2019-12-20 | 普天信息技术有限公司 | Network access control method and system |
CN106714159A (en) * | 2015-11-16 | 2017-05-24 | 普天信息技术有限公司 | Network access control method and system |
CN113411308A (en) * | 2016-03-10 | 2021-09-17 | 华为技术有限公司 | Authentication mechanism for 5G technology |
US10873464B2 (en) | 2016-03-10 | 2020-12-22 | Futurewei Technologies, Inc. | Authentication mechanism for 5G technologies |
JP2019512942A (en) * | 2016-03-10 | 2019-05-16 | 華為技術有限公司Huawei Technologies Co.,Ltd. | Authentication mechanism for 5G technology |
CN113411308B (en) * | 2016-03-10 | 2022-04-12 | 华为技术有限公司 | Communication method, device and storage medium |
CN108781366A (en) * | 2016-03-10 | 2018-11-09 | 华为技术有限公司 | Authentication mechanism for 5g technologies |
US11700131B2 (en) | 2016-03-10 | 2023-07-11 | Futurewei Technologies, Inc. | Authentication mechanism for 5G technologies |
WO2018046017A1 (en) * | 2016-09-12 | 2018-03-15 | 中国移动通信有限公司研究院 | Information processing method, device, electronic equipment and computer storage medium |
CN106878009A (en) * | 2017-02-21 | 2017-06-20 | 蔚来汽车有限公司 | Key updating method and system |
CN106878009B (en) * | 2017-02-21 | 2021-04-09 | 蔚来(安徽)控股有限公司 | Key updating method and system |
WO2018153018A1 (en) * | 2017-02-21 | 2018-08-30 | 蔚来汽车有限公司 | Key update method and system |
CN108880813A (en) * | 2017-05-08 | 2018-11-23 | 中国移动通信有限公司研究院 | A kind of implementation method and device of attachment flow |
US10798082B2 (en) | 2017-08-07 | 2020-10-06 | Huawei Technologies Co., Ltd. | Network authentication triggering method and related device |
CN109391942A (en) * | 2017-08-07 | 2019-02-26 | 华为技术有限公司 | Trigger the method and relevant device of network authentication |
WO2019029531A1 (en) * | 2017-08-07 | 2019-02-14 | 华为技术有限公司 | Method for triggering network authentication, and related device |
US12003957B2 (en) | 2018-10-04 | 2024-06-04 | Google Llc | Distributed network cellular identity management |
CN109905879A (en) * | 2019-03-23 | 2019-06-18 | 西安电子科技大学 | Transmission line of electricity based on ECC algorithm monitors terminal security cut-in method |
CN109905879B (en) * | 2019-03-23 | 2021-04-02 | 西安电子科技大学 | ECC algorithm-based safe access method for power transmission line monitoring terminal |
CN113132979A (en) * | 2019-12-30 | 2021-07-16 | 中移雄安信息通信科技有限公司 | Method for acquiring and issuing IMSI encrypted public key and equipment |
CN113132979B (en) * | 2019-12-30 | 2023-03-21 | 中移雄安信息通信科技有限公司 | Method for acquiring and issuing IMSI encrypted public key and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN102026178B (en) | 2013-06-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102026178B (en) | User identity protection method based on public-key mechanism | |
CN101867898B (en) | Short message encrypting communication system, method and secret key center | |
EP1106000B1 (en) | Secure processing for authentication of a wireless communications device | |
CN101511082B (en) | Method, equipment and system for updating group cipher key | |
CN101969638B (en) | Method for protecting international mobile subscriber identity (IMSI) in mobile communication | |
CN101094065B (en) | Method and system for distributing cipher key in wireless communication network | |
CN105553951A (en) | Data transmission method and data transmission device | |
CN101102186B (en) | Method for implementing general authentication framework service push | |
CN101635924B (en) | CDMA port-to-port encryption communication system and key distribution method thereof | |
CN102106111A (en) | Method of deriving and updating traffic encryption key | |
Abdo et al. | Ensured confidentiality authentication and key agreement protocol for EPS | |
CN100488281C (en) | Method for acquring authentication cryptographic key context from object base station | |
CN101340443A (en) | Session key negotiating method, system and server in communication network | |
CN113228721B (en) | Communication method and related product | |
CN101228766A (en) | Exchange of key material | |
US20120170745A1 (en) | Method and device for encrypting user identity during paging procedure | |
CN103533539A (en) | Virtual SIM (subscriber identity module) card parameter management method and device | |
US20210250762A1 (en) | Key generation method, device, and system | |
Juang et al. | Efficient 3GPP authentication and key agreement with robust user privacy protection | |
CN109586899A (en) | Signaling manipulation and its indicating means, device and computer storage medium | |
WO2017080142A1 (en) | Key distribution, generation and reception method, and related apparatus | |
CN1964259B (en) | A method to manage secret key in the course of switch-over | |
CN108156112B (en) | Data encryption method, electronic equipment and network side equipment | |
CN112054905B (en) | Secure communication method and system of mobile terminal | |
KR20110016186A (en) | The method for preventing changing the authority of information data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |