CN105813066A - Method and system for preventing mobile terminal tracking - Google Patents

Method and system for preventing mobile terminal tracking Download PDF

Info

Publication number
CN105813066A
CN105813066A CN201410856728.4A CN201410856728A CN105813066A CN 105813066 A CN105813066 A CN 105813066A CN 201410856728 A CN201410856728 A CN 201410856728A CN 105813066 A CN105813066 A CN 105813066A
Authority
CN
China
Prior art keywords
identification
mobile terminal
sensitive identification
sensitive
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410856728.4A
Other languages
Chinese (zh)
Inventor
汪文清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leadcore Technology Co Ltd
Original Assignee
Leadcore Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leadcore Technology Co Ltd filed Critical Leadcore Technology Co Ltd
Priority to CN201410856728.4A priority Critical patent/CN105813066A/en
Publication of CN105813066A publication Critical patent/CN105813066A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a method and a system for preventing mobile terminal tracking with an aim to solve problems of security holes of technologies of the prior art. The method disclosed in the invention comprises the following steps: sensitive identifications to be transmitted are encrypted at a mobile terminal; the sensitive identifications and encryption identifications signifying that the sensitive identifications are encrypted are transmitted to a network from the mobile terminal via messages; the messages are received on a network side; that the sensitive identifications in the messages are encrypted can be identified via the encryption identifications; the sensitive identifications can be decrypted on the network side.

Description

Prevent from following the tracks of the method and system of mobile terminal
Technical field
The present invention relates to mobile terminal, especially relate to the method and system preventing following the tracks of mobile terminal.
Background technology
Mobile terminal, for instance mobile phone, panel computer have become as individual's belongings.Therefore the position obtaining its user by positioning mobile terminal is possibly realized.The positional information obtaining user generally can have various ways, for instance is intruded into by modes such as virus and back doors in the mobile terminal of user and obtains current satellite positioning information or current cell information;Monitor the user service data transmitted in communication interface and be analyzed (a large amount of speech datas such as carry out feature analysis, contrast coupling can find out the Position Approximate being concerned personage place) etc..
Many user are arbitrarily obtained by mobile terminal without wishing to its position, therefore occur in that the technology preventing following the tracks of mobile terminal.Intruded into by virus and the mode such as back door user terminal obtains customer location mode can by adopting safe terminal platform, the use management of strengthening terminal avoids, and even do not configure satellite positioning device on some security terminal.By monitoring the user service data transmitted in communication interface and carrying out feature analysis thus the mode obtaining customer position information can be avoided by business datum carries out the mode of End to End Encryption.
Also can transmission terminal signaling terminal mark and ID in mobile terminal use procedure.Owing in existing communication public communication system, terminal sets up the terminal iidentification reported in process and ID is not encrypted in business, although what generally adopt is interim subscriber identity, but when signaling is not encrypted, by interim subscriber identity is tracked, still may determine that the approximate location of certain user.Even if newly assigned user's temporary mark is encrypted in communication system, cause that cannot monitor interim subscriber identity by interface aloft carries out customer location tracking, but newly assigned temporary mark can be obtained by the wireline interface of public communication network side and realize user tracking.And network (such as interim subscriber identity not can recognize that in some cases, in the network equipment, user data breaks down) still may require that the non-provisional ID such as terminal to report IMSI, and also do not enable in the encryption of this stage air interface, disclosed in the non-provisional ID of terminal to report is then entirely, therefore follower can by illegal analog network equipment (such as pseudo-base station) signaling or other nonconventional approaches, triggering terminal reports its non-provisional ID, thus easily realizing the tracking to user.So it is feasible for realizing the tracking to user by terminal iidentification and ID in existing public communication system.
Because mobile terminal prevents the potential safety hazard that tracking aspect exists, it is necessary to propose a kind of method preventing from following the tracks of mobile terminal of improvement.
Summary of the invention
The technical problem to be solved is to provide a kind of method and system preventing from following the tracks of mobile terminal.
The present invention solves that above-mentioned technical problem employed technical scheme comprise that and proposes a kind of method preventing and following the tracks of mobile terminal, comprise the following steps: at mobile terminal, sensitive identification to be sent is encrypted;This sensitive identification is sent to network by message together with identifying the encryption identification that this sensitive identification is encrypted from this mobile terminal;Receiving this message at network side, the sensitive identification identified in this message by this encryption identification is encrypted;And at network side, this sensitive identification is decrypted.
In one embodiment of this invention, receive this message in the process of network side and business device, and at the privacy device of network side, this sensitive identification is decrypted.
In one embodiment of this invention, by intermediate equipment, this sensitive identification is transmitted to this privacy device at network side, and the sensitive identification of deciphering is returned to this process and business device.
In one embodiment of this invention, said method also includes the equipment routing iinformation by the equipment identification information of privacy device that can this sensitive identification be decrypted or equivalence, sends network to by message together as privacy device mark.
In one embodiment of this invention, said method also includes the equipment routing iinformation by forwarding this sensitive identification equipment identification information to the intermediate equipment of corresponding privacy device or equivalence, sends network to by message together as privacy device mark.
In one embodiment of this invention, also include before this sensitive identification is decrypted: at this network side, this sensitive identification is verified, and abandon the sensitive identification of illegal encryption.
The present invention also proposes a kind of system preventing from following the tracks of mobile terminal, including mobile terminal and network equipment.Sensitive identification to be sent is encrypted by this mobile terminal, and sends this sensitive identification to network by message together with identifying the encryption identification that this sensitive identification is encrypted.Network equipment receives this message, and the sensitive identification identified in this message by this encryption identification is encrypted, and this sensitive identification is decrypted.
In one embodiment of this invention, this network equipment includes process and business device and privacy device, this process and business device, in order to receive this message, identify the sensitive identification in this message by this encryption identification, and this sensitive identification are transferred to this privacy device;This sensitive identification is decrypted by this privacy device, and returns to this process and business device.
In one embodiment of this invention, this network equipment also includes intermediate equipment, so that this sensitive identification to be transmitted to this privacy device, and the sensitive identification of deciphering returns to this process and business device.
Due to the fact that the above technical scheme of employing, so as to compared with prior art, by realizing the End to End Encryption of terminal iidentification or ID between mobile terminal and network equipment, achieve user's anti-tracking performance of high intensity, it is ensured that follower cannot pass through terminal and ID realizes the tracking to user.
Accompanying drawing explanation
For the above-mentioned purpose of the present invention, feature and advantage can be become apparent, below in conjunction with accompanying drawing, the specific embodiment of the present invention is elaborated, wherein:
Fig. 1 illustrates the system block diagram preventing from following the tracks of mobile terminal of one embodiment of the invention.
Fig. 2 illustrates the system block diagram preventing from following the tracks of mobile terminal of another embodiment of the present invention.
Fig. 3 illustrates the system block diagram preventing from following the tracks of mobile terminal of further embodiment of this invention.
Fig. 4 illustrates the flow chart preventing from following the tracks of mobile terminal method of invention one embodiment.
Fig. 5 illustrates the flow chart preventing from following the tracks of mobile terminal method inventing another embodiment.
Detailed description of the invention
Fig. 1 illustrates the system block diagram preventing from following the tracks of mobile terminal of one embodiment of the invention.With reference to shown in Fig. 1, system 100 includes mobile terminal 110 and network equipment 120.Mobile terminal 110 typically mobile phone and panel computer.Mobile terminal 110 may also comprise the portable electric appts networked of other form, for instance personal digital assistant, notebook computer and Intelligent worn device etc..Network equipment 120 is the combination of one or more equipment being arranged in network.Such as, network equipment 120 can include process and service processing equipment 122 and privacy device 124.The example of process and service processing equipment 122 is MSC (mobile switching centre) and SGSN (Serving GPRS Support Node).It will be appreciated that network equipment 120 can carry out the division of other form according to function, or it is integrated in same equipment.
Configurable security module 112 in mobile terminal 110.Security module 112 may be embodied as hardware, software or firmware.Mobile terminal 110 needs to send terminal iidentification or ID to network equipment 120, and wherein ID farther includes interim subscriber identity, non-provisional ID, terminal iidentification etc..In the context of the present invention, these marks are referred to as " sensitive identification ".Mobile terminal 110 is before sending sensitive identification, it is possible to sensitive identification be encrypted by security module 112.Mobile terminal 110 can use known any suitable AES to be encrypted.For ease of management, this AES and corresponding key can by network equipment 120 unified management and issues, for instance managed by privacy device 124 and issued.
When sending, the sensitive identification after mark (abbreviation encryption identification) encrypted for mark sensitive identification, encryption can be passed through message by mobile terminal 110 simultaneously together, for instance layer 3 message sends network equipment 120 to.Considering the coupling of AES, the equipment routing iinformation (being called for short privacy device mark) of the equipment identification information of the privacy device 124 that the sensitive identification of encryption is decrypted or equivalence can will can be sent to network equipment 120 by mobile terminal 110 further.
Network equipment 120, after process and service processing equipment 122 receive above-mentioned message specifically, whether encrypted by the sensitive identification of encryption identification this user of identification.When identify sensitive identification encrypted after, the sensitive identification of encryption can be sent to privacy device 124 by process and service processing equipment 122.If comprising the privacy device mark of corresponding privacy device in message, then the sensitive identification of encryption can be sent to the privacy device of correspondence by process and service processing equipment 122 according to this privacy device mark, privacy device the sensitive identification of encryption is decrypted.Sensitive identification after deciphering is sent to process and service processing equipment 122 directly or indirectly, the subsequent operations such as follow-up authentication ciphering, interim subscriber identity distribution or business foundation are carried out by process and service processing equipment 122, these subsequent operations can perform according to prior art or relevant criterion, does not repeat them here.
Fig. 4 illustrates the flow process preventing from following the tracks of mobile terminal that the embodiment of applicable system shown in Figure 1 performs, and with reference to shown in Fig. 4, flow process is as follows:
In step 401, sensitive identification to be sent is encrypted by mobile terminal 110.
In step 402 to, from mobile terminal 110, this sensitive identification is sent by message together with identifying the encryption identification that this sensitive identification is encrypted process and the service processing equipment 122 of network side.
In step 403, process and the service processing equipment 122 of network side receive this message, and the sensitive identification identified in message by encryption identification is encrypted.
Sending decoding request in step 404, process and service processing equipment 122 to privacy device 124, it comprises the sensitive identification of encryption.
In step 405, privacy device 124 returns deciphering response to process and service processing equipment 122, and it comprises the sensitive identification of deciphering.
Once obtain the sensitive identification of deciphering, process and service processing equipment 122 can carry out the subsequent treatment of process or business.
Fig. 2 illustrates the system block diagram preventing from following the tracks of mobile terminal of another embodiment of the present invention.With reference to shown in Fig. 2, system 200 includes mobile terminal 110 and network equipment 120.Mobile terminal 110 typically mobile phone and panel computer.Mobile terminal 110 may also comprise the portable electric appts networked of other form, for instance personal digital assistant, notebook computer and Intelligent worn device etc..Network equipment 120 is the combination of one or more equipment being arranged in network.With previous embodiment the difference is that, network equipment 120 includes process and service processing equipment 122, privacy device 124 and intermediate equipment 126.Intermediate equipment 126 can as the intermediary between process and service processing equipment 122 and privacy device 124.The example of intermediate equipment 126 is ownership HLR.
Correspondingly, when sending message, mobile terminal 110 can will can forward sensitive identification to send network equipment 120 to the equipment identification information of the intermediate equipment 126 of privacy device 124 or the equipment routing iinformation (being called for short privacy device mark) of equivalence.
Correspondingly, when identify sensitive identification encrypted after, the sensitive identification of encryption can be sent to intermediate equipment 126 by process and service processing equipment 122, intermediate equipment 126 be transmitted to privacy device 124.Or if message comprises the privacy device mark of corresponding intermediate equipment, then the sensitive identification of encryption can be transmitted to privacy device through corresponding intermediate equipment according to this privacy device mark by process and service processing equipment 122, privacy device the sensitive identification of encryption is decrypted.Sensitive identification after deciphering is indirectly sent to process and service processing equipment 122 then through intermediate equipment 126.The benefit of the present embodiment is, it is not necessary to exposed by privacy device 124, in order to avoid it is open to attack.
The system of embodiment illustrated in fig. 2 still can use flow process shown in Fig. 4 to implement, and simply needs by intermediate equipment 126 to forward message between process and service processing equipment 122 and privacy device 124.
Fig. 3 illustrates the system block diagram preventing from following the tracks of mobile terminal of further embodiment of this invention.With reference to shown in Fig. 3, system 100 includes mobile terminal 110 and network equipment 120.Mobile terminal 110 typically mobile phone and panel computer.Mobile terminal 110 may also comprise the portable electric appts networked of other form, for instance personal digital assistant, notebook computer and Intelligent worn device etc..Network equipment 120 is the combination of one or more equipment being arranged in network.With embodiment illustrated in fig. 1 the difference is that, network equipment 120 can include process and service processing equipment 122, privacy device 124 and checking equipment 128.The example of process and service processing equipment 122 is MSC (mobile switching centre) and SGSN (Serving GPRS Support Node).Checking equipment 128 can be certain special equipment.It will be appreciated that network equipment 120 can carry out the division of other form according to function, or it is integrated in same equipment.Such as checking equipment 128 can be implemented in the network equipment of such as MSC.
When sending, the sensitive identification after mark (abbreviation encryption identification) encrypted for mark sensitive identification, encryption can be passed through message by mobile terminal 110 simultaneously together, for instance layer 3 message sends network equipment 120 to.Mobile terminal 110 also can insert several check bits in sensitive identification, as check code.
Network equipment 120, after process and service processing equipment 122 receive message specifically, whether encrypted by the sensitive identification of encryption identification this user of identification.When identify sensitive identification encrypted after, the sensitive identification of encryption can be sent to checking equipment 128 by process and service processing equipment 122.The sensitive identification of the encryption received first is verified by checking equipment 128, the encrypted sensitive mark just meeting only meeting agreement verification rule is further sent to privacy device 124 and is decrypted, illegal encryption " sensitive identification " will be dropped, and notification procedure and service processing equipment 122 refuse this process or service request.Sensitive identification after deciphering is sent to process and service processing equipment 122 directly or indirectly, process and service processing equipment 122 carry out the subsequent operations such as follow-up authentication ciphering, interim subscriber identity distribution or business foundation.
Fig. 5 illustrates the flow chart preventing from following the tracks of mobile terminal that the embodiment of applicable system shown in Figure 3 performs.With reference to shown in Fig. 5, flow process is as follows:
In step 501, sensitive identification to be sent is encrypted by mobile terminal 110.
In step 502 to, from mobile terminal 110, this sensitive identification is sent by message together with identifying the encryption identification that this sensitive identification is encrypted process and the service processing equipment 122 of network side.
In step 503, process and the service processing equipment 122 of network side receive this message, and the sensitive identification identified in message by encryption identification is encrypted.
Sending checking and decoding request in step 504, process and service processing equipment 122 to checking equipment 128, it comprises the sensitive identification of encryption.
In step 505, the sensitive identification of the encryption received first is verified by checking equipment 128.
In step 506, checking equipment 128 sends verification response to process and service processing equipment 122, and notification procedure and service processing equipment 122 verify success or failure.
If verifying successfully, checking equipment 128, simultaneously in step 507, forwards decoding request to privacy device, and it comprises the sensitive identification of encryption.
In step 508, if verifying unsuccessfully, process and service processing equipment 122 return the information of this process of refusal or service request to mobile terminal 110.
In step 509, privacy device 124 returns deciphering response to process and service processing equipment 122, and it comprises the sensitive identification of deciphering.
Once obtain the sensitive identification of deciphering, process and service processing equipment 122 can carry out the subsequent treatment of process or business.
The example of of the present invention practical application is set forth below.
Communication system adopts asymmetric encryption mechanism that " sensitive identification " encrypts and decrypts process, and the terminal having is announced the device identification in a network of its AES and encrypted public key and this equipment or routing iinformation by network side privacy device.If only one of which privacy device in network, then the mark of this privacy device or routing iinformation need not be announced to terminal.
Communication system (includes the network equipment and mobile terminal), and BIT8 unused in first byte in Mobileidentity information unit is set to the flag whether " sensitive identification " encrypts by agreement, such as table 1 below.
Table 1
Below for starting up of terminal IMSIAttach process, the general processing procedure adopting the embodiment of the present invention is described.
Mobile terminal is when start carries out IMSIAttach, its " sensitive identification " is encrypted by the AES and the encrypted public key that use the issue of home network privacy device, and in LOCATIONUPDATINGREQUEST message, arranging the sensitive identification encryption identification position in MobileIdentity information unit is " encryption ", and the sensitive identification after encryption inserted in LOCATIONUPDATINGREQUEST message, and increase device identification or the routing iinformation of the HLR equipment of ownership in the message.
After network side MSC receives the LOCATIONUPDATINGREQUEST message that this mobile terminal is sent, the sensitive identification identified in this message by encryption identification position is encrypted, then obtain device identification or the routing iinformation of the HLR equipment of this terminal use ownership in message further, and the sensitive identification of encryption is transmitted directly to the HLR of ownership, the HLR of ownership forwards it to the privacy device of correspondence, after privacy device uses the sensitive identification of private key pair encryption to be decrypted, feed back to HLR, HLR and feed back to MSC equipment.After MSC obtains the sensitive identification after deciphering, it is possible to carry out the relevant operating process of follow-up IMSIAttach.
If security strategy allows, terminal can also directly comprise mark or the routing iinformation of privacy device in LOCATIONUPDATINGREQUEST message.Corresponding to network side, after MSC obtains mark or the routing iinformation of privacy device from LOCATIONUPDATINGREQUEST message, the sensitive identification of encryption is transmitted directly to privacy device, and privacy device feeds back to MSC equipment after using " sensitive identification " of private key pair encryption to be decrypted.
When sensitive identification is encrypted, it is also possible to sensitive identification and related data (including odd/evenindicator and Typeofidentity) thereof are encrypted together.
In order to prevent that privacy device is carried out saturation attack, system can about fix on and comprise verification rule in " sensitive identification " of encryption.Terminal inserts some check bits meeting this verification rule in encrypted sensitive mark, at network side, by certain equipment (such as certain special equipment, or have existing certain network equipment such as MSC) sensitive identification of the encryption received is verified, the encrypted sensitive mark only meeting agreement verification rule just can be sent to privacy device and is decrypted, illegal encryption " sensitive identification " will be dropped, and notifies that MSC refuses this process or service request.
After communication system adopts the technical scheme of the above embodiment of the present invention, if send various sensitive identification by analog network equipment requirements terminal, the all of sensitive identification sent due to mobile terminal is all encryption, as long as following the tracks of people cannot crack the sensitive identification of this encryption within the effective time, mobile terminal and user cannot be identified, user is made directly position and follows the tracks of by terminal iidentification or the ID that cannot utilize non-provisional, also cannot monitor, by interface aloft, the context analyzing interim subscriber identity and user is carried out location tracking.
The scheme of the embodiment of the present invention is compared to the prior art, achieve terminal iidentification or the ID End to End Encryption transmission between terminal and network side specialized security device in mobile communication system, ensure that follower passes through the wireline interface in monitoring air interface even part public network or utilizes analog network to require the hands sections such as terminal transmission terminal iidentification, all can not obtain terminal iidentification or the ID cleartext information of terminal to report, stop by terminal iidentification or ID, terminal or user to be tracked the probability of location, achieve the function preventing from terminal or user are carried out location tracking location of higher intensity.
Although the present invention describes with reference to current specific embodiment, but those of ordinary skill in the art will be appreciated that, above embodiments is intended merely to the explanation present invention, change or the replacement of various equivalence also can be made when without departing from spirit of the present invention, therefore, as long as to the change of above-described embodiment, modification all by the scope dropping on following claims in the spirit of the present invention.

Claims (9)

1. the method preventing from following the tracks of mobile terminal, comprises the following steps:
At mobile terminal, sensitive identification to be sent is encrypted;
This sensitive identification is sent to network by message together with identifying the encryption identification that this sensitive identification is encrypted from this mobile terminal;
Receiving this message at network side, the sensitive identification identified in this message by this encryption identification is encrypted;And
At network side, this sensitive identification is decrypted.
2. the method preventing from as claimed in claim 1 following the tracks of mobile terminal, it is characterised in that receive this message in the process of network side and business device, and at the privacy device of network side, this sensitive identification is decrypted.
3. the method preventing from as claimed in claim 2 following the tracks of mobile terminal, it is characterised in that by intermediate equipment, this sensitive identification is transmitted to this privacy device at network side, and the sensitive identification of deciphering is returned to this process and business device.
4. the method preventing from as claimed in claim 1 following the tracks of mobile terminal, it is characterized in that, also include the equipment routing iinformation by the equipment identification information of privacy device this sensitive identification can being decrypted or equivalence, send network to by message together as privacy device mark.
5. the method preventing from as claimed in claim 1 following the tracks of mobile terminal, it is characterized in that, also include the equipment routing iinformation by this sensitive identification equipment identification information to the intermediate equipment of corresponding privacy device or equivalence can be forwarded, send network to by message together as privacy device mark.
6. the method preventing from as claimed in claim 1 or 2 following the tracks of mobile terminal, it is characterised in that also include before this sensitive identification is decrypted: at this network side, this sensitive identification is verified, and abandon the sensitive identification of illegal encryption.
7. prevent from following the tracks of a system for mobile terminal, including:
Mobile terminal, is encrypted sensitive identification to be sent, and sends this sensitive identification to network by message together with identifying the encryption identification that this sensitive identification is encrypted;
Network equipment, receives this message, and the sensitive identification identified in this message by this encryption identification is encrypted, and this sensitive identification is decrypted.
8. prevent from following the tracks of the system of mobile terminal as claimed in claim 7, it is characterised in that this network equipment includes process and business device and privacy device,
This process and business device, in order to receive this message, identify the sensitive identification in this message by this encryption identification, and this sensitive identification are transferred to this privacy device;
This sensitive identification is decrypted by this privacy device, and returns to this process and business device.
9. prevent from following the tracks of the system of mobile terminal as claimed in claim 8, it is characterised in that this network equipment also includes intermediate equipment, so that this sensitive identification to be transmitted to this privacy device, and the sensitive identification of deciphering returns to this process and business device.
CN201410856728.4A 2014-12-29 2014-12-29 Method and system for preventing mobile terminal tracking Pending CN105813066A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410856728.4A CN105813066A (en) 2014-12-29 2014-12-29 Method and system for preventing mobile terminal tracking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410856728.4A CN105813066A (en) 2014-12-29 2014-12-29 Method and system for preventing mobile terminal tracking

Publications (1)

Publication Number Publication Date
CN105813066A true CN105813066A (en) 2016-07-27

Family

ID=56465417

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410856728.4A Pending CN105813066A (en) 2014-12-29 2014-12-29 Method and system for preventing mobile terminal tracking

Country Status (1)

Country Link
CN (1) CN105813066A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109391937A (en) * 2017-08-04 2019-02-26 华为技术有限公司 Acquisition methods, equipment and the system of public key

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1512708A (en) * 2002-12-27 2004-07-14 �ձ�������ʽ���� Radio communication system, co-shared key management server and terminal
CN101277184A (en) * 2007-03-30 2008-10-01 展讯通信(上海)有限公司 Message structure compatible with 3GPP protocol and communication method thereof
CN101741555A (en) * 2008-11-12 2010-06-16 中兴通讯股份有限公司 Method and system for identity authentication and key agreement
CN101969638A (en) * 2010-09-30 2011-02-09 中国科学院软件研究所 Method for protecting international mobile subscriber identity (IMSI) in mobile communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1512708A (en) * 2002-12-27 2004-07-14 �ձ�������ʽ���� Radio communication system, co-shared key management server and terminal
CN101277184A (en) * 2007-03-30 2008-10-01 展讯通信(上海)有限公司 Message structure compatible with 3GPP protocol and communication method thereof
CN101741555A (en) * 2008-11-12 2010-06-16 中兴通讯股份有限公司 Method and system for identity authentication and key agreement
CN101969638A (en) * 2010-09-30 2011-02-09 中国科学院软件研究所 Method for protecting international mobile subscriber identity (IMSI) in mobile communication

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109391937A (en) * 2017-08-04 2019-02-26 华为技术有限公司 Acquisition methods, equipment and the system of public key
CN109391937B (en) * 2017-08-04 2021-10-19 华为技术有限公司 Method, device and system for obtaining public key

Similar Documents

Publication Publication Date Title
US10638321B2 (en) Wireless network connection method and apparatus, and storage medium
US9344881B2 (en) Identifiers in a communication system
US10791106B2 (en) Digital credential with embedded authentication instructions
CN108880813B (en) Method and device for realizing attachment process
US20150319172A1 (en) Group authentication and key management for mtc
CN109922474B (en) Method for triggering network authentication and related equipment
KR101503813B1 (en) Mobile device management system and method using device to device communication
CN103329501A (en) Method for managing content on a secure element connected to an equipment
US20130288641A1 (en) Wireless communication system providing the verification of the network identify
US10021562B2 (en) Mobile trusted module (MTM)-based short message service security system and method thereof
CN105657702A (en) Authentication method, authentication system, authentication method of mobile terminal and mobile terminal
CN105142136A (en) Method for preventing counterfeit base attack
US10412579B2 (en) MTC key management for sending key from network to UE
CN104125223A (en) Security defending system for private data of mobile device
CN102223356B (en) Lawful interception system for media security of Internet protocol (IP) multimedia subsystem (IMS) based on key management server (KMS)
CN105813066A (en) Method and system for preventing mobile terminal tracking
US20180131676A1 (en) Code encryption
CN111132155A (en) 5G secure communication method, equipment and storage medium
CN106211146A (en) Safety communication record adding method, information communicating method and call method and system
CN105392112A (en) MTC device information protection method, device and system
CN106714159B (en) Network access control method and system
CN114697945A (en) Method and device for generating discovery response message and method for processing discovery message
CN113038459A (en) Private information transmission method and device, computer equipment and computer readable medium
KR20060112597A (en) Method and system for resetting memory of mobile terminal and mobile terminal having a memory reset function
US11381387B2 (en) Proof-of-presence indicator

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160727