CN106714151A - Information transmission method - Google Patents

Information transmission method Download PDF

Info

Publication number
CN106714151A
CN106714151A CN201710131682.3A CN201710131682A CN106714151A CN 106714151 A CN106714151 A CN 106714151A CN 201710131682 A CN201710131682 A CN 201710131682A CN 106714151 A CN106714151 A CN 106714151A
Authority
CN
China
Prior art keywords
base station
terminal
information
source base
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710131682.3A
Other languages
Chinese (zh)
Other versions
CN106714151B (en
Inventor
李娜
刘尊宁
李思
徐瑨
陶小峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN201710131682.3A priority Critical patent/CN106714151B/en
Publication of CN106714151A publication Critical patent/CN106714151A/en
Application granted granted Critical
Publication of CN106714151B publication Critical patent/CN106714151B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an information transmission method which may comprise the following steps: a terminal encrypts a user identifier of the terminal by using a preset encryption key; the terminal sends the identifier of a source base station, the encrypted user identifier of the terminal and the information of the encryption key to a current base station, wherein the identifier of the source base station is used for determining the source base station by the current base station, and sending the information of the encryption key to the source base station; the information of the encryption key is used for allowing the source base station to determine a decryption key corresponding to the encryption key, and sending the decryption key to the current base station; and the decryption key is used for allowing the current base station to decrypt the encrypted user identifier of the terminal to acquire the user identifier of the terminal. According to the method provided by the invention, the user identifier transmitted by the terminal can be effectively prevented from being maliciously stolen, and communication security is ensured.

Description

Information transferring method
Technical field
The present invention relates to the communication technology, more particularly to a kind of information transferring method.
Background technology
After terminal accessing mobile communication network, mobile management entity (Mobility Management Entity, MME) is needed Authentication is carried out with the terminal consult (Authentication and Key Agreement, AKA) with key.
MME needs first to carry out authentication to the terminal during the AKA, and this needs terminal to send out the ID of terminal The MME is delivered to, is used to so that the MME carries out authentication according to the ID of the terminal.At present, terminal can generally use bright Literary mode sends to base station the ID of the terminal, then is sent to the MME by the base station.
However, clear-text way transmits the ID of the terminal, easily cause that the stolen hearer's malice of mark is stolen, so as to influence Communication security.
The content of the invention
The present invention provides a kind of information transferring method, is maliciously stolen with the mark for being prevented effectively from terminal transmission, improves logical Letter safety.
The present invention provides a kind of information transferring method, including:
Terminal is encrypted using default encryption key to the ID of the terminal;
The terminal to current base station send source base station mark, encryption after the terminal ID and it is described plus The information of key;The mark of the source base station is used to cause that the current base station determines the source base station, and the encryption is close The information of key is sent to the source base station;The information of the encryption key is used to cause that the source base station determines the encryption key Corresponding decruption key, then sends to the current base station decruption key;The decruption key is used for so that described Current base station to the encryption after the ID of the terminal be decrypted, obtain the ID of the terminal.
The present invention also provides a kind of information transferring method, including:
The ID of the terminal after mark, the encryption of the source base station that current base station receiving terminal sends and encryption are close The information of key;
The current base station determines the source base station according to the mark of the source base station;
The current base station sends the information of the encryption key to the source base station;The information of the encryption key is used for So that the source base station determines the corresponding decruption key of the encryption key;
The current base station receives the decruption key that the source base station sends;
The current base station according to the decruption key to the encryption after the ID of the terminal be decrypted, Obtain the ID of the terminal.
The present invention also provides a kind of information transferring method, including:
Source base station receives the information of the encryption key that current base station sends;
The source base station determines the corresponding decruption key of the encryption key according to the information of the encryption key;
The source base station sends the decruption key to the current base station, and the decruption key is used for so that described current Base station to encryption after the ID of the terminal be decrypted, obtain the ID of the terminal.
The information transferring method that the present invention is provided, can be marked using default encryption key by terminal to the user of the terminal Knowledge is encrypted, and the ID and the encryption key of the terminal after mark, the encryption of source base station are sent to current base station Information so that the current base station can determine the source base station according to the mark of the source base station, and the information of the encryption key is sent To the source base station, the source base station can determine the corresponding decruption key of the encryption key according to the information of the encryption key, then will The decruption key is sent to the current base station;The current base station can also be according to decruption key to the user of the terminal after the encryption Mark is decrypted, and obtains the ID of the terminal.The method can be prevented effectively from the ID of the terminal transmission by malice Steal, it is ensured that communication security.
Brief description of the drawings
Fig. 1 is the network architecture diagram of the applicable cordless communication network of the present invention;
A kind of flow chart of information transferring method that Fig. 2 is provided for the present invention;
The flow chart of another information transferring method that Fig. 3 is provided for the present invention;
A kind of structural representation of information carrying means that Fig. 4 is provided for the present invention;
The structural representation of another information carrying means that Fig. 5 is provided for the present invention;
The structural representation of another information carrying means that Fig. 6 is provided for the present invention;
A kind of structural representation of terminal that Fig. 7 is provided for the present invention;
A kind of structural representation of base station that Fig. 8 is provided for the present invention;
The structural representation of another base station that Fig. 9 is provided for the present invention.
Specific embodiment
The information transferring method that the following each embodiments of the present invention are provided, is applicable to based on terminal switching cell, that is, Switch on its connection base station in the case of cordless communication network in.Terminal can be after suspension for some reason, again In the case of access network, switch connected base station, another city or prominent is roamed into by a certain city such as after terminal closedown Network signal etc. is detected again after right signal interruption.For example, terminal departs from access network again after network, such as network cannot be recognized Card user identity, just needs terminal to resend user identity information such as the international mobile subscriber identity of the terminal In the case of (International Mobile Subscriber Identification number, IMSI), just can perform The information transferring method that following each embodiments are provided.
Fig. 1 is the network architecture diagram of the applicable cordless communication network of the present invention.As shown in figure 1, the cordless communication network can Including:Home device 101, MME/ gateways (Serving-GateWay, S-GW) 102, source base station 103, current base station 104 And terminal 105.Wherein, home device 101 be alternatively referred to as attaching position register (Home Location Register, HLR), Home Environment (Home Environment, HE) or home signature user server (Home Subscriber Server, HSS) etc..Home device 101 is connected with MME/S-GW 102.MME/S-GW 102 is connected by S1 interfaces with source base station 103, also It is connected with current base station 104 by S1 interfaces.Source base station 103 is connected by X2 interface with current base station 104.When terminal 105 from Source base station 103 switches to current base station 104, and terminal 105 is connected between being easy to current base station 104 with communication link.Wherein, the end The alternatively referred to as user equipment (User Equipment, UE) of end 105.
By performing the method that the following each embodiments of the present invention are provided, can effectively be kept away after terminal switches to current page The mark for exempting from terminal transmission is maliciously stolen, and improves communication security.
Following combination multiple embodiments are illustrated.
A kind of flow chart of information transferring method that Fig. 2 is provided for the present invention.As shown in Fig. 2 the method may include:
S201, terminal are encrypted using default encryption key to the ID of the terminal.
The encryption key is the encryption key that source base station consults determination with the terminal.The encryption key is source base station and the end Consult the encryption key nearest apart from current time for determining, that is, newest encryption key in end.This is stored with the terminal The information such as encryption key, the holding time of the encryption key, the mark of the source base station.
Optionally, if the terminal preserves multiple keys for consulting determination with the source base station, this is nearest apart from current time Encryption key can be holding time encryption key most long.When the holding time of each encryption key can be distance generation Between preset time period, such as 24 hours.One holding time of encryption key is reached, then terminal can be carried out to an encryption key Cleaning, such as deletes.
To save memory space, the terminal can only include an encryption key nearest apart from current time with source base station. An encryption key is only preserved, original cipher key is deleted after new encryption key generation.Under normal circumstances, as long as updating new Key can delete original cipher key.
If the time period apart from last time more new key exceedes preset time period, without new more new key, just will can protect The encryption key deposited is deleted.That is, in the case, the retention time most long of the encryption key can be default for this Time period, such as 24 hours.
Optionally, the ID of the terminal can include IMSI.
S202, terminal send ID and encryption of the terminal after the mark of source base station, encryption to current base station The information of key.
The terminal can carry out cell searching under detection (DETECTED) state, where selecting the current base station Cell is resident, and network connection is set up with the current base station.
Terminal does not directly transmit the user identity information of plaintext to current base station, but sends the use of the terminal after encryption Family identifies, and to cause that current base station can finally obtain the ID of the terminal by decryption, the terminal is also to the current base station Send the mark of the source base station and the information of the encryption key.
Corresponding, current base station can receive the ID of the terminal after mark, the encryption of the source base station from terminal And the information of the encryption key.
Wherein, the information of the encryption key can include:Encryption key in itself, the corresponding index of the encryption key or mark Knowledge information etc. at least one.
S203, current base station determine the source base station according to the mark of the source base station.
The current base station can be addressed according to the mark of the source base station as address, to determine the source base station.
S204, current base station send the information of the encryption key to source base station.
Corresponding, source base station can receive the information of the encryption key from current base station.
S205, source base station determine the corresponding decruption key of the encryption key according to the information of the encryption key.
The source base station can determine the encryption key according to the information of the encryption key, then determine that the encryption key is corresponding Decruption key.The encryption key and the decruption key can be the key in rivest, shamir, adelman, the encryption key and the solution Key two different keys each other.
S206, source base station send the decruption key to current base station.
The source base station can be it is determined that after the decruption key, directly send the decruption key to the current base station, also can be true Accuracy after the fixed decruption key first to the decruption key verifies that then being sent to current base station after being verified should Decruption key.
Corresponding, current base station can receive the decruption key from the source base station.
S207, current base station are decrypted according to the decruption key to the ID of the terminal after the encryption, obtain The ID of the terminal.
The current base station can be it is determined that after the ID of the terminal, can carry out AKA streams according to the ID and MME Journey, realizes the proof of identity to the terminal user.
In the information transferring method that the present invention is provided, terminal is using default encryption key to the ID of the terminal It is encrypted, and the ID and the encryption key of the terminal after mark, the encryption of source base station is sent to current base station Information so that the current base station can determine the source base station according to the mark of the source base station, by the information of the encryption key send to The source base station, the source base station can determine the corresponding decruption key of the encryption key according to the information of the encryption key, then should Decruption key is sent to the current base station;The current base station can also be marked according to decruption key to the user of the terminal after the encryption Knowledge is decrypted, and obtains the ID of the terminal.The ID that the method can be prevented effectively from the terminal transmission is maliciously stolen Take, it is ensured that communication security.
Also, in the information transfer, terminal is the ID of the terminal after encrypting to what current base station sent, and should add The ID of the terminal after close only has source base station just with the decruption key decrypted is used to, even if the use of the terminal after encryption Family identifies and the mark of the source base station is trapped, and listener-in or pseudo-base station cannot also obtain the plaintext user mark of user, it is ensured that The security of subscriber identity information.The method that the present invention is provided can be realized in base station level, that is, access net side, it is not necessary to Access Home Environment, it is ensured that the low time delay of accessing terminal to network, and avoid pseudo-base station from inveigling identification information, it is to avoid access pseudo- Base station, ensure that the security of user profile to greatest extent.
Meanwhile, in the information transferring method, even if current base station is pseudo-base station, because pseudo-base station cannot be with legal source base station Communicated, thus so as to cannot decruption key so that terminal can't blindly accept the signaling of pseudo-base station transmission, and be an attempt to Other base stations are accessed, terminal is prevented effectively from and is accessed pseudo-base station, it is ensured that communication security.
Optionally, in method as implied above, terminal is marked using default encryption key to the user of the terminal in S201 Before knowledge is encrypted, the method may also include:
The terminal consults to determine the encryption key in the case where being connected with source base station foundation with the source base station.
The terminal may be in the source base station set up connection in the case of, with the source base station consult determine be used for the terminal with After the source base station is disconnected, and in the case of being connected with the foundation of other base stations, the ID of the terminal is encrypted Key.
The encryption key can be generated using physical layer cipher key technique, or using root key (KeNB) generation 's.It is of course also possible to be generated using other modes.The encryption key can be a key in asymmetric key, can Think public key, or private key.
If the encryption key is to be generated using physical layer cipher key technique, then the method that the present invention is provided also may be such that attacks The person of hitting is difficult to, or even cannot obtain and decode key.
Optionally, the method may also include:
The terminal according to default temporal information, with the source base station synchronized update encryption key.
After the terminal and the source base station are disconnected, the terminal preserves the nearest encryption after updating with the source base station Key.In asymmetric key AES, encryption key and decruption key are usually different keys, to ensure ID Security so that only source base station just have be used to the decruption key decrypted.
Certainly, after the terminal and the source base station are disconnected, the terminal also needs to preserve the information such as the mark of the source base station. The deadline of the corresponding caching of mark of the source base station can be the connection of terminal disconnection and the current base station, and access it His base station.That is, the connection with the current base station is disconnected in the terminal, and in the case of accessing other base stations, the terminal The mark of the source base station of record can be removed, and the mark of the current base station will be recorded.Now, the current base station can be used as new Source base station.
Also preserve the decruption key corresponding to the nearest encryption key after the renewal in the source base station side.
In the method, the terminal, constantly according to Preset Time information, consults to update the encryption key, effectively with the source base station Ensure the freshness of key, communication security is then effectively ensured.
Optionally, end after mark, encryption of the terminal to current base station transmission source base station in S202 as implied above Before the information of the ID at end and the encryption key, the method may also include:
Current base station sends identity request to the terminal.
The identity request can be ID request (UserIDRequest).
Optionally, terminal sends the end after mark, the encryption of source base station to current base station in the S202 as shown in up The information of the ID at end and the encryption key, it may include:
The identity response that current base station receiving terminal sends, the identity response includes:After the mark of the source base station, the encryption The terminal ID and the information of encryption key.
The identity response can be ID response (UserIDResponse).
Optionally, current base station may include to the information that source base station sends the encryption key in S204 as implied above:
Current base station to source base station send the encryption key information and the encryption after the terminal ID.
The current base station can send decoding request to source base station, and the decoding request may include the information of the encryption key and be somebody's turn to do The ID of the terminal after encryption.
It is corresponding, the source base station from current base station receive the encryption key information and the encryption after the terminal user Mark.
Optionally, before S206 source base stations as implied above send the decruption key to current base station, the method can also be wrapped Include:
Source base station is decrypted according to decruption key to the ID of the terminal after the encryption.
Optionally, S206 source base stations as implied above send the decruption key to current base station, it may include:
If successful decryption, source base station sends successful decryption information to the current base station;The successful decryption information includes:The solution Key.
The successful decryption information is properly termed as correct (decryptionCorrect) information of decryption.
Optionally, the method may also include:
If decryption failure, the source base station sends decryption failure information to the current base station.
The decryption failure information can be described as decryption error (decryptionError) information.
And the current base station can send authentification failure after the decryption failure information for receiving source base station return to terminal (authenticationError) information.
The terminal just can be disconnected after the authentication failure message for receiving current base station transmission with current base station, be selected Another base station attempts accessing, if the base station number for attempting accessing cannot all succeed more than or equal to preset value (such as 3) The ID of the terminal after the encryption is decrypted, then can determine that the key that source base station or the end side preserve is lost, and The multiple base stations accessed were attempted before this for the possibility of pseudo-base station is smaller.To ensure that terminal can normally access network, the terminal The best base station of signal intensity may be selected and is connected thereto connection, the user identity information of the terminal is then sent in plain text.
The present invention provide the information transferring method, can in source base station according to decruption key to the terminal after the encryption In the case of ID is decrypted successfully, then decruption key is sent to current base station, the security of information is effectively ensured, carried Communication security high.
The present invention may also provide a kind of information transferring method.Another information transferring method that Fig. 3 is provided for the present invention Flow chart.As shown in figure 3, the method may include:
S301, current base station send ID and ask to terminal.
S302, terminal to current base station send ID respond, the ID response may include source base station mark, The IMSI of the terminal after encryption and the information of the encryption key.
S303, current base station determine source base station according to the mark of the source base station.
S304, current base station send decoding request to source base station, and the decoding request includes the information of the encryption key and is somebody's turn to do The IMSI of the terminal after encryption.
S305, source base station determine the corresponding decruption key of the encryption key according to the information of the encryption key.
S306, source base station are decrypted according to decruption key to the IMSI of the terminal after the encryption.
If successful decryption, S307-S309 can be continued executing with;If conversely, decryption failure, can continue executing with S310-S312.
If S307, successful decryption, source base station sends successful decryption information to current base station;The successful decryption information includes should Decruption key.
S308, current base station are decrypted according to the decruption key to the IMSI of the terminal after the encryption, obtain the end The IMSI at end.
S309, current base station perform AKA flows according to the IMSI of the terminal.
If S310, decryption failure, source base station send decryption failure information to current base station.
S311, current base station send authentication failure message to terminal.
S312, terminal disconnect the connection with current base station.
The information transferring method that the present invention is provided, can be illustrated by specific example to the above method, its Concrete implementation process and beneficial effect can be found in above-mentioned, will not be repeated here.
The present invention also provides a kind of information carrying means.A kind of structure of information carrying means that Fig. 4 is provided for the present invention Schematic diagram.The information carrying means can be integrated in terminal by way of software and/or hardware.As shown in figure 4, the information is passed Defeated device 400 may include:
Encrypting module 401, for being encrypted to the ID of terminal using default encryption key.
Sending module 402, for current base station send source base station mark, encryption after the terminal ID and The information of the encryption key;The mark of the source base station is used to cause that the current base station determines the source base station, by the encryption key Information is sent to the source base station;The information of the encryption key is used to cause that the source base station determines that the corresponding decryption of the encryption key is close Key, then sends to the current base station decruption key;After the decruption key is used to cause the current base station to the encryption The ID of the terminal is decrypted, and obtains the ID of the terminal.
Optionally, the information carrying means 400 may also include:
Negotiation module, for being added to the ID of the terminal using default encryption key in encrypting module 401 Before close, in the case where terminal and the source base station are set up and be connected, consult to determine the encryption key with the source base station.
Optionally, the information carrying means 400 may also include:
Update module, for according to default temporal information, with the source base station synchronized update encryption key.
Optionally, the information carrying means 400 may also include:
Receiver module, the identity request for receiving current base station transmission.
Sending module 402, specifically for sending identity response to the current base station, the identity response includes:The source base station Mark, the encryption after the terminal ID and the information of the encryption key.
The information carrying means that the present invention is provided, can perform the information transfer side that the terminal in above-mentioned Fig. 2 or Fig. 3 is performed Method, its concrete implementation process and beneficial effect can be found in above-mentioned, will not be repeated here.
The present invention also provides a kind of information carrying means.The knot of another information carrying means that Fig. 5 is provided for the present invention Structure schematic diagram.As shown in figure 5, the information carrying means 500 may include:
Receiver module 501, the use of the terminal after mark, the encryption of the source base station sent for current base station receiving terminal The information of family mark and encryption key.
Determining module 502, for the mark according to the source base station, determines the source base station.
Sending module 503, the information for sending the encryption key to the source base station;The information of the encryption key is used to make Obtain the source base station and determine the corresponding decruption key of the encryption key.
Receiver module 501, is additionally operable to receive the decruption key that the source base station sends.
Decryption key 504, for being decrypted to the ID of the terminal after the encryption according to the decruption key, obtains To the ID of the terminal.
Optionally, sending module 503, are additionally operable to send identity request to the terminal.
Receiver module 501, specifically for the identity response that receiving terminal sends, the identity response includes:The source base station The ID and the information of encryption key of the terminal after mark, the encryption.
The information carrying means that the present invention is provided, can perform the information transfer that the current base station in above-mentioned Fig. 2 or Fig. 3 is performed Method, its concrete implementation process and beneficial effect can be found in above-mentioned, will not be repeated here.
The present invention also provides a kind of information carrying means.The knot of another information carrying means that Fig. 6 is provided for the present invention Structure schematic diagram.As shown in fig. 6, the information carrying means 600 may include:
Receiver module 601, the information of the encryption key for receiving current base station transmission.
Determining module 602, for the information according to the encryption key, determines the corresponding decruption key of the encryption key.
Sending module 603, for sending the decruption key to the current base station, the decruption key is used to cause the current base Is stood and the ID of the terminal after encryption is decrypted, obtain the ID of the terminal.
Optionally, receiver module 601, specifically for receiving the information of the encryption key of current base station transmission and should add The ID of the terminal after close.
The information carrying means 600 may also include:
Deciphering module, it is close according to the decryption for before sending module 603 sends the decruption key to the current base station Key is decrypted to the ID of the terminal after the encryption.
Optionally, sending module 603, if specifically for successful decryption, successful decryption information is sent to the current base station; The successful decryption information includes:The decruption key.
Optionally, sending module 603, if being additionally operable to decryption failure, decryption failure information are sent to the current base station.
The information carrying means that the present invention is provided, can perform the information transfer side that the source base station in above-mentioned Fig. 2 or Fig. 3 is performed Method, its concrete implementation process and beneficial effect can be found in above-mentioned, will not be repeated here.
The present invention also provides a kind of terminal.A kind of structural representation of terminal that Fig. 7 is provided for the present invention.As shown in fig. 7, The terminal 700 may include:Processor 701 and transmitter 702.Processor 701 is connected with transmitter 702.
Processor 701, for being encrypted to the ID of terminal using default encryption key.
Transmitter 702, for sending the ID of the terminal after mark, the encryption of source base station to current base station and being somebody's turn to do The information of encryption key;The mark of the source base station is used to cause that the current base station determines the source base station, by the letter of the encryption key Breath is sent to the source base station;The information of the encryption key is used to cause that the source base station determines that the corresponding decryption of the encryption key is close Key, then sends to the current base station decruption key;After the decruption key is used to cause the current base station to the encryption The ID of the terminal is decrypted, and obtains the ID of the terminal.
Optionally, processor 701, are additionally operable to be encrypted the ID of the terminal using default encryption key Before, in the case where terminal and the source base station are set up and be connected, consult to determine the encryption key with the source base station.
Optionally, processor 701, are additionally operable to according to default temporal information, and the encryption is close with the source base station synchronized update Key.
Optionally, the terminal 700 may also include:
Receiver, the identity request for receiving current base station transmission.Receiver is connected with processor 701.
Transmitter 702, specifically for sending identity response to the current base station, the identity response includes:The source base station The ID and the information of the encryption key of the terminal after mark, the encryption.
The terminal that the present invention is provided, can perform the information transferring method that the terminal in above-mentioned Fig. 2 or Fig. 3 is performed, and its is specific Implementation process and beneficial effect can be found in above-mentioned, will not be repeated here.
The present invention also provides a kind of base station.A kind of structural representation of base station that Fig. 8 is provided for the present invention.The base station 800 Can be as current base station.As shown in figure 8, base station 800 may include:Receiver 801, processor 802 and transmitter 803.Receive Device 801 is connected with processor 802, and processor 802 is connected with transmitter 803.
Receiver 801, the user of the terminal after mark, the encryption of the source base station sent for current base station receiving terminal The information of mark and encryption key.
Processor 802, for the mark according to the source base station, determines the source base station.
Transmitter 803, the information for sending the encryption key to the source base station;The information of the encryption key is used to cause The source base station determines the corresponding decruption key of the encryption key.
Receiver 801, is additionally operable to receive the decruption key that the source base station sends.
Processor 802, is additionally operable to be decrypted the ID of the terminal after the encryption according to the decruption key, obtains To the ID of the terminal.
Optionally, transmitter 803, are additionally operable to send identity request to the terminal.
Receiver 801, specifically for the identity response that receiving terminal sends, the identity response includes:The mark of the source base station The ID and the information of encryption key of the terminal after knowledge, the encryption.
The base station that the present invention is provided, can perform the information transferring method that the current base station in above-mentioned Fig. 2 or Fig. 3 is performed, its Concrete implementation process and beneficial effect can be found in above-mentioned, will not be repeated here.
The present invention also provides a kind of base station.The structural representation of another base station that Fig. 9 is provided for the present invention.The base station 900 can be as source base station.As shown in figure 9, the base station 900 may include:Receiver 901, processor 902 and transmitter 903.Connect Receive device 901 to be connected with processor 902, processor 902 is connected with transmitter 903.
Receiver 901, the information of the encryption key for receiving current base station transmission.
Processor 902, for the information according to the encryption key, determines the corresponding decruption key of the encryption key.
Transmitter 903, for sending the decruption key to the current base station, the decruption key is used to cause the current base station ID to the terminal after encryption is decrypted, and obtains the ID of the terminal.
Optionally, receiver 901, information and the encryption specifically for receiving the encryption key of current base station transmission The ID of the terminal afterwards.
Processor 902 was additionally operable to before transmitter 903 sends the decruption key to the current base station, close according to the decryption Key is decrypted to the ID of the terminal after the encryption.
Optionally, transmitter 903, if specifically for successful decryption, successful decryption information is sent to the current base station;Should Successful decryption information includes:The decruption key.
Optionally, transmitter 903, if being additionally operable to decryption failure, decryption failure information are sent to the current base station.
The base station that the present invention is provided, can perform the information transferring method that the source base station in above-mentioned Fig. 2 or Fig. 3 is performed, its tool The implementation process and beneficial effect of body can be found in above-mentioned, will not be repeated here.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent Pipe has been described in detail with reference to foregoing embodiments to the present invention, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered Row equivalent;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

1. a kind of information transferring method, it is characterised in that including:
Terminal is encrypted using default encryption key to the ID of the terminal;
The terminal is close to the ID of the terminal after mark, the encryption of current base station transmission source base station and the encryption The information of key;The mark of the source base station is used to cause that the current base station determines the source base station, by the encryption key Information is sent to the source base station;The information of the encryption key is used to cause that the source base station determines the encryption key correspondence Decruption key, then the decruption key is sent to the current base station;The decruption key is used for so that described current Base station to the encryption after the ID of the terminal be decrypted, obtain the ID of the terminal.
2. method according to claim 1, it is characterised in that the terminal is using default encryption key to the terminal ID be encrypted before, methods described also includes:
The terminal consults to determine the encryption key in the case where being connected with source base station foundation with the source base station.
3. method according to claim 2, it is characterised in that methods described also includes:
The terminal according to default temporal information, with encryption key described in the source base station synchronized update.
4. the method according to any one of claim 1-3, it is characterised in that the terminal uses default encryption key Before being encrypted to the ID of the terminal, methods described also includes:
The terminal receives the identity request that the current base station sends;
The terminal is close to the ID of the terminal after mark, the encryption of current base station transmission source base station and the encryption The information of key, including:
The terminal sends identity response to the current base station, and the identity response includes:It is the mark of the source base station, described The ID of the terminal after encryption and the information of the encryption key.
5. a kind of information transferring method, it is characterised in that including:
The ID and encryption key of the terminal after mark, the encryption of the source base station that current base station receiving terminal sends Information;
The current base station determines the source base station according to the mark of the source base station;
The current base station sends the information of the encryption key to the source base station;The information of the encryption key is used to cause The source base station determines the corresponding decruption key of the encryption key;
The current base station receives the decruption key that the source base station sends;
The current base station according to the decruption key to the encryption after the ID of the terminal be decrypted, obtain The ID of the terminal.
6. method according to claim 5, it is characterised in that the mark of the source base station that the current base station receiving terminal sends Before the ID of the terminal and the information of encryption key after knowledge, encryption, methods described also includes:
The current base station sends identity request to the terminal;
The ID of the terminal after mark, the encryption of the source base station that the current base station receiving terminal sends and encryption are close The information of key, including:
The current base station receives the identity response that the terminal sends, and the identity response includes:The mark of the source base station, The ID and the information of encryption key of the terminal after the encryption.
7. a kind of information transferring method, it is characterised in that including:
Source base station receives the information of the encryption key that current base station sends;
The source base station determines the corresponding decruption key of the encryption key according to the information of the encryption key;
The source base station sends the decruption key to the current base station, and the decruption key is used to cause the current base station The ID of the terminal after to encryption is decrypted, and obtains the ID of the terminal.
8. method according to claim 7, it is characterised in that the source base station receives the encryption key that current base station sends Information include:
The terminal after the information of the encryption key that the source base station reception current base station sends and the encryption ID;
Before the source base station sends the decruption key to the current base station, methods described also includes:
The source base station according to the decruption key to the encryption after the ID of the terminal be decrypted.
9. method according to claim 8, it is characterised in that the source base station sends the decryption to the current base station Key, including:
If successful decryption, the source base station sends successful decryption information to the current base station;The successful decryption information includes: The decruption key.
10. method according to claim 8, it is characterised in that methods described also includes:
If decryption failure, the source base station sends decryption failure information to the current base station.
CN201710131682.3A 2017-03-07 2017-03-07 Information transmission method Active CN106714151B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710131682.3A CN106714151B (en) 2017-03-07 2017-03-07 Information transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710131682.3A CN106714151B (en) 2017-03-07 2017-03-07 Information transmission method

Publications (2)

Publication Number Publication Date
CN106714151A true CN106714151A (en) 2017-05-24
CN106714151B CN106714151B (en) 2020-04-28

Family

ID=58917987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710131682.3A Active CN106714151B (en) 2017-03-07 2017-03-07 Information transmission method

Country Status (1)

Country Link
CN (1) CN106714151B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019023825A1 (en) * 2017-07-30 2019-02-07 华为技术有限公司 Method and device for protecting privacy
CN110192381A (en) * 2017-09-15 2019-08-30 华为技术有限公司 The transmission method and equipment of key
CN110248359A (en) * 2018-03-07 2019-09-17 中国移动通信有限公司研究院 A kind of encipherment scheme, terminal, network element device and computer storage medium
CN110418419A (en) * 2018-04-28 2019-11-05 中国移动通信有限公司研究院 A kind of accidental access method, terminal and the network equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034980A (en) * 2007-04-09 2007-09-12 中兴通讯股份有限公司 Method for user identity protection and transfer
CN103188665A (en) * 2011-12-31 2013-07-03 中国移动通信集团北京有限公司 System, method and device of improving safety of cell phone receiving advertising
EP2765793A1 (en) * 2011-11-01 2014-08-13 Huawei Technologies Co., Ltd. Method and related device for generating group key
CN104980920A (en) * 2015-05-20 2015-10-14 小米科技有限责任公司 Method and device for establishing communication connection of intelligent terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101034980A (en) * 2007-04-09 2007-09-12 中兴通讯股份有限公司 Method for user identity protection and transfer
EP2765793A1 (en) * 2011-11-01 2014-08-13 Huawei Technologies Co., Ltd. Method and related device for generating group key
CN103188665A (en) * 2011-12-31 2013-07-03 中国移动通信集团北京有限公司 System, method and device of improving safety of cell phone receiving advertising
CN104980920A (en) * 2015-05-20 2015-10-14 小米科技有限责任公司 Method and device for establishing communication connection of intelligent terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019023825A1 (en) * 2017-07-30 2019-02-07 华为技术有限公司 Method and device for protecting privacy
CN110169102A (en) * 2017-07-30 2019-08-23 华为技术有限公司 The method and apparatus of secret protection
US11395148B2 (en) 2017-07-30 2022-07-19 Huawei Technologies Co., Ltd. Method and device for protecting privacy
CN110192381A (en) * 2017-09-15 2019-08-30 华为技术有限公司 The transmission method and equipment of key
CN110192381B (en) * 2017-09-15 2021-02-09 华为技术有限公司 Key transmission method and device
CN110248359A (en) * 2018-03-07 2019-09-17 中国移动通信有限公司研究院 A kind of encipherment scheme, terminal, network element device and computer storage medium
CN110418419A (en) * 2018-04-28 2019-11-05 中国移动通信有限公司研究院 A kind of accidental access method, terminal and the network equipment

Also Published As

Publication number Publication date
CN106714151B (en) 2020-04-28

Similar Documents

Publication Publication Date Title
US11075749B2 (en) Method and arrangement in a telecommunication system
CN109314861B (en) Method, device and communication system for obtaining secret key
EP2109278B1 (en) Method and apparatus for generating a new key
JP7139420B2 (en) Method for transmitting an encrypted subscription identifier stored in a security element to a physical or virtual element of a telecommunications network, the corresponding security element, the physical or virtual element and a terminal cooperating with this security element
US20150079941A1 (en) Secure Paging
CN109922474B (en) Method for triggering network authentication and related equipment
KR100547855B1 (en) Secure communication system and method of a composite mobile communication terminal having a local area communication device
CN105142136B (en) A kind of method of anti-pseudo-base station attack
CN101946535A (en) System and method for performing handovers, or key management while performing handovers in a wireless communication system
CN106714151A (en) Information transmission method
CN101309503A (en) Wireless switching method, base station and terminal
CN101895882A (en) Data transmission method, system and device in WiMAX system
KR100920409B1 (en) Authentication of a wireless communication using expiration marker
WO2022127656A1 (en) Authentication method and related apparatus
JP2007506329A (en) Method for improving WLAN security
CN105103577B (en) A kind of device and method of encryption data
WO2008152611A1 (en) Apparatus, method and computer program product providing transparent container
CN114374550B (en) Electric power metering platform with high safety
CN1964259B (en) A method to manage secret key in the course of switch-over
CN110830421A (en) Data transmission method and device
JP6499315B2 (en) Mobile communication system and communication network
CN111770488A (en) EHPLMN updating method, related equipment and storage medium
CN110169128B (en) Communication method, device and system
CN101588374B (en) Soft hardware integrality detection method and system for network appliance
WO2014205846A1 (en) Data transmission method, machine type communication terminal and addressing server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant