CN110248359A - A kind of encipherment scheme, terminal, network element device and computer storage medium - Google Patents
A kind of encipherment scheme, terminal, network element device and computer storage medium Download PDFInfo
- Publication number
- CN110248359A CN110248359A CN201810188437.0A CN201810188437A CN110248359A CN 110248359 A CN110248359 A CN 110248359A CN 201810188437 A CN201810188437 A CN 201810188437A CN 110248359 A CN110248359 A CN 110248359A
- Authority
- CN
- China
- Prior art keywords
- terminal
- public key
- roaming
- network
- imsi
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
Abstract
The invention discloses a kind of encryption method, terminal, network element device and computer storage mediums, wherein the described method includes: terminal downloads the roaming public key of corresponding current roaming network by network in the roaming mode;The terminal encrypts data using the roaming public key.
Description
Technical field
The present invention relates to wireless communication technique more particularly to a kind of encryption method, terminal, network element device and computer storages
Medium.
Background technique
It is universal with 4G network and terminal user for 4G pseudo-base station scheme, mostly have found 4G pseudo-base station, mesh
Be to obtain user's international mobile subscriber identity (IMSI) information, which can access great amount of terminals when starting, and cause common
User's communication service interruption causes customer complaint in turn, and causes larger interference to existing net.
In this scene, for IMSI encipherment scheme, in order to avoid IMSI is captured by 4G pseudo-base station, carry out
The research of related IMSI encryption.Candidate typical scenario is the encipherment scheme using rivest, shamir, adelman.Asymmetric encryption is calculated
Method allows the communication two party exchange of encryption information on unsafe media.The algorithm needs a pair of secret keys: the disclosure of external disclosure
Key (public key, abbreviation public key) and underground private cipher key (private key, abbreviation private key), if with open
Data key is encrypted, and could only be decrypted with corresponding private cipher key.Scheme is specially use when terminal reports IMSI
The public key of operator is encrypted, and operator base station is decrypted after receiving the IMSI of encryption using corresponding private key, and 4G is pseudo-
Base station can not be decrypted, therefore can not obtain user IMSI due to the private key of not no operator after intercepting and capturing the IMSI of encryption.
However, for above-mentioned asymmetrical encryption approach, need to block at client identification module (SIM) or terminal on storage of public keys,
But the public key of global each operator is different, causes for international roaming scene, terminal storage operator public key exists
There is Liang Baiduoge operator in problem, such as the whole world, need to store more public key, maintenance update it is more complex, along with release 5G when
Between have successively, starting terminal is likely difficult to support the later operator's public key for releasing 5G.For this problem, in the related technology simultaneously
There is no effective solution.
Summary of the invention
It is situated between in view of this, the embodiment of the present invention is desirable to provide a kind of encryption method, terminal, network element device and computer storage
Matter solves at least problem of the existing technology.
The technical solution of the embodiment of the present invention is achieved in that
A kind of encryption method of the embodiment of the present invention, which comprises
Terminal downloads the roaming public key of corresponding current roaming network by network in the roaming mode;
The terminal encrypts data using the roaming public key.
In above scheme, at least one ownership public key is stored in the SIM card of the terminal or the terminal.
In above scheme, the method also includes:
After the terminal enters the roam mode, when being switched on first time, transmitted IMSI is carried out using ownership public key
Encryption.
In above scheme, the method also includes:
The terminal ownership public key core net using the corresponding ownership public key ownership private key to the IMSI into
After row decryption and progress bi-directional authentification, the roaming public key that roaming network issues is received.
In above scheme, the method also includes:
The terminal encrypts transmitted IMSI using the roaming public key when roaming place is switched on again.
A kind of encryption method of the embodiment of the present invention, which comprises
It, will be under the roaming public key of corresponding current roaming network after terminal and network in the roaming mode carries out bi-directional authentification
The terminal is issued, encrypts the terminal to data using the roaming public key.
In above scheme, the method also includes:
The core net of roaming network receives the IMSI using ownership public key encryption;
After finding the core net of home network, the IMSI of encryption is sent to the core net of home network.
In above scheme, the method also includes:
The core net of roaming network uses the corresponding ownership private key for belonging to public key in the core net of the ownership public key
After the IMSI is decrypted, IMSI is received in plain text.
A kind of terminal of the embodiment of the present invention, the terminal include:
Download unit, for downloading the roaming public key of corresponding current roaming network by network in the roaming mode;
Encryption unit, for being encrypted using the roaming public key to data.
In above scheme, the terminal further include:
Storage unit, for storing at least one ownership public key in the SIM card of the terminal or the terminal.
In above scheme, the terminal further include:
Transmission unit, after entering the roam mode, when being switched on first time, transmitted IMSI is public using ownership
Key is encrypted.
In above scheme, the terminal further include:
Receiving unit, for the core net in ownership public key using the ownership private key of the corresponding ownership public key to described
After IMSI is decrypted and carries out bi-directional authentification, the roaming public key that roaming network issues is received.
In above scheme, the encryption unit is further used for:
When roaming place is switched on again, transmitted IMSI is encrypted using the roaming public key.
A kind of network element device of the embodiment of the present invention, the network element device include:
Delivering key unit will be corresponding current unrestrained after carrying out bi-directional authentification with network for terminal in the roaming mode
The roaming public key of trip network is handed down to the terminal, encrypts the terminal to data using the roaming public key.
In above scheme, the network element device further include:
Information receiving unit, for receiving the IMSI using ownership public key encryption;
The IMSI of encryption after the core net for finding home network, is sent to home network by information transmitting unit
Core net.
In above scheme, the information receiving unit is further used for:
The IMSI is solved using the ownership private key of the correspondence ownership public key in the core net of the ownership public key
After close, IMSI is received in plain text.
A kind of terminal of the embodiment of the present invention, comprising: processor and for storing the calculating that can be run on a processor
The memory of machine program;
Wherein, the step of any one of above scheme the method is realized when the processor is used to run the computer program
Suddenly.
A kind of network element device of the embodiment of the present invention, comprising: processor and for storing and can run on a processor
The memory of computer program;
Wherein, the step of any one of above scheme the method is realized when the processor is used to run the computer program
Suddenly.
A kind of computer storage medium of the embodiment of the present invention, is stored thereon with computer program, wherein the computer journey
The step of any one of above scheme the method is realized when sequence is executed by processor.
Using the embodiment of the present invention, the roaming that terminal downloads corresponding current roaming network by network in the roaming mode is public
Key, the terminal encrypt data using the roaming public key.Since terminal does not need to store the public key of each operator,
The public key for current roaming network can be downloaded to from network on demand, therefore, for solving end for international roaming scene
The problem of end storage operator's public key, does not need to store more public key, also reduces the complexity that maintenance updates.
Detailed description of the invention
Fig. 1 is the implementation flow chart of one method of the embodiment of the present invention;
Fig. 2 is the work flow diagram of 4G pseudo-base station in the related technology;
Fig. 3 is the schematic diagram of asymmetrical encryption approach in the related technology;
Fig. 4 is the flow chart using the IMSI encipherment scheme for updating public key by network of the embodiment of the present invention.
Specific embodiment
The implementation of technical solution is described in further detail with reference to the accompanying drawing.
A kind of encryption method of the embodiment of the present invention, as shown in Figure 1, which comprises
Step 101, terminal download the roaming public key of corresponding current roaming network by network in the roaming mode.
Step 102, the terminal encrypt data using the roaming public key.
In the related technology, for 4G pseudo-base station, 4G pseudo-base station, the purpose is to obtain user's IMSI information, the equipment
Great amount of terminals can be accessed when starting, lead to ordinary user's communication service interruption and then cause customer complaint, and to existing net cause compared with
Big interference.It is to monitor the system broadcast message for now netting base station first, the existing net cell that disguises oneself as after acquisition message simultaneously broadcasts forgery
System broadcast message, then terminal is sucked by cell reselection mode, and trigger eventually by the way that different tracking area codes (TAC) is arranged
Initiating updating of tracking area (TAU) process of end descends signaling to obtain the IMSI information of user in this process, finally kicks user
Out.
The workflow of 4G pseudo-base station is as shown in Fig. 2, include following content:
One: monitoring and pretend
Step 201-202, engineering mobile phone obtains the system broadcast message of current persistent district, is sent to 4G pseudo-base station;
Step 203-204, the signal strength of engineering mobile phone for measuring adjacent area finds the PCI of the most weak adjacent area of signal;
Step 205, pseudo-base station are forged by the system broadcast message of persistent district, most weak using identical frequency point and signal
The PCI of adjacent area, and different TAC (tracking area identification) is used, signal is emitted with relatively high power.Pseudo-base station cell becomes common and uses
The candidate service cell of family LTE mobile phone.
Two: sucking and kick out of
Step 206, ordinary user mobile phone detect pseudo-base station cell signal after reselect to pseudo-base station cell;
Step 207, ordinary user mobile phone detect TAC change, initiating updating of tracking area request;
Step 208-209, pseudo-base station issues identification demand signalling (Identity Request), the hand of ordinary user
Machine sends identification request response signaling (Identity Response), wherein encapsulating IMSI, it may be assumed that sends Identity
Response (IMSI), pseudo-base station get the IMSI of user terminal;
The tracing section updating request (TAU Reject) of step 210, pseudo-base station refusal user terminal, user terminal is kicked out of
Pseudo-base station cell.
In the related technology, for IMSI encipherment scheme, rivest, shamir, adelman can be used, which calculates
Method allows the communication two party exchange of encryption information on unsafe media.As shown in figure 3, the algorithm needs a pair of secret keys: externally
Disclosed public-key cryptography, abbreviation public key and underground private cipher key, abbreviation private key.If added with public-key cryptography to data
It is close, it could only be decrypted with corresponding private cipher key.Scheme is specially to be carried out when terminal reports IMSI using the public key of operator
Encryption, operator base station is decrypted after receiving the IMSI of encryption using corresponding private key, and 4G pseudo-base station is not due to runing
The private key of quotient can not be decrypted after intercepting and capturing the IMSI of encryption, therefore can not obtain user IMSI.
In the related technology, for above-mentioned asymmetrical encryption approach, need in SIM card or terminal storage of public keys, but it is global
The public key of each operator is different, causes for international roaming scene, and there are problems for terminal storage operator public key, such as
There is Liang Baiduoge operator in the whole world, need to store more public key, and maintenance update is more complex, along with the time for releasing 5G has successively,
Starting terminal is likely difficult to support the later operator's public key for releasing 5G.Using the embodiment of the present invention, terminal or SIM card can be with
It is only to store an ownership public key, terminal downloads public key and the use of corresponding network by network under roaming scence, is a kind of
The IMSI encipherment scheme that public key is updated by network, the problem of being brought so as to avoid terminal storage global operator public key.
In one embodiment of the embodiment of the present invention, at least one is stored in the SIM card of the terminal or the terminal and is returned
Belong to public key.For IMSI encipherment scheme, SIM card or terminal can be and only store an ownership public key, the terminal under roaming scence
The public key of corresponding network is downloaded by network and IMSI is encrypted using the public key.
So-called SIM card is the abbreviation of Subscriber Identity Module, is client identification module, also referred to as intelligence
It can block, subscriber identification card, GSM digital mobile telephone must load onto this card and can use.It is deposited on a computer chip
The information of digital mobile phone client is stored up, the contents such as telephone directory of the key of encryption and user, for GSM network client's body
Voice messaging when part being identified, and conversed client encrypts.Any GSM mobile handset can be inserted in one SIM card
Middle use, and then oneself be recorded in using communication expense caused by mobile phone on the customer's account of the SIM card institute unique identification.
In one embodiment of the embodiment of the present invention, the method also includes: after the terminal enters the roam mode,
Transmitted IMSI is encrypted using ownership public key when being switched on for the first time.It should be pointed out that only IMSI is encrypted,
The MCC and MNC of IMSI are not encrypted.
In one embodiment of the embodiment of the present invention, the method also includes: the terminal makes in the core net of ownership public key
After being decrypted to the IMSI with the ownership private key of the correspondence ownership public key and carry out bi-directional authentification, receive under roaming network
The roaming public key of hair.It should be pointed out that roaming public key is the roaming public key of corresponding current roaming network.
In one practical application, after the core net of roaming network receives IMSI, home network is found according to MCC and MNC
The IMSI of encryption is issued the core net of home network by core net.The core net of home network is returned using corresponding ownership public key
Belong to private key IMSI is decrypted, IMSI is issued to the core net of roaming network in plain text.After terminal and network carry out bi-directional authentification,
Roaming network issues the roaming public key of corresponding roaming network.To which terminal downloads corresponding network by network under roaming scence
Public key after, roaming public key can be used, data is encrypted, for example IMSI data are encrypted.
In one embodiment of the embodiment of the present invention, the method also includes: the terminal makes when roaming place is switched on again
Transmitted IMSI is encrypted with the roaming public key.That is, terminal is when roaming place is switched on again, transmission
IMSI uses roaming public key encryption.
A kind of encryption method of the embodiment of the present invention, which comprises terminal and network in the roaming mode carries out
After bi-directional authentification, the roaming public key of corresponding current roaming network is handed down to the terminal, the terminal is made to use the roaming
Public key encrypts data.
In one embodiment of the embodiment of the present invention, the method also includes: the core net of roaming network is received using ownership
The IMSI of public key encryption;After finding the core net of home network, the IMSI of encryption is sent to the core net of home network.It needs
, it is noted that the information that terminal is sent includes the MCC and MNC of unencryption, and using the IMSI of ownership public key encryption, according to MCC
The IMSI of encryption is sent to the core net of home network by the core net that home network is found with MNC.
In one embodiment of the embodiment of the present invention, the method also includes: the core net of roaming network is public in the ownership
After the core net of key is decrypted the IMSI using the ownership private key of the correspondence ownership public key, IMSI is received in plain text.
That is, the core net of home network is decrypted IMSI using the ownership private key of corresponding ownership public key, in plain text by IMSI
Issue the core net of roaming network.
In one embodiment of the embodiment of the present invention, after terminal and network progress bi-directional authentification, roaming network issues corresponding unrestrained
The roaming public key of network is swum to terminal.That is, under roaming scence terminal by network download corresponding network public key simultaneously
It uses, terminal saves after receiving.Terminal adds IMSI using the roaming public key that roaming network is sent when roaming place is switched on again
It is sent after close.
By taking 4G scene as an example, using a kind of IMSI encipherment scheme for updating public key by network of the embodiment of the present invention, such as
Shown in Fig. 4, include the following steps:
Step 401 only stores an ownership public key in SIM card or terminal.After terminal enters roaming, when being switched on for the first time
Attachment (Attach) request is sent, the IMSI in Attach request is not added using ownership public key encryption, the MCC and MNC of IMSI
It is close.
Step 402-403, after the core net of roaming network receives IMSI, the core of home network is found according to MCC and MNC
The IMSI of encryption is issued the core net of home network by net.
Step 404-405, the core net of home network is decrypted IMSI using the ownership private key of corresponding ownership public key,
IMSI is issued to the core net of roaming network in plain text.
Step 406-408, terminal and network carry out bi-directional authentification.After authenticating successfully, roaming network issues corresponding roaming network
For the roaming public key of network to terminal, terminal saves the roaming public key after receiving roaming public key.
When roaming place is switched on again, the IMSI of transmission uses the roaming public key encryption for step 409, terminal.
A kind of terminal of the embodiment of the present invention, the terminal include:
Download unit, for downloading the roaming public key of corresponding current roaming network by network in the roaming mode;
Encryption unit, for being encrypted using the roaming public key to data.
In one embodiment of the embodiment of the present invention, the terminal further include:
Storage unit is returned for storing at least one in the client identification module SIM card of the terminal or the terminal
Belong to public key.
In one embodiment of the embodiment of the present invention, the terminal further include:
Transmission unit, after entering the roam mode, when being switched on first time, transmitted IMSI is public using ownership
Key is encrypted.
In one embodiment of the embodiment of the present invention, the terminal further include:
Receiving unit, for the core net in ownership public key using the ownership private key of the corresponding ownership public key to described
After IMSI is decrypted and carries out bi-directional authentification, the roaming public key that roaming network issues is received.
In one embodiment of the embodiment of the present invention, the encryption unit is further used for:
When roaming place is switched on again, transmitted IMSI is encrypted using the roaming public key.
A kind of network element device of the embodiment of the present invention, the network element device include:
Delivering key unit will be corresponding current unrestrained after carrying out bi-directional authentification with network for terminal in the roaming mode
The roaming public key of trip network is handed down to the terminal, encrypts the terminal to data using the roaming public key.
In one embodiment of the embodiment of the present invention, the network element device further include:
Information receiving unit, for receiving the IMSI using ownership public key encryption;
The IMSI of encryption after the core net for finding home network, is sent to home network by information transmitting unit
Core net.
In one embodiment of the embodiment of the present invention, the information receiving unit is further used for:
The IMSI is solved using the ownership private key of the correspondence ownership public key in the core net of the ownership public key
After close, IMSI is received in plain text.
A kind of terminal of the embodiment of the present invention, comprising: processor and for storing the calculating that can be run on a processor
The memory of machine program;
Wherein, the processor is for realizing any one of above-described embodiment the method when running the computer program
Step.
A kind of network element device of the embodiment of the present invention, comprising: processor and for storing and can run on a processor
The memory of computer program;
Wherein, the processor is for realizing any one of above-described embodiment the method when running the computer program
Step.
A kind of computer storage medium of the embodiment of the present invention, is stored thereon with computer program, wherein the computer journey
The step of any one of above-described embodiment the method is realized when sequence is executed by processor.
If the module integrated described in the embodiment of the present invention is realized in the form of software function module and as independent production
Product when selling or using, also can store in a computer readable storage medium.Based on this understanding, the present invention is real
Applying the technical solution of example, substantially the part that contributes to existing technology can embody in the form of software products in other words
Come, which is stored in a storage medium, including some instructions are used so that a computer equipment (can
To be personal computer, server or network equipment etc.) execute the whole or portion of each embodiment the method for the present invention
Point.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), deposits at random
The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic or disk.
It is combined in this way, the embodiment of the present invention is not limited to any specific hardware and software.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (19)
1. a kind of encryption method, which is characterized in that the described method includes:
Terminal downloads the roaming public key of corresponding current roaming network by network in the roaming mode;
The terminal encrypts data using the roaming public key.
2. the method according to claim 1, wherein in the client identification module of the terminal or the terminal
At least one ownership public key is stored in SIM card.
3. the method according to claim 1, wherein the method also includes:
After the terminal enters the roam mode, when being switched on first time, transmitted IMSI is added using ownership public key
It is close.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
The terminal solves the IMSI using the ownership private key of the correspondence ownership public key in the core net of ownership public key
After close and progress bi-directional authentification, the roaming public key that roaming network issues is received.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
The terminal encrypts transmitted IMSI using the roaming public key when roaming place is switched on again.
6. a kind of encryption method, which is characterized in that the described method includes:
After terminal and network in the roaming mode carries out bi-directional authentification, the roaming public key of corresponding current roaming network is handed down to
The terminal encrypts the terminal to data using the roaming public key.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
The core net of roaming network receives the IMSI using ownership public key encryption;
After finding the core net of home network, the IMSI of encryption is sent to the core net of home network.
8. the method according to the description of claim 7 is characterized in that the method also includes:
The core net of roaming network uses the ownership private key of the corresponding ownership public key to institute in the core net of the ownership public key
It states after IMSI is decrypted, receives IMSI in plain text.
9. a kind of terminal, which is characterized in that the terminal includes:
Download unit, for downloading the roaming public key of corresponding current roaming network by network in the roaming mode;
Encryption unit, for being encrypted using the roaming public key to data.
10. terminal according to claim 9, which is characterized in that the terminal further include:
Storage unit, it is public for storing at least one ownership in the client identification module SIM card of the terminal or the terminal
Key.
11. terminal according to claim 9, which is characterized in that the terminal further include:
Transmission unit, after entering the roam mode, when being switched on first time transmitted IMSI using ownership public key into
Row encryption.
12. terminal according to claim 11, which is characterized in that the terminal further include:
Receiving unit, for the core net in ownership public key using the corresponding ownership public key ownership private key to the IMSI into
After row decryption and progress bi-directional authentification, the roaming public key that roaming network issues is received.
13. terminal according to claim 12, which is characterized in that the encryption unit is further used for:
When roaming place is switched on again, transmitted IMSI is encrypted using the roaming public key.
14. a kind of network element device, which is characterized in that the network element device includes:
Delivering key unit will corresponding current roaming net after carrying out bi-directional authentification with network for terminal in the roaming mode
The roaming public key of network is handed down to the terminal, encrypts the terminal to data using the roaming public key.
15. network element device according to claim 14, which is characterized in that the network element device further include:
Information receiving unit, for receiving the IMSI using ownership public key encryption;
The IMSI of encryption after the core net for finding home network, is sent to the core of home network by information transmitting unit
Net.
16. network element device according to claim 15, which is characterized in that the information receiving unit is further used for:
After in the core net of the ownership public key, using correspondence, the IMSI is decrypted in the ownership private key of the ownership public key,
Receive IMSI in plain text.
17. a kind of terminal characterized by comprising processor and for storing the computer journey that can be run on a processor
The memory of sequence;
Wherein, the step of any one of claim 1-5 the method is realized when the processor is used to run the computer program
Suddenly.
18. a kind of network element device characterized by comprising processor and for storing the calculating that can be run on a processor
The memory of machine program;
Wherein, the step of any one of claim 6-8 the method is realized when the processor is used to run the computer program
Suddenly.
19. a kind of computer storage medium, is stored thereon with computer program, wherein the computer program is executed by processor
The step of any one of Shi Shixian claim 1-5, claim 6-8 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810188437.0A CN110248359A (en) | 2018-03-07 | 2018-03-07 | A kind of encipherment scheme, terminal, network element device and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810188437.0A CN110248359A (en) | 2018-03-07 | 2018-03-07 | A kind of encipherment scheme, terminal, network element device and computer storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110248359A true CN110248359A (en) | 2019-09-17 |
Family
ID=67882160
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810188437.0A Pending CN110248359A (en) | 2018-03-07 | 2018-03-07 | A kind of encipherment scheme, terminal, network element device and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110248359A (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114958A (en) * | 2006-07-24 | 2008-01-30 | 华为技术有限公司 | Method for implementing mobile IP cipher key update in WiMAX system |
CN101282518A (en) * | 2007-04-03 | 2008-10-08 | 展讯通信(上海)有限公司 | Method and smart card apparatus for protecting user privacy when opening handset |
CN101309466A (en) * | 2007-05-15 | 2008-11-19 | 展讯通信(上海)有限公司 | Method and apparatus protecting user's privacy when mobile phone started |
CN101312583A (en) * | 2007-05-21 | 2008-11-26 | 展讯通信(上海)有限公司 | Mobile phone cipher selection method, system and smart card apparatus |
CN101448286A (en) * | 2008-12-26 | 2009-06-03 | 成都卫士通信息产业股份有限公司 | A roaming authorization method of mobile digital TV user |
CN101552668A (en) * | 2008-03-31 | 2009-10-07 | 展讯通信(上海)有限公司 | Certificating method, user equipment and base station for accessing user equipment into network |
CN101945388A (en) * | 2010-10-14 | 2011-01-12 | 杭州华三通信技术有限公司 | Wireless roaming authentication method, wireless roaming method and device thereof |
CN101969638A (en) * | 2010-09-30 | 2011-02-09 | 中国科学院软件研究所 | Method for protecting international mobile subscriber identity (IMSI) in mobile communication |
CN103354640A (en) * | 2008-05-06 | 2013-10-16 | 高通股份有限公司 | Authenticating a wireless device in a visited network |
WO2015121263A1 (en) * | 2014-02-12 | 2015-08-20 | Ipco As | Method and system for determining that a sim and a sip client are co-located in the same mobile equipment |
CN106131811A (en) * | 2016-06-29 | 2016-11-16 | 广州二六三移动通信有限公司 | Sim module, mobile module, roaming system and method thereof |
WO2016209126A1 (en) * | 2015-06-23 | 2016-12-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods, network nodes, mobile entity, computer programs and computer program products for protecting privacy of a mobile entity |
CN106714151A (en) * | 2017-03-07 | 2017-05-24 | 北京邮电大学 | Information transmission method |
-
2018
- 2018-03-07 CN CN201810188437.0A patent/CN110248359A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101114958A (en) * | 2006-07-24 | 2008-01-30 | 华为技术有限公司 | Method for implementing mobile IP cipher key update in WiMAX system |
CN101282518A (en) * | 2007-04-03 | 2008-10-08 | 展讯通信(上海)有限公司 | Method and smart card apparatus for protecting user privacy when opening handset |
CN101309466A (en) * | 2007-05-15 | 2008-11-19 | 展讯通信(上海)有限公司 | Method and apparatus protecting user's privacy when mobile phone started |
CN101312583A (en) * | 2007-05-21 | 2008-11-26 | 展讯通信(上海)有限公司 | Mobile phone cipher selection method, system and smart card apparatus |
CN101552668A (en) * | 2008-03-31 | 2009-10-07 | 展讯通信(上海)有限公司 | Certificating method, user equipment and base station for accessing user equipment into network |
CN103354640A (en) * | 2008-05-06 | 2013-10-16 | 高通股份有限公司 | Authenticating a wireless device in a visited network |
CN101448286A (en) * | 2008-12-26 | 2009-06-03 | 成都卫士通信息产业股份有限公司 | A roaming authorization method of mobile digital TV user |
CN101969638A (en) * | 2010-09-30 | 2011-02-09 | 中国科学院软件研究所 | Method for protecting international mobile subscriber identity (IMSI) in mobile communication |
CN101945388A (en) * | 2010-10-14 | 2011-01-12 | 杭州华三通信技术有限公司 | Wireless roaming authentication method, wireless roaming method and device thereof |
WO2015121263A1 (en) * | 2014-02-12 | 2015-08-20 | Ipco As | Method and system for determining that a sim and a sip client are co-located in the same mobile equipment |
WO2016209126A1 (en) * | 2015-06-23 | 2016-12-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods, network nodes, mobile entity, computer programs and computer program products for protecting privacy of a mobile entity |
CN106131811A (en) * | 2016-06-29 | 2016-11-16 | 广州二六三移动通信有限公司 | Sim module, mobile module, roaming system and method thereof |
CN106714151A (en) * | 2017-03-07 | 2017-05-24 | 北京邮电大学 | Information transmission method |
Non-Patent Citations (1)
Title |
---|
阮航,ET AL: "4G新型伪基站方案分析与对策", 《中国会议》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104703170B (en) | Methods and equipment for downloading file of operator | |
CN103329582B (en) | System for managing multiple subscriptions in a UICC | |
EP2861002B1 (en) | Virtual user identification data distributing method and obtaining method, and devices | |
US9047444B2 (en) | Mobile application registration | |
US8219811B2 (en) | Secure software execution such as for use with a cell phone or mobile device | |
KR101432356B1 (en) | Remote activation capture | |
CN105338515B (en) | Data service transmission method and mobile communication equipment | |
CN107979835B (en) | eSIM card and management method thereof | |
WO2013008048A1 (en) | Method and apparatus for provisioning network access credentials | |
CN109922474B (en) | Method for triggering network authentication and related equipment | |
US9572023B2 (en) | Method and system for providing services to mobile communication subscribers | |
CN102833712A (en) | Method, device, server and system for preventing information leakage and equipment | |
US9621716B2 (en) | Method and system for secure provisioning of a wireless device | |
KR102600813B1 (en) | Apparatus and method for installing and managing a profile by using messaging service | |
CN113785532B (en) | Method and apparatus for managing and verifying certificates | |
CN111132305B (en) | Method for 5G user terminal to access 5G network, user terminal equipment and medium | |
Lakshmi et al. | USSD—Architecture analysis, security threats, issues and enhancements | |
CN102625299A (en) | Data transmission method, system and device | |
CN103716772A (en) | Service processing method, device and communication system | |
CN105813060A (en) | Method and device for obtaining virtual user identity | |
CN105407479A (en) | Information recognition method, information gateway, SIM card, and system | |
CN102461232B (en) | Method for authenticating a universal subscriber identity module and system thereof | |
CN110073681B (en) | Method, apparatus and computer readable medium for internet of things device | |
CN105376733A (en) | Information processing method and electronic apparatus | |
CN108512803A (en) | Remind the method and device of change account bound phone number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190917 |
|
RJ01 | Rejection of invention patent application after publication |