CN110248359A - A kind of encipherment scheme, terminal, network element device and computer storage medium - Google Patents

A kind of encipherment scheme, terminal, network element device and computer storage medium Download PDF

Info

Publication number
CN110248359A
CN110248359A CN201810188437.0A CN201810188437A CN110248359A CN 110248359 A CN110248359 A CN 110248359A CN 201810188437 A CN201810188437 A CN 201810188437A CN 110248359 A CN110248359 A CN 110248359A
Authority
CN
China
Prior art keywords
terminal
public key
roaming
network
imsi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810188437.0A
Other languages
Chinese (zh)
Inventor
阮航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Communications Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Communications Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201810188437.0A priority Critical patent/CN110248359A/en
Publication of CN110248359A publication Critical patent/CN110248359A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier

Abstract

The invention discloses a kind of encryption method, terminal, network element device and computer storage mediums, wherein the described method includes: terminal downloads the roaming public key of corresponding current roaming network by network in the roaming mode;The terminal encrypts data using the roaming public key.

Description

A kind of encipherment scheme, terminal, network element device and computer storage medium
Technical field
The present invention relates to wireless communication technique more particularly to a kind of encryption method, terminal, network element device and computer storages Medium.
Background technique
It is universal with 4G network and terminal user for 4G pseudo-base station scheme, mostly have found 4G pseudo-base station, mesh Be to obtain user's international mobile subscriber identity (IMSI) information, which can access great amount of terminals when starting, and cause common User's communication service interruption causes customer complaint in turn, and causes larger interference to existing net.
In this scene, for IMSI encipherment scheme, in order to avoid IMSI is captured by 4G pseudo-base station, carry out The research of related IMSI encryption.Candidate typical scenario is the encipherment scheme using rivest, shamir, adelman.Asymmetric encryption is calculated Method allows the communication two party exchange of encryption information on unsafe media.The algorithm needs a pair of secret keys: the disclosure of external disclosure Key (public key, abbreviation public key) and underground private cipher key (private key, abbreviation private key), if with open Data key is encrypted, and could only be decrypted with corresponding private cipher key.Scheme is specially use when terminal reports IMSI The public key of operator is encrypted, and operator base station is decrypted after receiving the IMSI of encryption using corresponding private key, and 4G is pseudo- Base station can not be decrypted, therefore can not obtain user IMSI due to the private key of not no operator after intercepting and capturing the IMSI of encryption.
However, for above-mentioned asymmetrical encryption approach, need to block at client identification module (SIM) or terminal on storage of public keys, But the public key of global each operator is different, causes for international roaming scene, terminal storage operator public key exists There is Liang Baiduoge operator in problem, such as the whole world, need to store more public key, maintenance update it is more complex, along with release 5G when Between have successively, starting terminal is likely difficult to support the later operator's public key for releasing 5G.For this problem, in the related technology simultaneously There is no effective solution.
Summary of the invention
It is situated between in view of this, the embodiment of the present invention is desirable to provide a kind of encryption method, terminal, network element device and computer storage Matter solves at least problem of the existing technology.
The technical solution of the embodiment of the present invention is achieved in that
A kind of encryption method of the embodiment of the present invention, which comprises
Terminal downloads the roaming public key of corresponding current roaming network by network in the roaming mode;
The terminal encrypts data using the roaming public key.
In above scheme, at least one ownership public key is stored in the SIM card of the terminal or the terminal.
In above scheme, the method also includes:
After the terminal enters the roam mode, when being switched on first time, transmitted IMSI is carried out using ownership public key Encryption.
In above scheme, the method also includes:
The terminal ownership public key core net using the corresponding ownership public key ownership private key to the IMSI into After row decryption and progress bi-directional authentification, the roaming public key that roaming network issues is received.
In above scheme, the method also includes:
The terminal encrypts transmitted IMSI using the roaming public key when roaming place is switched on again.
A kind of encryption method of the embodiment of the present invention, which comprises
It, will be under the roaming public key of corresponding current roaming network after terminal and network in the roaming mode carries out bi-directional authentification The terminal is issued, encrypts the terminal to data using the roaming public key.
In above scheme, the method also includes:
The core net of roaming network receives the IMSI using ownership public key encryption;
After finding the core net of home network, the IMSI of encryption is sent to the core net of home network.
In above scheme, the method also includes:
The core net of roaming network uses the corresponding ownership private key for belonging to public key in the core net of the ownership public key After the IMSI is decrypted, IMSI is received in plain text.
A kind of terminal of the embodiment of the present invention, the terminal include:
Download unit, for downloading the roaming public key of corresponding current roaming network by network in the roaming mode;
Encryption unit, for being encrypted using the roaming public key to data.
In above scheme, the terminal further include:
Storage unit, for storing at least one ownership public key in the SIM card of the terminal or the terminal.
In above scheme, the terminal further include:
Transmission unit, after entering the roam mode, when being switched on first time, transmitted IMSI is public using ownership Key is encrypted.
In above scheme, the terminal further include:
Receiving unit, for the core net in ownership public key using the ownership private key of the corresponding ownership public key to described After IMSI is decrypted and carries out bi-directional authentification, the roaming public key that roaming network issues is received.
In above scheme, the encryption unit is further used for:
When roaming place is switched on again, transmitted IMSI is encrypted using the roaming public key.
A kind of network element device of the embodiment of the present invention, the network element device include:
Delivering key unit will be corresponding current unrestrained after carrying out bi-directional authentification with network for terminal in the roaming mode The roaming public key of trip network is handed down to the terminal, encrypts the terminal to data using the roaming public key.
In above scheme, the network element device further include:
Information receiving unit, for receiving the IMSI using ownership public key encryption;
The IMSI of encryption after the core net for finding home network, is sent to home network by information transmitting unit Core net.
In above scheme, the information receiving unit is further used for:
The IMSI is solved using the ownership private key of the correspondence ownership public key in the core net of the ownership public key After close, IMSI is received in plain text.
A kind of terminal of the embodiment of the present invention, comprising: processor and for storing the calculating that can be run on a processor The memory of machine program;
Wherein, the step of any one of above scheme the method is realized when the processor is used to run the computer program Suddenly.
A kind of network element device of the embodiment of the present invention, comprising: processor and for storing and can run on a processor The memory of computer program;
Wherein, the step of any one of above scheme the method is realized when the processor is used to run the computer program Suddenly.
A kind of computer storage medium of the embodiment of the present invention, is stored thereon with computer program, wherein the computer journey The step of any one of above scheme the method is realized when sequence is executed by processor.
Using the embodiment of the present invention, the roaming that terminal downloads corresponding current roaming network by network in the roaming mode is public Key, the terminal encrypt data using the roaming public key.Since terminal does not need to store the public key of each operator, The public key for current roaming network can be downloaded to from network on demand, therefore, for solving end for international roaming scene The problem of end storage operator's public key, does not need to store more public key, also reduces the complexity that maintenance updates.
Detailed description of the invention
Fig. 1 is the implementation flow chart of one method of the embodiment of the present invention;
Fig. 2 is the work flow diagram of 4G pseudo-base station in the related technology;
Fig. 3 is the schematic diagram of asymmetrical encryption approach in the related technology;
Fig. 4 is the flow chart using the IMSI encipherment scheme for updating public key by network of the embodiment of the present invention.
Specific embodiment
The implementation of technical solution is described in further detail with reference to the accompanying drawing.
A kind of encryption method of the embodiment of the present invention, as shown in Figure 1, which comprises
Step 101, terminal download the roaming public key of corresponding current roaming network by network in the roaming mode.
Step 102, the terminal encrypt data using the roaming public key.
In the related technology, for 4G pseudo-base station, 4G pseudo-base station, the purpose is to obtain user's IMSI information, the equipment Great amount of terminals can be accessed when starting, lead to ordinary user's communication service interruption and then cause customer complaint, and to existing net cause compared with Big interference.It is to monitor the system broadcast message for now netting base station first, the existing net cell that disguises oneself as after acquisition message simultaneously broadcasts forgery System broadcast message, then terminal is sucked by cell reselection mode, and trigger eventually by the way that different tracking area codes (TAC) is arranged Initiating updating of tracking area (TAU) process of end descends signaling to obtain the IMSI information of user in this process, finally kicks user Out.
The workflow of 4G pseudo-base station is as shown in Fig. 2, include following content:
One: monitoring and pretend
Step 201-202, engineering mobile phone obtains the system broadcast message of current persistent district, is sent to 4G pseudo-base station;
Step 203-204, the signal strength of engineering mobile phone for measuring adjacent area finds the PCI of the most weak adjacent area of signal;
Step 205, pseudo-base station are forged by the system broadcast message of persistent district, most weak using identical frequency point and signal The PCI of adjacent area, and different TAC (tracking area identification) is used, signal is emitted with relatively high power.Pseudo-base station cell becomes common and uses The candidate service cell of family LTE mobile phone.
Two: sucking and kick out of
Step 206, ordinary user mobile phone detect pseudo-base station cell signal after reselect to pseudo-base station cell;
Step 207, ordinary user mobile phone detect TAC change, initiating updating of tracking area request;
Step 208-209, pseudo-base station issues identification demand signalling (Identity Request), the hand of ordinary user Machine sends identification request response signaling (Identity Response), wherein encapsulating IMSI, it may be assumed that sends Identity Response (IMSI), pseudo-base station get the IMSI of user terminal;
The tracing section updating request (TAU Reject) of step 210, pseudo-base station refusal user terminal, user terminal is kicked out of Pseudo-base station cell.
In the related technology, for IMSI encipherment scheme, rivest, shamir, adelman can be used, which calculates Method allows the communication two party exchange of encryption information on unsafe media.As shown in figure 3, the algorithm needs a pair of secret keys: externally Disclosed public-key cryptography, abbreviation public key and underground private cipher key, abbreviation private key.If added with public-key cryptography to data It is close, it could only be decrypted with corresponding private cipher key.Scheme is specially to be carried out when terminal reports IMSI using the public key of operator Encryption, operator base station is decrypted after receiving the IMSI of encryption using corresponding private key, and 4G pseudo-base station is not due to runing The private key of quotient can not be decrypted after intercepting and capturing the IMSI of encryption, therefore can not obtain user IMSI.
In the related technology, for above-mentioned asymmetrical encryption approach, need in SIM card or terminal storage of public keys, but it is global The public key of each operator is different, causes for international roaming scene, and there are problems for terminal storage operator public key, such as There is Liang Baiduoge operator in the whole world, need to store more public key, and maintenance update is more complex, along with the time for releasing 5G has successively, Starting terminal is likely difficult to support the later operator's public key for releasing 5G.Using the embodiment of the present invention, terminal or SIM card can be with It is only to store an ownership public key, terminal downloads public key and the use of corresponding network by network under roaming scence, is a kind of The IMSI encipherment scheme that public key is updated by network, the problem of being brought so as to avoid terminal storage global operator public key.
In one embodiment of the embodiment of the present invention, at least one is stored in the SIM card of the terminal or the terminal and is returned Belong to public key.For IMSI encipherment scheme, SIM card or terminal can be and only store an ownership public key, the terminal under roaming scence The public key of corresponding network is downloaded by network and IMSI is encrypted using the public key.
So-called SIM card is the abbreviation of Subscriber Identity Module, is client identification module, also referred to as intelligence It can block, subscriber identification card, GSM digital mobile telephone must load onto this card and can use.It is deposited on a computer chip The information of digital mobile phone client is stored up, the contents such as telephone directory of the key of encryption and user, for GSM network client's body Voice messaging when part being identified, and conversed client encrypts.Any GSM mobile handset can be inserted in one SIM card Middle use, and then oneself be recorded in using communication expense caused by mobile phone on the customer's account of the SIM card institute unique identification.
In one embodiment of the embodiment of the present invention, the method also includes: after the terminal enters the roam mode, Transmitted IMSI is encrypted using ownership public key when being switched on for the first time.It should be pointed out that only IMSI is encrypted, The MCC and MNC of IMSI are not encrypted.
In one embodiment of the embodiment of the present invention, the method also includes: the terminal makes in the core net of ownership public key After being decrypted to the IMSI with the ownership private key of the correspondence ownership public key and carry out bi-directional authentification, receive under roaming network The roaming public key of hair.It should be pointed out that roaming public key is the roaming public key of corresponding current roaming network.
In one practical application, after the core net of roaming network receives IMSI, home network is found according to MCC and MNC The IMSI of encryption is issued the core net of home network by core net.The core net of home network is returned using corresponding ownership public key Belong to private key IMSI is decrypted, IMSI is issued to the core net of roaming network in plain text.After terminal and network carry out bi-directional authentification, Roaming network issues the roaming public key of corresponding roaming network.To which terminal downloads corresponding network by network under roaming scence Public key after, roaming public key can be used, data is encrypted, for example IMSI data are encrypted.
In one embodiment of the embodiment of the present invention, the method also includes: the terminal makes when roaming place is switched on again Transmitted IMSI is encrypted with the roaming public key.That is, terminal is when roaming place is switched on again, transmission IMSI uses roaming public key encryption.
A kind of encryption method of the embodiment of the present invention, which comprises terminal and network in the roaming mode carries out After bi-directional authentification, the roaming public key of corresponding current roaming network is handed down to the terminal, the terminal is made to use the roaming Public key encrypts data.
In one embodiment of the embodiment of the present invention, the method also includes: the core net of roaming network is received using ownership The IMSI of public key encryption;After finding the core net of home network, the IMSI of encryption is sent to the core net of home network.It needs , it is noted that the information that terminal is sent includes the MCC and MNC of unencryption, and using the IMSI of ownership public key encryption, according to MCC The IMSI of encryption is sent to the core net of home network by the core net that home network is found with MNC.
In one embodiment of the embodiment of the present invention, the method also includes: the core net of roaming network is public in the ownership After the core net of key is decrypted the IMSI using the ownership private key of the correspondence ownership public key, IMSI is received in plain text. That is, the core net of home network is decrypted IMSI using the ownership private key of corresponding ownership public key, in plain text by IMSI Issue the core net of roaming network.
In one embodiment of the embodiment of the present invention, after terminal and network progress bi-directional authentification, roaming network issues corresponding unrestrained The roaming public key of network is swum to terminal.That is, under roaming scence terminal by network download corresponding network public key simultaneously It uses, terminal saves after receiving.Terminal adds IMSI using the roaming public key that roaming network is sent when roaming place is switched on again It is sent after close.
By taking 4G scene as an example, using a kind of IMSI encipherment scheme for updating public key by network of the embodiment of the present invention, such as Shown in Fig. 4, include the following steps:
Step 401 only stores an ownership public key in SIM card or terminal.After terminal enters roaming, when being switched on for the first time Attachment (Attach) request is sent, the IMSI in Attach request is not added using ownership public key encryption, the MCC and MNC of IMSI It is close.
Step 402-403, after the core net of roaming network receives IMSI, the core of home network is found according to MCC and MNC The IMSI of encryption is issued the core net of home network by net.
Step 404-405, the core net of home network is decrypted IMSI using the ownership private key of corresponding ownership public key, IMSI is issued to the core net of roaming network in plain text.
Step 406-408, terminal and network carry out bi-directional authentification.After authenticating successfully, roaming network issues corresponding roaming network For the roaming public key of network to terminal, terminal saves the roaming public key after receiving roaming public key.
When roaming place is switched on again, the IMSI of transmission uses the roaming public key encryption for step 409, terminal.
A kind of terminal of the embodiment of the present invention, the terminal include:
Download unit, for downloading the roaming public key of corresponding current roaming network by network in the roaming mode;
Encryption unit, for being encrypted using the roaming public key to data.
In one embodiment of the embodiment of the present invention, the terminal further include:
Storage unit is returned for storing at least one in the client identification module SIM card of the terminal or the terminal Belong to public key.
In one embodiment of the embodiment of the present invention, the terminal further include:
Transmission unit, after entering the roam mode, when being switched on first time, transmitted IMSI is public using ownership Key is encrypted.
In one embodiment of the embodiment of the present invention, the terminal further include:
Receiving unit, for the core net in ownership public key using the ownership private key of the corresponding ownership public key to described After IMSI is decrypted and carries out bi-directional authentification, the roaming public key that roaming network issues is received.
In one embodiment of the embodiment of the present invention, the encryption unit is further used for:
When roaming place is switched on again, transmitted IMSI is encrypted using the roaming public key.
A kind of network element device of the embodiment of the present invention, the network element device include:
Delivering key unit will be corresponding current unrestrained after carrying out bi-directional authentification with network for terminal in the roaming mode The roaming public key of trip network is handed down to the terminal, encrypts the terminal to data using the roaming public key.
In one embodiment of the embodiment of the present invention, the network element device further include:
Information receiving unit, for receiving the IMSI using ownership public key encryption;
The IMSI of encryption after the core net for finding home network, is sent to home network by information transmitting unit Core net.
In one embodiment of the embodiment of the present invention, the information receiving unit is further used for:
The IMSI is solved using the ownership private key of the correspondence ownership public key in the core net of the ownership public key After close, IMSI is received in plain text.
A kind of terminal of the embodiment of the present invention, comprising: processor and for storing the calculating that can be run on a processor The memory of machine program;
Wherein, the processor is for realizing any one of above-described embodiment the method when running the computer program Step.
A kind of network element device of the embodiment of the present invention, comprising: processor and for storing and can run on a processor The memory of computer program;
Wherein, the processor is for realizing any one of above-described embodiment the method when running the computer program Step.
A kind of computer storage medium of the embodiment of the present invention, is stored thereon with computer program, wherein the computer journey The step of any one of above-described embodiment the method is realized when sequence is executed by processor.
If the module integrated described in the embodiment of the present invention is realized in the form of software function module and as independent production Product when selling or using, also can store in a computer readable storage medium.Based on this understanding, the present invention is real Applying the technical solution of example, substantially the part that contributes to existing technology can embody in the form of software products in other words Come, which is stored in a storage medium, including some instructions are used so that a computer equipment (can To be personal computer, server or network equipment etc.) execute the whole or portion of each embodiment the method for the present invention Point.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), deposits at random The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic or disk. It is combined in this way, the embodiment of the present invention is not limited to any specific hardware and software.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (19)

1. a kind of encryption method, which is characterized in that the described method includes:
Terminal downloads the roaming public key of corresponding current roaming network by network in the roaming mode;
The terminal encrypts data using the roaming public key.
2. the method according to claim 1, wherein in the client identification module of the terminal or the terminal At least one ownership public key is stored in SIM card.
3. the method according to claim 1, wherein the method also includes:
After the terminal enters the roam mode, when being switched on first time, transmitted IMSI is added using ownership public key It is close.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
The terminal solves the IMSI using the ownership private key of the correspondence ownership public key in the core net of ownership public key After close and progress bi-directional authentification, the roaming public key that roaming network issues is received.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
The terminal encrypts transmitted IMSI using the roaming public key when roaming place is switched on again.
6. a kind of encryption method, which is characterized in that the described method includes:
After terminal and network in the roaming mode carries out bi-directional authentification, the roaming public key of corresponding current roaming network is handed down to The terminal encrypts the terminal to data using the roaming public key.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
The core net of roaming network receives the IMSI using ownership public key encryption;
After finding the core net of home network, the IMSI of encryption is sent to the core net of home network.
8. the method according to the description of claim 7 is characterized in that the method also includes:
The core net of roaming network uses the ownership private key of the corresponding ownership public key to institute in the core net of the ownership public key It states after IMSI is decrypted, receives IMSI in plain text.
9. a kind of terminal, which is characterized in that the terminal includes:
Download unit, for downloading the roaming public key of corresponding current roaming network by network in the roaming mode;
Encryption unit, for being encrypted using the roaming public key to data.
10. terminal according to claim 9, which is characterized in that the terminal further include:
Storage unit, it is public for storing at least one ownership in the client identification module SIM card of the terminal or the terminal Key.
11. terminal according to claim 9, which is characterized in that the terminal further include:
Transmission unit, after entering the roam mode, when being switched on first time transmitted IMSI using ownership public key into Row encryption.
12. terminal according to claim 11, which is characterized in that the terminal further include:
Receiving unit, for the core net in ownership public key using the corresponding ownership public key ownership private key to the IMSI into After row decryption and progress bi-directional authentification, the roaming public key that roaming network issues is received.
13. terminal according to claim 12, which is characterized in that the encryption unit is further used for:
When roaming place is switched on again, transmitted IMSI is encrypted using the roaming public key.
14. a kind of network element device, which is characterized in that the network element device includes:
Delivering key unit will corresponding current roaming net after carrying out bi-directional authentification with network for terminal in the roaming mode The roaming public key of network is handed down to the terminal, encrypts the terminal to data using the roaming public key.
15. network element device according to claim 14, which is characterized in that the network element device further include:
Information receiving unit, for receiving the IMSI using ownership public key encryption;
The IMSI of encryption after the core net for finding home network, is sent to the core of home network by information transmitting unit Net.
16. network element device according to claim 15, which is characterized in that the information receiving unit is further used for:
After in the core net of the ownership public key, using correspondence, the IMSI is decrypted in the ownership private key of the ownership public key, Receive IMSI in plain text.
17. a kind of terminal characterized by comprising processor and for storing the computer journey that can be run on a processor The memory of sequence;
Wherein, the step of any one of claim 1-5 the method is realized when the processor is used to run the computer program Suddenly.
18. a kind of network element device characterized by comprising processor and for storing the calculating that can be run on a processor The memory of machine program;
Wherein, the step of any one of claim 6-8 the method is realized when the processor is used to run the computer program Suddenly.
19. a kind of computer storage medium, is stored thereon with computer program, wherein the computer program is executed by processor The step of any one of Shi Shixian claim 1-5, claim 6-8 the method.
CN201810188437.0A 2018-03-07 2018-03-07 A kind of encipherment scheme, terminal, network element device and computer storage medium Pending CN110248359A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810188437.0A CN110248359A (en) 2018-03-07 2018-03-07 A kind of encipherment scheme, terminal, network element device and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810188437.0A CN110248359A (en) 2018-03-07 2018-03-07 A kind of encipherment scheme, terminal, network element device and computer storage medium

Publications (1)

Publication Number Publication Date
CN110248359A true CN110248359A (en) 2019-09-17

Family

ID=67882160

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810188437.0A Pending CN110248359A (en) 2018-03-07 2018-03-07 A kind of encipherment scheme, terminal, network element device and computer storage medium

Country Status (1)

Country Link
CN (1) CN110248359A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114958A (en) * 2006-07-24 2008-01-30 华为技术有限公司 Method for implementing mobile IP cipher key update in WiMAX system
CN101282518A (en) * 2007-04-03 2008-10-08 展讯通信(上海)有限公司 Method and smart card apparatus for protecting user privacy when opening handset
CN101309466A (en) * 2007-05-15 2008-11-19 展讯通信(上海)有限公司 Method and apparatus protecting user's privacy when mobile phone started
CN101312583A (en) * 2007-05-21 2008-11-26 展讯通信(上海)有限公司 Mobile phone cipher selection method, system and smart card apparatus
CN101448286A (en) * 2008-12-26 2009-06-03 成都卫士通信息产业股份有限公司 A roaming authorization method of mobile digital TV user
CN101552668A (en) * 2008-03-31 2009-10-07 展讯通信(上海)有限公司 Certificating method, user equipment and base station for accessing user equipment into network
CN101945388A (en) * 2010-10-14 2011-01-12 杭州华三通信技术有限公司 Wireless roaming authentication method, wireless roaming method and device thereof
CN101969638A (en) * 2010-09-30 2011-02-09 中国科学院软件研究所 Method for protecting international mobile subscriber identity (IMSI) in mobile communication
CN103354640A (en) * 2008-05-06 2013-10-16 高通股份有限公司 Authenticating a wireless device in a visited network
WO2015121263A1 (en) * 2014-02-12 2015-08-20 Ipco As Method and system for determining that a sim and a sip client are co-located in the same mobile equipment
CN106131811A (en) * 2016-06-29 2016-11-16 广州二六三移动通信有限公司 Sim module, mobile module, roaming system and method thereof
WO2016209126A1 (en) * 2015-06-23 2016-12-29 Telefonaktiebolaget Lm Ericsson (Publ) Methods, network nodes, mobile entity, computer programs and computer program products for protecting privacy of a mobile entity
CN106714151A (en) * 2017-03-07 2017-05-24 北京邮电大学 Information transmission method

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101114958A (en) * 2006-07-24 2008-01-30 华为技术有限公司 Method for implementing mobile IP cipher key update in WiMAX system
CN101282518A (en) * 2007-04-03 2008-10-08 展讯通信(上海)有限公司 Method and smart card apparatus for protecting user privacy when opening handset
CN101309466A (en) * 2007-05-15 2008-11-19 展讯通信(上海)有限公司 Method and apparatus protecting user's privacy when mobile phone started
CN101312583A (en) * 2007-05-21 2008-11-26 展讯通信(上海)有限公司 Mobile phone cipher selection method, system and smart card apparatus
CN101552668A (en) * 2008-03-31 2009-10-07 展讯通信(上海)有限公司 Certificating method, user equipment and base station for accessing user equipment into network
CN103354640A (en) * 2008-05-06 2013-10-16 高通股份有限公司 Authenticating a wireless device in a visited network
CN101448286A (en) * 2008-12-26 2009-06-03 成都卫士通信息产业股份有限公司 A roaming authorization method of mobile digital TV user
CN101969638A (en) * 2010-09-30 2011-02-09 中国科学院软件研究所 Method for protecting international mobile subscriber identity (IMSI) in mobile communication
CN101945388A (en) * 2010-10-14 2011-01-12 杭州华三通信技术有限公司 Wireless roaming authentication method, wireless roaming method and device thereof
WO2015121263A1 (en) * 2014-02-12 2015-08-20 Ipco As Method and system for determining that a sim and a sip client are co-located in the same mobile equipment
WO2016209126A1 (en) * 2015-06-23 2016-12-29 Telefonaktiebolaget Lm Ericsson (Publ) Methods, network nodes, mobile entity, computer programs and computer program products for protecting privacy of a mobile entity
CN106131811A (en) * 2016-06-29 2016-11-16 广州二六三移动通信有限公司 Sim module, mobile module, roaming system and method thereof
CN106714151A (en) * 2017-03-07 2017-05-24 北京邮电大学 Information transmission method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
阮航,ET AL: "4G新型伪基站方案分析与对策", 《中国会议》 *

Similar Documents

Publication Publication Date Title
CN104703170B (en) Methods and equipment for downloading file of operator
CN103329582B (en) System for managing multiple subscriptions in a UICC
EP2861002B1 (en) Virtual user identification data distributing method and obtaining method, and devices
US9047444B2 (en) Mobile application registration
US8219811B2 (en) Secure software execution such as for use with a cell phone or mobile device
KR101432356B1 (en) Remote activation capture
CN105338515B (en) Data service transmission method and mobile communication equipment
CN107979835B (en) eSIM card and management method thereof
WO2013008048A1 (en) Method and apparatus for provisioning network access credentials
CN109922474B (en) Method for triggering network authentication and related equipment
US9572023B2 (en) Method and system for providing services to mobile communication subscribers
CN102833712A (en) Method, device, server and system for preventing information leakage and equipment
US9621716B2 (en) Method and system for secure provisioning of a wireless device
KR102600813B1 (en) Apparatus and method for installing and managing a profile by using messaging service
CN113785532B (en) Method and apparatus for managing and verifying certificates
CN111132305B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
Lakshmi et al. USSD—Architecture analysis, security threats, issues and enhancements
CN102625299A (en) Data transmission method, system and device
CN103716772A (en) Service processing method, device and communication system
CN105813060A (en) Method and device for obtaining virtual user identity
CN105407479A (en) Information recognition method, information gateway, SIM card, and system
CN102461232B (en) Method for authenticating a universal subscriber identity module and system thereof
CN110073681B (en) Method, apparatus and computer readable medium for internet of things device
CN105376733A (en) Information processing method and electronic apparatus
CN108512803A (en) Remind the method and device of change account bound phone number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190917

RJ01 Rejection of invention patent application after publication