CN110677849A - Privacy protection method, device, equipment and storage medium of communication terminal - Google Patents

Privacy protection method, device, equipment and storage medium of communication terminal Download PDF

Info

Publication number
CN110677849A
CN110677849A CN201810707772.7A CN201810707772A CN110677849A CN 110677849 A CN110677849 A CN 110677849A CN 201810707772 A CN201810707772 A CN 201810707772A CN 110677849 A CN110677849 A CN 110677849A
Authority
CN
China
Prior art keywords
terminal
temporary identifier
group
temporary
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810707772.7A
Other languages
Chinese (zh)
Other versions
CN110677849B (en
Inventor
宋志可
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201810707772.7A priority Critical patent/CN110677849B/en
Publication of CN110677849A publication Critical patent/CN110677849A/en
Application granted granted Critical
Publication of CN110677849B publication Critical patent/CN110677849B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a privacy protection method, a privacy protection device, privacy protection equipment and a storage medium of a communication terminal, wherein the method comprises the following steps: a terminal receives a temporary identifier group sent by a base station, wherein the group identifier of the temporary identifier group has a mapping relation with the terminal; the temporary identification group comprises at least two temporary identifications; determining a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the base station; and when the paging message sent by the base station is received and the terminal identifier included in the paging message is matched with the group identifier of the temporary identifier group, sending a channel application message to the base station.

Description

Privacy protection method, device, equipment and storage medium of communication terminal
Technical Field
The present invention relates to the field of communications, and in particular, but not exclusively, to a method, an apparatus, a device, and a storage medium for protecting privacy of a communication terminal.
Background
With the development of cellular communication technology, cellular communication brings convenience to people, but brings trouble in privacy, and privacy information includes location, communication data and the like. As the radio industry chain continues to evolve, cellular communication tracking and data collection devices are becoming less and less threshold to manufacture and acquire, which exacerbates the potential for exposure of private information to cell phone users. At present, there are devices in the market that perform radio tracking, Identity recognition, data acquisition and the like based on identification codes such as International Mobile Subscriber Identification (IMSI), International Mobile equipment identification (International Mobile equipment Identity), Temporary Mobile Subscriber Identity (TMSI), Packet Temporary Mobile Subscriber Identity (PTMSI), and the like, and after collecting data packets of fixed addresses corresponding to the identification codes, the devices can be cracked on a super computer, thereby obtaining privacy information of users.
At present, in order to protect user privacy, when a user performs location registration or authentication, a base station allocates a temporary user identifier to the user, so as to temporarily and uniquely identify a communication object, thereby reducing transmission of IMSI over the air interface, and generally only allocating one temporary user identifier to the user at a time. However, the temporary subscriber identity is generally usable for more than ten minutes by the operator due to network load and other considerations. Then during this time, the same temporary subscriber identity will be used for paging the user, which still risks exposing the user's identity, location, etc. privacy information.
Disclosure of Invention
The embodiment of the invention provides a privacy protection method, a privacy protection device, privacy protection equipment and a storage medium of a communication terminal, which can prevent privacy information of a user from being exposed and greatly ensure the communication safety of the user.
The technical scheme of the embodiment of the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a privacy protection method for a communication terminal, where the method includes:
a terminal receives a temporary identifier group sent by a base station, wherein the group identifier of the temporary identifier group has a mapping relation with the terminal; the temporary identification group comprises at least two temporary identifications;
determining a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the base station;
and when the paging message sent by the base station is received and the terminal identifier included in the paging message is matched with the group identifier of the temporary identifier group, sending a channel application message to the base station.
In a second aspect, an embodiment of the present invention provides a privacy protection method for a communication terminal, where the method includes:
a base station sends a temporary identification group to a terminal, and the group identification of the temporary identification group has a mapping relation with the terminal; the temporary identification group comprises at least two temporary identifications;
when the base station receives a paging request message of a paging terminal, determining a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the terminal;
and receiving a channel application message sent by the terminal, and establishing a communication channel between the terminal and the paging terminal by using the current temporary identifier.
In a third aspect, an embodiment of the present invention provides a privacy protecting apparatus for a communication terminal, where the apparatus includes:
a first receiving unit, configured to receive a temporary identifier group sent by a base station, where a group identifier of the temporary identifier group has a mapping relationship with the terminal; the temporary identification group comprises at least two temporary identifications;
a first determining unit, configured to determine a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the base station;
and the first sending unit is used for sending a channel application message to the base station when the paging message sent by the base station is received and the terminal identifier included in the paging message is matched with the group identifier of the temporary identifier group.
In a fourth aspect, an embodiment of the present invention provides a privacy protection apparatus for a communication terminal, where the apparatus includes:
a second sending unit, configured to send a temporary identifier group to a terminal, where a group identifier of the temporary identifier group has a mapping relationship with the terminal; the temporary identification group comprises at least two temporary identifications;
a second determining unit, configured to determine, when the base station receives a paging request message for paging a terminal, a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the terminal;
and the second receiving unit is used for receiving the channel application message sent by the terminal and establishing a communication channel between the terminal and the paging terminal by using the current temporary identifier.
In a fifth aspect, an embodiment of the present invention provides a privacy protection device for a communication terminal, where the privacy protection device at least includes: a processor and a storage medium configured to store executable instructions, wherein: the processor is configured to execute stored executable instructions;
the executable instructions are configured to perform the privacy protection method of the communication terminal described above.
In a sixth aspect, an embodiment of the present invention provides a storage medium, where computer-executable instructions are stored in the storage medium, and the computer-executable instructions are configured to execute the privacy protection method for a communication terminal.
In the embodiment of the invention, as the temporary identifier group sent by the base station comprises at least two temporary identifiers, the base station does not need to frequently send the temporary identifiers to the terminal, thus obviously reducing the network load of the base station; and each temporary identifier in the temporary identifier group can be used only once, so that the exposure of the privacy information of the user can be prevented, and the communication safety of the user is greatly guaranteed.
Drawings
In the drawings, which are not necessarily drawn to scale, like reference numerals may describe similar components in different views. Like reference numerals having different letter suffixes may represent different examples of similar components. The drawings illustrate generally, by way of example, but not by way of limitation, various embodiments discussed herein.
Fig. 1 is a schematic flow chart illustrating an implementation of a privacy protection method for a communication terminal according to an embodiment of the present invention;
fig. 2 is a schematic view of an application scenario of a privacy protection method of a communication terminal according to an embodiment of the present invention;
fig. 3 is a schematic flow chart illustrating an implementation of a privacy protection method of a communication terminal according to an embodiment of the present invention;
fig. 4 is a schematic flow chart illustrating an implementation of a privacy protection method of a communication terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a privacy protection system of a communication terminal according to an embodiment of the present invention;
fig. 6 is a schematic diagram illustrating a working principle of a fourth temporary subscriber identity maintenance unit according to an embodiment of the present invention;
fig. 7 is a schematic diagram of an implementation flow of allocating, by a fourth air interface protocol stack extension unit, a user identifier group to a cellular device according to the fourth embodiment of the present invention;
FIG. 8 is a flowchart illustrating a four-BS paging procedure according to an embodiment of the present invention;
fig. 9 is a schematic flow chart of an implementation of four cellular devices receiving a temporary user identifier allocated by a base station according to an embodiment of the present invention;
fig. 10 is a flowchart illustrating an implementation of a four-cell device responding to a paging message according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a privacy protecting apparatus of a five-communication terminal according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of a privacy protecting apparatus of a sixth communication terminal according to an embodiment of the present invention;
fig. 13 is a schematic structural diagram of a privacy protecting apparatus of a communication terminal according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the following describes specific technical solutions of the present invention in further detail with reference to the accompanying drawings in the embodiments of the present invention. The following examples are intended to illustrate the invention but are not intended to limit the scope of the invention.
Example one
The embodiment of the invention provides a privacy protection method of a communication terminal, which is applied to the terminal, wherein the terminal is a terminal with a cellular communication function, such as a mobile phone. The functions implemented by the privacy protection method of the communication terminal of this embodiment may be implemented by a processor in the terminal calling a program code, and of course, the program code may be stored in a computer storage medium.
Fig. 1 is a schematic flow chart of an implementation of a privacy protection method for a communication terminal according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S101, the terminal receives the temporary identification group sent by the base station.
Here, the temporary identifier group is randomly determined for the terminal by the base station, and the group identifier of the temporary identifier group has a mapping relationship with the terminal, so that after the group identifier of the temporary identifier group is known, the corresponding terminal can be determined according to the group identifier.
In this embodiment of the present invention, the temporary identifier group includes at least two temporary identifiers. The form and the character string length of the temporary identifier may be the same as the form and the character string length of the IMEI, so that the base station may randomly generate a plurality of temporary identifiers for the terminal according to the form and the character string length of the IMEI, and form a temporary identifier group with the plurality of temporary identifiers and send the temporary identifier group to the terminal, so that the terminal may use any one of the temporary identifiers in the temporary identifier group as the identifier of the terminal. In addition, because the temporary identifier group comprises at least two temporary identifiers, the base station can allocate a plurality of temporary identifiers to the terminal once, so the base station does not need to frequently send the temporary identifiers to the terminal, and the network load of the base station can be obviously reduced.
And step S102, the terminal determines a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal through negotiation with the base station.
Here, the terminal and the base station negotiate, and may determine, for the terminal, a temporary identifier from the temporary identifier group according to a preset condition, a preset rule, or a preset algorithm, as a current temporary identifier of the terminal, store the current temporary identifier of the terminal, and notify the current temporary identifier of the terminal to the base station; the base station may also determine a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal according to a preset condition, a preset rule, or a preset algorithm, store the current temporary identifier of the terminal, and notify the terminal, so that the terminal uses the temporary identifier determined by the base station as the current temporary identifier of the terminal.
In the embodiment of the invention, the current temporary identifier of the terminal is unique. Here, the current temporary identifier is determined from the temporary identifier group, and a plurality of temporary identifiers of the temporary identifier group are different from each other, but may be the current temporary identifier of the terminal. And after a certain time, the base station reassigns a new temporary identifier group to the terminal, and all temporary identifiers in the new temporary identifier group are different from any previous temporary identifier. Therefore, the current temporary identifier determined from the temporary identifier group is unique, so that the terminal corresponding to the current temporary identifier can be uniquely determined, and paging failure can not occur when the terminal is paged.
In the embodiment of the present invention, the current temporary identifier of the terminal is randomly determined. Here, the current temporary identifier is determined from the temporary identifier group, where the temporary identifier group includes at least two temporary identifiers, and then, when one temporary identifier is determined from the temporary identifier group as the current temporary identifier of the terminal, any one temporary identifier may be selected as the current temporary identifier. Therefore, the temporary identifier of the terminal can be ensured to be unknown in the subsequent communication process, and any equipment for radio tracking, identity recognition, data acquisition and the like cannot know the temporary identifier of the terminal at any time later, so that the privacy information of the user can be effectively guaranteed.
In the embodiment of the present invention, the current temporary identifier of the terminal is temporary. Here, the validity period of the current temporary identifier is not limited by a fixed time, the validity period of the current temporary identifier of the terminal is only one communication service, and after the one communication service is completed, the terminal may determine another temporary identifier from the temporary identifier group as a new current temporary identifier to replace the previous temporary identifier. Therefore, as the current temporary identifier of the terminal is temporary, the security of the privacy information of the user can be further ensured.
Step S103, when receiving the paging message sent by the base station and the terminal identifier included in the paging message is matched with the group identifier of the temporary identifier group, the terminal sends a channel application message to the base station.
The paging message is a message sent by a base station for paging a target terminal by a user, and the paging message comprises a terminal identifier. When the base station receives a paging request message sent by a paging terminal, the base station may acquire a terminal identifier of a target terminal in the paging request message, where the terminal identifier is a real fixed identifier of the terminal, such as an IMEI of the terminal. In the embodiment of the invention, the base station carries the terminal identification in the paging message, determines the paged terminal according to the terminal identification, and sends the paging message to the paged terminal after determining the paged terminal.
In the embodiment of the present invention, when the terminal receives the paging message and disappears, the terminal first determines whether the terminal identifier included in the paging message matches with the group identifier of the temporary identifier group.
Here, the group identification is an identification of the temporary identification group. The matching may be that the terminal identifier included in the paging message is the same as the group identifier of the temporary identifier group, or that the terminal identifier included in the paging message has a certain correspondence with the group identifier of the temporary identifier group; of course, the matching between the terminal identifier and the group identifier in this embodiment may also be a relationship in other forms, as long as it can be determined that the terminal corresponding to the group identifier matched with the terminal identifier is the target terminal according to the relationship, which is not limited in this embodiment.
When the terminal identification is matched with the group identification, the terminal is a target terminal which is currently paged by the paging terminal; and when the terminal identification is not matched with the group identification, the terminal is not a target terminal which is currently paged by the paging terminal.
In addition, the channel application message is used for applying for a communication channel to the base station, when the terminal receives the paging message sent by the base station, and the terminal identifier included in the paging message is matched with the group identifier of the temporary identifier group, the terminal is the target terminal which is currently being paged by the paging terminal, at this moment, the terminal needs to establish communication connection with the paging terminal, and then the terminal sends the channel application message to the base station, so that the base station can establish a communication channel for the terminal and the paging terminal based on the channel application message, and the terminal and the paging terminal are ensured to carry out normal communication through the communication channel.
Fig. 2 is a schematic view of an application scenario of a privacy protection method of a communication terminal according to an embodiment of the present invention, as shown in fig. 2, the privacy protection method of a communication terminal is applied to a privacy protection system 20 of a communication terminal, where the privacy protection system 20 of a communication terminal includes at least one base station 201, at least one terminal 202, and at least one paging terminal 203. When the paging terminal 203 wants to communicate with the terminal 202, the paging terminal 203 sends a paging request message to the base station 201, where the paging request message carries a terminal identifier of the terminal 202, and when the base station 201 receives the paging request message sent by the paging terminal 203, the base station 201 obtains a terminal identifier of a target terminal in the paging request message, where the target terminal is the terminal 202. And the base station carries the terminal identification in the paging message, determines the paged terminal as the terminal 202 according to the terminal identification, and sends the paging message to the terminal 202. When the terminal 202 receives the paging message sent by the base station 201 and determines that the terminal identifier included in the paging message matches the group identifier of the temporary identifier group of the terminal 202, the terminal 202 sends a channel application message to the base station 201, and the base station 201 establishes a communication channel for the terminal 202 and the paging terminal 203 according to the channel application message, so as to implement communication between the terminal 202 and the paging terminal 203.
According to the privacy protection method of the communication terminal provided by the embodiment of the invention, as the temporary identifier group sent by the base station comprises at least two temporary identifiers, the base station does not need to frequently send the temporary identifiers to the terminal, so that the network load of the base station can be obviously reduced; and each temporary identifier in the temporary identifier group can be used only once, so that the exposure of the privacy information of the user can be prevented, and the communication safety of the user is greatly guaranteed.
Example two
The embodiment of the invention provides a privacy protection method of a communication terminal, which is applied to the terminal, wherein the terminal is a terminal with a cellular communication function, such as a mobile phone. The functions implemented by the privacy protection method of the communication terminal of this embodiment may be implemented by a processor in the terminal calling a program code, and of course, the program code may be stored in a computer storage medium.
Fig. 3 is a schematic flow chart of an implementation of a privacy protection method of a communication terminal according to an embodiment of the present invention, and as shown in fig. 3, the method includes the following steps:
step S301, the terminal receives the temporary identifier group sent by the base station.
Step S302, the terminal randomly determines a temporary identifier from the temporary identifier group according to a preset algorithm as the current temporary identifier of the terminal.
Here, the preset algorithm is an algorithm determined by negotiation between the terminal and the base station, that is, the terminal and the base station both store the algorithm. The algorithm is used for randomly selecting a temporary identifier from the temporary identifier group and taking the temporary identifier as the current temporary identifier of the terminal.
In this embodiment, the terminal determines the current temporary identifier, and the terminal sends the determined current temporary identifier to the base station.
In other embodiments, step S302 may further include the steps of:
step S3021, the base station determines a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal.
Step S3022, the terminal receives the current temporary identifier.
In this embodiment, the current temporary identifier is determined by the base station, and after the base station determines the current temporary identifier of the terminal, the current temporary identifier is sent to the terminal, so as to ensure that the terminal can currently perform identity confirmation and identity identification on the external according to the current temporary identifier.
Step S303, when receiving the paging message sent by the base station and the terminal identifier included in the paging message matches with the group identifier of the temporary identifier group, the terminal sends a channel application message to the base station.
The paging message is a message sent by a base station for paging a target terminal by a user, and the paging message comprises a terminal identifier. In the embodiment of the present invention, when the terminal receives the paging message and disappears, the terminal first determines whether the terminal identifier included in the paging message matches with the group identifier of the temporary identifier group. When the terminal identification is matched with the group identification, the terminal is a target terminal which is currently paged by the paging terminal; and when the terminal identification is not matched with the group identification, the terminal is not a target terminal which is currently paged by the paging terminal.
And step S304, setting the current temporary identifier to be in a failure state.
Step S304 may be after step S303 or before step S303.
When step S304 is after step S303, the scheme of the present embodiment may be: when the terminal sends the channel application message to the base station, and after the terminal establishes communication connection with the paging terminal, the current temporary identifier of the terminal is occupied, the current temporary identifier is set to be in a failure state at the moment, and the current temporary identifier can not be determined as the temporary identifier of the terminal any more, so that each temporary identifier in the temporary identifier group can be ensured to be used only once, and then the temporary identifiers of the terminals corresponding to each communication service are different, so that the exposure of user privacy information can be effectively prevented, and the communication safety of the user is greatly guaranteed.
When step S304 precedes step S303, the scheme of the present embodiment may be: and after the terminal randomly determines a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal according to a preset algorithm, if the temporary identifier in the temporary identifier group is occupied, the temporary identifier is set to be in a failure state at the moment, and the temporary identifier cannot be determined as the current temporary identifier of the terminal. It should be noted that the failure state here is not that the temporary identifier is invalid, the failure state here is that the temporary identifier cannot be determined as the current temporary identifier of the terminal again, and this embodiment merely sets the temporary identifier to be in the failure state, but does not affect the next communication service, that is, whether the temporary identifier is transmitted as the identifier of the terminal in the next communication service. However, when the next communication service is completed, the temporary identifier is an invalid temporary identifier.
In other embodiments, the privacy protection method of the communication terminal may further include the steps of:
step S30, determining whether to update the temporary identifier group according to a preset condition.
Here, the preset condition includes at least one of: validity period, terminal position and use times.
In order to make the solution of the embodiment of the present invention be more clearly explained, the steps of the solution of the embodiment are explained by taking three cases, namely, the preset conditions are the validity period, the terminal position, and the number of times of use as examples.
In case one, when the preset condition is the validity period, the step S30 of determining whether to update the temporary identifier group according to the preset condition may include the following steps:
in step S310, the terminal determines a current time and a first time.
Here, the first time is a time when the terminal receives the temporary identifier group transmitted by the base station.
It should be noted that, in this embodiment, the determining of the current time by the terminal may be determining the current time by the terminal every preset time, and then, after determining the current time, the following steps S311 and S312 may be performed once.
Step S311, the terminal determines a second time according to the first time and the validity period.
Here, the validity period may be preset by the terminal when the terminal leaves a factory, may be preset by the user by setting the terminal according to needs, and may also be preset by the operator through the base station. The validity period is a time period, and after the terminal has determined the first time, the first time may be used as the starting time of the preset validity period, and then the ending time of the preset validity period is the second time.
Step S312, if the current time is after the second time, the terminal sends a temporary identifier group update message to the base station.
Here, the terminal determines a context between the current time and the second time, and if the current time is after the second time, it indicates that the current temporary identifier group has exceeded the validity period, and the current temporary identifier group is an invalid temporary identifier group, so the terminal sends a temporary identifier group update message to the base station to update the temporary identifier group of the terminal.
If the current time is before the second time, it indicates that the current temporary identifier group does not exceed the validity period, the current temporary identifier group is a valid temporary identifier group, and the terminal may further continue to execute the privacy protection method of the communication terminal in any of the embodiments according to the temporary identifier group.
The temporary identifier group update message is used to notify the base station to update the temporary identifier group of the terminal, that is, to request the base station to resend a new group of temporary identifiers, so that the terminal uses the new temporary identifiers to perform communication services.
According to the privacy protection method of the communication terminal, whether the temporary identifier group is updated or not is determined according to the validity period of the temporary identifier group, and the privacy protection method of the communication terminal can be executed by the terminal within the validity period of the temporary identifier group.
In case two, when the preset condition is the terminal location, the step S30 of determining whether to update the temporary identifier group according to the preset condition may include the following steps:
step S320, determining the current position of the terminal and the initial position of the terminal.
Here, the initial position is a position where the terminal receives the temporary identifier group transmitted by the base station.
It should be noted that, in this embodiment, the terminal may determine the current location of the terminal once every preset time, and then, after determining the current location once, the following step S321 may be executed once.
Step S321, when the distance between the current position and the initial position is a preset distance, sending a temporary identifier group update message to the base station.
Here, the preset distance may be preset by the terminal when the terminal leaves a factory, may also be preset by the user by setting the terminal according to needs, and may also be preset by the operator through the base station.
In this embodiment, the terminal determines a distance between the current position of the terminal and the initial position, and when the distance is equal to or greater than the preset distance, it indicates that the terminal has moved from the initial position to another position that is farther away.
For example, when the terminal receives the temporary identifier group sent by the first base station, the initial position of the terminal is located at the a ground, the current position of the terminal is located at the B ground, and the coverage area of the first base station does not include the B ground, then the terminal needs to switch its network to the serving cell of the second base station covering the B ground, and at this time, the temporary identifier group of the first base station is no longer applicable to the terminal, the terminal may request to update its current temporary identifier group, so as to implement effective communication with the second base station.
In case three, when the preset condition is the number of times of use, the step S30 of determining whether to update the temporary identifier group according to the preset condition may include the following steps:
step S330, the terminal sets the initial value of the number of times of use to zero.
Here, the number of times of use refers to the number of times that the temporary identifier in the temporary identifier group is occupied as the current temporary identifier of the terminal, and when one temporary identifier is occupied as the current temporary identifier of the terminal, the number of times of use corresponds to one.
It should be noted that, in the scenario corresponding to this step, the base station sends the temporary identifier group to the terminal, and the terminal does not occupy any temporary identifier in the temporary identifier group as its current temporary identifier. That is, the terminal sets the initial value of the number of times of use to zero when receiving the temporary identifier group transmitted by the base station.
Step S331, when the temporary flag is set to the disabled state, adding one to the current value of the number of times of use.
When the temporary identifier is set to be in a failure state, the temporary identifier is indicated to be occupied, the number of the available temporary identifiers in the temporary identifier group is reduced by one, and correspondingly, the current value of the number of the use times is increased by one.
Step S332, when the current value of the number of times of use is greater than or equal to a preset threshold, sending a temporary identifier group update message to the base station.
Here, the preset threshold may be preset by the terminal when the terminal leaves the factory, or may be preset by the user by setting the terminal as needed, or may be preset by the operator through the base station. The preset threshold is less than or equal to the total number of the temporary identifications in the temporary identification group.
When the preset threshold is equal to the total number of the temporary identifications in the temporary identification group, the temporary identifications in the temporary identification group are all occupied as the current temporary identification of the terminal; and when the preset threshold is smaller than the total number of the temporary identifications in the temporary identification group, indicating that all the temporary identifications in the temporary identification group are not occupied as the current temporary identification of the terminal. In this embodiment, the preset threshold may be randomly set to be less than or equal to the total number of the temporary identifiers in the temporary identifier group. When the preset threshold value is smaller than the total number of the temporary identifications in the temporary identification group, the probability that each temporary identification in the temporary identification group is occupied is unknown, so that the exposure of the privacy information of the user can be further prevented, and the communication safety of the user can be guaranteed.
In the above embodiment, only the preset conditions are taken as the validity period, the terminal position, and the number of times of use as examples to explain the steps of the embodiment, and of course, the preset conditions may also be any two or all of the validity period, the terminal position, and the number of times of use. And when the preset conditions are any two of the validity period, the terminal position and the using times, sending the temporary identifier group updating message to the base station as long as one of the two conditions is satisfied. And when the preset conditions are all the validity period, the terminal position and the using times, sending the temporary identifier group updating message to the base station as long as any one of the three conditions is satisfied.
For example, when the preset condition is the validity period and the terminal location, if the terminal is consistently located at location a without moving but the validity period of the temporary identifier group is reached, the terminal may send a temporary identifier group update message to the base station.
According to the privacy protection method of the communication terminal provided by the embodiment of the invention, the terminal randomly determines a temporary identifier from the temporary identifier group according to a preset algorithm to be used as the current temporary identifier of the terminal, and sets the current temporary identifier to be in a failure state. Like this, can guarantee that every temporary mark is only occupied once to according to the nimble interim sign group of monitoring of conditions such as validity period, terminal position, number of times of use, when interim sign group reaches certain condition, update interim sign group promptly, make the probability that every interim mark in interim sign group is occupied all unknown, can further prevent that user privacy information from exposing, guarantee user's communication safety.
EXAMPLE III
The embodiment of the invention provides a privacy protection method of a communication terminal, which is applied to a privacy protection system of the communication terminal formed by a terminal and a base station. Here, the terminal is a terminal having a cellular communication function, such as a cellular phone; the base station may be a base station of any one operator. The functions implemented by the privacy protection method of the communication terminal of this embodiment may be implemented by calling a program code by a processor in the terminal or the base station, and the program code may be stored in a computer storage medium.
Fig. 4 is a schematic flow chart of an implementation process of a privacy protection method of a communication terminal according to an embodiment of the present invention, and as shown in fig. 4, the method includes the following steps:
step S401, the base station sends the temporary identification group to the terminal.
Here, the temporary identifier group is randomly determined by the base station for the terminal, and a group identifier of the temporary identifier group has a mapping relationship with the terminal; the temporary identifier group comprises at least two temporary identifiers.
Step S402, the base station receives the paging request message of the paging terminal, and determines the paged terminal according to the paging request message.
When the base station receives a paging request message sent by a paging terminal, the base station acquires a terminal identifier of a target terminal in the paging request message. Here, the paged terminal is the target terminal, and the terminal identifier is a real fixed identifier of the terminal, such as an IMEI of the terminal.
Step S403, the terminal determines a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal through negotiation with the base station.
It should be noted that, in this step, three ways are available for determining a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal: the method comprises the steps of determining by a base station in a first mode, determining by a terminal in a second mode, and determining by the base station and the terminal together in a third mode.
That is, the step S403 may be implemented by:
in a first manner, in step S4031, the base station randomly determines a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal. The base station then sends the determined current temporary identity to the terminal, for example, via a paging message.
In a second mode, in step S4032, the terminal randomly determines a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal. And then the terminal sends the determined current temporary identifier to the base station.
In step S4033, the base station negotiates with the terminal, and determines a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal using the same rule, for example, the rule may be the same algorithm, for example, there are two temporary identifiers in the temporary identifier group, and the base station and the terminal negotiate each time to use the second temporary identifier as the current temporary identifier first, and if the second temporary identifier fails, use the first temporary identifier as the current temporary identifier.
Step S404, the base station sends a paging message to the terminal.
The paging message is a message sent by a base station for paging a target terminal by a user, and the paging message comprises a terminal identifier of the target terminal. In the embodiment of the invention, the base station determines the paged terminal according to the terminal identifier, carries the terminal identifier in the paging message and sends the paging message to the paged terminal.
Step S405, the terminal judges whether the terminal identification included in the paging message is matched with the group identification of the temporary identification group.
Here, the matching may be that the terminal identifier included in the paging message is the same as the group identifier of the temporary identifier group, or that the terminal identifier included in the paging message has a certain correspondence with the group identifier of the temporary identifier group.
Step S406, when the matching is performed, the terminal sends a channel application message to the base station.
Here, the channel application message is used for applying a communication channel to the base station to realize communication with the paging terminal.
Step S407, the base station uses the current temporary identifier to establish a communication channel between the terminal and the paging terminal.
In other embodiments, the method further comprises the steps of:
step S408, the base station determines whether to update the temporary identifier group according to a preset condition.
It should be noted that, in this step, determining whether to update the temporary identifier group according to a preset condition may be determined by the base station or by the terminal, which is not specifically limited in this embodiment. That is, the step S408 can also be realized by:
step S4081, the terminal determines whether to update the temporary identifier group according to a preset condition.
Here, the preset condition includes at least one of: validity period, terminal position and use times. When the preset conditions are any two or all of the validity period, the terminal position and the number of times of use, the temporary identifier group update message is sent to the base station as long as any one of the two preset conditions or all the preset conditions meets the conditions.
In an embodiment of the present invention, when the preset condition is the validity period, the step S408 of the base station determining whether to update the temporary identifier group according to the preset condition may include the following steps:
in step S4181, the base station determines the current time and the first time.
Here, the first time is a time when the base station transmits a temporary identifier group to the terminal.
Step S4182, the base station determines a second time according to the first time and the validity period.
Step S4183, if the current time is after the second time, the base station updates the temporary identifier group.
Here, the base station updates the temporary identifier group to regenerate or determine a new group of temporary identifiers for the base station, and sends the new group of temporary identifiers to the terminal.
It should be noted that steps S4181 to S4183 are the same as steps S310 to S312, except that steps S310 to S312 are performed by the terminal to determine whether to update the temporary identifier group according to the validity period, and steps S4181 to S4183 are performed by the base station to determine whether to update the temporary identifier group according to the validity period.
In an embodiment of the present invention, when the preset condition is the terminal location, the step S408 of the base station determining whether to update the temporary identifier group according to the preset condition may include the following steps:
step S4281, the base station determines the current position of the terminal and the initial position of the terminal.
Here, the initial position is a position at which the base station transmits a temporary identifier group to the terminal.
Step S4282, when the distance between the current position and the initial position is a preset distance, the base station updates the temporary identifier group.
It should be noted that steps S4281 and S4282 are the same as steps S320 and S321, except that steps S320 and S321 are that the terminal determines whether to update the temporary identifier group according to the terminal location, and steps S4281 and S4282 are that the base station determines whether to update the temporary identifier group according to the terminal location.
In an embodiment of the present invention, when the preset condition is the number of times of use, the step S408 of the base station determining whether to update the temporary identifier group according to the preset condition may include the following steps:
step S4381, the base station sets the initial value of the number of times of use to zero.
Step S4382, when the temporary identifier is set to a failure state, adding one to the current value of the number of times of use.
Step S4383, when the current value of the number of times of use is greater than or equal to a preset threshold, the base station updates the temporary identifier group.
It should be noted that steps S4381 to S4383 are the same as steps S330 to S332, except that steps S330 to S332 determine whether to update the temporary identifier group according to the number of times of use by the terminal, and steps S4381 to S4383 determine whether to update the temporary identifier group according to the number of times of use by the base station.
In the privacy protection method for the communication terminal provided by the embodiment of the present invention, the terminal and the base station complete privacy protection for the communication terminal together, the base station may determine a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the terminal, and the terminal may also negotiate with the base station and determine a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal; the base station may determine whether to update the temporary identifier group according to a preset condition, and the terminal may also determine whether to update the temporary identifier group according to a preset condition. Therefore, the determination of the current temporary identifier of the terminal can be effectively ensured, and the temporary identifier group of the terminal is updated. When one of the base station and the terminal is in a busy state of the network, the other one of the base station and the terminal can perform the actions, so that the privacy protection method of the communication terminal of the embodiment can still be effectively implemented when the base station or the terminal is in the busy state of the network.
Example four
The embodiment of the invention provides a privacy protection method of a communication terminal, which is applied to a privacy protection system of the communication terminal formed by a terminal and a base station. Here, the terminal is a cellular device having a cellular communication function, such as a cellular phone; the base station may be a base station of any one operator. The functions implemented by the privacy protection method of the communication terminal of this embodiment may be implemented by calling a program code by a processor in the terminal or the base station, and the program code may be stored in a computer storage medium.
In the privacy protection method for a communication terminal provided in the embodiments of the present invention, after a cellular device is connected to a network of a base station, the base station first allocates a group of temporary user identifiers to the cellular device, so as to ensure that temporary identities of the cellular device do not conflict, and transmits the group of temporary user identifiers to the cellular device. When the cellular device receives the temporary subscriber identity, the cellular device sends an acknowledgement message to the base station to complete a negotiation process between the cellular device and the base station. In addition, the base station and the cellular device each start a timer or a location acquisition unit or a counter for data acquisition to implement the set of temporary subscriber identities for which the cellular device is periodically negotiated for replacement.
In the network paging process, the temporary user identifier of the transmitted cellular device may be randomly selected from the group of temporary user identifiers according to an algorithm, and the algorithm may ensure that the temporary user identifier transmitted each time is different from the temporary user identifier transmitted last time, so that it may be ensured that the temporary user identifier of the same terminal may not be transmitted in the air interface multiple times within a period of time.
Fig. 5 is a schematic structural diagram of a composition of a privacy protection system of a communication terminal according to an embodiment of the present invention, and as shown in fig. 5, a privacy protection system 50 of a communication terminal according to this embodiment includes two parts, that is, a cellular device 51 and a base station 52, where the cellular device 51 includes a first temporary subscriber identity maintenance unit 511 and a first air interface protocol stack extension unit 512, and the base station 52 includes a second temporary subscriber identity maintenance unit 521 and a second air interface protocol stack extension unit 522.
The first temporary subscriber identity maintenance unit 511 and the second temporary subscriber identity maintenance unit 521 are configured to record the temporary subscriber identity allocated for each real IMSI.
The first air interface protocol stack extension unit 512 and the second air interface protocol stack extension unit 522 are configured to send and receive a temporary user identifier. When paging is performed on the base station side, the second air interface protocol stack extension unit 522 broadcasts different temporary user identifiers according to an algorithm, and the first air interface protocol stack extension unit 512 on the mobile phone side queries a group of temporary user identifiers of the mobile phone for matching.
Since the first temporary subscriber identity maintenance unit 511 of the temporary subscriber identity maintenance unit on the cellular device side and the second temporary subscriber identity maintenance unit 521 on the base station side both use a linked list form to perform unified storage of the temporary subscriber identity, and the used linked list form is the same, in order to save space, this embodiment describes the first temporary subscriber identity maintenance unit 511 and the second temporary subscriber identity maintenance unit 521 in a unified manner.
As shown in fig. 6, which is a schematic diagram illustrating an operation principle of a maintenance unit for four temporary subscriber identities according to an embodiment of the present invention, at least one temporary subscriber identity is respectively formed for a node 61 and a node 62 by using a head pointer 60 of a linked list, where the node 61 and the node 62 may correspond to two different cellular devices. In this embodiment, the node 61 includes a first IMSI real subscriber identity 611, a first temporary subscriber identity 612, and a second temporary subscriber identity 613; the node 62 includes a second IMSI real subscriber identity 621, a third temporary subscriber identity 622, and a fourth temporary subscriber identity 623. The first temporary user identity 612 comprises a first timer 6121 and a first counter 6122, the second temporary user identity 613 comprises a second timer 6131 and a second counter 6132, the third temporary user identity 622 comprises a third timer 6221 and a third counter 6222, and the fourth temporary user identity 623 comprises a fourth timer 6231 and a fourth counter 6232.
Here, the temporary subscriber identity maintenance unit assigns a timer and a counter to each temporary subscriber identity for determining when a new temporary subscriber identity needs to be used and whether all temporary subscriber identities need to be replaced.
It should be noted that the operations of updating or reading the linked list in this embodiment are completed by the air interface protocol stack extension unit.
Fig. 7 is a schematic flow chart of an implementation of allocating, by a fourth air interface protocol stack extension unit, a user identifier group to a cellular device in the embodiment of the present invention, as shown in fig. 7, where the method includes the following steps:
in step S701, the base station determines whether to reallocate the temporary user identity to the cellular device.
In step S702, if the result of the determination is that allocation is required, the second temporary user identifier maintenance unit generates a group of temporary user identifiers and stores the group of temporary user identifiers.
Step S703, the base station performs a subsequent temporary user identifier sending step.
Here, after the base station determines that the temporary ue needs to be reassigned to the cellular device, and the second temporary ue maintenance unit generates a set of temporary ues and stores the set of temporary ues, the sending unit in step S703 sends a new set of temporary ues to the cellular device for the base station.
When the base station determines that the temporary user identifier does not need to be reallocated to the cellular device, the sending step in step S703 determines a temporary user identifier from a current group of temporary user identifiers of the cellular device as the temporary user identifier of the cellular device, and sends the temporary user identifier to the cellular device.
In the embodiment of the invention, if the position of the cellular equipment is updated or the temporary subscriber identity is expired or the number of the use times of the temporary subscriber identity reaches the standard, the base station reallocates a group of temporary subscriber identities for the real IMSI subscriber and ensures that each temporary subscriber identity is unique.
Fig. 8 is a schematic flow chart of implementing a paging procedure of a four base station according to an embodiment of the present invention, and as shown in fig. 8, the method includes the following steps:
in step S801, the base station receives a paging request.
Step S802, the second temporary user identifier maintenance unit selects the temporary user identifier according to the algorithm.
Here, after the base station receives the paging request, it determines the target terminal to be paged according to the paging request, and after the target terminal is determined, the second temporary user identifier maintenance unit of the base station selects one temporary user identifier from a group of temporary user identifiers of the target terminal according to an algorithm as the current temporary user identifier of the target terminal.
In step S803, the base station performs a subsequent temporary user identifier sending procedure.
Here, the sending link performed by the base station is that the base station sends one temporary user identifier selected by the second temporary user identifier maintenance unit to the target terminal, that is, to the corresponding cellular device.
In this embodiment, when the target terminal is paged, the second air interface protocol stack extension unit on the base station side takes out one temporary subscriber identity from a group of temporary subscriber identities according to the real IMSI to perform paging.
Fig. 9 is a schematic flow chart of an implementation of a four-cell device receiving a temporary user identifier allocated by a base station according to an embodiment of the present invention, as shown in fig. 9, the method includes the following steps:
in step S901, the cellular device receives a temporary subscriber identity assignment message.
Step S902, the first temporary user identifier maintenance unit decodes the temporary user identifier according to the algorithm, and stores the temporary user identifier.
In step S903, the cellular device transmits an acknowledgement receipt message to the base station.
Here, the ACK message may be an Acknowledgement Character (ACK) to indicate to the bs that the data sent from the bs has been acknowledged and received without errors.
Fig. 10 is a schematic flow chart of implementing a four-cellular device to respond to a paging message according to an embodiment of the present invention, and as shown in fig. 10, the method includes the following steps:
in step S1001, the cellular device receives a paging message sent by the base station.
Step S1002, the first temporary subscriber identity maintenance unit of the cellular device matches the paging message, and determines whether the paging message is a local paging message.
Step S1003, when the paging local is judged, the cellular device initiates a channel application.
Step S1004, when it is judged that the cellular device is not the paging local device, the cellular device does not respond to the paging message.
In the embodiment of the invention, after the cellular device receives the data, if the matching is found to be correct, the cellular device starts to apply for a channel to enter a subsequent communication process. In this embodiment, it may also be detected whether a temporary user identifier expires through a timer and a counter, and if so, a group of temporary user identifiers needs to be reallocated.
In other embodiments, the privacy protection method of the communication terminal described above may be applied to a privacy protection system of a communication terminal. When the privacy protection method of the communication terminal is implemented, normal communication of the cellular device cannot be affected. The method can be implemented by the following steps:
step S01, when the cellular device leaves the factory, the privacy protection function of the communication terminal is preset.
Step S02 prompts whether to turn on this function when the cellular device first connects to the base station.
Step S03, when the user opens the function, the function is always in a working state in the background and works according to the implementation flow of the method provided in any embodiment of the present invention.
According to the privacy protection method of the communication terminal provided by the embodiment of the invention, as one-time distribution can comprise a plurality of temporary user identifications, the time, frequency spectrum and other resources required by the conventional distribution network temporary user identification can be greatly reduced, the load of the communication network can be reduced, and the user safety can be improved. After the allocation is completed, the cellular device uses the temporary user identifier for communication, so that normal communication of the cellular device can be ensured.
EXAMPLE five
An embodiment of the present invention provides a privacy protection apparatus for a communication terminal, where fig. 11 is a schematic structural diagram of a privacy protection apparatus for a five-communication terminal according to an embodiment of the present invention, and as shown in fig. 11, the privacy protection apparatus 1100 for a communication terminal includes:
a first receiving unit 1101, configured to receive a temporary identifier group sent by a base station, where a group identifier of the temporary identifier group has a mapping relationship with the terminal; the temporary identification group comprises at least two temporary identifications;
a first determining unit 1102, configured to determine a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the base station;
a first sending unit 1103, configured to send a channel application message to the base station when receiving a paging message sent by the base station and a terminal identifier included in the paging message matches with a group identifier of the temporary identifier group.
In other embodiments, the first determination unit includes: a first determination module;
the first determining module is configured to randomly determine a temporary identifier from the temporary identifier group according to a preset algorithm, where the temporary identifier is used as a current temporary identifier of the terminal;
in other embodiments, the apparatus further comprises:
and the first setting unit is used for setting the current temporary identifier to be in a failure state.
In other embodiments, the apparatus further comprises:
a third determining unit, configured to determine whether to update the temporary identifier group according to a preset condition; wherein the preset condition comprises at least one of: validity period, terminal position and use times;
when the preset condition is the validity period, the third determining unit includes:
a second determining module, configured to determine a current time and a first time, where the first time is a time when the terminal receives the temporary identifier group sent by the base station;
a third determining module for determining a second time based on the first time and the validity period,
a first sending module, configured to send a temporary identifier group update message to the base station if the current time is after the second time;
alternatively, the first and second electrodes may be,
when the preset condition is the terminal position, the third determining unit includes:
a fourth determining module, configured to determine a current position of the terminal and an initial position of the terminal, where the initial position is a position where the terminal receives the temporary identifier group sent by the base station;
a second sending module, configured to send a temporary identifier group update message to the base station when the current location is a preset distance away from the initial location;
alternatively, the first and second electrodes may be,
when the preset condition is the number of times of use, the third determining unit includes:
the first setting module is used for setting the initial value of the using times to be zero;
a first algorithm module, configured to add one to a current value of the number of times of use when the temporary identifier is set to a failure state;
and a third sending module, configured to send a temporary identifier group update message to the base station when the current value of the number of times of use is greater than or equal to a preset threshold.
It should be noted that the description of the apparatus of this embodiment is similar to the description of the method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is not repeated. For technical details not disclosed in the embodiments of the apparatus, reference is made to the description of the embodiments of the method of the invention for understanding.
EXAMPLE six
An embodiment of the present invention provides a privacy protection apparatus for a communication terminal, and fig. 12 is a schematic structural diagram of a privacy protection apparatus for a communication terminal according to an embodiment of the present invention, and as shown in fig. 12, a privacy protection apparatus 1200 for a communication terminal includes:
a second sending unit 1201, configured to send a temporary identifier group to a terminal, where a group identifier of the temporary identifier group has a mapping relationship with the terminal; the temporary identification group comprises at least two temporary identifications;
a second determining unit 1202, configured to determine, when the base station receives a paging request message for paging a terminal, a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the terminal;
a second receiving unit 1203, configured to receive a channel application message sent by the terminal, and establish a communication channel between the terminal and the paging terminal by using the current temporary identifier.
In other embodiments, the second determination unit includes: a fifth determining module;
the fifth determining module is configured to randomly determine a temporary identifier as the current temporary identifier of the terminal according to a preset algorithm in the temporary identifier group of the terminal;
in other embodiments, the apparatus further comprises:
and the second setting unit is used for setting the current temporary identifier to be in a failure state.
In other embodiments, the apparatus further comprises:
a fourth determining unit, configured to determine whether to update the temporary identifier group according to a preset condition; wherein the preset condition comprises at least one of: validity period, terminal position and use times;
when the preset condition is the validity period, the fourth determining unit includes:
a sixth determining module, configured to determine a current time and a first time, where the first time is a time when the base station sends the temporary identifier group to the terminal;
a seventh determining module, configured to determine a second time according to the first time and the validity period;
a first updating module, configured to update the temporary identifier group if the current time is after the second time;
alternatively, the first and second electrodes may be,
when the preset condition is the terminal position, the fourth determining unit includes:
an eighth determining module, configured to determine a current location of the terminal and an initial location of the terminal, where the initial location is a location where the base station sends a temporary identifier group to the terminal;
the second updating module is used for updating the temporary identifier group when the distance between the current position and the initial position is a preset distance;
alternatively, the first and second electrodes may be,
when the preset condition is the number of times of use, the fourth determining unit includes:
the second setting module is used for setting the initial value of the using times to be zero;
the second algorithm module is used for adding one to the current value of the using times when the temporary identifier is set to be in a failure state;
and the third updating module is used for updating the temporary identifier group when the current value of the using times is greater than or equal to a preset threshold value.
It should be noted that the description of the apparatus of this embodiment is similar to the description of the method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is not repeated. For technical details not disclosed in the embodiments of the apparatus, reference is made to the description of the embodiments of the method of the invention for understanding.
EXAMPLE seven
An embodiment of the present invention provides a privacy protection device of a communication terminal, fig. 13 is a schematic diagram of a composition structure of a privacy protection device of a communication terminal according to an embodiment of the present invention, and as shown in fig. 13, the device 1300 at least includes: a processor 1301 and a storage medium 1302 configured to store executable instructions, wherein:
the processor 1301 is configured to execute stored executable instructions configured to perform the privacy protection method of a communication terminal as provided in any of the embodiments described above.
It should be noted that the description of the embodiment of the privacy protecting device of the communication terminal is similar to the description of the embodiment of the method, and has similar beneficial effects to the embodiment of the method, and therefore, the description is omitted. For technical details not disclosed in the embodiments of the privacy securing apparatus of a communication terminal of the present invention, reference is made to the description of the embodiments of the method of the present invention for understanding.
Correspondingly, an embodiment of the present invention provides a computer-readable storage medium, in which computer-executable instructions are stored, and the computer-executable instructions are configured to execute the privacy protection method of the communication terminal provided in the other embodiment of the present invention.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (10)

1. A privacy protection method of a communication terminal, the method comprising:
a terminal receives a temporary identifier group sent by a base station, wherein the group identifier of the temporary identifier group has a mapping relation with the terminal; the temporary identification group comprises at least two temporary identifications;
determining a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the base station;
and when the paging message sent by the base station is received and the terminal identifier included in the paging message is matched with the group identifier of the temporary identifier group, sending a channel application message to the base station.
2. The method of claim 1, wherein the determining a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal by negotiating with the base station comprises:
randomly determining a temporary identifier from the temporary identifier group according to a preset algorithm to be used as the current temporary identifier of the terminal;
the method further comprises the following steps: and setting the current temporary identifier to be in a failure state.
3. The method of claim 2, further comprising: determining whether to update the temporary identifier group according to a preset condition; wherein the preset condition comprises at least one of: validity period, terminal position and use times;
when the preset condition is the validity period, the determining whether to update the temporary identifier group according to the preset condition includes: determining a current time and a first time, wherein the first time is the time when the terminal receives a temporary identifier group sent by a base station; determining a second time according to the first time and the validity period, and if the current time is behind the second time, sending a temporary identifier group update message to the base station;
alternatively, the first and second electrodes may be,
when the preset condition is the terminal position, determining whether to update the temporary identifier group according to the preset condition includes: determining the current position of the terminal and the initial position of the terminal, wherein the initial position is the position of the terminal when receiving the temporary identifier group sent by the base station; when the distance between the current position and the initial position is a preset distance, sending a temporary identifier group updating message to the base station;
alternatively, the first and second electrodes may be,
when the preset condition is the number of times of use, the determining whether to update the temporary identifier group according to the preset condition includes: setting an initial value of the number of times of use to zero; when the temporary identifier is set to be in a failure state, adding one to the current value of the number of times of use; and when the current value of the using times is greater than or equal to a preset threshold value, sending a temporary identification group updating message to the base station.
4. A privacy protection method of a communication terminal, the method comprising:
a base station sends a temporary identification group to a terminal, and the group identification of the temporary identification group has a mapping relation with the terminal; the temporary identification group comprises at least two temporary identifications;
when the base station receives a paging request message of a paging terminal, determining a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the terminal;
and receiving a channel application message sent by the terminal, and establishing a communication channel between the terminal and the paging terminal by using the current temporary identifier.
5. The method of claim 4, wherein the determining a temporary identifier from the temporary identifier group as the current temporary identifier of the terminal by negotiating with the terminal comprises:
randomly determining a temporary identifier in the temporary identifier group of the terminal according to a preset algorithm to serve as the current temporary identifier of the terminal;
the method further comprises the following steps: and setting the current temporary identifier to be in a failure state.
6. The method of claim 5, further comprising: determining whether to update the temporary identifier group according to a preset condition; wherein the preset condition comprises at least one of: validity period, terminal position and use times;
when the preset condition is the validity period, the determining whether to update the temporary identifier group according to the preset condition includes:
determining a current time and a first time, wherein the first time is the time when the base station sends a temporary identifier group to the terminal; determining a second time according to the first time and the validity period, and updating the temporary identifier group if the current time is behind the second time;
alternatively, the first and second electrodes may be,
when the preset condition is the terminal position, determining whether to update the temporary identifier group according to the preset condition includes: determining the current position of the terminal and the initial position of the terminal, wherein the initial position is a position at which the base station sends a temporary identifier group to the terminal; when the current position is away from the initial position by a preset distance, updating the temporary identifier group;
alternatively, the first and second electrodes may be,
when the preset condition is the number of times of use, the determining whether to update the temporary identifier group according to the preset condition includes: setting an initial value of the number of times of use to zero; when the temporary identifier is set to be in a failure state, adding one to the current value of the number of times of use; and updating the temporary identification group when the current value of the use times is greater than or equal to a preset threshold value.
7. An apparatus for protecting privacy of a communication terminal, the apparatus comprising:
a first receiving unit, configured to receive a temporary identifier group sent by a base station, where a group identifier of the temporary identifier group has a mapping relationship with the terminal; the temporary identification group comprises at least two temporary identifications;
a first determining unit, configured to determine a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the base station;
and the first sending unit is used for sending a channel application message to the base station when the paging message sent by the base station is received and the terminal identifier included in the paging message is matched with the group identifier of the temporary identifier group.
8. An apparatus for protecting privacy of a communication terminal, the apparatus comprising:
a second sending unit, configured to send a temporary identifier group to a terminal, where a group identifier of the temporary identifier group has a mapping relationship with the terminal; the temporary identification group comprises at least two temporary identifications;
a second determining unit, configured to determine, when the base station receives a paging request message for paging a terminal, a temporary identifier from the temporary identifier group as a current temporary identifier of the terminal through negotiation with the terminal;
and the second receiving unit is used for receiving the channel application message sent by the terminal and establishing a communication channel between the terminal and the paging terminal by using the current temporary identifier.
9. A privacy preserving device of a communication terminal, characterized in that the device comprises at least: a processor and a storage medium configured to store executable instructions, wherein: the processor is configured to execute stored executable instructions;
the executable instructions are configured to perform the privacy protection method of the communication terminal as provided in any one of the preceding claims 1 to 3, or claims 4 to 6.
10. A storage medium having stored therein computer-executable instructions configured to perform the method of privacy protection for a communication terminal as claimed in any one of claims 1 to 3 above, or as provided in any one of claims 4 to 6.
CN201810707772.7A 2018-07-02 2018-07-02 Privacy protection method, device, equipment and storage medium of communication terminal Active CN110677849B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810707772.7A CN110677849B (en) 2018-07-02 2018-07-02 Privacy protection method, device, equipment and storage medium of communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810707772.7A CN110677849B (en) 2018-07-02 2018-07-02 Privacy protection method, device, equipment and storage medium of communication terminal

Publications (2)

Publication Number Publication Date
CN110677849A true CN110677849A (en) 2020-01-10
CN110677849B CN110677849B (en) 2023-06-02

Family

ID=69065413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810707772.7A Active CN110677849B (en) 2018-07-02 2018-07-02 Privacy protection method, device, equipment and storage medium of communication terminal

Country Status (1)

Country Link
CN (1) CN110677849B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111800400A (en) * 2020-06-28 2020-10-20 长沙理工大学 Multi-dimensional multi-angle electricity data aggregation system based on fog
CN112738750A (en) * 2020-12-31 2021-04-30 努比亚技术有限公司 Electronic price tag paging method, base station and readable storage medium
WO2021156399A1 (en) * 2020-02-06 2021-08-12 Nokia Technologies Oy Guti reallocation for mt-edt in 5gc and other systems
CN113498030A (en) * 2020-04-02 2021-10-12 海能达通信股份有限公司 System and method for supporting MCPTT anonymous callback

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050076022A1 (en) * 2003-08-18 2005-04-07 Yuh-Cherng Wu Processing index action requests for search engines
CN100490549C (en) * 2006-05-18 2009-05-20 华为技术有限公司 Method for allocating channel to called side
US20100322192A1 (en) * 2009-06-18 2010-12-23 Hitachi, Ltd. Base station controller and wireless packet processing device
CN103428669A (en) * 2012-05-21 2013-12-04 中国移动通信集团公司 Temporary identity identifying method, temporary identity recognizing method, terminal, network cell device and system
CN104125642A (en) * 2014-07-22 2014-10-29 京信通信系统(中国)有限公司 Paging optimization method, device and system
CN107018497A (en) * 2017-03-24 2017-08-04 电信科学技术研究院 A kind of paging method and device
CN107046735A (en) * 2016-02-05 2017-08-15 中兴通讯股份有限公司 Connection processing method and device between terminal and network
WO2017161570A1 (en) * 2016-03-25 2017-09-28 华为技术有限公司 Communication method, apparatus and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050076022A1 (en) * 2003-08-18 2005-04-07 Yuh-Cherng Wu Processing index action requests for search engines
CN100490549C (en) * 2006-05-18 2009-05-20 华为技术有限公司 Method for allocating channel to called side
US20100322192A1 (en) * 2009-06-18 2010-12-23 Hitachi, Ltd. Base station controller and wireless packet processing device
CN103428669A (en) * 2012-05-21 2013-12-04 中国移动通信集团公司 Temporary identity identifying method, temporary identity recognizing method, terminal, network cell device and system
CN104125642A (en) * 2014-07-22 2014-10-29 京信通信系统(中国)有限公司 Paging optimization method, device and system
CN107046735A (en) * 2016-02-05 2017-08-15 中兴通讯股份有限公司 Connection processing method and device between terminal and network
WO2017161570A1 (en) * 2016-03-25 2017-09-28 华为技术有限公司 Communication method, apparatus and system
CN107018497A (en) * 2017-03-24 2017-08-04 电信科学技术研究院 A kind of paging method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021156399A1 (en) * 2020-02-06 2021-08-12 Nokia Technologies Oy Guti reallocation for mt-edt in 5gc and other systems
CN113498030A (en) * 2020-04-02 2021-10-12 海能达通信股份有限公司 System and method for supporting MCPTT anonymous callback
CN111800400A (en) * 2020-06-28 2020-10-20 长沙理工大学 Multi-dimensional multi-angle electricity data aggregation system based on fog
WO2022001535A1 (en) * 2020-06-28 2022-01-06 长沙理工大学 Fog-based multi-dimensional multi-angle electricity consumption data aggregating system
CN112738750A (en) * 2020-12-31 2021-04-30 努比亚技术有限公司 Electronic price tag paging method, base station and readable storage medium

Also Published As

Publication number Publication date
CN110677849B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
CN110677849B (en) Privacy protection method, device, equipment and storage medium of communication terminal
KR102040072B1 (en) Linkage establishment method and device
US20200236529A1 (en) A method for allocating temporarily a subscription to a credential container
EP3046394B1 (en) Message processing method and mme selection method and device
EP2978247A1 (en) Terminal registration method, terminal discovery method, terminal and device
US9179443B2 (en) Method and apparatus for providing services at terminal of mobile communication system
US9473961B2 (en) Method and apparatus for handling address conflict
CN109788507B (en) Communication method and device
CN107005430B (en) Communication method, device and system based on data link layer
EP3128773B1 (en) Processing method and apparatus for d2d discovery
KR20130093953A (en) Method and apparatus for supporting device to device communications
JP2012520642A (en) Service data transmission method and terminal
US8165093B2 (en) Method for IP address management in networks using a proxy based approach in mobile IP telephony
CN111200620B (en) Method, apparatus and computer readable medium for updating network connection configuration
US20120008627A1 (en) Method and apparatus for assigning device identifier with collision avoidance
KR20000071706A (en) Supporting concentrator in multiple paging channel environment
CN111149421B (en) Base station, terminal, processing method and wireless communication system
CN117082582A (en) Processing method and device for non-access stratum context
EP3035770A1 (en) Call service implementation method and device, and indication information delivery method and device
CN102187721B (en) Communication control device, communication control method
JP2017519384A (en) ProSe information transmission method, terminal, and communication device
CN111132265B (en) Network access method and device
KR20150051072A (en) 2-step discovery procedure for d2d communication
CN105430591B (en) Method and device for recovering device-to-device service and home subscriber server
CN114448944A (en) MAC address allocation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant