CN111049831A - Generation control method and device of user hidden identifier and terminal - Google Patents

Generation control method and device of user hidden identifier and terminal Download PDF

Info

Publication number
CN111049831A
CN111049831A CN201911285707.0A CN201911285707A CN111049831A CN 111049831 A CN111049831 A CN 111049831A CN 201911285707 A CN201911285707 A CN 201911285707A CN 111049831 A CN111049831 A CN 111049831A
Authority
CN
China
Prior art keywords
user
user hidden
hidden identifier
calculation
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911285707.0A
Other languages
Chinese (zh)
Other versions
CN111049831B (en
Inventor
刘煜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201911285707.0A priority Critical patent/CN111049831B/en
Publication of CN111049831A publication Critical patent/CN111049831A/en
Application granted granted Critical
Publication of CN111049831B publication Critical patent/CN111049831B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present disclosure provides a method for controlling generation of a user hidden identifier, including: sending a user hidden identifier calculation setting command to a mobile device of the terminal, wherein the user hidden identifier calculation setting command comprises main body information of a main body used for executing a calculation process of a user hidden identifier, and the main body used for executing the calculation process of the user hidden identifier comprises the user identification module and the mobile device; receiving a command response message returned by the mobile equipment, wherein the command response message comprises information used for indicating whether the mobile equipment supports the calculation of user hidden identification; and determining a main body currently used for executing the calculation process of the user hidden identification according to the command response message and the main body information so as to trigger the main body to execute the calculation process of the user hidden identification and generate the user hidden identification. The disclosure also provides a generation control device of the user hidden identifier, a user identification module, a mobile device and a terminal.

Description

Generation control method and device of user hidden identifier and terminal
Technical Field
The embodiment of the disclosure relates to the technical field of communication, and in particular relates to a method and a device for controlling generation of a user hidden identifier, a user identification module, mobile equipment and a terminal.
Background
At present, the domestic 5G technology enters a commercial development express way, and the development of the communication technology enters a new era. In the 3G and 4G era, the main services are voice, short message and mobile broadband, and the service types are relatively single. The 5G technology brings high speed, short delay, large connection service experience and more application scenarios, and has obvious innovation and progress in many specific technical requirements, and user authentication and authentication is one of them. Aiming at the safety problem existing in the authentication of the 4G network, the correction and the improvement are carried out in the authentication scheme of the 5G network, most typically, the public and private key encryption system is used for encrypting the IMSI, so that the problems of plaintext transmission of the IMSI and monitoring and capturing of the IMSI in the air by illegal molecules caused by plaintext transmission of the IMSI are avoided. In the 5G technology, the real identity of the terminal corresponding to the IMSI is generally called a user Permanent Identifier (SUPI), the SUPI is encrypted by a public key to form a ciphertext, the ciphertext is called a user hidden Identifier (SUCI), and the SUCI is transmitted to a 5G core network via a 5G base station gNB to perform a network authentication procedure.
Since 5G is still in the early development stage, the capabilities of both network, terminal and Universal Subscriber Identity Module (USIM) card are defined and developed, and a smooth transition from 4G is also required to be considered, different options exist for the network authentication scheme: the encryption scheme can be a user permanent identity (SUPI) encryption scheme of a standard terminal, a non-encryption scheme and even an authentication scheme of a 4G network. Even if the encryption scheme is different in the execution subject of encryption, the operator determines a required authentication scheme according to the overall policy and expresses willingness in authentication through setting of the USIM to realize control and management of the authentication scheme.
In the prior art, once the authentication scheme is set, the execution subject of the encryption calculation of the SUPI is fixed and cannot be changed, and the requirement of more execution subjects of the encryption calculation of the SUPI cannot be met, so that the calculation efficiency, the success rate and the flexibility of the encryption calculation of the SUPI are reduced.
Disclosure of Invention
The disclosed embodiment aims to solve at least one of technical problems in the prior art, and provides a method and a device for controlling generation of a user hidden identifier, a user identification module, a mobile device and a terminal.
In a first aspect, an embodiment of the present disclosure provides a method for controlling generation of a hidden user identifier, where the method is applied to a user identification module of a terminal, and the method includes:
generating a user hidden identity calculation setting command, wherein the user hidden identity calculation setting command comprises main body information of a main body used for executing a calculation process of a user hidden identity, and the main body used for executing the calculation process of the user hidden identity comprises the user identification module and the mobile equipment;
sending the user hidden identifier calculation setting command to the mobile equipment of the terminal;
receiving a command response message returned by the mobile equipment, wherein the command response message comprises information used for indicating whether the mobile equipment supports the calculation of user hidden identification;
and determining a main body currently used for executing the calculation process of the user hidden identification according to the command response message and the main body information so as to trigger the main body to execute the calculation process of the user hidden identification and generate the user hidden identification.
In some embodiments, the body information includes priority information; the determining, according to the command response message and the subject information, a subject currently used for executing a calculation process of the user hidden identifier includes:
when the mobile equipment supports the calculation of the user hidden identifier, determining a main body corresponding to a first priority in the priority information as a main body currently used for executing the calculation process of the user hidden identifier;
the triggering the main body to execute the calculation process of the user hidden identifier and generating the user hidden identifier includes: and triggering a main body corresponding to the first priority in the priority information to execute the calculation process of the user hidden identification, and generating the user hidden identification.
In some embodiments, when the mobile device does not support the calculation of the user hidden identifier, determining that a main body currently used for executing the calculation process of the user hidden identifier is the user identification module, and triggering the user identification module to execute the calculation process of the user hidden identifier to generate the user hidden identifier.
In some embodiments, after triggering the subject corresponding to the first priority in the priority information to perform the calculation process of the user hidden identifier, the method further includes:
judging whether the main body corresponding to the first priority successfully generates the user hidden identification;
and if the main body corresponding to the first priority is judged to be unsuccessful in generating the user hidden identifier, triggering the main body corresponding to the second priority in the priority information to execute a calculation process of the user hidden identifier so as to generate the user hidden identifier.
In a second aspect, an embodiment of the present disclosure provides a method for controlling generation of a user hidden identifier, which is applied to a mobile device of a terminal, and the method includes:
receiving a user hidden identifier calculation setting command sent by a user identification module, wherein the user hidden identifier calculation setting command comprises main body information of a main body used for executing a user hidden identifier calculation process, and the main body used for executing the user hidden identifier calculation process comprises the user identification module and the mobile equipment;
when the user hidden identifier calculation setting command identifies that the main body for executing the calculation process of the user hidden identifier comprises the user hidden identifier, determining whether the user hidden identifier calculation is supported by the user hidden identifier calculation setting command;
and returning a command response message to the user identification module, wherein the command response message comprises information for indicating whether the command response message supports the calculation of the user hidden identifier, so that the user identification module determines a main body currently used for executing the calculation process of the user hidden identifier according to the command response message and the main body information.
In some embodiments, before the receiving the user hidden identifier calculation setting command sent by the user identification module, the method further includes:
reading a service list preset by the user identification module when starting up;
determining whether the user identification module has the requirement of multi-party computing user hidden identification according to the service list;
and if the user identification module is determined to have the requirement of hiding the identification of the multi-party calculation user, waiting to receive the command of the user identification module.
In a third aspect, an embodiment of the present disclosure provides a device for controlling generation of a user hidden identifier, including:
the generation module is used for generating a user hidden identifier calculation setting command, wherein the user hidden identifier calculation setting command comprises main body information of a main body used for executing a calculation process of a user hidden identifier, and the main body used for executing the calculation process of the user hidden identifier comprises a user identification module of the terminal and mobile equipment of the terminal;
the first sending module is used for sending the user hidden identifier calculation setting command to the mobile equipment of the terminal;
a first receiving module, configured to receive a command response message returned by the mobile device, where the command response message includes information indicating whether the mobile device supports user hidden identity calculation;
a first determining module, configured to determine, according to the command response message and the subject information, a subject currently used for executing a calculation process of the user hidden identifier; and
and the triggering module is used for triggering the determined main body to execute the calculation process of the user hidden identification so as to generate the user hidden identification.
In some embodiments, the body information includes priority information;
the first determining module is specifically configured to determine, when the mobile device supports calculation of a user hidden identifier, a subject corresponding to a first priority in the priority information as a subject currently used for performing a calculation process of the user hidden identifier;
the triggering module is specifically configured to trigger a main body corresponding to a first priority in the priority information to execute a calculation process of the user hidden identifier, and generate the user hidden identifier.
In some embodiments, the first determining module is further configured to determine that a subject currently used for performing the calculation process of the user hidden identifier is the user identification module when the mobile device does not support the calculation of the user hidden identifier;
the triggering module is further configured to trigger the user identification module to execute a calculation process of a user hidden identifier, so as to generate the user hidden identifier.
In some embodiments, the method further comprises a judging module;
the judging module is used for judging whether the main body corresponding to the first priority successfully generates the user hidden identifier or not after the triggering module triggers the main body corresponding to the first priority in the priority information to execute the calculation process of the user hidden identifier;
the triggering module is further configured to trigger the main body corresponding to the second priority in the priority information to execute a calculation process of the user hidden identifier if the judging module judges that the main body corresponding to the first priority does not successfully generate the user hidden identifier, so as to generate the user hidden identifier.
In a fourth aspect, an embodiment of the present disclosure provides a subscriber identity module, including the apparatus for generating and controlling a subscriber hidden identifier provided in any of the foregoing embodiments.
In a fifth aspect, an embodiment of the present disclosure provides a mobile device, including:
a second receiving module, configured to receive a user hidden identifier calculation setting command sent by a user identification module, where the user hidden identifier calculation setting command includes body information of a body used to execute a user hidden identifier calculation process, and the body used to execute the user hidden identifier calculation process includes the user identification module and the mobile device;
a second determination module for determining whether the mobile device supports calculation of a user hidden identity, when it is recognized from the user hidden identity calculation setting command that a subject for performing a calculation process of a user hidden identity includes the mobile device;
and a second sending module, configured to return a command response message to the subscriber identity module, where the command response message includes information used to indicate whether the mobile device supports user hidden identifier calculation, so that the subscriber identity module determines, according to the command response message and the subject information, a subject currently used for executing the user hidden identifier calculation process.
In some embodiments, a read module is further included;
the reading module is used for reading a service list preset by the user identification module when the mobile equipment is started;
the second determining module is further used for determining whether the user identification module has the requirement of multi-party computing user hidden identification according to the service list; and if the user identification module is determined to have the requirement of hiding the identification of the multi-party calculation user, enabling the second receiving module to wait for receiving the command of the user identification module.
In a sixth aspect, an embodiment of the present disclosure provides a terminal, including a mobile device and a subscriber identity module, where the subscriber identity module includes the subscriber identity module provided in any of the foregoing embodiments, and/or the mobile device includes the mobile device provided in any of the foregoing embodiments.
According to the method and the device for controlling the generation of the user hidden identifier, the user identification module, the mobile device and the terminal, the user hidden identifier calculation setting command is sent to the mobile device of the terminal, and the user hidden identifier calculation setting command comprises main body information of a main body used for executing a calculation process of the user hidden identifier; receiving a command response message returned by the mobile equipment, wherein the command response message comprises information used for indicating whether the mobile equipment supports the calculation of the user hidden identifier; and determining a main body which is currently used for executing the calculation process of the user hidden identifier according to the command response message and the main body information so as to trigger the main body to execute the calculation process of the user hidden identifier and generate the user hidden identifier. Before the terminal performs the authentication process of accessing the mobile network, the selection and the switching of the main body for executing the SUCI calculation process are realized by adding a new machine-card interactive instruction, the interactive capacity and the range of the mobile equipment and the user identification module of the terminal are expanded, more support for more identification encryption strategies is realized, and the calculation efficiency, the success rate and the flexibility of the identification encryption are effectively improved.
Drawings
Fig. 1 is a flowchart of a method for controlling generation of a user hidden identifier according to an embodiment of the present disclosure;
FIG. 2 is a flowchart of one specific implementation of step 13 in an embodiment of the present disclosure;
fig. 3 is a flowchart of another method for controlling generation of a hidden identifier of a user according to an embodiment of the present disclosure;
fig. 4 is a flowchart of another method for controlling generation of a hidden identifier of a user according to an embodiment of the present disclosure;
FIG. 5 is a diagram of byte 17 of a service list of a subscriber identity module;
FIG. 6 is a schematic diagram of a 16 th byte in a service list of a subscriber identity module;
fig. 7 is a flowchart of a control method for generating a hidden identifier of a user according to another embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a control apparatus for generating a user hidden identifier according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of a mobile device according to an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present disclosure, the following describes in detail a method and an apparatus for controlling generation of a user hidden identifier, a user identification module, a mobile device, and a terminal provided in the present disclosure with reference to the accompanying drawings.
Unless otherwise defined, technical or scientific terms used herein shall have the ordinary meaning as understood by one of ordinary skill in the art to which this disclosure belongs. The use of "first," "second," and similar terms in this disclosure is not intended to indicate any order, quantity, or importance, but rather is used to distinguish one element from another. Also, the use of the terms "a," "an," or "the" and similar referents do not denote a limitation of quantity, but rather denote the presence of at least one. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", and the like are used merely to indicate relative positional relationships, and when the absolute position of the object being described is changed, the relative positional relationships may also be changed accordingly.
Fig. 1 is a flowchart of a method for controlling generation of a hidden user identifier according to an embodiment of the present disclosure, as shown in fig. 1, where the method may be executed by a device for controlling generation of a hidden user identifier, the device may be implemented in a software and/or hardware manner, the device may be integrated in a user identification module of a terminal, the method for controlling generation of a hidden user identifier may be applied to the user identification module of the terminal, and the method for controlling generation of a hidden user identifier includes:
and 10, generating a user hidden identifier calculation setting command, wherein the user hidden identifier calculation setting command comprises main body information of a main body for executing a calculation process of the user hidden identifier.
And step 11, sending a user hidden identifier calculation setting command to the mobile equipment of the terminal.
The terminal is a User Equipment (UE), for example, a 5G terminal. The terminal (UE) includes a subscriber identity module (sim) and a Mobile Equipment (ME). The Subscriber Identity Module may be a Universal Subscriber Identity Module (USIM) card.
It should be understood that the USIM card is Integrated on a Universal Integrated Circuit Card (UICC), and the USIM card can actively request the mobile device of the terminal to execute corresponding functions according to Application requirements by introducing a USIM Application Toolkit (USAT) mechanism. Wherein, USAT is one of the basic capabilities of a telecommunication smart card represented by a USIM card, and refers to a USAT protocol layer introduced in a protocol stack of a Cu interface (a mobile device of a terminal and an interface of the USIM card), and the USAT protocol layer provides a service mechanism on the basis of a service provided by a transport layer, which allows a USIM application to interact and operate with a mobile device of the terminal supporting such a mechanism, so that the USIM can actively request the mobile device of the terminal to perform a certain operation, and in USAT, a USAT instruction set is the basis and main manner for the telecommunication smart card to implement a service through the mobile device of the terminal.
In the embodiment of the present disclosure, before the terminal performs an authentication procedure for accessing a mobile network, a user hidden Identifier (SUCI) needs to be obtained first, and the SUCI is usually obtained by performing encryption calculation on a user Permanent Identifier (SUPI) of the terminal. In the embodiment of the present disclosure, when the terminal is powered on and started, before performing an authentication procedure for accessing a mobile network, first, in step 10, a user hidden identifier calculation setting command is generated, and then, in step 11, the user hidden identifier calculation setting command is sent to the Mobile Equipment (ME) of the terminal (UE), where the user hidden identifier calculation setting command is an active instruction that is expanded and added in advance by the user identification module.
In the embodiment of the present disclosure, the user hidden identification calculation setting command includes body information of a body for executing a calculation process of the user hidden identification SUCI, and the body information includes priority information of each body. The main body for executing the calculation process of the user hidden identifier includes a subscriber identity module (sim) and a Mobile Equipment (ME), that is, the main body capable of executing the calculation process of the user hidden identifier may be the sim or the Mobile Equipment (ME).
Table 1 shows a structure of a user hidden identification calculation setting command, and as shown in table 1, the SUCI calculation setting is an extended new added data object, and indicates a main body for performing a calculation process of SUCI and priority information of each main body.
The part of the extended SUCI calculation settings that represents the contents of the SUCI calculation settings is defined with two values: "01" and "02", the remaining values remain defined. Wherein "01" indicates that the calculation process of the sui is preferentially performed by the subscriber identity module, and when the subscriber identity module does not support the sui calculation or the calculation fails, the calculation process of the sui is performed by the mobile device of the terminal, that is, in the main body of the calculation process for performing the sui, the priority of the subscriber identity module is the first priority, and the priority of the mobile device is the second priority; "02" indicates that the mobile device preferentially performs the computation process of the sui, and the user identification module performs the computation process of the sui when the mobile device does not support the sui computation or the computation fails, that is, in the main body of the computation process for performing the sui, the priority of the mobile device is the first priority, and the priority of the user identification module is the second priority. Wherein the first priority is higher than the second priority. The operator may configure, according to actual needs, specific values of the parts representing the contents of the SUCI calculation settings in the extended SUCI calculation settings, which is not limited in this embodiment of the disclosure. For example, the value of a portion representing the content of the SUCI calculation setting in the SUCI calculation setting of the configuration extension is "01".
TABLE 1
Figure BDA0002317913430000081
Figure BDA0002317913430000091
And step 12, receiving a command response message returned by the mobile equipment, wherein the command response message comprises information for indicating whether the mobile equipment supports the calculation of the user hidden identifier.
In the embodiment of the present disclosure, after receiving a user hidden identifier calculation setting command, a mobile device parses the user hidden identifier calculation setting command, obtains a requirement of a user identification module, and when it is recognized that a main body for executing a calculation process of a user hidden identifier in the user hidden identifier calculation setting command includes the mobile device, determines whether the mobile device supports SUCI calculation, that is, whether the mobile device supports cryptographic calculation on SUPI to generate SUCI, and generates a command response message, and then returns the command response message to the user identification module. Wherein the command response message includes information indicating whether the mobile device supports calculation of the user hidden identity.
Table 2 shows the structure of the command response message returned by the mobile device, and as shown in table 2, the command response message indicates the mobile device to execute the result of the user hidden identity calculation setting command. Wherein, the part of the result representing the content of the result is defined with a plurality of values: the values of "00", "01", "02" and "15" are conventional values, wherein "15" indicates that although the user hidden identifier calculation setting command is successfully executed, the mobile device of the terminal does not support the computation of the SUCI, and the values of the other values also indicate that the mobile device of the terminal supports the computation of the SUCI. The operator may configure the information in the command response message for indicating whether the mobile device supports the calculation of the user hidden identifier according to actual needs, which is not limited by the embodiment of the present disclosure.
TABLE 2
Figure BDA0002317913430000101
Figure BDA0002317913430000111
And step 13, determining a main body currently used for executing the calculation process of the user hidden identifier according to the command response message and the main body information so as to trigger the main body to execute the calculation process of the user hidden identifier and generate the user hidden identifier.
In the embodiment of the present disclosure, according to a command response message returned by a mobile device of a terminal and preset subject information of a subject used for executing a computation process of a SUCI, a subject currently used for executing a computation process of a user hidden identifier is determined, and the subject is triggered to execute the computation process of the user hidden identifier, so as to generate the user hidden identifier. For example, according to a command response message returned by a mobile device of the terminal and preset subject information of a subject used for executing a computation process of the SUCI, determining that the subject currently used for executing the computation process of the user hidden identifier is the mobile device, and triggering the mobile device to execute the computation process of the SUCI to generate the user hidden identifier SUCI. For example, according to a command response message returned by a mobile device of the terminal and preset subject information of a subject used for executing a computation process of the SUCI, determining that the subject currently used for executing the computation process of the user hidden identifier is the user identification module, and triggering the user identification module to execute the computation process of the SUCI to generate the user hidden identifier SUCI.
Fig. 2 is a flowchart of a specific implementation manner of step 13 in an embodiment of the present disclosure, and in some embodiments, as shown in fig. 2, step 13 includes:
step 131, determining whether the mobile device supports the calculation of the user hidden identifier according to the command response message, if so, executing step 132, and if not, executing step 133.
In step 131, after receiving the command response message returned by the mobile device of the terminal, the command response message is parsed, and whether the mobile device of the terminal supports the computation of the SUCI is identified from the information indicating whether the mobile device supports the computation of the user hidden identifier in the command response message. For example, when the value of the result in the command response message is "15", it indicates that the mobile device of the terminal does not support the computation of the SUCI, and when the value of the result in the command response message is any one of "00", "01", "02", "10", and the like, it may be considered that the mobile device of the terminal supports the computation of the SUCI.
Step 132, determining the main body corresponding to the first priority in the priority information as the main body currently used for executing the calculation process of the user hidden identifier, and triggering the main body corresponding to the first priority in the priority information to execute the calculation process of the user hidden identifier, so as to generate the user hidden identifier.
In step 132, when it is recognized that the mobile device supports the computation of the SUCI, the subject corresponding to the first priority in the priority information is determined as the subject currently used for performing the computation process of the user hidden identifier. For example, when the value of the content part of the SUCI calculation setting in the SUCI calculation setting is "01" in the user hidden identifier calculation setting command, it indicates that the priority corresponding to the user identification module is the first priority, and the priority corresponding to the mobile device is the second priority, so when it is recognized that the mobile device supports SUCI calculation, first, the main body corresponding to the first priority in the priority information, that is, the user identification module, is determined as the main body currently used for executing the calculation process of the user hidden identifier. For example, when the value of the content part of the SUCI calculation setting in the SUCI calculation setting is "02" in the user hidden identifier calculation setting command, it indicates that the priority corresponding to the user identification module is the second priority, and the priority corresponding to the mobile device is the first priority, so when it is recognized that the mobile device supports SUCI calculation, first, the main body corresponding to the first priority in the priority information, that is, the user identification module, is determined as the main body currently used for executing the calculation process of the user hidden identifier.
And after the main body corresponding to the first priority in the priority information is determined as the main body currently used for executing the calculation process of the user hidden identifier, triggering the main body corresponding to the first priority in the priority information to execute the calculation process of the user hidden identifier, and generating the user hidden identifier. In the embodiment of the present disclosure, a public key for encrypting the SUPI to generate the sui is stored in the sim, and when a computation process of the sui is performed by a main body corresponding to the first priority, the main body corresponding to the first priority may use a general Elliptic Curve Integrated Encryption Scheme (ECIES) or another suitable personalized encryption scheme to perform encryption computation on the SUPI of the pre-obtained terminal, so as to generate the sui.
Step 133, determining that a main body currently used for executing the calculation process of the user hidden identifier is the user identification module, and triggering the user identification module to execute the calculation process of the user hidden identifier, so as to generate the user hidden identifier.
In step 133, when it is recognized that the mobile device does not support the computation of the user hidden identifier SUCI, it is determined that the main body currently used for executing the computation process of the user hidden identifier is the user identification module, and the user identification module is triggered to execute the computation process of the user hidden identifier, so as to generate the user hidden identifier. The sim may perform encryption calculation on the SUPI of the terminal obtained in advance by using a general Elliptic Curve integrated encryption Scheme (ECIES for short) or other suitable personalized encryption Scheme, so as to generate the sui.
Fig. 3 is a flowchart of another method for controlling generation of a hidden identifier of a user according to an embodiment of the present disclosure, and as shown in fig. 3, different from the foregoing embodiment shown in fig. 2, in the embodiment of the present disclosure, after step 132, the method further includes:
step 1321, determining whether the main body corresponding to the first priority successfully generates the user hidden identifier, if so, ending the process, otherwise, executing step 1322.
In some embodiments, if the main body corresponding to the first priority is the subscriber identity module, in step 1321, the subscriber identity module may determine whether the computation process of the SUCI performed by the subscriber identity module in the computation process of the SUCI fails, end the process if the user hidden identifier is successfully computed, and perform step 1322 if the user hidden identifier is not successfully computed.
In some embodiments, if the main body corresponding to the first priority is the mobile device, a calculation result of the mobile device executing the SUCI calculation process may be obtained in advance, where the calculation result is fed back by the mobile device, and in step 1321, it is determined whether the mobile device successfully generates the user hidden identifier according to the calculation result of the mobile device, if it is determined that the mobile device successfully calculates the user hidden identifier, the process is ended, and if it is determined that the mobile device does not successfully calculate the user hidden identifier, step 1322 is performed.
Step 1322, triggering the main body corresponding to the second priority in the priority information to execute the calculation process of the user hidden identifier, so as to generate the user hidden identifier.
It can be understood that, if the main body corresponding to the first priority is the subscriber identity module, the main body corresponding to the second priority is the mobile device; and if the main body corresponding to the first priority is the mobile equipment, the main body corresponding to the second priority is the subscriber identity module.
In some embodiments, if the main body corresponding to the first priority is a mobile device, the execution main body in step 1321 and step 1322 may also be the mobile device, the mobile device itself determines whether the computation process of the SUCI executed by the mobile device is successful, if the computation is successful, the process is ended, otherwise, the mobile device itself triggers the main body corresponding to the second priority in the priority information in the user hidden identifier computation setting command, that is, the user identification module, to execute the computation process of the SUCI.
The method for controlling the generation of the user hidden identifier provided by the embodiment of the disclosure comprises the steps of sending a user hidden identifier calculation setting command to a mobile device of a terminal, wherein the user hidden identifier calculation setting command comprises main body information of a main body used for executing a calculation process of the user hidden identifier; receiving a command response message returned by the mobile equipment, wherein the command response message comprises information used for indicating whether the mobile equipment supports the calculation of the user hidden identifier; and determining a main body which is currently used for executing the calculation process of the user hidden identifier according to the command response message and the main body information so as to trigger the main body to execute the calculation process of the user hidden identifier and generate the user hidden identifier. Before the terminal performs the authentication process of accessing the mobile network, the selection and the switching of the main body for executing the SUCI calculation process are realized by adding a new machine-card interactive instruction, the interactive capacity and the range of the mobile equipment and the user identification module of the terminal are expanded, more support for more identification encryption strategies is realized, and the calculation efficiency, the success rate and the flexibility of the identification encryption are effectively improved.
Fig. 4 is a flowchart of a further method for controlling generation of a user hidden identifier according to an embodiment of the present disclosure, and as shown in fig. 4, the method for controlling generation of a user hidden identifier is applied to a mobile device of a terminal, and the method for controlling generation of a user hidden identifier includes:
and step 20, when the mobile device is started, reading a service list preset by the user identification module by the mobile device.
In the embodiment of the present disclosure, an operator determines that a terminal performs a policy of calculating suici for a given plurality of parties in an authentication scheme for accessing a mobile network, and extends the setting of a service list in a subscriber identity module (e.g., USIM) according to the given policy.
Fig. 5 is a schematic diagram of a 17 th byte in a service list of a subscriber identity module, as shown in fig. 5, in the embodiment of the present disclosure, by extending the service list of the subscriber identity module, the b3 reserved bit of the 17 th byte of the service list is enabled, and the b3 reserved bit of the 17 th byte is defined to indicate that the sui supports multi-party computation, for example, the b3 reserved bit of the 17 th byte is set to 1 to indicate that the subscriber identity module supports the sui, that is, the subscriber identity module has a requirement for the sui to support multi-party computation.
Fig. 6 is a schematic diagram of a 16 th byte in a service list of a subscriber identity module, as shown in fig. 6, in an embodiment of the present disclosure, the subscriber identity module may indicate characteristics related to the computation of the SUCI, including whether the SUCI computation is supported and whether the execution of the SUCI computation is supported, at specific different service identification bits of the service list of the subscriber identity module. For example, b4 and b5 of the 16 th byte in the service list of the subscriber identity module may be set to 1 in advance, which indicates that the subscriber identity module supports the computation of the sui and the subscriber identity module may perform the computation process of the sui.
In the embodiment of the present disclosure, when the mobile device is powered on and started, before performing an authentication procedure for accessing the mobile network, a service list preset by the subscriber identity module is read first.
Step 21, the mobile device determines whether the subscriber identity module has the requirement of multi-party computing subscriber hidden identity according to the service list.
The mobile device can identify whether the subscriber identity module has the requirement for multi-party computing of the subscriber hidden identity by identifying the service identity bits in fig. 5 and 6 in corresponding bytes. For example, whether the subscriber identity module has the requirement of hiding the identity of the multi-party computing user is identified by judging whether the b3 flag of the 17 th byte in the service list is 1, when the b3 flag of the 17 th byte is 1, the subscriber identity module has the requirement of hiding the identity of the multi-party computing user is identified, otherwise, the subscriber identity module does not have the requirement of hiding the identity of the multi-party computing user is identified.
Step 22, if the mobile device determines that the subscriber identity module has the requirement of the hidden identity of the multi-party computing subscriber, the mobile device waits to receive the command of the subscriber identity module.
In step 22, if the mobile device determines that the subscriber identity module has the requirement for the multi-party hidden identity of the user, the mobile device does not execute the authentication procedure for accessing the mobile network for the moment, and waits for receiving the subsequent command of the subscriber identity module.
And step 23, the mobile device receives a user hidden identifier calculation setting command sent by the user identification module, wherein the user hidden identifier calculation setting command comprises main body information of a main body used for executing a user hidden identifier calculation process.
The main body of the calculation process for executing the user hidden identification comprises a user identification module and a mobile device.
For the terminal, the user hidden identifier calculation setting command, and the specific related description of step 23, reference may be made to the description of step 11 in the embodiment shown in fig. 1, and details are not described here.
When it is recognized from the user hidden identity calculation setting command that the subject for performing the calculation process of the user hidden identity includes the mobile device, the mobile device determines whether or not it supports the calculation of the user hidden identity.
In step 24, after receiving the user hidden identity calculation setting command, the mobile device parses the user hidden identity calculation setting command, obtains the requirements of the subscriber identity module, determines whether the mobile device supports SUCI calculation, that is, whether the mobile device supports cryptographic calculation for SUPI to generate SUCI, and generates a command response message, when it is recognized that the main body for executing the user hidden identity calculation process in the user hidden identity calculation setting command includes the mobile device. Specifically, the mobile device may determine whether it supports SUCI's computation based on its computing capabilities.
And step 25, the mobile device returns a command response message to the subscriber identity module, wherein the command response message includes information for indicating whether the mobile device supports the calculation of the subscriber hidden identifier, so that the subscriber identity module determines a main body currently used for executing the calculation process of the subscriber hidden identifier according to the command response message and the main body information.
For a detailed description of the command response message, reference may be made to the description in step 12 above, and details are not described here.
Fig. 7 is a flowchart of a further method for controlling generation of a user hidden identifier according to an embodiment of the present disclosure, and as shown in fig. 7, the method for controlling generation of a user hidden identifier includes:
step 31, when the mobile device is started, the mobile device reads a service list preset by the subscriber identity module.
For the detailed description of step 31, reference may be made to the above description of step 20, which is not repeated herein.
Step 32, the mobile device determines whether the subscriber identity module has the requirement of multi-party computing subscriber hidden identity according to the service list.
For the detailed description of step 32, reference may be made to the above description of step 21, which is not repeated herein.
Step 33, if the mobile device determines that the subscriber identity module has the requirement of the hidden identity of the multi-party computing user, the mobile device waits to receive the command of the subscriber identity module.
For the detailed description of step 31, reference may be made to the above description of step 22, which is not repeated herein.
Step 34, the user identification module sends a user hidden identifier calculation setting command to the mobile device of the terminal, where the user hidden identifier calculation setting command includes body information of a body for executing a calculation process of the user hidden identifier.
Before step 34, a step of generating a user hidden identity calculation setting command by the user identification module is further included.
For the detailed description of step 34, reference may be made to the above description of step 11, which is not repeated herein.
Step 35, when the mobile device recognizes from the user hidden identity calculation setting command that the main body for executing the calculation process of the user hidden identity includes the mobile device, the mobile device determines whether or not it supports the calculation of the user hidden identity.
For a detailed description of this step 35, reference may be made to the above description of step 24, which is not repeated herein.
Step 36, the subscriber identity module receives a command response message returned by the mobile device, where the command response message includes information indicating whether the mobile device supports the calculation of the user hidden identifier.
For a detailed description of this step 36, reference may be made to the above description of step 12, which is not repeated herein.
And step 37, the subscriber identity module judges whether the mobile equipment supports the calculation of the user hidden identifier or not according to the command response message, if so, step 38 is executed, and if not, step 39 is executed.
For a detailed description of step 37, reference may be made to the above description of step 131, which is not repeated herein.
And step 38, the user identification module determines the main body corresponding to the first priority in the priority information as the main body currently used for executing the calculation process of the user hidden identifier, and triggers the main body corresponding to the first priority in the priority information to execute the calculation process of the user hidden identifier, so as to generate the user hidden identifier.
For a detailed description of this step 38, reference may be made to the above description of step 132, which is not repeated herein.
And 39, judging whether the main body corresponding to the first priority successfully generates the user hidden identifier by the user identification module, if so, ending the process, and otherwise, executing the step 40.
For a detailed description of this step 39, reference may be made to the description of step 1321 above, which is not described herein again.
And step 40, the user identification module triggers the main body corresponding to the second priority in the priority information to execute the calculation process of the user hidden identifier so as to generate the user hidden identifier, and the process is ended.
For a detailed description of step 40, reference may be made to the above description of step 1322, which is not repeated herein.
And step 41, the user identification module determines that the main body of the calculation process for executing the user hidden identifier is the user identification module, executes the calculation process for the user hidden identifier to generate the user hidden identifier, and ends the process.
For a detailed description of step 41, reference may be made to the above description of step 133, which is not repeated herein.
The method for controlling the generation of the user hidden identifier provided by the embodiment of the disclosure comprises the steps of sending a user hidden identifier calculation setting command to a mobile device of a terminal, wherein the user hidden identifier calculation setting command comprises main body information of a main body used for executing a calculation process of the user hidden identifier; receiving a command response message returned by the mobile equipment, wherein the command response message comprises information used for indicating whether the mobile equipment supports the calculation of the user hidden identifier; and determining a main body which is currently used for executing the calculation process of the user hidden identifier according to the command response message and the main body information so as to trigger the main body to execute the calculation process of the user hidden identifier and generate the user hidden identifier. Before the terminal performs the authentication process of accessing the mobile network, the selection and the switching of the main body for executing the SUCI calculation process are realized by expanding the service list of the user identification module and adding a new machine-card interaction instruction, the interaction capacity and the range of the mobile equipment of the terminal and the user identification module are expanded, more support on more identification encryption strategies is realized, and the calculation efficiency, the success rate and the flexibility of identification encryption are effectively improved.
Fig. 8 is a schematic structural diagram of a generation control device for a user hidden identifier according to an embodiment of the present disclosure, and as shown in fig. 8, the generation control device includes: the device comprises a generating module 400, a first sending module 401, a first receiving module 402, a first determining module 403 and a triggering module 404.
The generating module 400 is configured to generate a user hidden identifier calculation setting command, where the user hidden identifier calculation setting command includes body information for executing a body of a calculation process of a user hidden identifier, and the body for executing the calculation process of the user hidden identifier includes a user identification module of a terminal and a mobile device of the terminal.
The first sending module 401 is configured to send a user hidden identifier calculation setting command to a mobile device of the terminal.
The first receiving module 402 is configured to receive a command response message returned by the mobile device, where the command response message includes information indicating whether the mobile device supports calculation of the user hidden identity.
The first determining module 403 is configured to determine, according to the command response message and the subject information, a subject currently used for executing a calculation process of the user hidden identifier; and
the triggering module 404 is configured to trigger the subject determined by the first determining module 403 to perform a calculation process of the user hidden identifier, so as to generate the user hidden identifier.
Optionally, the body information includes priority information; the first determining module 403 is specifically configured to, when the mobile device supports calculation of a user hidden identifier, determine a main body corresponding to a first priority in the priority information as a main body currently used for executing a calculation process of the user hidden identifier; the triggering module 404 is specifically configured to trigger a main body corresponding to the first priority in the priority information to execute a calculation process of the user hidden identifier, so as to generate the user hidden identifier.
Optionally, the first determining module 403 is further configured to determine that a subject currently used for performing the calculation process of the user hidden identifier is a user identification module when the mobile device does not support the calculation of the user hidden identifier; the triggering module 404 is further configured to trigger the user identification module to perform a calculation process of the user hidden identifier, so as to generate the user hidden identifier.
Optionally. The device for controlling the generation of the user hidden identifier further comprises a judging module 405; the judging module 405 is configured to judge whether the main body corresponding to the first priority successfully generates the user hidden identifier after the triggering module 404 triggers the main body corresponding to the first priority in the priority information to execute the calculation process of the user hidden identifier; the triggering module 404 is further configured to trigger the main body corresponding to the second priority in the priority information to execute a calculation process of the user hidden identifier to generate the user hidden identifier, if the determining module 405 determines that the main body corresponding to the first priority does not successfully generate the user hidden identifier.
In addition, the apparatus for controlling generation of a user hidden identifier according to the embodiments of the present disclosure is configured to implement the method for controlling generation of a user hidden identifier according to the embodiments shown in fig. 1, fig. 2, and fig. 3, and for specific description, reference may be made to the description of the embodiments shown in fig. 1, fig. 2, and fig. 3, which is not described herein again.
Correspondingly, the embodiment of the present disclosure further provides a user identification module, where the identification module includes the generation control device of the user hidden identifier provided in the foregoing embodiment.
Fig. 9 is a schematic structural diagram of a mobile device according to an embodiment of the present disclosure, and as shown in fig. 9, the mobile device includes: a second receiving module 501, a second determining module 502 and a second sending module 503.
The second receiving module 501 is configured to receive a user hidden identifier calculation setting command sent by the user identification module, where the user hidden identifier calculation setting command includes main information of a main body used for executing a user hidden identifier calculation process, and the main body used for executing the user hidden identifier calculation process includes the user identification module and the mobile device.
The second determination module 502 is configured to determine whether the mobile device supports the calculation of the user hidden identity when it is recognized from the user hidden identity calculation setting command that the main body for performing the calculation process of the user hidden identity includes the mobile device.
The second sending module 503 is configured to return a command response message to the subscriber identity module, where the command response message includes information indicating whether the mobile device supports the calculation of the user hidden identifier, so that the subscriber identity module determines, according to the command response message and the subject information, a subject currently used for executing the calculation process of the user hidden identifier.
Optionally, the mobile device further comprises a reading module 504; the reading module 504 is configured to read a service list preset by the subscriber identity module when the mobile device is powered on.
The second determining module 502 is further configured to determine whether the subscriber identity module has a requirement for multi-party hidden identity calculation for the subscriber according to the service list; if it is determined that the subscriber identity module has a requirement for the multi-party computing subscriber to hide the identity, the second receiving module 501 is enabled to wait for receiving the command of the subscriber identity module.
In addition, the mobile device provided in the embodiment of the present disclosure is configured to implement the user hidden identifier generation control method provided in the embodiment shown in fig. 4, and for specific description, reference may be made to the description of the embodiment shown in fig. 4, and details are not described here again.
Fig. 10 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure, and as shown in fig. 10, the terminal includes a subscriber identity module 601 and a mobile device 602.
Wherein the subscriber identity module 601 comprises a subscriber identity module as provided in any of the above embodiments, and/or the mobile device 602 comprises a mobile device as provided in any of the above embodiments.
One of ordinary skill in the art will appreciate that all or some of the steps of the methods, systems, apparatuses, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (14)

1. A generation control method of a user hidden identifier is applied to a user identification module of a terminal, and is characterized in that the generation control method comprises the following steps:
generating a user hidden identity calculation setting command, wherein the user hidden identity calculation setting command comprises main body information of a main body used for executing a calculation process of a user hidden identity, and the main body used for executing the calculation process of the user hidden identity comprises the user identification module and the mobile equipment;
sending the user hidden identifier calculation setting command to the mobile equipment of the terminal;
receiving a command response message returned by the mobile equipment, wherein the command response message comprises information used for indicating whether the mobile equipment supports the calculation of user hidden identification;
and determining a main body currently used for executing the calculation process of the user hidden identification according to the command response message and the main body information so as to trigger the main body to execute the calculation process of the user hidden identification and generate the user hidden identification.
2. The generation control method according to claim 1, wherein the body information includes priority information; the determining, according to the command response message and the subject information, a subject currently used for executing a calculation process of the user hidden identifier includes:
when the mobile equipment supports the calculation of the user hidden identifier, determining a main body corresponding to a first priority in the priority information as a main body currently used for executing the calculation process of the user hidden identifier;
the triggering the main body to execute the calculation process of the user hidden identifier and generating the user hidden identifier includes: and triggering a main body corresponding to the first priority in the priority information to execute the calculation process of the user hidden identification, and generating the user hidden identification.
3. The generation control method according to claim 2, wherein when the mobile device does not support the calculation of the user hidden identifier, it is determined that a subject currently used for executing the calculation process of the user hidden identifier is the user identification module, and the user identification module is triggered to execute the calculation process of the user hidden identifier, so as to generate the user hidden identifier.
4. The generation control method according to claim 2, wherein after triggering the subject corresponding to the first priority in the priority information to perform a calculation process of hiding the identifier by the user, the method further comprises:
judging whether the main body corresponding to the first priority successfully generates the user hidden identification;
and if the main body corresponding to the first priority is judged to be unsuccessful in generating the user hidden identifier, triggering the main body corresponding to the second priority in the priority information to execute a calculation process of the user hidden identifier so as to generate the user hidden identifier.
5. A generation control method of a user hidden identifier is applied to a mobile device of a terminal, and is characterized in that the generation control method comprises the following steps:
receiving a user hidden identifier calculation setting command sent by a user identification module, wherein the user hidden identifier calculation setting command comprises main body information of a main body used for executing a user hidden identifier calculation process, and the main body used for executing the user hidden identifier calculation process comprises the user identification module and the mobile equipment;
when the user hidden identifier calculation setting command identifies that the main body for executing the calculation process of the user hidden identifier comprises the user hidden identifier, determining whether the user hidden identifier calculation is supported by the user hidden identifier calculation setting command;
and returning a command response message to the user identification module, wherein the command response message comprises information for indicating whether the command response message supports the calculation of the user hidden identifier, so that the user identification module determines a main body currently used for executing the calculation process of the user hidden identifier according to the command response message and the main body information.
6. The generation control method according to claim 5, wherein before receiving the user hidden identifier calculation setting command sent by the user identification module, the method further comprises:
reading a service list preset by the user identification module when starting up;
determining whether the user identification module has the requirement of multi-party computing user hidden identification according to the service list;
and if the user identification module is determined to have the requirement of hiding the identification of the multi-party calculation user, waiting to receive the command of the user identification module.
7. A control device for generating a user hidden identifier, which is applied to a user identification module of a terminal, is characterized by comprising:
the generation module is used for generating a user hidden identifier calculation setting command, wherein the user hidden identifier calculation setting command comprises main body information of a main body used for executing a calculation process of a user hidden identifier, and the main body used for executing the calculation process of the user hidden identifier comprises a user identification module of the terminal and mobile equipment of the terminal;
the first sending module is used for sending the user hidden identifier calculation setting command to the mobile equipment of the terminal;
a first receiving module, configured to receive a command response message returned by the mobile device, where the command response message includes information indicating whether the mobile device supports user hidden identity calculation;
a first determining module, configured to determine, according to the command response message and the subject information, a subject currently used for executing a calculation process of the user hidden identifier; and
and the triggering module is used for triggering the determined main body to execute the calculation process of the user hidden identification so as to generate the user hidden identification.
8. The generation control apparatus according to claim 7, wherein the body information includes priority information;
the first determining module is specifically configured to determine, when the mobile device supports calculation of a user hidden identifier, a subject corresponding to a first priority in the priority information as a subject currently used for performing a calculation process of the user hidden identifier;
the triggering module is specifically configured to trigger a main body corresponding to a first priority in the priority information to execute a calculation process of the user hidden identifier, and generate the user hidden identifier.
9. The generation control apparatus according to claim 8, wherein the first determining module is further configured to determine that a subject currently used for performing the calculation process of the user hidden identifier is the user identification module when the mobile device does not support the calculation of the user hidden identifier;
the triggering module is further configured to trigger the user identification module to execute a calculation process of a user hidden identifier, so as to generate the user hidden identifier.
10. The generation control device according to claim 8, characterized by further comprising a judgment module;
the judging module is used for judging whether the main body corresponding to the first priority successfully generates the user hidden identifier or not after the triggering module triggers the main body corresponding to the first priority in the priority information to execute the calculation process of the user hidden identifier;
the triggering module is further configured to trigger the main body corresponding to the second priority in the priority information to execute a calculation process of the user hidden identifier if the judging module judges that the main body corresponding to the first priority does not successfully generate the user hidden identifier, so as to generate the user hidden identifier.
11. A subscriber identity module, characterized in that it comprises control means for generating a hidden identity for a subscriber according to any one of claims 7 to 10.
12. A mobile device, comprising:
a second receiving module, configured to receive a user hidden identifier calculation setting command sent by a user identification module, where the user hidden identifier calculation setting command includes body information of a body used to execute a user hidden identifier calculation process, and the body used to execute the user hidden identifier calculation process includes the user identification module and the mobile device;
a second determination module for determining whether the mobile device supports calculation of a user hidden identity, when it is recognized from the user hidden identity calculation setting command that a subject for performing a calculation process of a user hidden identity includes the mobile device;
and a second sending module, configured to return a command response message to the subscriber identity module, where the command response message includes information used to indicate whether the mobile device supports user hidden identifier calculation, so that the subscriber identity module determines, according to the command response message and the subject information, a subject currently used for executing the user hidden identifier calculation process.
13. The mobile device of claim 12, further comprising a reading module;
the reading module is used for reading a service list preset by the user identification module when the mobile equipment is started;
the second determining module is further used for determining whether the user identification module has the requirement of multi-party computing user hidden identification according to the service list; and if the user identification module is determined to have the requirement of hiding the identification of the multi-party calculation user, enabling the second receiving module to wait for receiving the command of the user identification module.
14. A terminal, characterized in that it comprises a mobile device and a subscriber identity module, said subscriber identity module comprising the subscriber identity module of the preceding claim 11, and/or said mobile device comprising the mobile device of the preceding claim 12 or 13.
CN201911285707.0A 2019-12-13 2019-12-13 Generation control method and device of user hidden identifier and terminal Active CN111049831B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911285707.0A CN111049831B (en) 2019-12-13 2019-12-13 Generation control method and device of user hidden identifier and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911285707.0A CN111049831B (en) 2019-12-13 2019-12-13 Generation control method and device of user hidden identifier and terminal

Publications (2)

Publication Number Publication Date
CN111049831A true CN111049831A (en) 2020-04-21
CN111049831B CN111049831B (en) 2022-03-18

Family

ID=70236269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911285707.0A Active CN111049831B (en) 2019-12-13 2019-12-13 Generation control method and device of user hidden identifier and terminal

Country Status (1)

Country Link
CN (1) CN111049831B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887965A (en) * 2020-12-18 2021-06-01 合肥途鸽科技有限公司 Method and device for sending user identification
CN113342653A (en) * 2021-06-07 2021-09-03 星汉智能科技股份有限公司 5G smart card testing method, device and medium based on key agreement
CN113840273A (en) * 2021-09-18 2021-12-24 中国联合网络通信集团有限公司 User hidden identifier generation method, terminal, USIM, device and medium
CN113840276A (en) * 2021-09-18 2021-12-24 中国联合网络通信集团有限公司 5G identifier hiding compatible configuration method, user identification module and terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201828051A (en) * 2017-01-17 2018-08-01 阿里巴巴集團服務有限公司 Hiding setting method and device, application processing method, and device hides the data and/or function items which do not need to be checked or used by other people
US20190098502A1 (en) * 2017-07-25 2019-03-28 Telefonaktiebolaget Lm Ericsson (Publ) Subscription concealed identifier
CN110049483A (en) * 2019-04-09 2019-07-23 中国电子科技集团公司第三十研究所 Mobile communication system user network identity jumps the implementation method for hiding network function
CN110493773A (en) * 2019-08-23 2019-11-22 中国联合网络通信集团有限公司 The acquisition methods and its equipment of mobile device authentication capability

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201828051A (en) * 2017-01-17 2018-08-01 阿里巴巴集團服務有限公司 Hiding setting method and device, application processing method, and device hides the data and/or function items which do not need to be checked or used by other people
US20190098502A1 (en) * 2017-07-25 2019-03-28 Telefonaktiebolaget Lm Ericsson (Publ) Subscription concealed identifier
CN110049483A (en) * 2019-04-09 2019-07-23 中国电子科技集团公司第三十研究所 Mobile communication system user network identity jumps the implementation method for hiding network function
CN110493773A (en) * 2019-08-23 2019-11-22 中国联合网络通信集团有限公司 The acquisition methods and its equipment of mobile device authentication capability

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112887965A (en) * 2020-12-18 2021-06-01 合肥途鸽科技有限公司 Method and device for sending user identification
CN113342653A (en) * 2021-06-07 2021-09-03 星汉智能科技股份有限公司 5G smart card testing method, device and medium based on key agreement
CN113840273A (en) * 2021-09-18 2021-12-24 中国联合网络通信集团有限公司 User hidden identifier generation method, terminal, USIM, device and medium
CN113840276A (en) * 2021-09-18 2021-12-24 中国联合网络通信集团有限公司 5G identifier hiding compatible configuration method, user identification module and terminal
CN113840276B (en) * 2021-09-18 2023-05-02 中国联合网络通信集团有限公司 5G identification hiding compatible configuration method, user identification module and terminal
CN113840273B (en) * 2021-09-18 2023-05-09 中国联合网络通信集团有限公司 User hidden identifier generation method, terminal, USIM, equipment and medium

Also Published As

Publication number Publication date
CN111049831B (en) 2022-03-18

Similar Documents

Publication Publication Date Title
CN111049831B (en) Generation control method and device of user hidden identifier and terminal
US9699642B2 (en) Electronic subscriber identity module selection
US9762277B2 (en) Supporting SIM toolkit applications in embedded UICCs
US9439062B2 (en) Electronic subscriber identity module application identifier handling
TWI587674B (en) Methods and apparatus to support globalplatform usage on an embedded uicc
JP6231044B2 (en) Handling of application identification information of electronic subscriber identification module (eSIM)
WO2016169184A1 (en) Virtual sim card management method and system
CN105916144B (en) Techniques for dynamically supporting different authentication algorithms
US20150119017A1 (en) Method and system for implementing smart card remote operation based on smart card web server
EP4207847A1 (en) Virtual private dial-up network access method, network-side system, system, and storage medium
CN110945887B (en) Loading new subscription profiles into embedded subscriber identity modules
CN105357771A (en) Connection establishing method and user terminal
JP2013513986A (en) Smart card security function profile in the server
WO2020048382A1 (en) Method for controlling display of service identifier, and related product
CN113840276B (en) 5G identification hiding compatible configuration method, user identification module and terminal
CN112752258B (en) eSIM card opening method, mobile phone terminal and service acceptance system
US11570612B2 (en) Flexible electronic subscriber identity module deployment
US11272357B2 (en) Method and device for determining SIM card information
KR102287554B1 (en) Communication apparatus transmitting nssai and control method thereof
CN114080004B (en) Private network access method and device
CN112153756B (en) Data processing method and communication equipment based on tunnel establishment service
CN111615100B (en) Data processing method and device
CN111385795B (en) Authentication method of user identification card, mobile terminal and computer readable storage medium
CN108462967B (en) Mobile terminal and data service processing method thereof
CN116261123A (en) Communication method, device and system for network interview

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant