CN111065101A - 5G communication information encryption and decryption method and device based on block chain and storage medium - Google Patents

5G communication information encryption and decryption method and device based on block chain and storage medium Download PDF

Info

Publication number
CN111065101A
CN111065101A CN201911402314.3A CN201911402314A CN111065101A CN 111065101 A CN111065101 A CN 111065101A CN 201911402314 A CN201911402314 A CN 201911402314A CN 111065101 A CN111065101 A CN 111065101A
Authority
CN
China
Prior art keywords
public key
network
terminal device
terminal equipment
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911402314.3A
Other languages
Chinese (zh)
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201911402314.3A priority Critical patent/CN111065101A/en
Publication of CN111065101A publication Critical patent/CN111065101A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The embodiment of the invention provides a 5G communication information encryption and decryption method, device and storage medium based on a block chain. In the embodiment of the invention, the 5G terminal device encrypts the public key and the random number of the 5G terminal device by adopting the public key of the target operator to obtain the first encrypted information, the first encrypted information is sent to the network device of the target operator, the 5G terminal device receives the second encrypted information sent by the network device, the 5G terminal device decrypts the second encrypted information by adopting the private key of the 5G terminal device to obtain the decrypted information, if the decryption information is a random number, the network equipment is determined to pass the verification, so that the 5G terminal equipment without the SIM card can complete the authentication of the operator network by using the public key of the target operator, because the pseudo base station cannot obtain the private key corresponding to the public key of the target operator, therefore, authentication cannot be completed, disturbance of the pseudo base station is thoroughly avoided, and the communication safety between the 5G terminal equipment and the operator network equipment is improved.

Description

5G communication information encryption and decryption method and device based on block chain and storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a 5G communication information encryption and decryption method and device based on a block chain and a storage medium.
Background
When the 5G terminal device accesses the 5G network, the 5G terminal device needs to insert a Subscriber Identity Module (SIM) card. Because the public key of the operator or the shared key of both parties is stored in the SIM card, any man in the middle can not modify the built-in public key or shared key in the SIM card, and the attack or monitoring of the communication between the 5G terminal equipment and the network equipment of the operator by any man in the middle is avoided.
However, in an access scheme in which the 5G terminal device is not inserted into the SIM card, the 5G terminal device cannot authenticate the operator network device, so that any person can set up a base station to forge the identification information of the operator to provide service for the 5G terminal device without the SIM card and cheat the 5G terminal device to pay, thereby reducing the security of communication between the 5G terminal device and the operator network device.
Disclosure of Invention
The embodiment of the invention provides a 5G communication information encryption and decryption method, equipment and a storage medium based on a block chain, so as to avoid disturbance of a pseudo base station, thereby improving the communication security between 5G terminal equipment and operator network equipment.
In a first aspect, an embodiment of the present invention provides a 5G communication information encryption and decryption method based on a block chain, including:
the 5G terminal equipment encrypts a public key and a random number of the 5G terminal equipment by adopting a public key of a target operator to obtain first encryption information;
the 5G terminal equipment respectively adopts a block chain network and a 5G channel to send the first encryption information to network equipment of a target operator, wherein the 5G channel comprises a 5G new wireless base station and a user plane network element function UPF;
the 5G terminal equipment receives second encrypted information which is sent by the network equipment and signed by a private key through the block chain network, wherein the second encrypted information is obtained by encrypting a random number by using a public key of the 5G terminal equipment after the network equipment decrypts the first encrypted information to obtain the public key and the random number of the 5G terminal equipment;
the 5G terminal equipment adopts the public key of the target operator to verify the private key signature;
after the private key signature passes verification, the 5G terminal equipment decrypts the second encrypted information by adopting the private key of the 5G terminal equipment to obtain decrypted information;
and if the decryption information is the random number, the 5G terminal equipment determines that the network equipment passes the verification.
In a second aspect, an embodiment of the present invention provides a 5G communication information encryption and decryption method based on a block chain, including:
the method comprises the steps that network equipment of a target operator respectively receives first encryption information sent by 5G terminal equipment through a block chain network and a 5G channel, wherein the first encryption information is obtained by encrypting a public key and a random number of the 5G terminal equipment by the 5G terminal equipment through the public key of the target operator;
the network equipment decrypts the first encrypted information to obtain a public key and a random number of the 5G terminal equipment;
the network equipment encrypts the random number by adopting the public key of the 5G terminal equipment to obtain second encryption information;
the network equipment carries out private key signature on the second encrypted information by adopting a private key of the network equipment;
the network device sends the second encrypted information signed by the private key to the 5G terminal device through the blockchain network, so that the 5G terminal device verifies the private key signature by using the public key of the target operator, and when the private key signature passes the verification, the 5G terminal device decrypts the second encrypted information by using the private key of the 5G terminal device to obtain decrypted information; and if the decryption information is the random number, the 5G terminal equipment determines that the network equipment passes the verification.
In a third aspect, an embodiment of the present invention provides a 5G terminal device, including:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
encrypting the public key and the random number of the 5G terminal equipment by adopting the public key of a target operator to obtain first encryption information;
respectively adopting a block chain network and a 5G channel to send the first encryption information to network equipment of a target operator, wherein the 5G channel comprises a 5G new wireless base station and a user plane network element function UPF;
receiving second encrypted information which is sent by the network equipment and signed by a private key through the block chain network, wherein the second encrypted information is obtained by decrypting the first encrypted information by the network equipment to obtain a public key and a random number of the 5G terminal equipment and then encrypting the random number by adopting the public key of the 5G terminal equipment;
verifying the private key signature by adopting the public key of the target operator;
after the private key signature passes verification, decrypting the second encrypted information by using a private key of the 5G terminal equipment to obtain decrypted information;
and if the decryption information is the random number, determining that the network equipment passes the verification.
In a fourth aspect, an embodiment of the present invention provides a network device of a target operator, including:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
respectively receiving first encryption information sent by 5G terminal equipment from a block chain network and a 5G channel through the communication interface, wherein the first encryption information is obtained by encrypting a public key and a random number of the 5G terminal equipment by adopting a public key of a target operator;
decrypting the first encrypted information to obtain a public key and a random number of the 5G terminal equipment;
encrypting the random number by adopting the public key of the 5G terminal equipment to obtain second encryption information;
carrying out private key signature on the second encrypted information by adopting a private key of the network equipment;
sending the second encrypted information signed by the private key to the 5G terminal device through the blockchain network, so that the 5G terminal device verifies the private key signature by using the public key of the target operator, and after the private key signature passes the verification, the 5G terminal device decrypts the second encrypted information by using the private key of the 5G terminal device to obtain decrypted information; and if the decryption information is the random number, the 5G terminal equipment determines that the network equipment passes the verification.
In a fifth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, the computer program being executed by a processor to implement the method of the first aspect or the second aspect.
In the method, the device, and the storage medium for encrypting and decrypting 5G communication information based on a block chain provided in the embodiments of the present invention, a 5G terminal device encrypts a public key and a random number of the 5G terminal device by using a public key of a target operator to obtain first encrypted information, the 5G terminal device sends the first encrypted information to a network device of the target operator by using a block chain network and a 5G channel, respectively, the 5G terminal device receives second encrypted information sent by the network device, the second encrypted information is encrypted information obtained by encrypting the random number by using the public key of the 5G terminal device after the network device decrypts the first encrypted information to obtain the public key and the random number of the 5G terminal device, the 5G terminal device decrypts the second encrypted information by using a private key of the 5G terminal device, and obtaining decryption information, if the decryption information is the random number, the 5G terminal equipment determines that the network equipment passes verification, so that the 5G terminal equipment without the SIM card can finish the authentication of the operator network by using the public key of the target operator, and since the pseudo base station cannot obtain the private key corresponding to the public key of the target operator, the authentication cannot be finished, thereby thoroughly avoiding the harassment of the pseudo base station, and improving the safety of the communication between the 5G terminal equipment and the operator network equipment.
Drawings
Fig. 1 is a schematic diagram of a communication system according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for encrypting and decrypting 5G communication information based on a block chain according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for encrypting and decrypting 5G communication information based on a block chain according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of a 5G terminal device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a network device of a target operator according to an embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The 5G communication information encryption and decryption method based on the block chain provided by the embodiment of the invention can be applied to the communication system shown in figure 1. As shown in fig. 1, the communication system includes: the mobile terminal includes 5G terminal equipment 11, a 5G new wireless base station 12, a User Plane network Function (UPF) 13, a network element 14, a Unified User Data Management (UDM) Function 15, and a temporary identity registration server 16, where the network element 14 may include an Access and Mobility Management Function (AMF) and a Session Management Function (SMF). In some embodiments, the AMF and SMF may be deployed in different devices, respectively. 5G New Radio base station 5G New Radio Access Technology (NR) base station (neighbor Node B, gNB).
It is to be understood that this is by way of illustration only. The temporary identity registration server can be one or a plurality of cloud servers, the cloud servers are a server cluster, a plurality of servers are similar to a universal computer framework, and the cloud servers comprise a processor, a hard disk, a memory, a system bus and the like. The 5G terminal device 11 is, for example, a smart phone, a tablet computer, or the like.
As shown in fig. 1, the 5G terminal device 11 may be inserted into a SIM card of operator a, that is, the 5G terminal device 11 may be connected to a 5G network of operator a, but the 5G terminal device 11 is not inserted into a SIM card of operator B, that is, the 5G terminal device 11 has not yet accessed into a 5G network of operator B, and in some scenarios, the 5G terminal device 11 may need to access the 5G network of operator B, and therefore, the 5G new radio base station 12, the User Plane Function (UPF) 13, the network element 14, the Unified User Data Management (UDM) Function 15, the temporary identity registration server 16, and the Data network shown in fig. 1 may belong to operator B. In the following embodiments, operator B may be denoted as the target operator.
The embodiment of the invention provides a 5G communication information encryption and decryption method based on a block chain, and aims to solve the technical problems in the prior art.
The following describes the technical solutions of the present invention and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present invention will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a method for encrypting and decrypting 5G communication information based on a block chain according to an embodiment of the present invention. The embodiment of the invention provides a 5G communication information encryption and decryption method based on a block chain, aiming at the technical problems in the prior art, and the method comprises the following specific steps:
step 201, the 5G terminal device encrypts the public key and the random number of the 5G terminal device by using the public key of the target operator to obtain first encryption information.
In the embodiment of the present application, the 5G terminal device 11 shown in fig. 1 needs to access the 5G network of the operator B, and the operator B is denoted as a target operator. First, 5G terminal device 11 needs to obtain the legal public key of operator B. The public key of operator B is denoted PKb.
Optionally, before the 5G terminal device encrypts the public key and the random number of the 5G terminal device by using the public key of the target operator, the method further includes: the 5G terminal equipment acquires the public key of the target operator from the application program by installing the application program of the target operator; or the 5G terminal equipment acquires the public key of the target operator from the network equipment of the target operator through a WIFI communication technology; or the 5G terminal equipment acquires the public key of the target operator in a legal way through the operator to which the 5G terminal equipment has access.
As a possible implementation manner, the 5G terminal device 11 may install an Application (APP) of the operator B, and the public key PKb of the operator B may be embedded in the APP, so that the 5G terminal device 11 may obtain the public key PKb of the operator B from the APP.
As another possible implementation manner, the 5G terminal device 11 may obtain the public key PKb of the operator B from the network device of the operator B through the WIFI communication technology.
As still another possible implementation, the 5G terminal device 11 may obtain the public key PKb of the operator B legally through the operator a to which the 5G terminal device 11 has access, for example, the operator a may obtain the public key PKb of the operator B from a page of a business hall of the operator B or an official website of the operator B.
Optionally, before the 5G terminal device encrypts the public key and the random number of the 5G terminal device by using the public key of the target operator, the method further includes: and the 5G terminal equipment generates a public key and a private key corresponding to a temporary identity, wherein the temporary identity is used for accessing the 5G terminal equipment to the 5G network of the target operator.
Specifically, when the 5G terminal device 11 executes a procedure of accessing to the 5G network of the operator B with the temporary identity, the application program of the operator B in the 5G terminal device 11 may locally generate a public key and a private key corresponding to the temporary identity, where the public key is recorded as PKu, and the private key is recorded as SKu. Further, the 5G terminal device 11 may prompt the user to enter a password, which may be used to encrypt SKu, and the encrypted SKu may be stored locally at the 5G terminal device 11. In addition, the 5G terminal device 11 and the network device of the operator B may also be nodes in a blockchain network, the public key Pku corresponding to the temporary identity of the 5G terminal device 11 may be used as a public key of the 5G terminal device 11 in the blockchain network, and the private key Sku corresponding to the temporary identity of the 5G terminal device 11 may be used as a private key of the 5G terminal device 11 in the blockchain network. Specifically, the 5G terminal device 11 may perform private key signature on the broadcast information sent by the 5G terminal device 11 in the blockchain network by using the private key Sku, so that the network device of the operator B may receive the broadcast information sent by the 5G terminal device 11 in the blockchain network from the blockchain network. Additionally, the 5G terminal device 11 may broadcast the public key Pku into the blockchain network so that other nodes in the blockchain network can verify the private key signature of the 5G terminal device 11.
The 5G terminal device 11 may search for signals of 5G new wireless base stations around the 5G terminal device 11 and display identification information of an operator to which the 5G new wireless base station searched by the 5G terminal device 11 belongs, for example, identification information of operator B. When the user selects the identifier information of the operator B displayed by the 5G terminal device 11, or when the 5G terminal device 11 starts an application program of the operator B, the 5G terminal device 11 may encrypt the public key PKu of the 5G terminal device 11 according to a preset encryption algorithm by using the public key PKb of the operator B, so as to obtain the first encryption information. Alternatively, the 5G terminal device 11 may encrypt the public key PKu of the 5G terminal device 11 and a random number Rand according to a preset encryption algorithm by using the public key PKb of the operator B to obtain the first encryption information, where the public key PKu of the 5G terminal device 11 and the random number Rand may be combined in a predetermined combination manner.
Step 202, the 5G terminal device sends the first encrypted information to a network device of a target operator by using a block chain network and a 5G channel, respectively, where the 5G channel includes a 5G new wireless base station and a user plane network element function UPF.
As shown in fig. 1, the 5G terminal device 11 may access the 5G network through two channels, for example, the temporary identity registration server 16 is a network element in the 5G network, so that the 5G terminal device 11 may communicate with the temporary identity registration server 16 through two channels, where one channel is a block chain network and the other channel is a 5G channel, and the 5G channel includes a 5G new radio base station 12 and a User Plane Function (UPF) 13. Specifically, the 5G terminal device 11 may access the blockchain network through the WIFI network or a network of another operator.
Specifically, the 5G terminal device 11 may use the two channels to send the first encrypted information to the network device of the operator B, for example, the AMF or the temporary identity registration server 16. If the AMF or the temporary identity registration server 16 has the private key SKb corresponding to the public key PKb of the operator B, the AMF or the temporary identity registration server 16 may decrypt the first encrypted information by using the private key SKb corresponding to the PKb, so as to obtain the public key PKu of the 5G terminal device 11. If the AMF or the temporary identity registration server 16 does not have the private key SKb corresponding to the public key PKb of the operator B, the AMF or the temporary identity registration server 16 may send the first encrypted information to the UDM, and the UDM may decrypt the first encrypted information to obtain the public key Pku of the 5G terminal device 11.
In other embodiments, when the 5G terminal device 11 uses the two channels to send the first encrypted information to the network device of the operator B, the 5G terminal device 11 may also use the private key Sku of the 5G terminal device 11 to perform private key signature on the first encrypted information. Further, the 5G terminal device 11 sends the first encrypted information signed by the private key to the network device of the operator B by using the two channels.
Step 203, the 5G terminal device receives, through the blockchain network, second encrypted information that is obtained after the private key signature is sent by the network device, where the second encrypted information is obtained by the network device encrypting a random number by using the public key of the 5G terminal device after the network device decrypts the first encrypted information to obtain the public key and the random number of the 5G terminal device.
It is understood that, if the first encrypted information is the encrypted information of the public key PKu and the random number of the 5G terminal device 11, and the AMF or the temporary identity registration server 16 has the private key SKb corresponding to the public key PKb of the operator B, the AMF or the temporary identity registration server 16 may decrypt the first encrypted information by using the private key SKb corresponding to the public key PKb to obtain the public key PKu and the random number of the 5G terminal device 11.
If the AMF or the temporary identity registration server 16 receives the first encrypted information after the private key signature of the 5G terminal device 11, the AMF or the temporary identity registration server 16 may verify the private key signature by using the public key of the 5G terminal device 11, and after the verification is passed, the AMF or the temporary identity registration server 16 decrypts the first encrypted information by using the private key SKb corresponding to the PKb, so as to obtain the public key PKu and the random number of the 5G terminal device 11.
Further, the AMF or the temporary identity registration server 16 may encrypt the random number by using the public key PKu of the 5G terminal device 11 to obtain second encrypted information, and further, the AMF or the temporary identity registration server 16 may perform private key signature on the second encrypted information by using the private key of the operator B to obtain second encrypted information after the private key signature. Further, the AMF or the temporary identity registration server 16 may broadcast the second encrypted information signed by the private key in the blockchain network, so that the 5G terminal device 11 may receive the second encrypted information signed by the private key through the blockchain network.
And step 204, the 5G terminal equipment adopts the public key of the target operator to verify the private key signature.
When the 5G terminal device 11 receives the second encrypted information after the private key signature through the blockchain network, the 5G terminal device 11 may first verify the private key signature by using the public key of the operator B.
And step 205, after the private key signature passes the verification, the 5G terminal device decrypts the second encrypted information by using the private key of the 5G terminal device to obtain decrypted information.
If the private key signature is verified, further, the 5G terminal device 11 may decrypt the second encrypted information by using the private key SKu of the 5G terminal device to obtain decrypted information.
Step 206, if the decryption information is the random number, the 5G terminal device determines that the network device passes the verification.
If the 5G terminal device 11 determines that the decryption information is the random number, the 5G terminal device 11 may determine that the AMF or the temporary identity registration server 16 is authenticated and is not a pseudo base station.
Further, the 5G terminal device 11 and the AMF or the temporary identity registration server 16 may use the public key PKb of the operator B and the public key PKu of the 5G terminal device 11 to perform other communications, thereby completely avoiding access to a counterfeit base station network or man-in-the-middle attacks.
In the embodiment of the invention, a 5G terminal device encrypts a public key and a random number of a target operator by using a public key of the target operator to obtain first encrypted information, the 5G terminal device respectively adopts a block chain network and a 5G channel to send the first encrypted information to a network device of the target operator, the 5G terminal device receives second encrypted information sent by the network device, the second encrypted information is encrypted information obtained by encrypting the random number by using the public key of the 5G terminal device after the network device decrypts the first encrypted information to obtain the public key and the random number of the 5G terminal device, the 5G terminal device decrypts the second encrypted information by using a private key of the 5G terminal device to obtain decrypted information, and if the decrypted information is the random number, the 5G terminal device determines that the network device passes verification, therefore, the 5G terminal equipment without the SIM card can complete the authentication of the operator network by using the public key of the target operator, and the pseudo base station cannot complete the authentication because the pseudo base station cannot obtain the private key corresponding to the public key of the target operator, so that the disturbance of the pseudo base station is thoroughly avoided, and the safety of communication between the 5G terminal equipment and the operator network equipment is improved.
Fig. 3 is a flowchart of a method for encrypting and decrypting 5G communication information based on a block chain according to another embodiment of the present invention. On the basis of the foregoing embodiment, the method for encrypting and decrypting 5G communication information based on a block chain provided in this embodiment specifically includes the following steps:
step 301, a network device of a target operator receives first encryption information sent by a 5G terminal device through a blockchain network and a 5G channel, respectively, where the first encryption information is obtained by encrypting, by the 5G terminal device, a public key and a random number of the 5G terminal device by using the public key of the target operator.
In the embodiment of the present application, the 5G terminal device 11 shown in fig. 1 needs to access the 5G network of the operator B, and the operator B is denoted as a target operator. First, 5G terminal device 11 needs to obtain the legal public key of operator B. The public key of operator B is denoted PKb.
As a possible implementation manner, the 5G terminal device 11 may install an Application (APP) of the operator B, and the public key PKb of the operator B may be embedded in the APP, so that the 5G terminal device 11 may obtain the public key PKb of the operator B from the APP.
As another possible implementation manner, the 5G terminal device 11 may obtain the public key PKb of the operator B from the network device of the operator B through the WIFI communication technology.
As still another possible implementation, the 5G terminal device 11 may obtain the public key PKb of the operator B legally through the operator a to which the 5G terminal device 11 has access, for example, the operator a may obtain the public key PKb of the operator B from a page of a business hall of the operator B or an official website of the operator B.
When the 5G terminal device 11 executes a procedure of accessing to the 5G network of the operator B with the temporary identity, the application program of the operator B in the 5G terminal device 11 may locally generate a public key and a private key corresponding to the temporary identity, where the public key is recorded as PKu, and the private key is recorded as SKu. Further, the 5G terminal device 11 may prompt the user to enter a password, which may be used to encrypt SKu, and the encrypted SKu may be stored locally at the 5G terminal device 11. In addition, the 5G terminal device 11 and the network device of the operator B may also be nodes in a blockchain network, the public key Pku corresponding to the temporary identity of the 5G terminal device 11 may be used as a public key of the 5G terminal device 11 in the blockchain network, and the private key Sku corresponding to the temporary identity of the 5G terminal device 11 may be used as a private key of the 5G terminal device 11 in the blockchain network. Specifically, the 5G terminal device 11 may perform private key signature on the broadcast information sent by the 5G terminal device 11 in the blockchain network by using the private key Sku, so that the network device of the operator B may receive the broadcast information sent by the 5G terminal device 11 in the blockchain network from the blockchain network. Additionally, the 5G terminal device 11 may broadcast the public key Pku into the blockchain network so that other nodes in the blockchain network can verify the private key signature of the 5G terminal device 11.
The 5G terminal device 11 may search for signals of 5G new wireless base stations around the 5G terminal device 11 and display identification information of an operator to which the 5G new wireless base station searched by the 5G terminal device 11 belongs, for example, identification information of operator B. When the user selects the identifier information of the operator B displayed by the 5G terminal device 11, or when the 5G terminal device 11 starts an application program of the operator B, the 5G terminal device 11 may encrypt the public key PKu of the 5G terminal device 11 according to a preset encryption algorithm by using the public key PKb of the operator B, so as to obtain the first encryption information. Alternatively, the 5G terminal device 11 may encrypt the public key PKu of the 5G terminal device 11 and a random number Rand according to a preset encryption algorithm by using the public key PKb of the operator B to obtain the first encryption information, where the public key PKu of the 5G terminal device 11 and the random number Rand may be combined in a predetermined combination manner.
As shown in fig. 1, the 5G terminal device 11 may access the 5G network through two channels, for example, the temporary identity registration server 16 is a network element in the 5G network, so that the 5G terminal device 11 may communicate with the temporary identity registration server 16 through two channels, where one channel is a block chain network and the other channel is a 5G channel, and the 5G channel includes a 5G new radio base station 12 and a User Plane Function (UPF) 13. Specifically, the 5G terminal device 11 may access the blockchain network through the WIFI network or a network of another operator.
Specifically, the 5G terminal device 11 may use the two channels to send the first encrypted information to the network device of the operator B, for example, the AMF or the temporary identity registration server 16. If the AMF or the temporary identity registration server 16 has the private key SKb corresponding to the public key PKb of the operator B, the AMF or the temporary identity registration server 16 may decrypt the first encrypted information by using the private key SKb corresponding to the PKb, so as to obtain the public key PKu of the 5G terminal device 11. If the AMF or the temporary identity registration server 16 does not have the private key SKb corresponding to the public key PKb of the operator B, the AMF or the temporary identity registration server 16 may send the first encrypted information to the UDM, and the UDM may decrypt the first encrypted information to obtain the public key Pku of the 5G terminal device 11.
In other embodiments, when the 5G terminal device 11 uses the two channels to send the first encrypted information to the network device of the operator B, the 5G terminal device 11 may also use the private key Sku of the 5G terminal device 11 to perform private key signature on the first encrypted information. Further, the 5G terminal device 11 sends the first encrypted information signed by the private key to the network device of the operator B by using the two channels.
Step 302, the network device decrypts the first encrypted information to obtain the public key and the random number of the 5G terminal device.
It is understood that, if the first encrypted information is the encrypted information of the public key PKu and the random number of the 5G terminal device 11, and the AMF or the temporary identity registration server 16 has the private key SKb corresponding to the public key PKb of the operator B, the AMF or the temporary identity registration server 16 may decrypt the first encrypted information by using the private key SKb corresponding to the public key PKb to obtain the public key PKu and the random number of the 5G terminal device 11.
If the AMF or the temporary identity registration server 16 receives the first encrypted information after the private key signature of the 5G terminal device 11, the AMF or the temporary identity registration server 16 may verify the private key signature by using the public key of the 5G terminal device 11, and after the verification is passed, the AMF or the temporary identity registration server 16 decrypts the first encrypted information by using the private key SKb corresponding to the PKb, so as to obtain the public key PKu and the random number of the 5G terminal device 11.
And step 303, the network device encrypts the random number by using the public key of the 5G terminal device to obtain second encryption information.
Further, the AMF or the temporary identity registration server 16 may encrypt the random number using the public key PKu of the 5G terminal device 11 to obtain second encryption information.
And step 304, the network device performs private key signature on the second encrypted information by using a private key of the network device.
Further, the AMF or the temporary identity registration server 16 may perform a private key signature on the second encrypted information by using a private key of the operator B, so as to obtain the second encrypted information after the private key signature.
Step 305, the network device sends the second encrypted information signed by the private key to the 5G terminal device through the blockchain network, so that the 5G terminal device verifies the private key signature by using the public key of the target operator, and after the private key signature passes the verification, the 5G terminal device decrypts the second encrypted information by using the private key of the 5G terminal device, so as to obtain decrypted information; and if the decryption information is the random number, the 5G terminal equipment determines that the network equipment passes the verification.
Further, the AMF or the temporary identity registration server 16 may broadcast the second encrypted information signed by the private key in the blockchain network, so that the 5G terminal device 11 may receive the second encrypted information signed by the private key through the blockchain network.
When the 5G terminal device 11 receives the second encrypted information after the private key signature through the blockchain network, the 5G terminal device 11 may first verify the private key signature by using the public key of the operator B.
If the private key signature is verified, further, the 5G terminal device 11 may decrypt the second encrypted information by using the private key SKu of the 5G terminal device to obtain decrypted information.
If the 5G terminal device 11 determines that the decryption information is the random number, the 5G terminal device 11 may determine that the AMF or the temporary identity registration server 16 is authenticated and is not a pseudo base station.
Optionally, after the 5G terminal device determines that the network device passes the verification, the method further includes: and the network equipment communicates with the 5G terminal equipment by adopting the public key of the 5G terminal equipment and the public key of the target operator.
Further, the 5G terminal device 11 and the AMF or the temporary identity registration server 16 may use the public key PKb of the operator B and the public key PKu of the 5G terminal device 11 to perform other communications, thereby completely avoiding access to a counterfeit base station network or man-in-the-middle attacks.
In the embodiment of the invention, a 5G terminal device encrypts a public key and a random number of a target operator by using a public key of the target operator to obtain first encrypted information, the 5G terminal device respectively adopts a block chain network and a 5G channel to send the first encrypted information to a network device of the target operator, the 5G terminal device receives second encrypted information sent by the network device, the second encrypted information is encrypted information obtained by encrypting the random number by using the public key of the 5G terminal device after the network device decrypts the first encrypted information to obtain the public key and the random number of the 5G terminal device, the 5G terminal device decrypts the second encrypted information by using a private key of the 5G terminal device to obtain decrypted information, and if the decrypted information is the random number, the 5G terminal device determines that the network device passes verification, therefore, the 5G terminal equipment without the SIM card can complete the authentication of the operator network by using the public key of the target operator, and the pseudo base station cannot complete the authentication because the pseudo base station cannot obtain the private key corresponding to the public key of the target operator, so that the disturbance of the pseudo base station is thoroughly avoided, and the safety of communication between the 5G terminal equipment and the operator network equipment is improved.
Fig. 4 is a schematic structural diagram of a 5G terminal device according to an embodiment of the present invention. The 5G terminal device provided in the embodiment of the present invention may execute the processing flow provided in the embodiment of the block chain-based 5G communication information encryption and decryption method, and as shown in fig. 4, the 5G terminal device 40 includes: memory 41, processor 42, computer programs and communication interface 43; wherein the computer program is stored in the memory 41 and is configured to be executed by the processor 42 for: encrypting the public key and the random number of the 5G terminal equipment by adopting the public key of a target operator to obtain first encryption information; respectively adopting a block chain network and a 5G channel to send the first encryption information to network equipment of a target operator, wherein the 5G channel comprises a 5G new wireless base station and a user plane network element function UPF; receiving second encrypted information which is sent by the network equipment and signed by a private key through the block chain network, wherein the second encrypted information is obtained by decrypting the first encrypted information by the network equipment to obtain a public key and a random number of the 5G terminal equipment and then encrypting the random number by adopting the public key of the 5G terminal equipment; verifying the private key signature by adopting the public key of the target operator; after the private key signature passes verification, decrypting the second encrypted information by using a private key of the 5G terminal equipment to obtain decrypted information; and if the decryption information is the random number, determining that the network equipment passes the verification.
Optionally, before encrypting the public key of the 5G terminal device and the random number by using the public key of the target operator, the processor is further configured to: and generating a public key and a private key corresponding to the temporary identity, wherein the temporary identity is used for the 5G terminal equipment to access the 5G network of the target operator.
Optionally, before encrypting the public key of the 5G terminal device and the random number by using the public key of the target operator, the processor is further configured to: acquiring a public key of the target operator from an application program by installing the application program of the target operator; or acquiring the public key of the target operator from the network equipment of the target operator through a WIFI communication technology; or the public key of the target operator is obtained by the operator to which the 5G terminal equipment has access in a legal way.
The 5G terminal device in the embodiment shown in fig. 4 may be configured to execute the technical solution of the method embodiment, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 5 is a schematic structural diagram of a network device of a target operator according to an embodiment of the present invention. The network device of the target operator provided in the embodiment of the present invention may execute the processing flow provided in the embodiment of the method for encrypting and decrypting 5G communication information based on a block chain, as shown in fig. 5, the network device 50 of the target operator includes: memory 51, processor 52, computer programs and communication interface 53; wherein the computer program is stored in the memory 51 and is configured to be executed by the processor 52 for: respectively receiving first encryption information sent by 5G terminal equipment from a block chain network and a 5G channel through the communication interface, wherein the first encryption information is obtained by encrypting a public key and a random number of the 5G terminal equipment by adopting a public key of a target operator; decrypting the first encrypted information to obtain a public key and a random number of the 5G terminal equipment; encrypting the random number by adopting the public key of the 5G terminal equipment to obtain second encryption information; carrying out private key signature on the second encrypted information by adopting a private key of the network equipment; sending the second encrypted information signed by the private key to the 5G terminal device through the blockchain network, so that the 5G terminal device verifies the private key signature by using the public key of the target operator, and after the private key signature passes the verification, the 5G terminal device decrypts the second encrypted information by using the private key of the 5G terminal device to obtain decrypted information; and if the decryption information is the random number, the 5G terminal equipment determines that the network equipment passes the verification.
Optionally, after determining that the network device passes the authentication, the processor is further configured to: and communicating with the 5G terminal equipment by adopting the public key of the 5G terminal equipment and the public key of the target operator.
The network device of the target operator in the embodiment shown in fig. 5 may be configured to execute the technical solution of the above method embodiment, and the implementation principle and the technical effect are similar, and are not described herein again.
In addition, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the 5G communication information encryption and decryption method based on a block chain described in the foregoing embodiment.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (11)

1. A5G communication information encryption and decryption method based on a block chain is characterized by comprising the following steps:
the 5G terminal equipment encrypts a public key and a random number of the 5G terminal equipment by adopting a public key of a target operator to obtain first encryption information;
the 5G terminal equipment respectively adopts a block chain network and a 5G channel to send the first encryption information to network equipment of a target operator, wherein the 5G channel comprises a 5G new wireless base station and a user plane network element function UPF;
the 5G terminal equipment receives second encrypted information which is sent by the network equipment and signed by a private key through the block chain network, wherein the second encrypted information is obtained by encrypting a random number by using a public key of the 5G terminal equipment after the network equipment decrypts the first encrypted information to obtain the public key and the random number of the 5G terminal equipment;
the 5G terminal equipment adopts the public key of the target operator to verify the private key signature;
after the private key signature passes verification, the 5G terminal equipment decrypts the second encrypted information by adopting the private key of the 5G terminal equipment to obtain decrypted information;
and if the decryption information is the random number, the 5G terminal equipment determines that the network equipment passes the verification.
2. The method of claim 1, wherein before the 5G terminal device encrypts the public key and the random number of the 5G terminal device with the public key of the target operator, the method further comprises:
and the 5G terminal equipment generates a public key and a private key corresponding to a temporary identity, wherein the temporary identity is used for accessing the 5G terminal equipment to the 5G network of the target operator.
3. The method of claim 1, wherein before the 5G terminal device encrypts the public key and the random number of the 5G terminal device with the public key of the target operator, the method further comprises:
the 5G terminal equipment acquires the public key of the target operator from the application program by installing the application program of the target operator; or
The 5G terminal equipment acquires the public key of the target operator from the network equipment of the target operator through a WIFI communication technology; or
And the 5G terminal equipment acquires the public key of the target operator in a legal way through the operator to which the 5G terminal equipment has access.
4. A5G communication information encryption and decryption method based on a block chain is characterized by comprising the following steps:
the method comprises the steps that network equipment of a target operator respectively receives first encryption information sent by 5G terminal equipment through a block chain network and a 5G channel, wherein the first encryption information is obtained by encrypting a public key and a random number of the 5G terminal equipment by the 5G terminal equipment through the public key of the target operator;
the network equipment decrypts the first encrypted information to obtain a public key and a random number of the 5G terminal equipment;
the network equipment encrypts the random number by adopting the public key of the 5G terminal equipment to obtain second encryption information;
the network equipment carries out private key signature on the second encrypted information by adopting a private key of the network equipment;
the network device sends the second encrypted information signed by the private key to the 5G terminal device through the blockchain network, so that the 5G terminal device verifies the private key signature by using the public key of the target operator, and when the private key signature passes the verification, the 5G terminal device decrypts the second encrypted information by using the private key of the 5G terminal device to obtain decrypted information; and if the decryption information is the random number, the 5G terminal equipment determines that the network equipment passes the verification.
5. The method of claim 4, wherein after the 5G terminal device determines that the network device is authenticated, the method further comprises:
and the network equipment communicates with the 5G terminal equipment by adopting the public key of the 5G terminal equipment and the public key of the target operator.
6. A5G terminal device, comprising:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
encrypting the public key and the random number of the 5G terminal equipment by adopting the public key of a target operator to obtain first encryption information;
respectively adopting a block chain network and a 5G channel to send the first encryption information to network equipment of a target operator, wherein the 5G channel comprises a 5G new wireless base station and a user plane network element function UPF;
receiving second encrypted information which is sent by the network equipment and signed by a private key through the block chain network, wherein the second encrypted information is obtained by decrypting the first encrypted information by the network equipment to obtain a public key and a random number of the 5G terminal equipment and then encrypting the random number by adopting the public key of the 5G terminal equipment;
verifying the private key signature by adopting the public key of the target operator;
after the private key signature passes verification, decrypting the second encrypted information by using a private key of the 5G terminal equipment to obtain decrypted information;
and if the decryption information is the random number, determining that the network equipment passes the verification.
7. The 5G terminal device of claim 6, wherein the processor, before encrypting the public key of the 5G terminal device and the random number with the public key of the target operator, is further configured to:
and generating a public key and a private key corresponding to the temporary identity, wherein the temporary identity is used for the 5G terminal equipment to access the 5G network of the target operator.
8. The 5G terminal device of claim 6, wherein the processor, before encrypting the public key of the 5G terminal device and the random number with the public key of the target operator, is further configured to:
acquiring a public key of the target operator from an application program by installing the application program of the target operator; or
Acquiring a public key of the target operator from network equipment of the target operator through a WIFI communication technology; or
And obtaining the public key of the target operator in a legal way through the operator to which the 5G terminal equipment has access.
9. A network device of a target operator, comprising:
a memory;
a processor;
a communication interface; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to:
respectively receiving first encryption information sent by 5G terminal equipment from a block chain network and a 5G channel through the communication interface, wherein the first encryption information is obtained by encrypting a public key and a random number of the 5G terminal equipment by adopting a public key of a target operator;
decrypting the first encrypted information to obtain a public key and a random number of the 5G terminal equipment;
encrypting the random number by adopting the public key of the 5G terminal equipment to obtain second encryption information;
carrying out private key signature on the second encrypted information by adopting a private key of the network equipment;
sending the second encrypted information signed by the private key to the 5G terminal device through the blockchain network, so that the 5G terminal device verifies the private key signature by using the public key of the target operator, and after the private key signature passes the verification, the 5G terminal device decrypts the second encrypted information by using the private key of the 5G terminal device to obtain decrypted information; and if the decryption information is the random number, the 5G terminal equipment determines that the network equipment passes the verification.
10. The network device of the target operator of claim 9, wherein the processor, after determining that the network device is authenticated, is further configured to:
and communicating with the 5G terminal equipment by adopting the public key of the 5G terminal equipment and the public key of the target operator.
11. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-5.
CN201911402314.3A 2019-12-30 2019-12-30 5G communication information encryption and decryption method and device based on block chain and storage medium Pending CN111065101A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911402314.3A CN111065101A (en) 2019-12-30 2019-12-30 5G communication information encryption and decryption method and device based on block chain and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911402314.3A CN111065101A (en) 2019-12-30 2019-12-30 5G communication information encryption and decryption method and device based on block chain and storage medium

Publications (1)

Publication Number Publication Date
CN111065101A true CN111065101A (en) 2020-04-24

Family

ID=70304993

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911402314.3A Pending CN111065101A (en) 2019-12-30 2019-12-30 5G communication information encryption and decryption method and device based on block chain and storage medium

Country Status (1)

Country Link
CN (1) CN111065101A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112243201A (en) * 2020-12-17 2021-01-19 上海大汉三通通信股份有限公司 Channel distribution method, device and system in 5G RCS message sending
CN114172923A (en) * 2021-12-08 2022-03-11 中国联合网络通信集团有限公司 Data transmission method, communication system and communication device
CN114710359A (en) * 2022-04-15 2022-07-05 辽宁工控科技有限公司 Industrial network dynamic key management method and industrial network encryption communication method
WO2022237600A1 (en) * 2021-05-11 2022-11-17 支付宝(杭州)信息技术有限公司 Information proxy method and apparatus
WO2023155721A1 (en) * 2022-02-18 2023-08-24 华为技术有限公司 Method for detecting false base station, and apparatus

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656481A (en) * 2016-10-28 2017-05-10 美的智慧家居科技有限公司 Identity authentication method, apparatus and system
CN108616532A (en) * 2018-04-26 2018-10-02 中国联合网络通信集团有限公司 Ballot processing method, apparatus and terminal device
CN108737430A (en) * 2018-05-25 2018-11-02 全链通有限公司 The encryption communication method and system of block chain node
CN108989048A (en) * 2018-08-02 2018-12-11 中国联合网络通信集团有限公司 Cryptographic key distribution method, device, equipment and storage medium
CN109151929A (en) * 2017-06-19 2019-01-04 中兴通讯股份有限公司 Switching handling method, apparatus and system, the storage medium of network system
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK
CN110048842A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key processing method, equipment and computer readable storage medium
CN110177101A (en) * 2019-05-28 2019-08-27 四川城市职业学院 Information processing method and device and relevant device based on 5G communication
CN110602691A (en) * 2019-10-18 2019-12-20 中国联合网络通信集团有限公司 Mobile communication method and device based on block chain network

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656481A (en) * 2016-10-28 2017-05-10 美的智慧家居科技有限公司 Identity authentication method, apparatus and system
CN109151929A (en) * 2017-06-19 2019-01-04 中兴通讯股份有限公司 Switching handling method, apparatus and system, the storage medium of network system
CN108616532A (en) * 2018-04-26 2018-10-02 中国联合网络通信集团有限公司 Ballot processing method, apparatus and terminal device
CN108737430A (en) * 2018-05-25 2018-11-02 全链通有限公司 The encryption communication method and system of block chain node
CN108989048A (en) * 2018-08-02 2018-12-11 中国联合网络通信集团有限公司 Cryptographic key distribution method, device, equipment and storage medium
CN109302412A (en) * 2018-11-06 2019-02-01 晋商博创(北京)科技有限公司 VoIP communication processing method, terminal, server and storage medium based on CPK
CN110177101A (en) * 2019-05-28 2019-08-27 四川城市职业学院 Information processing method and device and relevant device based on 5G communication
CN110048842A (en) * 2019-05-30 2019-07-23 全链通有限公司 Session key processing method, equipment and computer readable storage medium
CN110602691A (en) * 2019-10-18 2019-12-20 中国联合网络通信集团有限公司 Mobile communication method and device based on block chain network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
曾志高等: "基于ECC的双因素身份认证的设计与实现", 《计算机工程》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112243201A (en) * 2020-12-17 2021-01-19 上海大汉三通通信股份有限公司 Channel distribution method, device and system in 5G RCS message sending
CN112243201B (en) * 2020-12-17 2021-05-11 复旦大学 Channel distribution method, device and system in 5G RCS message sending
WO2022237600A1 (en) * 2021-05-11 2022-11-17 支付宝(杭州)信息技术有限公司 Information proxy method and apparatus
CN114172923A (en) * 2021-12-08 2022-03-11 中国联合网络通信集团有限公司 Data transmission method, communication system and communication device
CN114172923B (en) * 2021-12-08 2023-07-07 中国联合网络通信集团有限公司 Data transmission method, communication system and communication device
WO2023155721A1 (en) * 2022-02-18 2023-08-24 华为技术有限公司 Method for detecting false base station, and apparatus
CN114710359A (en) * 2022-04-15 2022-07-05 辽宁工控科技有限公司 Industrial network dynamic key management method and industrial network encryption communication method
CN114710359B (en) * 2022-04-15 2024-02-06 沈阳邦粹科技有限公司 Industrial network dynamic key management method and industrial network encryption communication method

Similar Documents

Publication Publication Date Title
CN111669276B (en) Network verification method, device and system
CN111065101A (en) 5G communication information encryption and decryption method and device based on block chain and storage medium
EP3249849B1 (en) Key agreement for wireless communication
WO2017201809A1 (en) Communication method and system for terminal
CN105050081A (en) Method, device and system for connecting network access device to wireless network access point
US9088408B2 (en) Key agreement using a key derivation key
CA2879910C (en) Terminal identity verification and service authentication method, system and terminal
CN108900528B (en) Block chain real-name authentication method, device, equipment and storage medium
CN103688563A (en) Performing a group authentication and key agreement procedure
WO2013182154A1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN111132165B (en) 5G communication card-free access method, equipment and storage medium based on block chain
CN111050324B (en) 5G terminal equipment access method, equipment and storage medium
CN111148094B (en) Registration method of 5G user terminal, user terminal equipment and medium
CN104935435A (en) Login methods, terminal and application server
WO2018010480A1 (en) Network locking method for esim card, terminal, and network locking authentication server
CN110944319A (en) 5G communication identity authentication method, equipment and storage medium
US11139962B2 (en) Method, chip, device and system for authenticating a set of at least two users
CN101938742A (en) Method for reversely cloning subscriber identity module, device and system
CN101895881A (en) Method for realizing GBA secret key and pluggable equipment of terminal
CN110138558B (en) Transmission method and device of session key and computer-readable storage medium
CN111132155B (en) 5G secure communication method, device and storage medium
CN111107550A (en) Dual-channel access registration method and device for 5G terminal equipment and storage medium
CN111148098A (en) 5G terminal equipment registration method, equipment and storage medium
CN109474635B (en) Power utilization equipment network distribution method and system based on code scanning technology
CN111065092A (en) 5G communication information encryption and decryption method, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

CB02 Change of applicant information