CN111148094B - Registration method of 5G user terminal, user terminal equipment and medium - Google Patents

Registration method of 5G user terminal, user terminal equipment and medium Download PDF

Info

Publication number
CN111148094B
CN111148094B CN201911402049.9A CN201911402049A CN111148094B CN 111148094 B CN111148094 B CN 111148094B CN 201911402049 A CN201911402049 A CN 201911402049A CN 111148094 B CN111148094 B CN 111148094B
Authority
CN
China
Prior art keywords
public key
block
temporary identity
user terminal
registration server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911402049.9A
Other languages
Chinese (zh)
Other versions
CN111148094A (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201911402049.9A priority Critical patent/CN111148094B/en
Publication of CN111148094A publication Critical patent/CN111148094A/en
Application granted granted Critical
Publication of CN111148094B publication Critical patent/CN111148094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/75Temporary identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides a registration method of a 5G user terminal, user terminal equipment and a medium, wherein the method comprises the following steps: the 5G user terminal equipment sends a registration application to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to the temporary identity generated by the equipment; receiving block information returned by the temporary identity registration server, and carrying out hash value verification on a block chain and blocks in the block chain according to the block information; when the verification is passed, searching and obtaining a public key of the target operator from block information returned by the temporary identity registration server according to the identification of the target operator; and encrypting the second public key by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and transmitting encrypted data obtained by encryption to a temporary identity registration server for identity registration. The scheme provided by the embodiment of the application improves the data security and confidentiality of the 5G user terminal equipment during identity registration.

Description

Registration method of 5G user terminal, user terminal equipment and medium
Technical Field
The embodiment of the application relates to the technical field of blockchain, in particular to a registration method of a 5G user terminal, user terminal equipment and a medium.
Background
In the standard 5G registration process, a SIM card is inserted in a 5G user terminal device (UE for short), the SIM card has a public key of an operator, or a shared key of both the 5G UE and the operator, any intermediate person cannot modify the public key built in the SIM card, so that man-in-the-middle attack cannot be performed, but in the SIM card-free access scheme, when the 5G UE without the SIM card submits its public key, a malicious intermediate person or a listener can easily replace the public key, and the operator cannot perceive the public key, so that all secret communications between the 5G UE and the operator may be monitored.
Disclosure of Invention
The embodiment of the application provides a registration method of a 5G user terminal, user terminal equipment and a medium, which are used for improving the data security and confidentiality of the 5G user terminal equipment without a SIM card during identity registration.
An embodiment of the present application provides a registration method for a 5G user terminal, where the method includes:
the method comprises the steps that 5G user terminal equipment sends a registration application to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and public keys of operators are recorded in blocks of the blockchain; the 5G user terminal equipment receives block information of the block chain returned by the temporary identity registration server according to the registration application, and performs hash value verification on the block chain and blocks in the block chain according to the block information; when the block chains and the blocks in the block chains pass verification, the 5G user terminal equipment searches and obtains a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator; and the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In one possible implementation, the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
In a possible implementation manner, the registration application further includes an identification of the target operator.
In one possible implementation, the block information returned by the temporary identity registration server includes information of a first block in which the public key of the target operator is recorded.
In one possible implementation manner, the block information returned by the temporary identity registration server further includes: information of the first N blocks and the last M blocks of the first block in the blockchain, wherein N and M are positive integers.
A second aspect of an embodiment of the present application provides a 5G user terminal device, including:
a processor and a memory, the memory having instructions stored therein that when executed by the processor perform the operations of: a registration application is sent to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and public keys of operators are recorded in blocks of the blockchain; receiving block information of the block chain returned by the temporary identity registration server according to the registration application, and carrying out hash value verification on the block chain and blocks in the block chain according to the block information; when the block chain and the blocks in the block chain pass verification, searching and obtaining a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator; and encrypting a second public key corresponding to the permanent identity of the user by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and transmitting encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In one possible implementation, the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
In a possible implementation manner, the registration application further includes an identification of the target operator.
In one possible implementation, the block information returned by the temporary identity registration server includes information of a first block in which the public key of the target operator is recorded.
In one possible implementation manner, the block information returned by the temporary identity registration server further includes: information of the first N blocks and the last M blocks of the first block in the blockchain, wherein N and M are positive integers.
A third aspect of an embodiment of the application provides a computer readable storage medium comprising instructions which, when run on a computer, cause the computer to perform the method of the first aspect described above.
In the embodiment of the application, the 5G user terminal equipment carries the first public key corresponding to the temporary identity which is generated in advance in the registration application and sends the first public key to the temporary identity registration server in the blockchain, so that the temporary identity registration server returns the blockinformation of the blockchain according to the registration application, the 5G user terminal equipment verifies hash values of the blockchain and the blocks in the blockchain according to the blockinformation returned by the temporary identity registration server, and when the hash values pass the verification, the public key of the target operator is obtained by searching the blockinformation returned by the temporary identity registration server according to the identification of the target operator.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the application, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a communication system according to an embodiment of the present application;
fig. 3 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a 5G ue according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms "comprises" and "comprising" and any variations thereof, in the description and claims, are intended to cover a non-exclusive inclusion, such that a device that comprises a sequence of steps or structures is not necessarily limited to those structures or steps that are expressly listed or inherent to such process or device but may include other steps or structures not expressly listed or inherent to such process or device.
Fig. 1 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application, where, as shown in fig. 1, the method includes:
step 101, a 5G user terminal device sends a registration application to a temporary identity registration server in a blockchain, where the registration application includes a first public key corresponding to a temporary identity generated by the 5G user terminal device, and public keys of operators are recorded in a block of the blockchain.
The blockchain in this embodiment is a blockchain maintained by an operator, the temporary identity registration server accesses the blockchain and records and maintains the latest public key of all operators in the blockchain, and the 5G UE or other terminal devices can be used as nodes of the blockchain to access the blockchain, and meanwhile, the blockchain can be used for recording registration information of each node on the blockchain and transaction information of each node. The 5G UE in this embodiment may not have the access function of the complete blockchain, as long as the capability of verifying and analyzing the blocks on the blockchain and searching the block records under a certain specified condition is required.
Fig. 2 is a schematic structural diagram of a communication system according to an embodiment of the present application, where in the system shown in fig. 2, a device UE may be understood as a 5G user terminal device in this embodiment, and a 5G core network (5G Core network,5GC) of an operator performs accounting on a public key of the operator in a blockchain, and a temporary identity registration server accesses the blockchain, and records and maintains the public key of each operator. In the registration process, the 5G UE first generates a public key and a private key corresponding to a temporary identity (for convenience of distinguishing a first public key and a first private key for short), then sends a registration application carrying the first public key to an access and mobility management function unit (Access and Mobility Management Function, AMF) or a session management function unit (Session Management Function, SMF) in the 5GC through the 5G base station gNB, the AMF or the SMF informs a user plane network element function (User Plane Function, UPF) to transfer the registration application to a temporary identity registration server, and after the temporary identity registration server receives the registration application, signs block information of all blocks in a block chain by adopting a private key of itself, and returns the signed information to the 5G UE. Wherein the block information of the block includes, but is not limited to: hash value of the present block, hash value of the previous block, content information of the present block, and the like.
Step 102, the 5G ue receives the block information of the blockchain returned by the temporary identity registration server according to the registration application, and performs hash value verification on the blockchain and the blocks in the blockchain according to the block information.
After receiving the block information fed back by the temporary identity registration server, the 5G UE firstly verifies the private key signature in the block information based on the public key of the temporary identity registration server, if the verification is passed, the hash value of each block is further calculated based on the block information of each block fed back by the temporary identity registration server, the calculated hash value of each block is compared with the hash value of each block carried in the block information fed back by the temporary identity registration server, whether the hash value of each block obtained by verification is consistent with the hash value of each block recorded in the block information is verified, whether the hash value of each block is smaller than the preset difficulty value is verified, and whether the hash value of the previous block is recorded in each block is verified, if the verification is passed, the public key of the target operator is obtained by searching the block information fed back by the temporary identity registration server according to the identification of the target operator.
Step 103, when the blockchain and the blocks in the blockchain pass verification, the 5G user terminal equipment searches and obtains the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator.
Optionally, in a feasible manner, the 5G UE may obtain the public key of the target operator by traversing from the block information of each block returned by the temporary identity registration server in a traversing manner one by one.
Optionally, in another possible manner, in order to improve efficiency of searching the target operator public key by the 5G UE, pointer information of a target block may be further added to the block information fed back by the temporary identity registration server, where the target block is a block in which the target operator public key is recorded, and the pointer information of the target block is used to inform the 5G UE which block is the target block, so that the 5G UE can quickly and accurately lock the target block according to the pointer information of the target block, and improve efficiency of obtaining the target operator public key.
Step 104, the 5G ue encrypts a second public key corresponding to the permanent identity of the ue by using the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
The preset encryption algorithm in this embodiment is an encryption algorithm shared by the 5G UE and the temporary identity registration server. In order to ensure that the second public key of the permanent identity sent by the 5G UE is not monitored or replaced, the 5G UE needs to encrypt the second public key according to a preset encryption algorithm before sending the second public key to the temporary identity registration server, the public key of the target operator or the public key of the target operator and the first public key are adopted to encrypt the second public key, the encrypted data is signed by the first private key of the 5G UE and then sent to the temporary identity registration server, after receiving the encrypted data, the temporary identity registration server firstly verifies the private key signature of the encrypted data by the first public key of the 5G UE, and if the verification is passed, the encrypted data is decrypted based on the preset encryption algorithm to obtain the second public key of the 5G UE, so that the 5G UE is registered based on the second public key.
It will of course be appreciated by those skilled in the art that although the above embodiments describe a method of encrypting the second public key of a 5G UE, in a practical scenario, not only the second public key may be encrypted, but also other registration information of the 5G UE may be encrypted, such as the international mobile equipment identity (International Mobile Equipment Identity, IMEI) number of the 5G UE in one possible scenario, or the hash value of the second public key and/or IMEI number in another possible scenario.
In this embodiment, the 5G user terminal device carries the first public key corresponding to the temporary identity generated in advance in the registration application and sends the first public key to the temporary identity registration server in the blockchain, so that the temporary identity registration server returns the blockchain blockinformation according to the registration application, the 5G user terminal device performs hash value verification on the blockchain and the blockchain blockaccording to the blockinformation returned by the temporary identity registration server, and when the verification passes, searches the public key of the target operator from the blockinformation returned by the temporary identity registration server according to the identifier of the target operator, and because the embodiment of the application does not directly send the public key of the target operator to the 5G user terminal device like the prior art, but sends the blockchain blockinformation to the 5G user terminal device, and because the difficulty of forging the blockchain blockis far greater than the difficulty of forging the public key of the operator, the security and confidentiality of the target operator can be improved, and further, the 5G user terminal device can encrypt and register the first public key corresponding to the first public key of the target operator and self-temporary identity by presetting an encryption algorithm after obtaining the public key of the target operator, and the temporary identity corresponding to the temporary identity registration server can be sent to the second public key of the target operator, and the security of the user terminal device can be encrypted and encrypted, and the security is improved, and the security is achieved.
Fig. 3 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application, as shown in fig. 3, where on the basis of the foregoing embodiment, the method includes:
step 301, a 5G ue sends a registration application to a temporary identity registration server in a blockchain, where the registration application includes a first public key corresponding to a temporary identity generated by the 5G ue and an identifier of a target operator, and public keys of the operators are recorded in a block of the blockchain.
In this embodiment, the 5G UE searches for 5G signal strength information around itself, and determines a target operator according to the signal strength information of each operator around itself. And the identification of the target operator and the first public key of the target operator are carried in the registration application and sent to the temporary identity registration server.
Step 302, the 5G ue receives the information of the first block recorded with the public key of the target operator returned by the temporary identity registration server according to the registration application, and performs hash value verification on the blockchain and the first block according to the information of the first block.
After receiving the block information of the first block, the method can judge whether the calculated hash value is consistent with the hash value of the first block fed back by the temporary identity registration server, whether the calculated hash value is smaller than a preset difficulty value or not and whether the hash value of the last block is included in the first block or not by calculating the hash value of the first block, if yes, verification is passed, otherwise verification is failed. Of course, this is merely illustrative and not intended to be the only limitation on the verification method of the present application. For example, in some scenarios, considering that the more block information is fed back to the 5G UE by the temporary identity registration server, the more difficult the block information is to be forged, so, on the basis of returning the block information of the first block to the 5G UE, the block information of N blocks before the first block and M blocks after the first block may also be returned to the 5G UE, so that the 5G UE performs hash value verification based on the received block information of all blocks. Wherein, N and M are positive integers, the values of N and M can be the same or different, the values of N and M can be set according to the needs, and the larger the value of N and/or M is, the higher the security and confidentiality of the registered data are.
Step 303, when the blockchain and the first block pass verification, the 5G ue searches and obtains the public key of the target operator from the block information of the first block returned by the temporary identity registration server according to the identifier of the target operator.
And step 304, the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In this embodiment, the 5G user terminal device carries the first public key corresponding to the temporary identity generated in advance in the registration application and sends the first public key to the temporary identity registration server in the blockchain, so that the temporary identity registration server returns the blockchain blockinformation according to the registration application, the 5G user terminal device performs hash value verification on the blockchain and the blockchain blockaccording to the blockinformation returned by the temporary identity registration server, and when the verification passes, searches the public key of the target operator from the blockinformation returned by the temporary identity registration server according to the identifier of the target operator, and because the embodiment of the application does not directly send the public key of the target operator to the 5G user terminal device like the prior art, but sends the blockchain blockinformation to the 5G user terminal device, and because the difficulty of forging the blockchain blockis far greater than the difficulty of forging the public key of the operator, the security and confidentiality of the target operator can be improved, and further, the 5G user terminal device can encrypt and register the first public key corresponding to the first public key of the target operator and self-temporary identity by presetting an encryption algorithm after obtaining the public key of the target operator, and the temporary identity corresponding to the temporary identity registration server can be sent to the second public key of the target operator, and the security of the user terminal device can be encrypted and encrypted, and the security is improved, and the security is achieved.
Fig. 4 is a schematic structural diagram of a 5G ue according to an embodiment of the present application, where, as shown in fig. 4, the device 40 includes a processor 41 and a memory 42, where instructions are stored in the memory 42, and when the processor 41 executes the instructions, the following operations are performed: a registration application is sent to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and public keys of operators are recorded in blocks of the blockchain; receiving block information of the block chain returned by the temporary identity registration server according to the registration application, and carrying out hash value verification on the block chain and blocks in the block chain according to the block information; when the block chain and the blocks in the block chain pass verification, searching and obtaining a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator; and encrypting a second public key corresponding to the permanent identity of the user by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and transmitting encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In one possible implementation, the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
In a possible implementation manner, the registration application further includes an identification of the target operator.
In one possible implementation, the block information returned by the temporary identity registration server includes information of a first block in which the public key of the target operator is recorded.
In one possible implementation manner, the block information returned by the temporary identity registration server further includes: information of the first N blocks and the last M blocks of the first block in the blockchain, wherein N and M are positive integers.
The method of any one of the foregoing embodiments can be executed by the device provided in this embodiment, and the execution manner and effect of the method are similar, and are not described herein again.
Embodiments of the present application also provide a computer-readable storage medium comprising instructions which, when run on a computer, cause the computer to perform the method provided by any of the embodiments described above.
Finally, it should be noted that, as will be appreciated by those skilled in the art, all or part of the above-described methods may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and the program may include the steps of the above-described embodiments of the methods when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a random-access memory (RAM), or the like.
The functional units in the embodiment of the application can be integrated in one processing module, or the individual physical existence of the units can be realized, or two or more units can be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules, if implemented as software functional modules, may also be stored on a computer readable storage medium for sale or use as a stand-alone product. The above-mentioned storage medium may be a read-only memory, a magnetic disk, an optical disk, or the like.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.

Claims (10)

1. A method for registering a 5G user terminal, comprising:
the method comprises the steps that a 5G user terminal device sends a registration application to an AMF or an SMF, the AMF or the SMF sends the registration application to a UPF, so that the UPF transfers the registration application to a temporary identity registration server in a blockchain, the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal device, and a public key of an operator is recorded in a block of the blockchain;
the 5G user terminal equipment receives block information of the block chain returned by the temporary identity registration server according to the registration application, and performs hash value verification on the block chain and blocks in the block chain according to the block information;
when the block chains and the blocks in the block chains pass verification, the 5G user terminal equipment searches and obtains a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator;
and the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
2. The method of claim 1, wherein the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
3. The method of claim 1, wherein the registration application further includes an identification of a target operator.
4. A method according to claim 3, wherein the block information returned by the temporary identity registration server comprises information of a first block in which the public key of the target operator is recorded.
5. The method of claim 4, wherein the block information returned by the temporary identity registration server further comprises: information of the first N blocks and the last M blocks of the first block in the blockchain, wherein N and M are positive integers.
6. A 5G user terminal device comprising a processor and a memory, the memory having instructions stored therein which when executed by the processor perform the following:
sending a registration application to an AMF or an SMF, and sending the registration application to a UPF by the AMF or the SMF so that the UPF transfers the registration application to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to the temporary identity generated by the 5G user terminal equipment, and the public key of an operator is recorded in a block of the blockchain;
receiving block information of the block chain returned by the temporary identity registration server according to the registration application, and carrying out hash value verification on the block chain and blocks in the block chain according to the block information;
when the block chain and the blocks in the block chain pass verification, searching and obtaining a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator;
and encrypting a second public key corresponding to the permanent identity of the user by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and transmitting encrypted data obtained by encryption to the temporary identity registration server for identity registration.
7. The apparatus of claim 6, wherein the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
8. The apparatus of claim 6, wherein the registration application further includes an identification of a target operator.
9. The apparatus of claim 8, wherein the block information returned by the temporary identity registration server includes information of a first block in which a public key of the target operator is recorded.
10. A computer readable storage medium having stored therein instructions which, when run on a computer, cause the computer to perform the method of any of claims 1-5.
CN201911402049.9A 2019-12-30 2019-12-30 Registration method of 5G user terminal, user terminal equipment and medium Active CN111148094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911402049.9A CN111148094B (en) 2019-12-30 2019-12-30 Registration method of 5G user terminal, user terminal equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911402049.9A CN111148094B (en) 2019-12-30 2019-12-30 Registration method of 5G user terminal, user terminal equipment and medium

Publications (2)

Publication Number Publication Date
CN111148094A CN111148094A (en) 2020-05-12
CN111148094B true CN111148094B (en) 2023-11-21

Family

ID=70522256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911402049.9A Active CN111148094B (en) 2019-12-30 2019-12-30 Registration method of 5G user terminal, user terminal equipment and medium

Country Status (1)

Country Link
CN (1) CN111148094B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569209B (en) * 2021-07-09 2024-06-11 远光软件股份有限公司 User registration method and device based on block chain
CN113569210A (en) * 2021-07-09 2021-10-29 远光软件股份有限公司 Distributed identity authentication method, equipment access method and device
CN114172923B (en) * 2021-12-08 2023-07-07 中国联合网络通信集团有限公司 Data transmission method, communication system and communication device
CN114239072B (en) * 2021-12-28 2023-01-20 中国联合网络通信集团有限公司 Block chain node management method and block chain network
CN114584314B (en) * 2022-02-28 2024-06-14 天翼安全科技有限公司 Registration method, device, equipment and medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209835A (en) * 2016-07-08 2016-12-07 北京众享比特科技有限公司 Peer-to-peer network communication system and method
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN108616532A (en) * 2018-04-26 2018-10-02 中国联合网络通信集团有限公司 Ballot processing method, apparatus and terminal device
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
CN108881296A (en) * 2018-07-24 2018-11-23 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
JP2019004263A (en) * 2017-06-13 2019-01-10 Kddi株式会社 Gateway device, usage management system, usage control method, and usage control program
WO2019034014A1 (en) * 2017-08-16 2019-02-21 华为技术有限公司 Method and apparatus for access authentication
CN109905874A (en) * 2019-01-04 2019-06-18 中国联合网络通信集团有限公司 The method and system of the autonomous number of selecting based on block chain
CN110177101A (en) * 2019-05-28 2019-08-27 四川城市职业学院 Information processing method and device and relevant device based on 5G communication
CN110581860A (en) * 2019-09-19 2019-12-17 腾讯科技(深圳)有限公司 identity authentication method, device, storage medium and equipment based on block chain
WO2019241605A1 (en) * 2018-06-13 2019-12-19 Konstantinos Bakalis Systems and methods for secure access to property or information using blockchain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018020943A1 (en) * 2016-07-28 2018-02-01 日本電気株式会社 Number portability information management system
CN109462472A (en) * 2017-09-06 2019-03-12 阿里巴巴集团控股有限公司 The methods, devices and systems of data encryption and decryption

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209835A (en) * 2016-07-08 2016-12-07 北京众享比特科技有限公司 Peer-to-peer network communication system and method
JP2019004263A (en) * 2017-06-13 2019-01-10 Kddi株式会社 Gateway device, usage management system, usage control method, and usage control program
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
WO2019034014A1 (en) * 2017-08-16 2019-02-21 华为技术有限公司 Method and apparatus for access authentication
CN108616532A (en) * 2018-04-26 2018-10-02 中国联合网络通信集团有限公司 Ballot processing method, apparatus and terminal device
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
WO2019241605A1 (en) * 2018-06-13 2019-12-19 Konstantinos Bakalis Systems and methods for secure access to property or information using blockchain
CN108881296A (en) * 2018-07-24 2018-11-23 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109905874A (en) * 2019-01-04 2019-06-18 中国联合网络通信集团有限公司 The method and system of the autonomous number of selecting based on block chain
CN110177101A (en) * 2019-05-28 2019-08-27 四川城市职业学院 Information processing method and device and relevant device based on 5G communication
CN110581860A (en) * 2019-09-19 2019-12-17 腾讯科技(深圳)有限公司 identity authentication method, device, storage medium and equipment based on block chain

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
"Draft 33.126r15_tracked_changes";3gpp;《3GPP tsg_sa\WG3_Security》;20170928;全文 *
A Study on smart city security policy based on blockchain in 5G Age;Jong-ho Noh,Hun-yeong Kwon;《2019 International Conference on Platform Technology and Service (PlatCon)》;20190321;全文 *
区块链将改变运营商运作模式;谢剑超;《通信企业管理》;20170810(第08期);全文 *
基于区块链的PKI数字证书系统;阎军智;彭晋;左敏;王珂;;电信工程技术与标准化(11);全文 *
基于区块链的去中心化身份认证及密钥管理方案;姚英英等;《网络空间安全》;20190625(第06期);全文 *
基于多变量二次方程的抗量子区块链快速签名算法;梁伟,刘小欧,罗维,马文平,王凌;《信息技术与网络安全》;20190110;全文 *

Also Published As

Publication number Publication date
CN111148094A (en) 2020-05-12

Similar Documents

Publication Publication Date Title
CN111148094B (en) Registration method of 5G user terminal, user terminal equipment and medium
US10187202B2 (en) Key agreement for wireless communication
EP1768426B1 (en) Method for transmitting information
US9088408B2 (en) Key agreement using a key derivation key
Saxena et al. Authentication protocol for an IoT-enabled LTE network
JP2022529837A (en) Parameter transmission method and equipment
CN111132155B (en) 5G secure communication method, device and storage medium
CN111132149B (en) Registration method of 5G user terminal, user terminal equipment and medium
CN111148213B (en) Registration method of 5G user terminal, user terminal equipment and medium
CN111148098A (en) 5G terminal equipment registration method, equipment and storage medium
CN102892114B (en) Method and device for checking equipment validity
CN114666040A (en) Radio frequency identification authentication system and method based on quantum cryptography network
CN111107550A (en) Dual-channel access registration method and device for 5G terminal equipment and storage medium
CN111083700A (en) 5G terminal equipment access method, equipment and storage medium based on block chain
CN112887979A (en) Network access method and related equipment
CN111836260A (en) Authentication information processing method, terminal and network equipment
CN111132156B (en) Registration method of 5G user terminal, user terminal equipment and medium
CN111163466B (en) Method for 5G user terminal to access block chain, user terminal equipment and medium
WO2022078058A1 (en) Decryption method, server and storage medium
CN105681364B (en) A kind of IPv6 mobile terminal attack resistance method based on enhancing binding
CN111132167B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN111770488A (en) EHPLMN updating method, related equipment and storage medium
CN118802151A (en) Anonymous authentication method, AAnF network element, user equipment and storage medium
CN118797670A (en) Method, device, electronic equipment and storage medium for identifying object
CN117528506A (en) Data forwarding method, access controller, wireless access point, device and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant