CN111148094B - Registration method of 5G user terminal, user terminal equipment and medium - Google Patents
Registration method of 5G user terminal, user terminal equipment and medium Download PDFInfo
- Publication number
- CN111148094B CN111148094B CN201911402049.9A CN201911402049A CN111148094B CN 111148094 B CN111148094 B CN 111148094B CN 201911402049 A CN201911402049 A CN 201911402049A CN 111148094 B CN111148094 B CN 111148094B
- Authority
- CN
- China
- Prior art keywords
- public key
- block
- temporary identity
- user terminal
- registration server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 35
- 238000012795 verification Methods 0.000 claims abstract description 29
- 238000012546 transfer Methods 0.000 claims description 3
- 230000006870 function Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 4
- 238000005242 forging Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/75—Temporary identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the application provides a registration method of a 5G user terminal, user terminal equipment and a medium, wherein the method comprises the following steps: the 5G user terminal equipment sends a registration application to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to the temporary identity generated by the equipment; receiving block information returned by the temporary identity registration server, and carrying out hash value verification on a block chain and blocks in the block chain according to the block information; when the verification is passed, searching and obtaining a public key of the target operator from block information returned by the temporary identity registration server according to the identification of the target operator; and encrypting the second public key by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and transmitting encrypted data obtained by encryption to a temporary identity registration server for identity registration. The scheme provided by the embodiment of the application improves the data security and confidentiality of the 5G user terminal equipment during identity registration.
Description
Technical Field
The embodiment of the application relates to the technical field of blockchain, in particular to a registration method of a 5G user terminal, user terminal equipment and a medium.
Background
In the standard 5G registration process, a SIM card is inserted in a 5G user terminal device (UE for short), the SIM card has a public key of an operator, or a shared key of both the 5G UE and the operator, any intermediate person cannot modify the public key built in the SIM card, so that man-in-the-middle attack cannot be performed, but in the SIM card-free access scheme, when the 5G UE without the SIM card submits its public key, a malicious intermediate person or a listener can easily replace the public key, and the operator cannot perceive the public key, so that all secret communications between the 5G UE and the operator may be monitored.
Disclosure of Invention
The embodiment of the application provides a registration method of a 5G user terminal, user terminal equipment and a medium, which are used for improving the data security and confidentiality of the 5G user terminal equipment without a SIM card during identity registration.
An embodiment of the present application provides a registration method for a 5G user terminal, where the method includes:
the method comprises the steps that 5G user terminal equipment sends a registration application to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and public keys of operators are recorded in blocks of the blockchain; the 5G user terminal equipment receives block information of the block chain returned by the temporary identity registration server according to the registration application, and performs hash value verification on the block chain and blocks in the block chain according to the block information; when the block chains and the blocks in the block chains pass verification, the 5G user terminal equipment searches and obtains a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator; and the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In one possible implementation, the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
In a possible implementation manner, the registration application further includes an identification of the target operator.
In one possible implementation, the block information returned by the temporary identity registration server includes information of a first block in which the public key of the target operator is recorded.
In one possible implementation manner, the block information returned by the temporary identity registration server further includes: information of the first N blocks and the last M blocks of the first block in the blockchain, wherein N and M are positive integers.
A second aspect of an embodiment of the present application provides a 5G user terminal device, including:
a processor and a memory, the memory having instructions stored therein that when executed by the processor perform the operations of: a registration application is sent to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and public keys of operators are recorded in blocks of the blockchain; receiving block information of the block chain returned by the temporary identity registration server according to the registration application, and carrying out hash value verification on the block chain and blocks in the block chain according to the block information; when the block chain and the blocks in the block chain pass verification, searching and obtaining a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator; and encrypting a second public key corresponding to the permanent identity of the user by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and transmitting encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In one possible implementation, the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
In a possible implementation manner, the registration application further includes an identification of the target operator.
In one possible implementation, the block information returned by the temporary identity registration server includes information of a first block in which the public key of the target operator is recorded.
In one possible implementation manner, the block information returned by the temporary identity registration server further includes: information of the first N blocks and the last M blocks of the first block in the blockchain, wherein N and M are positive integers.
A third aspect of an embodiment of the application provides a computer readable storage medium comprising instructions which, when run on a computer, cause the computer to perform the method of the first aspect described above.
In the embodiment of the application, the 5G user terminal equipment carries the first public key corresponding to the temporary identity which is generated in advance in the registration application and sends the first public key to the temporary identity registration server in the blockchain, so that the temporary identity registration server returns the blockinformation of the blockchain according to the registration application, the 5G user terminal equipment verifies hash values of the blockchain and the blocks in the blockchain according to the blockinformation returned by the temporary identity registration server, and when the hash values pass the verification, the public key of the target operator is obtained by searching the blockinformation returned by the temporary identity registration server according to the identification of the target operator.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the description below are only some embodiments of the application, and that other drawings can be obtained according to these drawings without inventive faculty for a person skilled in the art.
Fig. 1 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a communication system according to an embodiment of the present application;
fig. 3 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a 5G ue according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms "comprises" and "comprising" and any variations thereof, in the description and claims, are intended to cover a non-exclusive inclusion, such that a device that comprises a sequence of steps or structures is not necessarily limited to those structures or steps that are expressly listed or inherent to such process or device but may include other steps or structures not expressly listed or inherent to such process or device.
Fig. 1 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application, where, as shown in fig. 1, the method includes:
step 101, a 5G user terminal device sends a registration application to a temporary identity registration server in a blockchain, where the registration application includes a first public key corresponding to a temporary identity generated by the 5G user terminal device, and public keys of operators are recorded in a block of the blockchain.
The blockchain in this embodiment is a blockchain maintained by an operator, the temporary identity registration server accesses the blockchain and records and maintains the latest public key of all operators in the blockchain, and the 5G UE or other terminal devices can be used as nodes of the blockchain to access the blockchain, and meanwhile, the blockchain can be used for recording registration information of each node on the blockchain and transaction information of each node. The 5G UE in this embodiment may not have the access function of the complete blockchain, as long as the capability of verifying and analyzing the blocks on the blockchain and searching the block records under a certain specified condition is required.
Fig. 2 is a schematic structural diagram of a communication system according to an embodiment of the present application, where in the system shown in fig. 2, a device UE may be understood as a 5G user terminal device in this embodiment, and a 5G core network (5G Core network,5GC) of an operator performs accounting on a public key of the operator in a blockchain, and a temporary identity registration server accesses the blockchain, and records and maintains the public key of each operator. In the registration process, the 5G UE first generates a public key and a private key corresponding to a temporary identity (for convenience of distinguishing a first public key and a first private key for short), then sends a registration application carrying the first public key to an access and mobility management function unit (Access and Mobility Management Function, AMF) or a session management function unit (Session Management Function, SMF) in the 5GC through the 5G base station gNB, the AMF or the SMF informs a user plane network element function (User Plane Function, UPF) to transfer the registration application to a temporary identity registration server, and after the temporary identity registration server receives the registration application, signs block information of all blocks in a block chain by adopting a private key of itself, and returns the signed information to the 5G UE. Wherein the block information of the block includes, but is not limited to: hash value of the present block, hash value of the previous block, content information of the present block, and the like.
Step 102, the 5G ue receives the block information of the blockchain returned by the temporary identity registration server according to the registration application, and performs hash value verification on the blockchain and the blocks in the blockchain according to the block information.
After receiving the block information fed back by the temporary identity registration server, the 5G UE firstly verifies the private key signature in the block information based on the public key of the temporary identity registration server, if the verification is passed, the hash value of each block is further calculated based on the block information of each block fed back by the temporary identity registration server, the calculated hash value of each block is compared with the hash value of each block carried in the block information fed back by the temporary identity registration server, whether the hash value of each block obtained by verification is consistent with the hash value of each block recorded in the block information is verified, whether the hash value of each block is smaller than the preset difficulty value is verified, and whether the hash value of the previous block is recorded in each block is verified, if the verification is passed, the public key of the target operator is obtained by searching the block information fed back by the temporary identity registration server according to the identification of the target operator.
Step 103, when the blockchain and the blocks in the blockchain pass verification, the 5G user terminal equipment searches and obtains the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator.
Optionally, in a feasible manner, the 5G UE may obtain the public key of the target operator by traversing from the block information of each block returned by the temporary identity registration server in a traversing manner one by one.
Optionally, in another possible manner, in order to improve efficiency of searching the target operator public key by the 5G UE, pointer information of a target block may be further added to the block information fed back by the temporary identity registration server, where the target block is a block in which the target operator public key is recorded, and the pointer information of the target block is used to inform the 5G UE which block is the target block, so that the 5G UE can quickly and accurately lock the target block according to the pointer information of the target block, and improve efficiency of obtaining the target operator public key.
Step 104, the 5G ue encrypts a second public key corresponding to the permanent identity of the ue by using the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
The preset encryption algorithm in this embodiment is an encryption algorithm shared by the 5G UE and the temporary identity registration server. In order to ensure that the second public key of the permanent identity sent by the 5G UE is not monitored or replaced, the 5G UE needs to encrypt the second public key according to a preset encryption algorithm before sending the second public key to the temporary identity registration server, the public key of the target operator or the public key of the target operator and the first public key are adopted to encrypt the second public key, the encrypted data is signed by the first private key of the 5G UE and then sent to the temporary identity registration server, after receiving the encrypted data, the temporary identity registration server firstly verifies the private key signature of the encrypted data by the first public key of the 5G UE, and if the verification is passed, the encrypted data is decrypted based on the preset encryption algorithm to obtain the second public key of the 5G UE, so that the 5G UE is registered based on the second public key.
It will of course be appreciated by those skilled in the art that although the above embodiments describe a method of encrypting the second public key of a 5G UE, in a practical scenario, not only the second public key may be encrypted, but also other registration information of the 5G UE may be encrypted, such as the international mobile equipment identity (International Mobile Equipment Identity, IMEI) number of the 5G UE in one possible scenario, or the hash value of the second public key and/or IMEI number in another possible scenario.
In this embodiment, the 5G user terminal device carries the first public key corresponding to the temporary identity generated in advance in the registration application and sends the first public key to the temporary identity registration server in the blockchain, so that the temporary identity registration server returns the blockchain blockinformation according to the registration application, the 5G user terminal device performs hash value verification on the blockchain and the blockchain blockaccording to the blockinformation returned by the temporary identity registration server, and when the verification passes, searches the public key of the target operator from the blockinformation returned by the temporary identity registration server according to the identifier of the target operator, and because the embodiment of the application does not directly send the public key of the target operator to the 5G user terminal device like the prior art, but sends the blockchain blockinformation to the 5G user terminal device, and because the difficulty of forging the blockchain blockis far greater than the difficulty of forging the public key of the operator, the security and confidentiality of the target operator can be improved, and further, the 5G user terminal device can encrypt and register the first public key corresponding to the first public key of the target operator and self-temporary identity by presetting an encryption algorithm after obtaining the public key of the target operator, and the temporary identity corresponding to the temporary identity registration server can be sent to the second public key of the target operator, and the security of the user terminal device can be encrypted and encrypted, and the security is improved, and the security is achieved.
Fig. 3 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application, as shown in fig. 3, where on the basis of the foregoing embodiment, the method includes:
step 301, a 5G ue sends a registration application to a temporary identity registration server in a blockchain, where the registration application includes a first public key corresponding to a temporary identity generated by the 5G ue and an identifier of a target operator, and public keys of the operators are recorded in a block of the blockchain.
In this embodiment, the 5G UE searches for 5G signal strength information around itself, and determines a target operator according to the signal strength information of each operator around itself. And the identification of the target operator and the first public key of the target operator are carried in the registration application and sent to the temporary identity registration server.
Step 302, the 5G ue receives the information of the first block recorded with the public key of the target operator returned by the temporary identity registration server according to the registration application, and performs hash value verification on the blockchain and the first block according to the information of the first block.
After receiving the block information of the first block, the method can judge whether the calculated hash value is consistent with the hash value of the first block fed back by the temporary identity registration server, whether the calculated hash value is smaller than a preset difficulty value or not and whether the hash value of the last block is included in the first block or not by calculating the hash value of the first block, if yes, verification is passed, otherwise verification is failed. Of course, this is merely illustrative and not intended to be the only limitation on the verification method of the present application. For example, in some scenarios, considering that the more block information is fed back to the 5G UE by the temporary identity registration server, the more difficult the block information is to be forged, so, on the basis of returning the block information of the first block to the 5G UE, the block information of N blocks before the first block and M blocks after the first block may also be returned to the 5G UE, so that the 5G UE performs hash value verification based on the received block information of all blocks. Wherein, N and M are positive integers, the values of N and M can be the same or different, the values of N and M can be set according to the needs, and the larger the value of N and/or M is, the higher the security and confidentiality of the registered data are.
Step 303, when the blockchain and the first block pass verification, the 5G ue searches and obtains the public key of the target operator from the block information of the first block returned by the temporary identity registration server according to the identifier of the target operator.
And step 304, the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In this embodiment, the 5G user terminal device carries the first public key corresponding to the temporary identity generated in advance in the registration application and sends the first public key to the temporary identity registration server in the blockchain, so that the temporary identity registration server returns the blockchain blockinformation according to the registration application, the 5G user terminal device performs hash value verification on the blockchain and the blockchain blockaccording to the blockinformation returned by the temporary identity registration server, and when the verification passes, searches the public key of the target operator from the blockinformation returned by the temporary identity registration server according to the identifier of the target operator, and because the embodiment of the application does not directly send the public key of the target operator to the 5G user terminal device like the prior art, but sends the blockchain blockinformation to the 5G user terminal device, and because the difficulty of forging the blockchain blockis far greater than the difficulty of forging the public key of the operator, the security and confidentiality of the target operator can be improved, and further, the 5G user terminal device can encrypt and register the first public key corresponding to the first public key of the target operator and self-temporary identity by presetting an encryption algorithm after obtaining the public key of the target operator, and the temporary identity corresponding to the temporary identity registration server can be sent to the second public key of the target operator, and the security of the user terminal device can be encrypted and encrypted, and the security is improved, and the security is achieved.
Fig. 4 is a schematic structural diagram of a 5G ue according to an embodiment of the present application, where, as shown in fig. 4, the device 40 includes a processor 41 and a memory 42, where instructions are stored in the memory 42, and when the processor 41 executes the instructions, the following operations are performed: a registration application is sent to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and public keys of operators are recorded in blocks of the blockchain; receiving block information of the block chain returned by the temporary identity registration server according to the registration application, and carrying out hash value verification on the block chain and blocks in the block chain according to the block information; when the block chain and the blocks in the block chain pass verification, searching and obtaining a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator; and encrypting a second public key corresponding to the permanent identity of the user by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and transmitting encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In one possible implementation, the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
In a possible implementation manner, the registration application further includes an identification of the target operator.
In one possible implementation, the block information returned by the temporary identity registration server includes information of a first block in which the public key of the target operator is recorded.
In one possible implementation manner, the block information returned by the temporary identity registration server further includes: information of the first N blocks and the last M blocks of the first block in the blockchain, wherein N and M are positive integers.
The method of any one of the foregoing embodiments can be executed by the device provided in this embodiment, and the execution manner and effect of the method are similar, and are not described herein again.
Embodiments of the present application also provide a computer-readable storage medium comprising instructions which, when run on a computer, cause the computer to perform the method provided by any of the embodiments described above.
Finally, it should be noted that, as will be appreciated by those skilled in the art, all or part of the above-described methods may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and the program may include the steps of the above-described embodiments of the methods when executed. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a random-access memory (RAM), or the like.
The functional units in the embodiment of the application can be integrated in one processing module, or the individual physical existence of the units can be realized, or two or more units can be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules, if implemented as software functional modules, may also be stored on a computer readable storage medium for sale or use as a stand-alone product. The above-mentioned storage medium may be a read-only memory, a magnetic disk, an optical disk, or the like.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the application.
Claims (10)
1. A method for registering a 5G user terminal, comprising:
the method comprises the steps that a 5G user terminal device sends a registration application to an AMF or an SMF, the AMF or the SMF sends the registration application to a UPF, so that the UPF transfers the registration application to a temporary identity registration server in a blockchain, the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal device, and a public key of an operator is recorded in a block of the blockchain;
the 5G user terminal equipment receives block information of the block chain returned by the temporary identity registration server according to the registration application, and performs hash value verification on the block chain and blocks in the block chain according to the block information;
when the block chains and the blocks in the block chains pass verification, the 5G user terminal equipment searches and obtains a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator;
and the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
2. The method of claim 1, wherein the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
3. The method of claim 1, wherein the registration application further includes an identification of a target operator.
4. A method according to claim 3, wherein the block information returned by the temporary identity registration server comprises information of a first block in which the public key of the target operator is recorded.
5. The method of claim 4, wherein the block information returned by the temporary identity registration server further comprises: information of the first N blocks and the last M blocks of the first block in the blockchain, wherein N and M are positive integers.
6. A 5G user terminal device comprising a processor and a memory, the memory having instructions stored therein which when executed by the processor perform the following:
sending a registration application to an AMF or an SMF, and sending the registration application to a UPF by the AMF or the SMF so that the UPF transfers the registration application to a temporary identity registration server in a blockchain, wherein the registration application comprises a first public key corresponding to the temporary identity generated by the 5G user terminal equipment, and the public key of an operator is recorded in a block of the blockchain;
receiving block information of the block chain returned by the temporary identity registration server according to the registration application, and carrying out hash value verification on the block chain and blocks in the block chain according to the block information;
when the block chain and the blocks in the block chain pass verification, searching and obtaining a public key of a target operator from the block information returned by the temporary identity registration server according to the identification of the target operator;
and encrypting a second public key corresponding to the permanent identity of the user by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and transmitting encrypted data obtained by encryption to the temporary identity registration server for identity registration.
7. The apparatus of claim 6, wherein the block information returned by the temporary identity registration server is information of all blocks in the blockchain.
8. The apparatus of claim 6, wherein the registration application further includes an identification of a target operator.
9. The apparatus of claim 8, wherein the block information returned by the temporary identity registration server includes information of a first block in which a public key of the target operator is recorded.
10. A computer readable storage medium having stored therein instructions which, when run on a computer, cause the computer to perform the method of any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911402049.9A CN111148094B (en) | 2019-12-30 | 2019-12-30 | Registration method of 5G user terminal, user terminal equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911402049.9A CN111148094B (en) | 2019-12-30 | 2019-12-30 | Registration method of 5G user terminal, user terminal equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111148094A CN111148094A (en) | 2020-05-12 |
CN111148094B true CN111148094B (en) | 2023-11-21 |
Family
ID=70522256
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911402049.9A Active CN111148094B (en) | 2019-12-30 | 2019-12-30 | Registration method of 5G user terminal, user terminal equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111148094B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113569209B (en) * | 2021-07-09 | 2024-06-11 | 远光软件股份有限公司 | User registration method and device based on block chain |
CN113569210A (en) * | 2021-07-09 | 2021-10-29 | 远光软件股份有限公司 | Distributed identity authentication method, equipment access method and device |
CN114172923B (en) * | 2021-12-08 | 2023-07-07 | 中国联合网络通信集团有限公司 | Data transmission method, communication system and communication device |
CN114239072B (en) * | 2021-12-28 | 2023-01-20 | 中国联合网络通信集团有限公司 | Block chain node management method and block chain network |
CN114584314B (en) * | 2022-02-28 | 2024-06-14 | 天翼安全科技有限公司 | Registration method, device, equipment and medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209835A (en) * | 2016-07-08 | 2016-12-07 | 北京众享比特科技有限公司 | Peer-to-peer network communication system and method |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
CN108616532A (en) * | 2018-04-26 | 2018-10-02 | 中国联合网络通信集团有限公司 | Ballot processing method, apparatus and terminal device |
CN108712395A (en) * | 2018-04-27 | 2018-10-26 | 腾讯科技(深圳)有限公司 | Account management method, device, server based on block chain and storage medium |
CN108881296A (en) * | 2018-07-24 | 2018-11-23 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
JP2019004263A (en) * | 2017-06-13 | 2019-01-10 | Kddi株式会社 | Gateway device, usage management system, usage control method, and usage control program |
WO2019034014A1 (en) * | 2017-08-16 | 2019-02-21 | 华为技术有限公司 | Method and apparatus for access authentication |
CN109905874A (en) * | 2019-01-04 | 2019-06-18 | 中国联合网络通信集团有限公司 | The method and system of the autonomous number of selecting based on block chain |
CN110177101A (en) * | 2019-05-28 | 2019-08-27 | 四川城市职业学院 | Information processing method and device and relevant device based on 5G communication |
CN110581860A (en) * | 2019-09-19 | 2019-12-17 | 腾讯科技(深圳)有限公司 | identity authentication method, device, storage medium and equipment based on block chain |
WO2019241605A1 (en) * | 2018-06-13 | 2019-12-19 | Konstantinos Bakalis | Systems and methods for secure access to property or information using blockchain |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018020943A1 (en) * | 2016-07-28 | 2018-02-01 | 日本電気株式会社 | Number portability information management system |
CN109462472A (en) * | 2017-09-06 | 2019-03-12 | 阿里巴巴集团控股有限公司 | The methods, devices and systems of data encryption and decryption |
-
2019
- 2019-12-30 CN CN201911402049.9A patent/CN111148094B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106209835A (en) * | 2016-07-08 | 2016-12-07 | 北京众享比特科技有限公司 | Peer-to-peer network communication system and method |
JP2019004263A (en) * | 2017-06-13 | 2019-01-10 | Kddi株式会社 | Gateway device, usage management system, usage control method, and usage control program |
CN107257336A (en) * | 2017-06-15 | 2017-10-17 | 北京汇通金财信息科技有限公司 | A kind of user authen method and system |
WO2019034014A1 (en) * | 2017-08-16 | 2019-02-21 | 华为技术有限公司 | Method and apparatus for access authentication |
CN108616532A (en) * | 2018-04-26 | 2018-10-02 | 中国联合网络通信集团有限公司 | Ballot processing method, apparatus and terminal device |
CN108712395A (en) * | 2018-04-27 | 2018-10-26 | 腾讯科技(深圳)有限公司 | Account management method, device, server based on block chain and storage medium |
WO2019241605A1 (en) * | 2018-06-13 | 2019-12-19 | Konstantinos Bakalis | Systems and methods for secure access to property or information using blockchain |
CN108881296A (en) * | 2018-07-24 | 2018-11-23 | 中国联合网络通信集团有限公司 | Block chain real name identification method, device, equipment and storage medium |
CN109905874A (en) * | 2019-01-04 | 2019-06-18 | 中国联合网络通信集团有限公司 | The method and system of the autonomous number of selecting based on block chain |
CN110177101A (en) * | 2019-05-28 | 2019-08-27 | 四川城市职业学院 | Information processing method and device and relevant device based on 5G communication |
CN110581860A (en) * | 2019-09-19 | 2019-12-17 | 腾讯科技(深圳)有限公司 | identity authentication method, device, storage medium and equipment based on block chain |
Non-Patent Citations (6)
Title |
---|
"Draft 33.126r15_tracked_changes";3gpp;《3GPP tsg_sa\WG3_Security》;20170928;全文 * |
A Study on smart city security policy based on blockchain in 5G Age;Jong-ho Noh,Hun-yeong Kwon;《2019 International Conference on Platform Technology and Service (PlatCon)》;20190321;全文 * |
区块链将改变运营商运作模式;谢剑超;《通信企业管理》;20170810(第08期);全文 * |
基于区块链的PKI数字证书系统;阎军智;彭晋;左敏;王珂;;电信工程技术与标准化(11);全文 * |
基于区块链的去中心化身份认证及密钥管理方案;姚英英等;《网络空间安全》;20190625(第06期);全文 * |
基于多变量二次方程的抗量子区块链快速签名算法;梁伟,刘小欧,罗维,马文平,王凌;《信息技术与网络安全》;20190110;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111148094A (en) | 2020-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111148094B (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
US10187202B2 (en) | Key agreement for wireless communication | |
EP1768426B1 (en) | Method for transmitting information | |
US9088408B2 (en) | Key agreement using a key derivation key | |
Saxena et al. | Authentication protocol for an IoT-enabled LTE network | |
JP2022529837A (en) | Parameter transmission method and equipment | |
CN111132155B (en) | 5G secure communication method, device and storage medium | |
CN111132149B (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN111148213B (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN111148098A (en) | 5G terminal equipment registration method, equipment and storage medium | |
CN102892114B (en) | Method and device for checking equipment validity | |
CN114666040A (en) | Radio frequency identification authentication system and method based on quantum cryptography network | |
CN111107550A (en) | Dual-channel access registration method and device for 5G terminal equipment and storage medium | |
CN111083700A (en) | 5G terminal equipment access method, equipment and storage medium based on block chain | |
CN112887979A (en) | Network access method and related equipment | |
CN111836260A (en) | Authentication information processing method, terminal and network equipment | |
CN111132156B (en) | Registration method of 5G user terminal, user terminal equipment and medium | |
CN111163466B (en) | Method for 5G user terminal to access block chain, user terminal equipment and medium | |
WO2022078058A1 (en) | Decryption method, server and storage medium | |
CN105681364B (en) | A kind of IPv6 mobile terminal attack resistance method based on enhancing binding | |
CN111132167B (en) | Method for 5G user terminal to access 5G network, user terminal equipment and medium | |
CN111770488A (en) | EHPLMN updating method, related equipment and storage medium | |
CN118802151A (en) | Anonymous authentication method, AAnF network element, user equipment and storage medium | |
CN118797670A (en) | Method, device, electronic equipment and storage medium for identifying object | |
CN117528506A (en) | Data forwarding method, access controller, wireless access point, device and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing Applicant after: IALLCHAIN Co.,Ltd. Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing. Applicant before: IALLCHAIN Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |