CN113840276A - 5G identifier hiding compatible configuration method, user identification module and terminal - Google Patents

5G identifier hiding compatible configuration method, user identification module and terminal Download PDF

Info

Publication number
CN113840276A
CN113840276A CN202111111103.1A CN202111111103A CN113840276A CN 113840276 A CN113840276 A CN 113840276A CN 202111111103 A CN202111111103 A CN 202111111103A CN 113840276 A CN113840276 A CN 113840276A
Authority
CN
China
Prior art keywords
terminal
suci
command
main body
calculation execution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111111103.1A
Other languages
Chinese (zh)
Other versions
CN113840276B (en
Inventor
刘煜
翟京卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202111111103.1A priority Critical patent/CN113840276B/en
Publication of CN113840276A publication Critical patent/CN113840276A/en
Application granted granted Critical
Publication of CN113840276B publication Critical patent/CN113840276B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The present disclosure provides a 5G identifier hiding compatible configuration method, a user identification module, a terminal, a user equipment, an electronic device, and a storage medium, the method comprising: the user identification module acquires the configuration information of the terminal about the SUCI and judges whether the terminal supports SUCI user identification hiding and whether computation of SUCI is required; if so, generating a second command and sending the second command to the terminal, so that the terminal learns that the current user identification module and the terminal have contradiction on SUCI calculation setting, determining an willingness execution main body, and generating a response message of the SUCI calculation execution main body including the willingness of the terminal; a user identification module acquires a SUCI calculation execution main body of terminal intention; if the terminal is the SUCI, the SUCI calculation information file is changed to be available for the terminal, the SUCI is calculated by the terminal, and the network is logged in; if the user identification module is the user identification module, SUCI is calculated. The technical scheme of the disclosure improves the compatibility of the SUCI calculation execution main body.

Description

5G identifier hiding compatible configuration method, user identification module and terminal
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a 5G identifier hiding compatible configuration method, a subscriber identity module, a terminal, a user equipment, an electronic device, and a computer-readable storage medium.
Background
At present, 5G has entered the fast lane of commercial development, and the development of communication technology will enter a new era. The 5G has obvious innovation and progress in many specific technical requirements while bringing high speed, short delay, large-connection service experience and more application scenarios, and user authentication and authentication is one of them. Aiming at the security problem existing in the 4G network authentication, the 5G authentication scheme is modified and improved, most typically, a public and private key encryption system is used for encrypting the IMSI (International Mobile Subscriber Identity), so that the problems of plaintext transmission of the IMSI and monitoring and capturing of the IMSI in the air caused by the plaintext transmission of the IMSI are avoided. The IMSI corresponding to the terminal real identity is called SUPI (SUbscription Permanent Identifier), the SUPI forms a ciphertext sui (SUbscription shared Identifier) after being encrypted by a public key, and the sui is transmitted to the 5G base station gNB and then the gNB is transmitted to the core network.
The public key used by the user equipment to encrypt SUPI is stored in the USIM, and the calculation process of SUPI can be performed by either the USIM or the terminal. The SUCI generation algorithm can adopt a general elliptic curve integrated encryption Scheme ECIES (elliptic curve integrated encryption Scheme), can also adopt a personalized Scheme according to the requirement of the SUCI generation algorithm, and can even adopt a Null-Scheme, namely, SUPI encryption is not carried out.
However, the user identifier hiding is used as a new function of 5G, and due to different requirements of the USIM and the terminal in terms of management and control, in an actual situation, there may be a problem that an implementation scheme and a required configuration of the user identifier hiding are incompatible, so that both the terminal and the USIM cannot calculate the sui, and the sui generation fails.
Disclosure of Invention
In order to solve at least the problem that both a terminal and a USIM can not calculate SUCI due to incompatibility of a user identifier hiding implementation scheme and required configuration, the invention provides a 5G identifier hiding compatible configuration method, a user identification module, a terminal, user equipment, electronic equipment and a computer readable storage medium.
In a first aspect, the present disclosure provides a method for configuring hidden compatibility of a 5G identifier, which is applied to a subscriber identity module, and the method includes:
receiving a first command sent by a terminal, wherein the first command carries configuration information of the terminal about a user hidden identifier SUCI;
analyzing the first command, and judging whether the terminal supports SUCI user identification hiding and whether the terminal requires the terminal to be used as a SUCI calculation execution main body according to the configuration information of the terminal about the SUCI;
if the judgment results are yes, generating a second command to negotiate with the terminal on a SUCI calculation execution main body, wherein the second command carries information that the user identification module and the terminal have contradiction on the SUCI calculation execution main body;
sending a second command to the terminal so that the terminal determines an intended SUCI calculation execution subject based on the second command, generates a response message including the intended SUCI calculation execution subject of the terminal, and sends the response message to the subscriber identity module;
receiving the response message, and acquiring a SUCI calculation execution main body of the terminal intention;
if the SUCI calculation execution subject of the terminal will is the terminal, the state of the SUCI calculation information basic file is changed to be available for the terminal, the terminal calculates the SUCI and logs in the network;
and if the SUCI calculation execution main body intended by the terminal is the user identification module, calculating the SUCI as the SUCI calculation execution main body.
Further, after parsing the first command, the method further comprises:
and if the terminal does not support the user identification hiding of the SUCI, calculating the SUCI by taking the SUCI as a calculation execution main body.
Further, after parsing the first command, the method further comprises:
if the terminal supports SUCI user identification hiding and the terminal does not require the terminal to be used as a SUCI calculation execution main body, sending a third command carrying user identification module serving as SUCI calculation execution main body information to the terminal; and the number of the first and second groups,
the calculation execution subject as SUCI calculates SUCI.
Further, the changing the state of the SUCI calculation information basic file to be available to the terminal includes:
if the file attribute of the SUCI calculation information basic file is unreadable to the terminal, changing the file attribute to be readable to the terminal;
and if the file state of the SUCI calculation information basic file is the terminal deactivation, changing the file state of the SUCI calculation information basic file into the terminal activation.
In a second aspect, the present disclosure provides a 5G identifier hiding compatibility configuration method, applied to a terminal, the method including:
generating a first command, wherein the first command carries configuration information of a terminal about a user hidden identifier SUCI;
sending the first command to a user identification module to enable the user identification module to analyze the first command, judging whether the terminal supports SUCI user identifier hiding according to the configuration information of the terminal about the SUCI and whether the terminal requires the terminal to serve as a SUCI calculation execution main body, if the judgment results are yes, generating a second command to carry out SUCI calculation execution main body negotiation with the terminal, and sending the second command to the terminal, wherein the second command carries information that the user identification module and the terminal have contradiction in SUCI calculation execution main body setting;
receiving the second command, and determining a SUCI calculation execution subject of the second command according to the second command;
generating a response message of a SUCI calculation execution main body including terminal intention, sending the response message to a user identification module so that the user identification module receives the response message and obtains the SUCI calculation execution main body including the terminal intention, if the SUCI calculation execution main body including the terminal intention is a terminal, changing the state of a SUCI calculation information basic file into a state available for the terminal, calculating the SUCI by the terminal and logging in a network; if the SUCI calculation execution main body of the terminal intention is the user identification module, the SUCI calculation execution main body is used as the SUCI calculation execution main body to calculate SUCI;
and if the SUCI calculation execution subject intended by the terminal is the terminal, calculating the SUCI and logging in the network.
Further, the method further comprises:
and receiving a third command sent by the user identification module, wherein the third command is sent when the user identification module judges that the terminal supports SUCI user identification hiding according to the configuration information of the terminal about the SUCI, and the terminal does not require the terminal to be used as a calculation execution main body of the SUCI, and the third command carries the information of the calculation execution main body of the SUCI carried by the user identification module.
In a third aspect, the present disclosure provides a subscriber identity module, comprising:
the terminal comprises a first receiving module, a second receiving module and a control module, wherein the first receiving module is used for receiving a first command sent by the terminal, and the first command carries configuration information of the terminal about a user hidden identifier SUCI;
the judging module is arranged for analyzing the first command, judging whether the terminal supports SUCI user identification hiding or not according to the configuration information of the terminal about the SUCI, and judging whether the terminal requires the terminal to be used as a calculation execution main body of the SUCI or not;
the first generation module is configured to generate a second command to perform a negotiation with the terminal on the calculation execution main body of the SUCI if the judgment module judges that the terminal supports SUCI user identifier hiding and requires the SUCI user identifier hiding as the calculation execution main body of the SUCI, wherein the second command carries information that the user identification module and the terminal have contradiction in the SUCI calculation execution main body setting;
a first sending module, configured to send the second command to the terminal, so that the terminal determines an intended SUCI calculation execution subject based on the second command, generates a response message including the intended SUCI calculation execution subject of the terminal, and sends the response message to the subscriber identity module;
the first receiving module is also configured to receive the response message to obtain a SUCI calculation execution main body intended by the terminal;
a change module, which is set to change the state of the SUCI calculation information basic file into the state of being available for the terminal if the SUCI calculation execution main body of the terminal will is the terminal, and the terminal calculates the SUCI and logs in the network;
and the first calculation module is set to calculate the SUCI as the SUCI calculation execution main body if the SUCI calculation execution main body intended by the terminal is the user identification module.
In a fourth aspect, the present disclosure provides a terminal comprising:
a second generating module, configured to generate a first command, where the first command carries configuration information of a terminal about a user hidden identifier SUCI;
the second sending module is arranged to send the first command to the user identification module so that the user identification module can analyze the first command, judge whether the terminal supports SUCI user identification hiding according to the configuration information of the terminal about SUCI, and judge whether the terminal requires the terminal to be used as a SUCI calculation execution main body;
the second receiving module is arranged to receive a second command sent by the user identification module;
a determination module configured to determine a SUCI computation execution subject of its will according to the second command;
the second generation module is also configured to generate a response message of the SUCI calculation execution subject including the terminal intention;
the second sending module is also configured to send the response message to a user identification module so that the user identification module receives the response message and obtains an intended SUCI calculation execution main body of the terminal, if the intended SUCI calculation execution main body of the terminal is the terminal, the state of an SUCI calculation information basic file is changed to be available for the terminal, and the terminal calculates SUCI and logs in a network; if the SUCI calculation execution main body of the terminal intention is the user identification module, the SUCI calculation execution main body is used as the SUCI calculation execution main body to calculate SUCI;
and the second calculation module is set to calculate the SUCI and log in the network if the SUCI calculation execution subject intended by the terminal is the terminal.
In a fifth aspect, an embodiment of the present disclosure provides a user equipment, which includes a subscriber identity module and a terminal, where the subscriber identity module includes the subscriber identity module described above, and the terminal includes the terminal described above.
In a fifth aspect, the present disclosure provides a user equipment comprising a subscriber identity module and a terminal, the subscriber identity module comprising the subscriber identity module according to the third aspect, and the terminal comprising the terminal according to the fourth aspect.
In a sixth aspect, the present disclosure further provides an electronic device, including a memory and a processor, where the memory stores a computer program, and when the processor runs the computer program stored in the memory, the processor executes the method for configuring hidden and compatible 5G identifier according to any one of the first and second aspects.
In a seventh aspect, the present disclosure also provides a computer-readable storage medium, comprising: a computer program which, when run on a computer, causes the computer to perform the 5G identity hiding compatible configuration method as described in any one of the first and second aspects.
Has the advantages that:
according to the 5G identifier hiding compatible configuration method, the user identification module, the terminal, the user equipment, the electronic equipment and the computer readable storage medium, the user identification module receives a first command sent by the terminal, and the first command carries configuration information of the terminal about a user hidden identifier SUCI; analyzing the first command, and judging whether the terminal supports SUCI user identification hiding and whether the terminal requires the terminal to be used as a SUCI calculation execution main body according to the configuration information of the terminal about the SUCI; if the judgment results are yes, generating a second command to negotiate with the terminal on a SUCI calculation execution main body, wherein the second command carries information that the user identification module and the terminal have contradiction on the SUCI calculation execution main body; sending a second command to the terminal so that the terminal determines an intended SUCI calculation execution subject based on the second command, generates a response message including the intended SUCI calculation execution subject of the terminal, and sends the response message to the subscriber identity module; receiving the response message, and acquiring a SUCI calculation execution main body of the terminal intention; if the SUCI calculation execution subject of the terminal will is the terminal, the state of the SUCI calculation information basic file is changed to be available for the terminal, the terminal calculates the SUCI and logs in the network; and if the SUCI calculation execution main body intended by the terminal is the user identification module, calculating the SUCI as the SUCI calculation execution main body. The technical scheme of the disclosure provides and expands new definitions for corresponding commands, newly adds functions, structures and parameter definitions of machine-card interactive instructions, introduces new SUCI calculation main body data objects, and specifies interaction processes and rules of a USIM and a terminal for realizing the functions, improves compatibility of a user identifier hiding function calculation execution main body, and realizes 5G identifier hiding by maintaining the principle of taking USIM requirements as the standard as far as possible on the premise of negotiation confirmation. The failed SUCI calculation attempt of the terminal before the terminal and the USIM are not consistent is avoided, and the efficiency of the SUCI calculation scheme is improved.
Drawings
Fig. 1 is a schematic flowchart of a 5G identifier hiding compatibility configuration method according to a first embodiment of the present disclosure;
fig. 2 is a schematic diagram of a USIM service list provided in an embodiment of the present disclosure indicating SUPI encryption related characteristics at a specific service identity location;
fig. 3 is a schematic diagram illustrating a byte configuration of a part of an extended Terminal Profile command according to an embodiment of the disclosure;
fig. 4 is a schematic flowchart of a configuration method for hiding and compatibility of a 5G identifier according to a second embodiment of the present disclosure;
fig. 5 is a schematic flowchart of a configuration method for hiding and compatibility of a 5G identifier according to a third embodiment of the present disclosure;
fig. 6 is an architecture diagram of a subscriber identity module according to a fourth embodiment of the present disclosure;
fig. 7 is an architecture diagram of a terminal according to a fifth embodiment of the disclosure;
fig. 8 is an architecture diagram of a user equipment according to a sixth embodiment of the present disclosure;
fig. 9 is an architecture diagram of an electronic device according to a seventh embodiment of the disclosure.
Detailed Description
In order to make the technical solutions of the present disclosure better understood by those skilled in the art, the present disclosure is further described in detail below with reference to the accompanying drawings and examples.
In which the terminology used in the embodiments of the disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in the disclosed embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
Due to different requirements of the USIM and the terminal in management and control, in an actual situation, there may be a problem that an implementation scheme for hiding the user identifier and a required configuration are incompatible, so that both the terminal and the USIM cannot calculate the sui, and the generation of the sui fails.
The following describes the technical solutions of the present disclosure and how to solve the above problems in detail with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 1 is a schematic flowchart of a configuration method for hiding and compatibility of a 5G identifier provided in an embodiment of the present disclosure, which is applied to a subscriber identity module, and as shown in fig. 1, the method includes:
step S101: receiving a first command sent by a terminal, wherein the first command carries configuration information of the terminal about a user hidden identifier SUCI;
step S102: analyzing the first command, and judging whether the terminal supports SUCI user identification hiding and whether the terminal requires the terminal to be used as a SUCI calculation execution main body according to the configuration information of the terminal about the SUCI;
step S103: if the judgment results are yes, generating a second command to negotiate with the terminal on a SUCI calculation execution main body, wherein the second command carries information that the user identification module and the terminal have contradiction on the SUCI calculation execution main body;
step S104: sending a second command to the terminal so that the terminal determines an intended SUCI calculation execution subject based on the second command, generates a response message including the intended SUCI calculation execution subject of the terminal, and sends the response message to the subscriber identity module;
step S105: receiving the response message, and acquiring a SUCI calculation execution main body of the terminal intention;
step S106: if the SUCI calculation execution subject of the terminal will is the terminal, the state of the SUCI calculation information basic file is changed to be available for the terminal, the terminal calculates the SUCI and logs in the network;
step S107: and if the SUCI calculation execution main body intended by the terminal is the user identification module, calculating the SUCI as the SUCI calculation execution main body.
In an embodiment of the present disclosure, a Mobile device is referred to as a terminal, which may be a 5G terminal, and a User Equipment (User Equipment, UE) includes a Mobile device (ME) and a User Equipment Module (USIM).
It should be understood that the USIM Card is Integrated on a Universal Integrated Circuit Card (UICC), the USIM Card can actively request the terminal to perform corresponding functions according to Application requirements by introducing a USIM Application Toolkit (USAT) mechanism, USAT is another type of USIM-related function, which is one of the basic capabilities of a telecommunication smart Card represented by USIM, and means introducing a USAT protocol layer in a protocol stack of a Cu interface (interface between the terminal and the UICC), the USAT layer provides a service mechanism on the basis of services provided by a transport layer, and allows USIM applications to interact and operate with the terminal supporting the mechanism, so that the terminal can be actively requested to perform a certain operation, and the USAT instruction set is the basis and main mode for the telecommunication smart Card to implement services through the terminal. Terminal Profile is one of the basic command types of USAT, and is a method for a Terminal to provide support capability and other capabilities for instructions of USAT to a USIM, and the command is one of the necessary steps for the Terminal to start initial interaction with the USIM, so that the machine card can interact with the capability of the Terminal in advance, but the existing Terminal Profile command has no content about the capability of the Terminal in the sui.
The USIM may mark the features related to the encryption of the SUPI at a specific service identifier of the USIM service list, including whether the sci calculation is supported and whether the sci calculation execution is supported, as shown in fig. 2, where, in the 16 th byte, when the USIM is set to support the subscriber identifier hiding but not the USIM calculation sci, that is, b4b3 is 01 in the figure, the terminal performs the sci calculation, the USIM information provides a basic file containing the subscriber hidden identifier calculation information to the terminal, the file includes a calculated encryption scheme, a home network public key, etc., and after obtaining the above calculation information, the terminal performs the encryption calculation on the SUPI according to the information requirement, so as to form the sci. According to the international standard definition, this basic file is only available when the USIM is set as a terminal to compute the SUCI, and is not available when the USIM computes the SUCI. According to the conventional method, the encryption execution subject should be decided by the USIM and specified by the USIM service list. However, many terminals choose to ignore USIM requirements for control and management, and use itself directly as the encryption execution subject. A significant problem occurs when the USIM is set to the USIM compute SUCI and the terminal chooses to compute SUCI itself at the same time, i.e. when the two set terminals are used in conjunction with the card. The terminal is used as a relatively active party, basic information required by calculation needs to be obtained from a basic file of the SUCI calculation information when the SUCI is calculated, a USIM cannot provide corresponding files according to the existing standard requirements, the USIM calculation also needs terminal cooperation to transmit the SUCI to the network side, and the terminal cannot provide cooperation due to self setting. Because the terminal and the USIM are incompatible in the aspect, the SUCI cannot be calculated by both the terminal and the USIM, and the SUCI generates a failure result, thereby further influencing authentication and network access. Considering that in a real situation, a considerable number of terminals are the case, a 5G USIM issued by an operator will typically set a USIM to perform SUCI calculation, and in order to improve compatibility with such terminals, the above-mentioned problem needs to be solved.
The embodiment of the present disclosure first needs to implement mutual communication between a Terminal and a USIM regarding configuration of an implementation subject of sui computation, as described above, the Terminal may obtain configuration of the USIM in this respect by reading setting of a USIM service list, while the USIM has no way to obtain configuration of the Terminal in this respect in the prior art, so the scheme proposes to explain the configuration of the Terminal in the aspect of the sui computation subject to the USIM by extending a Terminal Profile command, and at the same time, explain support for a negotiation command of the sui computation implementation subject. The 37 th byte of the original reserved command of the Terminal Profile is mainly extended to explain the configuration, the byte encoding is shown in fig. 3, in the figure, b1 indicates that the Terminal supports user identifier hiding, b2 indicates that the Terminal supports and requires ME to calculate SUCI, b3 indicates that the Terminal supports the proactive command that the SUCI calculates and executes subject negotiation, and the rest bits are reserved. All the above bits are set to 1 to indicate support, and set to 0 to indicate no support.
The Terminal sends a first command to the USIM at the initial stage of startup, where the first command includes configuration information of the Terminal about the SUCI, and the first command may be a Terminal Profile command extended as described above, which describes USAT and other relevant capability configurations of the Terminal, and includes the extended command content, that is, the configuration of the Terminal related to the SUCI, and the specific code definition is as described above; if the terminal supports and requires the user identification to be hidden, the b1/b2/b3 in the command sent by the terminal is set to be 1.
The user identification module analyzes the first command, judges whether the terminal supports SUCI user identification hiding according to the configuration information of the terminal about SUCI, and whether the terminal is required to be used as an execution subject for calculating SUCI;
if the Terminal supports and requires the user identifier to be hidden, the user identification module requires that the two parties perform negotiation of execution main bodies when the Terminal and the USIM are respectively configured to execute SUCI calculation by themselves, a second command needs to be generated for this purpose, the SUCI calculation main body which represents the current intention of the user identification module is used as the user identification module, the second command can be an added new USAT active instruction, the command function is that after the USIM knows that the Terminal is configured to require the Terminal to be used as the execution main body for calculating SUCI through Terminal Profile and supports the negotiation of the execution main body, the command is sent to require the Terminal to perform negotiation, and after the Terminal receives the command, the Terminal provides the intended execution main body in response according to the self condition. The new adding command is named SUCI Calculation Negotiation, and the structure of the new adding command is as the following table 1:
table 1: SUCI Calculation Negotiation command structure
Figure BDA0003270352080000111
The command indicates a sui calculation subject that the USIM currently intends, and indicates that the USIM requests the terminal to perform negotiation of the sui calculation subject. The sci calculation subject is a newly added data object and represents the sci calculation subject currently intended by the USIM, and the detailed definition and encoding are as shown in table 1 above and are usually set as that the USIM is a sci calculation subject. M is optional, and O is optional.
After receiving the second command (i.e. the above succi Calculation notification command), the Terminal learns that there is a contradiction between the current subscriber identity module and the Terminal in the SUCI Calculation execution subject setting, considers its own condition and determines the desired SUCI Calculation execution subject according to the self condition, and generates a Response message including the Terminal desired SUCI Calculation execution subject, where the Response message may be a Terminal Response command as follows, and returns the desired SUCI Calculation subject to the USIM through the Terminal Response command, and the Terminal Response command structure may be as shown in table 2 below:
table 2: terminal Response command structure
Figure BDA0003270352080000121
The SUCI calculation subject data object has the same structure as the definition in the second command, and the difference is that the represented SUCI calculation subject may be a terminal or a USIM, and the terminal selects to change the configuration of the SUCI calculated by the original terminal or insist on the configuration after knowing that the USIM configuration is that the SUCI is calculated by the USIM.
The USIM receives the response message and acquires an SUCI calculation execution main body intended by the terminal; after receiving the response, the USIM determines a processing mode according to the response content: if the execution main body responded by the terminal is still the terminal, the USIM changes the unavailable state of the original SUCI calculation information basic file of the USIM to the terminal into an available state for the terminal to execute the SUCI calculation; if the execution subject responded by the terminal is changed to USIM, USIM configuration does not need to be changed, and the USIM executes SUCI calculation and sends the SUCI calculation to the base station through the terminal to log in the network.
The embodiment of the disclosure provides a method for achieving compatibility through configuration negotiation aiming at contradiction setting between the set cards. The scheme solves the practical problem in the aspect of user identification hiding, maintains the leading right of the USIM in the aspect of SUCI execution subject definition in the international standard as much as possible on the premise of negotiation confirmation, avoids failed SUCI calculation attempts of the terminal before the terminal and the USIM are not consistent, and improves the efficiency of the scheme.
Further, after parsing the first command, the method further comprises:
and if the terminal does not support the user identification hiding of the SUCI, calculating the SUCI by taking the SUCI as a calculation execution main body.
And the user identification module directly determines that the user identification module is an execution subject for calculating the SUCI if the user identification module determines that the terminal does not support the hiding of the user identifier of the SUCI according to the first command of the terminal, and if b1 in the command is 0, the user identification module calculates the SUCI and enables the user equipment to log in the network.
Further, after parsing the first command, the method further comprises:
if the terminal supports SUCI user identification hiding and the terminal does not require the terminal to be used as a SUCI calculation execution main body, sending a third command carrying user identification module serving as SUCI calculation execution main body information to the terminal; and the number of the first and second groups,
the calculation execution subject as SUCI calculates SUCI.
If the terminal does not require the terminal as an execution subject for calculating the sui, if b1b2 in the first command is 10, a third command is sent to the terminal to indicate to the terminal that the user identification module is the execution subject for calculating the sui, and the sui is calculated and the user equipment is logged in the network.
Further, the changing the state of the SUCI calculation information basic file to be available to the terminal includes:
if the file attribute of the SUCI calculation information basic file is unreadable to the terminal, changing the file attribute to be readable to the terminal;
and if the file state of the SUCI calculation information basic file is the terminal deactivation, changing the file state of the SUCI calculation information basic file into the terminal activation.
If the terminal insists that the terminal is required to be used as an execution subject for calculating the SUCI, in order to enable the SUCI calculation to be executed smoothly, the USIM can give the execution subject for calculating the SUCI to the terminal, prevent the SUCI from being calculated by the terminal, and enable the terminal to calculate the SUCI smoothly by changing the state of the SUCI calculation information basic file into the state of being available for the terminal and calculating the SUCI by the terminal. Of course, in another implementation manner of the embodiment of the present disclosure, after the attribute of the SUCI calculation information basic file is changed to be available to the terminal, the terminal may autonomously read the SUCI calculation information basic file after confirming that the desired SUCI calculation execution main body is the terminal itself without sending the fourth command to the terminal, and perform the SUCI calculation.
The embodiment of the disclosure provides a method for expanding new definitions of corresponding commands, newly adds functions, structures and parameter definitions of machine-card interactive instructions, introduces a new SUCI computing main body data object, and specifies the interaction process and rules of a USIM and a terminal realized by the functions, improves the compatibility of a user identifier hiding function computing execution main body, and realizes 5G identifier hiding by maintaining the principle of taking USIM requirements as the standard as far as possible on the premise of negotiation confirmation. The failed SUCI calculation attempt of the terminal before the terminal and the USIM are not consistent is avoided, and the efficiency of the SUCI calculation scheme is improved.
Fig. 4 is a schematic flowchart of a configuration method for hiding and compatibility of a 5G identifier provided in a second embodiment of the present disclosure, which is applied to a terminal, and as shown in fig. 4, the method includes:
step S201: generating a first command, wherein the first command carries configuration information of a terminal about a user hidden identifier SUCI;
step S202: sending the first command to a user identification module to enable the user identification module to analyze the first command, judging whether the terminal supports SUCI user identifier hiding according to the configuration information of the terminal about the SUCI and whether the terminal requires the terminal to serve as a SUCI calculation execution main body, if the judgment results are yes, generating a second command to carry out SUCI calculation execution main body negotiation with the terminal, and sending the second command to the terminal, wherein the second command carries information that the user identification module and the terminal have contradiction in SUCI calculation execution main body setting;
step S203: receiving the second command, and determining a SUCI calculation execution subject of the second command according to the second command;
step S204: generating a response message of a SUCI calculation execution main body including terminal intention, sending the response message to a user identification module so that the user identification module receives the response message and obtains the SUCI calculation execution main body including the terminal intention, if the SUCI calculation execution main body including the terminal intention is a terminal, changing the state of a SUCI calculation information basic file into a state available for the terminal, calculating the SUCI by the terminal and logging in a network; if the SUCI calculation execution main body of the terminal intention is the user identification module, the SUCI calculation execution main body is used as the SUCI calculation execution main body to calculate SUCI;
step S205: and if the SUCI calculation execution subject intended by the terminal is the terminal, calculating the SUCI and logging in the network.
The terminal can enable the user identification module to acquire the configuration information of the terminal about the SUCI by generating the first command, if the terminal does not support the hiding of the user identification of the SUCI, or the terminal does not require to be used as an execution subject for calculating the SUCI, the USIM determines that the USIM is the execution subject for calculating the SUCI, and the USIM normally calculates the SUCI and logs in the network. If the terminal supports SUCI user identification hiding and requires to be used as an execution subject of SUCI calculation, the terminal receives a second command sent by the user identification module, negotiates with the terminal to determine whether the terminal is willing to change the SUCI calculation setting of the original terminal and sends the SUCI calculation setting to the user identification module through a response message, if the terminal is willing, the user identification module is determined to be the execution subject of SUCI calculation, the user identification module calculates SUCI and enables user equipment to log in a network, if the terminal is unwilling to change, the user identification module changes the state of the SUCI calculation information basic file to be available for the terminal, and the terminal calculates SUCI and logs in the network.
Further, the method further comprises:
and receiving a third command sent by the user identification module, wherein the third command is sent when the user identification module judges that the terminal supports SUCI user identification hiding according to the configuration information of the terminal about the SUCI, and the terminal does not require the terminal to be used as a calculation execution main body of the SUCI, and the third command carries the information of the calculation execution main body of the SUCI carried by the user identification module.
If the SUCI calculation execution main body intended by the terminal is the terminal, the USIM determines that the terminal is the SUCI calculation execution main body, changes the state of the original SUCI calculation information basic file, and changes from unavailable to available to the terminal, which may include two situations: if the reason that the SUCI calculation information basic file is unavailable to the terminal is that the file attribute is unreadable, changing the file attribute of the SUCI calculation information basic file to be readable to the terminal; and if the reason that the SUCI calculation information basic file is unavailable to the terminal is that the file state is deactivated, changing the file state to be activated to the terminal. And the terminal can read the SUCI calculation information basic file, and then the terminal completes the SUCI calculation and logs in the network.
In order to more clearly and completely describe the technical solution of the present disclosure, a third embodiment of the present disclosure further provides an application program network segment selection method, as shown in fig. 5, where the method includes:
step S1: the USIM and the terminal are matched for use and started;
step S2: the Terminal sends a Terminal Profile command to the USIM at the initial starting stage, which indicates the USAT and other related capability configurations of the Terminal, wherein the Terminal comprises the expanded command content, namely the configuration related to the SUCI of the Terminal, and the specific code definition is shown in FIG. 2;
step S3: the USIM receives and analyzes the command, acquires the SUCI-related configuration of the terminal, and judges according to the configuration content;
step S4: a specific character (b1/b2) in the USIM read command, determines whether the terminal supports the user identity hiding of the SUCI and requires the terminal as an execution subject for calculating the SUCI, if not, goes to step S11, and if so, performs the subsequent step S5;
step S5: b3 in USIM reading command, determining whether the terminal supports SUCI calculation to execute subject negotiation and related active command, if yes, executing the following step S6, if no, ending the process;
step S6: the USIM sends an SUCI Calculation Negotiation command for executing the main body Negotiation to the terminal, and requires the terminal to carry out the Negotiation of the SUCI Calculation main body, and the SUCI Calculation main body which indicates the current intention of the USIM is the USIM;
step S7: the terminal receives the command of the SUCI calculation execution main body negotiation, acquires the contradiction between the current USIM and the terminal in the setting aspect of the SUCI calculation execution main body, judges the processing of the situation according to the self condition, determines the SUCI calculation execution main body with will, and returns the SUCI calculation execution main body to the terminal in the response message;
step S8: the USIM receives and analyzes the response message, acquires a SUCI calculation execution main body intended by the terminal and judges whether the terminal changes the setting of the SUCI calculated by the original terminal, if so, the step is switched to S11, and if not, the subsequent step S9 is continuously executed;
step S9: the USIM determines that the terminal is an execution subject for calculating the SUCI, changes the state of the original SUCI calculation information basic file, and changes from unavailable to available to the terminal, which may include two cases:
s9-1, if the reason that the file is unavailable is that the file attribute is unreadable, changing the file attribute to be readable;
s9-2, if the reason that the file is unavailable is that the file state is deactivated, changing the file state to be activated;
step S10: the terminal acquires the calculation information from the available SUCI calculation information basic file and uses the calculation information to calculate the SUCI, normally logs in the network, and the process is ended;
step S11: the USIM determines that the USIM is an execution subject for calculating the SUCI, and the USIM normally calculates the SUCI and enables the user equipment to log in the network.
The structure of the command SUCI call notification and the response message is shown in table 1 and table 2 in the first embodiment.
Fig. 6 is an architecture diagram of a subscriber identity module according to a fourth embodiment of the present disclosure, as shown in fig. 6, including:
a first receiving module 11, configured to receive a first command sent by a terminal, where the first command carries configuration information of a user hidden identifier SUCI of the terminal;
a judging module 12 configured to analyze the first command, and judge whether the terminal supports SUCI user identifier hiding and whether the terminal requires itself as a SUCI calculation execution subject according to the terminal configuration information about the SUCI;
a first generating module 13, configured to generate a second command to perform a negotiation with the terminal on the calculation execution main body of the SUCI if the determining module 12 determines that the terminal supports the hiding of the user identifier of the SUCI and requires the user identifier of the terminal to be used as the calculation execution main body of the SUCI, where the second command carries information that the user identifier module and the terminal have a contradiction in the settings of the calculation execution main body of the SUCI;
a first sending module 14 configured to send the second command to the terminal, so that the terminal determines an intended SUCI calculation execution subject based on the second command, generates a response message including the intended SUCI calculation execution subject of the terminal, and sends the response message to the subscriber identity module;
the first receiving module 11 is further configured to receive the response message to obtain a sui computation execution subject intended by the terminal;
a change module 15 configured to change the state of the SUCI calculation information basic file to be available to the terminal if the SUCI calculation execution subject intended by the terminal is the terminal itself, calculate the SUCI by the terminal, and log in the network;
and a first calculation module 16 configured to calculate the SUCI as a calculation execution subject of the SUCI if the SUCI calculation execution subject intended by the terminal is the subscriber identity module.
Further, the first calculating module 16 is further configured to, if the determining module 12 determines that the terminal does not support the hiding of the user identifier of the SUCI, enable the user identification module to serve as a calculation execution subject of the SUCI to calculate the SUCI.
Further, the first sending module is further configured to send a third command carrying information of the user identification module as the SUCI calculation execution main body to the terminal if the judging module 12 judges that the terminal supports the SUCI user identifier hiding and the terminal does not require the terminal to serve as the SUCI calculation execution main body; and the number of the first and second groups,
the user identification module is caused to calculate the SUCI as a calculation execution subject of the SUCI.
Further, the changing module 15 is specifically configured to:
if the file attribute of the SUCI calculation information basic file is unreadable to the terminal, changing the file attribute to be readable to the terminal;
and if the file state of the SUCI calculation information basic file is the terminal deactivation, changing the file state of the SUCI calculation information basic file into the terminal activation.
Fig. 7 is an architecture diagram of a terminal according to a fifth embodiment of the present disclosure, as shown in fig. 7, including:
a second generating module 21 configured to generate a first command, where the first command carries configuration information of the terminal about a user hidden identifier SUCI;
a second sending module 22, configured to send the first command to the subscriber identity module, so that the subscriber identity module parses the first command, and determine, according to the configuration information of the terminal about the SUCI, whether the terminal supports the hiding of the user identifier of the SUCI, and whether the terminal requires itself to be the main execution body for calculating the SUCI, and if the terminal supports the hiding of the user identifier of the SUCI and requires to be the main execution body for calculating the SUCI, generate a second command, so as to perform negotiation with the terminal on the main execution body for calculating the SUCI, and send the second command to the terminal, where the second command carries information that the subscriber identity module and the terminal have contradiction in the settings of the main execution body for calculating the SUCI;
a second receiving module 23 configured to receive a second command sent by the subscriber identity module;
a determination module 24 configured to determine a sui computation execution subject of its will according to the second command;
the second generating module 21 is further configured to generate a response message including a sui calculation execution subject intended by the terminal;
the second sending module 22 is further configured to send the response message to the user identification module, so that the user identification module receives the response message, obtains a desired SUCI calculation execution main body of the terminal, and if the desired SUCI calculation execution main body of the terminal is the terminal itself, changes the state of the SUCI calculation information basic file to be available to the terminal, calculates the SUCI by the terminal, and logs in to the network; if the SUCI calculation execution main body of the terminal intention is the user identification module, the SUCI calculation execution main body is used as the SUCI calculation execution main body to calculate SUCI;
and a second calculation module 25 configured to calculate the sui and log in the network if the sui calculation execution subject intended by the terminal is the terminal itself.
Further, the second receiving module 23 is further configured to receive a third command sent by the subscriber identity module, where the third command is sent by the subscriber identity module according to the configuration information of the terminal about the SUCI, and the third command is sent when the terminal does not require itself to be used as a calculation execution subject of the SUCI, and the third command carries information of the subscriber identity module as the calculation execution subject of the SUCI.
The subscriber identity module and the terminal in the embodiments of the present disclosure are used to implement the 5G identifier hiding compatibility configuration method in the first to third embodiments of the method, so that description is simple, and reference may be specifically made to the related description in the first and third embodiments of the method, and details are not described here again.
Furthermore, as shown in fig. 8, a user equipment according to a sixth embodiment of the present disclosure includes a subscriber identity module 1 and a terminal 2, where the subscriber identity module 1 includes the subscriber identity module as described above, and the terminal 2 includes the terminal as described above.
Furthermore, as shown in fig. 9, a seventh embodiment of the present disclosure further provides an electronic device, which includes a memory 10 and a processor 20, where the memory 10 stores a computer program, and when the processor 20 runs the computer program stored in the memory 10, the processor 20 executes the above-mentioned various possible application network partition selecting methods.
The memory 10 is connected to the processor 20, the memory 10 may be a flash memory, a read-only memory or other memories, and the processor 20 may be a central processing unit or a single chip microcomputer.
In addition, the embodiments of the present disclosure also provide a computer-readable storage medium, in which computer-executable instructions are stored, and when at least one processor of the user equipment executes the computer-executable instructions, the user equipment executes the above-mentioned various possible methods.
Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC (Application Specific Integrated Circuit). Additionally, the ASIC may reside in user equipment. Of course, the processor and the storage medium may reside as discrete components in a communication device.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present disclosure, and that the present disclosure is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the disclosure, and these are to be considered as the scope of the disclosure.

Claims (11)

1. A5G identification hiding compatible configuration method is applied to a user identification module, and comprises the following steps:
receiving a first command sent by a terminal, wherein the first command carries configuration information of the terminal about a user hidden identifier SUCI;
analyzing the first command, and judging whether the terminal supports SUCI user identification hiding and whether the terminal requires the terminal to be used as a SUCI calculation execution main body according to the configuration information of the terminal about the SUCI;
if the judgment results are yes, generating a second command to negotiate with the terminal on a SUCI calculation execution main body, wherein the second command carries information that the user identification module and the terminal have contradiction on the SUCI calculation execution main body;
sending a second command to the terminal so that the terminal determines an intended SUCI calculation execution subject based on the second command, generates a response message including the intended SUCI calculation execution subject of the terminal, and sends the response message to the subscriber identity module;
receiving the response message, and acquiring a SUCI calculation execution main body of the terminal intention;
if the SUCI calculation execution subject of the terminal will is the terminal, the state of the SUCI calculation information basic file is changed to be available for the terminal, the terminal calculates the SUCI and logs in the network;
and if the SUCI calculation execution main body intended by the terminal is the user identification module, calculating the SUCI as the SUCI calculation execution main body.
2. The method of claim 1, wherein after parsing the first command, the method further comprises:
and if the terminal does not support the user identification hiding of the SUCI, calculating the SUCI by taking the SUCI as a calculation execution main body.
3. The method of claim 1, wherein after parsing the first command, the method further comprises:
if the terminal supports SUCI user identification hiding and the terminal does not require the terminal to be used as a SUCI calculation execution main body, sending a third command carrying user identification module serving as SUCI calculation execution main body information to the terminal; and the number of the first and second groups,
the calculation execution subject as SUCI calculates SUCI.
4. The method according to claim 1, wherein the changing the status of the SUCI calculation information elementary file to be available to the terminal comprises:
if the file attribute of the SUCI calculation information basic file is unreadable to the terminal, changing the file attribute to be readable to the terminal;
and if the file state of the SUCI calculation information basic file is the terminal deactivation, changing the file state of the SUCI calculation information basic file into the terminal activation.
5. A5G identification hiding compatible configuration method is applied to a terminal, and comprises the following steps:
generating a first command, wherein the first command carries configuration information of a terminal about a user hidden identifier SUCI;
sending the first command to a user identification module to enable the user identification module to analyze the first command, judging whether the terminal supports SUCI user identifier hiding according to the configuration information of the terminal about the SUCI and whether the terminal requires the terminal to serve as a SUCI calculation execution main body, if the judgment results are yes, generating a second command to carry out SUCI calculation execution main body negotiation with the terminal, and sending the second command to the terminal, wherein the second command carries information that the user identification module and the terminal have contradiction in SUCI calculation execution main body setting;
receiving the second command, and determining a SUCI calculation execution subject of the second command according to the second command;
generating a response message of a SUCI calculation execution main body including terminal intention, sending the response message to a user identification module so that the user identification module receives the response message and obtains the SUCI calculation execution main body including the terminal intention, if the SUCI calculation execution main body including the terminal intention is a terminal, changing the state of a SUCI calculation information basic file into a state available for the terminal, calculating the SUCI by the terminal and logging in a network; if the SUCI calculation execution main body of the terminal intention is the user identification module, the SUCI calculation execution main body is used as the SUCI calculation execution main body to calculate SUCI;
and if the SUCI calculation execution subject intended by the terminal is the terminal, calculating the SUCI and logging in the network.
6. The method of claim 5, further comprising:
and receiving a third command sent by the user identification module, wherein the third command is sent when the user identification module judges that the terminal supports SUCI user identification hiding according to the configuration information of the terminal about the SUCI, and the terminal does not require the terminal to be used as a calculation execution main body of the SUCI, and the third command carries the information of the calculation execution main body of the SUCI carried by the user identification module.
7. A subscriber identity module, comprising:
the terminal comprises a first receiving module, a second receiving module and a control module, wherein the first receiving module is used for receiving a first command sent by the terminal, and the first command carries configuration information of the terminal about a user hidden identifier SUCI;
the judging module is arranged for analyzing the first command, judging whether the terminal supports SUCI user identification hiding or not according to the configuration information of the terminal about the SUCI, and judging whether the terminal requires the terminal to be used as a calculation execution main body of the SUCI or not;
the first generation module is configured to generate a second command to perform a negotiation with the terminal on the calculation execution main body of the SUCI if the judgment module judges that the terminal supports SUCI user identifier hiding and requires the SUCI user identifier hiding as the calculation execution main body of the SUCI, wherein the second command carries information that the user identification module and the terminal have contradiction in the SUCI calculation execution main body setting;
a first sending module, configured to send the second command to the terminal, so that the terminal determines an intended SUCI calculation execution subject based on the second command, generates a response message including the intended SUCI calculation execution subject of the terminal, and sends the response message to the subscriber identity module;
the first receiving module is also configured to receive the response message to obtain a SUCI calculation execution main body intended by the terminal;
a change module, which is set to change the state of the SUCI calculation information basic file into the state of being available for the terminal if the SUCI calculation execution main body of the terminal will is the terminal, and the terminal calculates the SUCI and logs in the network;
and the first calculation module is set to calculate the SUCI as the SUCI calculation execution main body if the SUCI calculation execution main body intended by the terminal is the user identification module.
8. A terminal, comprising:
a second generating module, configured to generate a first command, where the first command carries configuration information of a terminal about a user hidden identifier SUCI;
the second sending module is arranged to send the first command to the user identification module so that the user identification module can analyze the first command, judge whether the terminal supports SUCI user identification hiding according to the configuration information of the terminal about SUCI, and judge whether the terminal requires the terminal to be used as a SUCI calculation execution main body;
the second receiving module is arranged to receive a second command sent by the user identification module;
a determination module configured to determine a SUCI computation execution subject of its will according to the second command;
the second generation module is also configured to generate a response message of the SUCI calculation execution subject including the terminal intention;
the second sending module is also configured to send the response message to a user identification module so that the user identification module receives the response message and obtains an intended SUCI calculation execution main body of the terminal, if the intended SUCI calculation execution main body of the terminal is the terminal, the state of an SUCI calculation information basic file is changed to be available for the terminal, and the terminal calculates SUCI and logs in a network; if the SUCI calculation execution main body of the terminal intention is the user identification module, the SUCI calculation execution main body is used as the SUCI calculation execution main body to calculate SUCI;
and the second calculation module is set to calculate the SUCI and log in the network if the SUCI calculation execution subject intended by the terminal is the terminal.
9. A user equipment, characterized in that it comprises a subscriber identity module and a terminal, the subscriber identity module comprising a subscriber identity module according to claim 7, and the terminal comprising a terminal according to claim 8.
10. An electronic device comprising a memory and a processor, the memory having a computer program stored therein, the processor performing the 5G identification hiding compatibility configuration method of any one of claims 1-4 and claims 5-6 when the processor runs the computer program stored in the memory.
11. A computer-readable storage medium, comprising: computer program which, when run on a computer, causes the computer to perform the 5G identification hiding compatible configuration method as claimed in any of claims 1-4 and claims 5-6.
CN202111111103.1A 2021-09-18 2021-09-18 5G identification hiding compatible configuration method, user identification module and terminal Active CN113840276B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111111103.1A CN113840276B (en) 2021-09-18 2021-09-18 5G identification hiding compatible configuration method, user identification module and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111111103.1A CN113840276B (en) 2021-09-18 2021-09-18 5G identification hiding compatible configuration method, user identification module and terminal

Publications (2)

Publication Number Publication Date
CN113840276A true CN113840276A (en) 2021-12-24
CN113840276B CN113840276B (en) 2023-05-02

Family

ID=78969076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111111103.1A Active CN113840276B (en) 2021-09-18 2021-09-18 5G identification hiding compatible configuration method, user identification module and terminal

Country Status (1)

Country Link
CN (1) CN113840276B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117177238A (en) * 2023-11-02 2023-12-05 中国电子科技集团公司第三十研究所 Method and system for initiating control instruction by terminal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190246267A1 (en) * 2018-01-12 2019-08-08 Telefonaktiebolaget Lm Ericsson (Publ) Managing identifier privacy
CN110493773A (en) * 2019-08-23 2019-11-22 中国联合网络通信集团有限公司 The acquisition methods and its equipment of mobile device authentication capability
WO2019224218A1 (en) * 2018-05-21 2019-11-28 Blackberry Limited Support of emergency number descriptions
CN111049831A (en) * 2019-12-13 2020-04-21 中国联合网络通信集团有限公司 Generation control method and device of user hidden identifier and terminal
CN111133728A (en) * 2017-07-25 2020-05-08 瑞典爱立信有限公司 Subscription hidden identifier
WO2020095617A1 (en) * 2018-11-08 2020-05-14 Nec Corporation Procedure to update the parameters related to unified access control
US10743176B1 (en) * 2019-04-05 2020-08-11 Verizon Patent And Licensing, Inc. Secure onboarding of a device having an embedded universal integrated circuit card without a preloaded provisioning profile
CN113242543A (en) * 2021-05-14 2021-08-10 中国联合网络通信集团有限公司 USIM-based application control method, USIM, terminal and medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111133728A (en) * 2017-07-25 2020-05-08 瑞典爱立信有限公司 Subscription hidden identifier
US20190246267A1 (en) * 2018-01-12 2019-08-08 Telefonaktiebolaget Lm Ericsson (Publ) Managing identifier privacy
WO2019224218A1 (en) * 2018-05-21 2019-11-28 Blackberry Limited Support of emergency number descriptions
WO2020095617A1 (en) * 2018-11-08 2020-05-14 Nec Corporation Procedure to update the parameters related to unified access control
US20210409934A1 (en) * 2018-11-08 2021-12-30 Nec Corporation Procedure to update the parameters related to unified access control
US10743176B1 (en) * 2019-04-05 2020-08-11 Verizon Patent And Licensing, Inc. Secure onboarding of a device having an embedded universal integrated circuit card without a preloaded provisioning profile
CN110493773A (en) * 2019-08-23 2019-11-22 中国联合网络通信集团有限公司 The acquisition methods and its equipment of mobile device authentication capability
CN111049831A (en) * 2019-12-13 2020-04-21 中国联合网络通信集团有限公司 Generation control method and device of user hidden identifier and terminal
CN113242543A (en) * 2021-05-14 2021-08-10 中国联合网络通信集团有限公司 USIM-based application control method, USIM, terminal and medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
G+D MS: "C6-180282 \"Subscription identifier privacy suppport\"", 3GPP TSG_CT\\WG6_SMARTCARD_EX-T3 *
QUALCOMM INCORPORATED: "C6-180314 \"Allow configuration of MCS Access Identity via USIM\"", 3GPP TSG_CT\\WG6_SMARTCARD_EX-T3 *
阎占林;黄健文;黄健;李俊磊;蔡秋艳;杨光;: "5G通信卡中SUCI隐私保护的研究", 无线电工程 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117177238A (en) * 2023-11-02 2023-12-05 中国电子科技集团公司第三十研究所 Method and system for initiating control instruction by terminal
CN117177238B (en) * 2023-11-02 2024-01-23 中国电子科技集团公司第三十研究所 Method and system for initiating control instruction by terminal

Also Published As

Publication number Publication date
CN113840276B (en) 2023-05-02

Similar Documents

Publication Publication Date Title
US20220278831A1 (en) Discovery Method and Apparatus Based on Service-Based Architecture
CN110214459A (en) The method and apparatus of business processing
EP3668042A1 (en) Registration method and apparatus based on service-oriented architecture
US20200213937A1 (en) Network Slice Instance Processing Method and Apparatus, and System
CN111049831B (en) Generation control method and device of user hidden identifier and terminal
CN111787521B (en) Terminal application permission obtaining method, terminal equipment and USIM
WO2021164125A1 (en) Session creation method and related device
WO2020043209A1 (en) Disconnected network state reporting method and apparatus, and storage medium
CN108462683B (en) Authentication method and device
CN113726581B (en) Method and device for restoring factory configuration of network equipment and network equipment
CN104796852A (en) Device discovery method and device for device-to-device communication and terminal
CN113840276A (en) 5G identifier hiding compatible configuration method, user identification module and terminal
CN112243224B (en) Edge computing network implementation method and device
WO2016127435A1 (en) Profile downloading and activation method, integrated circuit card and system
CN105357771A (en) Connection establishing method and user terminal
US11825336B2 (en) Connection management method, apparatus, computer device and storage medium
CN114363918B (en) Network slice signing method, user equipment, core network equipment and system
CN112367661B (en) USAT application matching implementation method, USIM, terminal, device and medium
KR20230049706A (en) Network Transition Methods, Devices and Appliances
CN115134800A (en) 5G private network access method, private network gateway, 5GC system and storage medium
CN113840273B (en) User hidden identifier generation method, terminal, USIM, equipment and medium
CN114222290A (en) Communication method, device, equipment and storage medium
CN114025349A (en) Network service method, device, system and storage medium
US11272357B2 (en) Method and device for determining SIM card information
CN107659673B (en) equipment communication method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant