WO2011032389A1 - 一种寻呼过程中用户标识的保密方法及装置 - Google Patents

一种寻呼过程中用户标识的保密方法及装置 Download PDF

Info

Publication number
WO2011032389A1
WO2011032389A1 PCT/CN2010/072577 CN2010072577W WO2011032389A1 WO 2011032389 A1 WO2011032389 A1 WO 2011032389A1 CN 2010072577 W CN2010072577 W CN 2010072577W WO 2011032389 A1 WO2011032389 A1 WO 2011032389A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
paging
user
ciphertext
user identifier
Prior art date
Application number
PCT/CN2010/072577
Other languages
English (en)
French (fr)
Inventor
白晓春
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to EP10816593.7A priority Critical patent/EP2479921A4/en
Priority to JP2012529100A priority patent/JP5613768B2/ja
Priority to US13/258,218 priority patent/US20120170745A1/en
Publication of WO2011032389A1 publication Critical patent/WO2011032389A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W68/00User notification, e.g. alerting and paging, for incoming communication, change of service or the like

Definitions

  • the present invention belongs to the field of communications technologies, and in particular, to a method and device for securing a user identity in a paging process of an LTE (Long Term Evolution) system. Background technique
  • the 3GPP Evolved Packet System consists of an Evolved UMTS Terrestrial Radio Access Network (EUTRAN) and an Evolved Packet Core (EPC).
  • EUTRAN Evolved UMTS Terrestrial Radio Access Network
  • EPC Evolved Packet Core
  • the evolved UTRAN, the base station device is an evolved Node-B (eNB), and is mainly responsible for wireless communication, wireless communication management, and mobility context management.
  • eNB evolved Node-B
  • the Mobility Management Entity needs to initiate a paging process in order to actively connect to the User Terminal (UE). Normally, the MME performs paging by using the temporary s-TMSI (temporary mobile subscriber identity), but in the case of an MME abnormality, it is required to use the Global Mobile Subscriber Identity (IMSI) for paging.
  • TMSI temporary mobile subscriber identity
  • the paging message is transmitted in clear text on the air interface.
  • the IMSI number may be leaked in the air interface, resulting in a security risk.
  • the technical problem to be solved by the present invention is to provide a method and a device for securing user identification in several paging processes, so as to realize the confidentiality of the user identity in the paging process.
  • the method for encrypting a user identifier in the first paging process includes the following steps:
  • Step A using the key generated by the user identifier of the called user terminal to identify the user After the line is encrypted, the ciphertext SI is generated, and the ciphertext S 1 is used for paging;
  • Step B After receiving the paging message, the called user terminal encrypts the user identifier by using the key generated by the user identifier to generate the ciphertext S2. If the ciphertext S1 and the ciphertext S2 are the same, the user is considered to be the ciphertext S1. That is, the called user terminal of the paging.
  • the security device for identifying the user in the first paging process includes a paging originating device and a called user terminal;
  • the paging initiating device is configured to encrypt the user identifier by using a key generated by the user identifier of the called user terminal, generate a ciphertext S1, and use the ciphertext S1 to perform paging;
  • the user terminal is configured to obtain the ciphertext S2 by using the key generated by the user ID to encrypt the ciphertext S2, and determine whether the ciphertext S1 and the ciphertext S2 in the paging message are consistent. I identify myself as the called user terminal for this page.
  • the method for encrypting a user identifier in the second paging process includes the following steps:
  • Step A Generate random data X, combine the random data X with the user identifier of the called user terminal into data Y, and encrypt the data Y by using a key generated by the user identifier of the called user terminal to generate a secret.
  • S1 and using the ciphertext S1 and the random data X for paging;
  • Step B After receiving the paging message, the called user terminal compares the random data X with the user identifier into the data Y in step A, and uses the random data X with the user. The identifiers are combined into one plaintext data, and then the plaintext data is encrypted by using the key generated by the user identifier to obtain the ciphertext S2. If the ciphertext S1 and the ciphertext S2 are consistent, the user is deemed to be the paging. Called user terminal.
  • step A the method of combining the random data X and the user identifier into the data Y may be:
  • the security device for identifying the user in the second paging process includes a paging initiating device and a called user terminal;
  • the paging initiating device is configured to generate random data X, combine the random data X with a user identifier of the called user terminal into data, and use the key pair generated by the user identifier of the called user terminal.
  • encrypting to generate ciphertext S1, and using the ciphertext S1 and the random data X to perform paging;
  • the called user terminal after receiving the paging message, according to the same method as the method of combining the random data X and the user identifier into the data , the random data X and The user ID is combined into a plaintext data, and then the plaintext data is encrypted by using the key generated by the user identifier to obtain the ciphertext S2. If the ciphertext S1 and the ciphertext S2 are identical, the user is deemed to be the ciphertext S1.
  • the called user terminal of the secondary page after receiving the paging message, according to the same method as the method of combining the random data X and the user identifier into the data , the random data X and The user ID is combined into a plaintext data, and then the plaintext data is encrypted by using the key generated by the user identifier to obtain the ciphertext S2. If the ciphertext S1 and the ciphertext S2 are identical, the user is deemed to be the ciphertext S1.
  • the called user terminal of the secondary page after receiving
  • the method for encrypting the user identity in the third paging process includes the following steps:
  • Step ⁇ randomly generating a data ⁇ , combining the random data ⁇ with a user identifier of the called user terminal into a data ⁇ , and the data ⁇ includes the user identifier at a specific location, where the specific location is Describe a location where the user identifier appears in the data frame, and is only related to the user identifier;
  • Step ⁇ encrypt the data ⁇ by using a key generated by the user identifier, and use the obtained ciphertext to perform paging;
  • Step C After receiving the ciphertext in the paging message, the called user terminal decrypts the ciphertext by using a key generated by its own user identifier to obtain plaintext data, and then view the plaintext data. Whether the location of the same location as the specific location includes its own user identifier, and if it contains its own user identifier at the same location as the specific location, it considers itself to be the called user terminal of the paging. Further, in step A, the method of combining the random data Z and the user identifier into the data Y may be:
  • the user identifier is placed in front of the random data Z to directly obtain the data Y; or, the random data Z is placed in front of the user identifier to directly obtain the data Y.
  • the security device for identifying the user in the third paging process includes a paging originating device and a called user terminal;
  • the paging initiating device is configured to randomly generate a data ⁇ , combine the random data ⁇ with a user identifier of the called user terminal into a data ⁇ , and the data ⁇ includes the user identifier at a specific location, where The specific location is a location where the user identifier appears in the data ,, and is only related to the user identifier; then the data ⁇ is encrypted using a key generated by the user identifier, and used Ciphertext for paging;
  • the called user terminal after receiving the ciphertext in the paging message, decrypts the ciphertext by using a key generated by its own user identifier, obtains plaintext data, and then views the Whether the plaintext data includes its own user identifier at the same location as the specific location, and if it contains its own user identifier at the same location as the specific location, it considers itself to be the called user terminal of the paging.
  • the paging process is initiated by the mobility management entity to the called user terminal, and the user identity is the Global Mobile Subscriber Identity IMSI.
  • the method and device for securing a user identifier in a paging process encrypts a user identifier when a page is initiated to a user terminal, thereby overcoming the security risk caused by directly using plaintext paging in the prior art. Provides the security of the communication system.
  • FIG. 1 is a schematic diagram of a process of confidentiality of a user identity in a paging process according to a first embodiment
  • FIG. 2 is a schematic diagram of the process of securing the user identity in the paging process of the second embodiment
  • FIG. 3 is a schematic diagram of the process of securing the user identity in the paging process of the third embodiment.
  • the present invention provides three methods and apparatus for secrecy of user identification in a paging process, and three embodiments are respectively given below.
  • FIG. 1 is a schematic diagram of the user identity security process in the paging process of the first embodiment.
  • the IMSI is used as the user identifier.
  • the user identity privacy method in the paging process of the present invention specifically includes the following steps:
  • S110 The MME determines that paging by using IMSI is required
  • S120 The MME encrypts the IMSI by using the IMSI as a key to obtain the ciphertext S1;
  • S130 The MME sends the ciphertext S1 to the eNB;
  • S140 The eNB performs paging by using the ciphertext S I;
  • the UE receives the paging message, encrypts the IMSI number of the UE by using the IMSI of the UE as a key, and obtains the ciphertext S2, and compares whether the ciphertext S1 and the ciphertext S2 are consistent. Calling yourself.
  • the user identifier may be deformed, and the modified data is used as a key to generate the S 1 and S 2 . It should be noted that the deformation algorithm used by the MME and the UE should be consistent.
  • the ciphertext is always the same. To avoid this, the following processing can be performed:
  • a data X is randomly generated, and the random data X and the IMSI are combined into plaintext data Y. Then, the data Y is encrypted by using the IMSI as a key to obtain a ciphertext.
  • Random data X The method of combining the IMSI into the plaintext data Y may be to place the user identifier in front of the random data X, thereby directly obtaining the data Y, or to place the random data X in front of the user identifier, thereby directly obtaining the data Y. Of course, other combinations can be used here.
  • the UE After receiving the ciphertext and the random data X, the UE generates a ciphertext according to the random data X and the IMSI of the UE according to the same method as generating the ciphertext, that is, first combining the random data X and the IMSI into the plaintext.
  • the random data X is combined with the IMSI of the UE into a plaintext data, and then the plaintext data is encrypted by using the IMSI of the UE as a key to obtain a ciphertext. Then compare the two ciphertexts, if they are consistent, then think that they are calling themselves.
  • FIG. 2 is a schematic diagram of the user identity security process in the paging process of the second embodiment.
  • the user identity security method in the paging process of the present invention specifically includes the following steps: S210: The MME determines that the IMSI needs to be used. Paging;
  • the MME uses the IMSI as a key to encrypt the plaintext data Y combined with the IMSI and the random data X to obtain the ciphertext S1.
  • the MME sends the ciphertext S1 to the eNB for paging.
  • S240 The eNB performs paging by using the ciphertext SI
  • the UE receives the paging message, and according to the received random data X and its own IMSI, obtains the ciphertext S2 according to the same method as the MME generates the ciphertext, that is, first combines the random data X and the IMSI into the plaintext data Y. In the same manner, the random data X is combined with the IMSI of the UE into a plaintext data, and then the plaintext data is encrypted by using the IMSI of the UE as a key to obtain a ciphertext S2, and then the ciphertext S1 and S2 are compared. If the two ciphertexts are the same, the page is considered to be itself.
  • the user identifier may be deformed, and the modified data is used as a key to generate the S 1 and S2, which should be described by the MME and the UE.
  • the shape algorithm should be consistent.
  • a data Z is randomly generated, and the IMSI and the random data Z are combined into a plaintext data.
  • the data Y must contain the complete IMSI number at a specific location, which refers to the location where the subscriber identity appears in the data Y.
  • the location of the subscriber identity appearing in the data Y should only be associated with the IMSI number.
  • the method of combining the random data Z and the IMSI into the plaintext data Y may be to place the user identifier in front of the random data Z, thereby directly obtaining the data Y, or placing the random data Z in front of the user identifier, thereby directly obtaining Data Y.
  • other combinations can be used here.
  • the plaintext data is then encrypted with the IMSI number to obtain the ciphertext.
  • the ciphertext is sent out.
  • the called UE After receiving the ciphertext, the called UE decrypts with its own IMSI number to obtain plaintext data, and determines whether the plaintext data includes its own user identifier at the same location as the specific location, if it meets the same location as the specific location. Include your own user ID and think that you are paging yourself.
  • FIG. 3 is a schematic diagram of the user identity security process in the paging process of the third embodiment.
  • the user identity security method in the paging process of the present invention specifically includes the following steps: S310: The MME determines that the IMSI needs to be used. Paging;
  • S320 The MME uses the IMSI as a key to encrypt the plaintext data Y combined with the IMSI and the random data Z to obtain a ciphertext S1, where the plaintext data Y includes a complete IMSI number at a specific location;
  • S330 The MME sends the ciphertext S1 to The eNB performs paging;
  • S340 The eNB performs paging by using the ciphertext SI.
  • S350 The UE receives the paging message, uses its own IMSI as a key, and decrypts S1, and determines whether the obtained plaintext includes the IMSI number at the same location as the specific location, if it is in the same location as the specific location. If the IMSI number is included, the page is considered to be itself.
  • the user identifier may be modified, and the modified data is used as a key to generate the SI, and the UE also deforms its own user identifier by using the same deformation algorithm as the MME, and The deformed data is decrypted as a key pair S1 to obtain plaintext.
  • the security device for identifying a user in the first paging process includes a paging originating device and a called user terminal.
  • the paging initiating device is configured to encrypt the user identifier by using the user identifier of the called user terminal as a key, and use the obtained ciphertext to perform paging;
  • the called user terminal is configured to use the user identifier as a key. Encrypting the user identifier to obtain a ciphertext, determining whether the ciphertext is the same as the ciphertext in the paging message received by the ciphertext, and if the same, determining that the ciphertext is the called user terminal of the paging.
  • the security device for the user identification in the second paging process includes a paging initiating device and a called user terminal; wherein the paging initiating device is configured to randomly generate a data X, and the random data X and the called user terminal The user ID is combined into data Y, the user ID is used as a key, the data Y is encrypted, and the obtained ciphertext and random data X are used for paging; after the called user terminal receives the paging message, according to Combining the random data X with the user identifier into the same method as the data Y, combining the random data X with its own user identifier into a plaintext data, and then encrypting the plaintext data with the user identifier as a key, if the obtained ciphertext The same as the ciphertext in the received paging message, it is determined that it is the called user terminal of the paging.
  • the security device for identifying the user in the third paging process of the present invention includes a paging initiating device and a called user terminal; wherein the paging initiating device is configured to randomly generate a data Z, and the random data Z and the called user terminal
  • the user identifier is combined into data Y, and the data Y includes the user identifier at a specific location, wherein the specific location is the user identifier in the data Y
  • the location of the occurrence, and only related to the user identifier then encrypting the data Y with the user identifier as a key, and using the obtained ciphertext for paging
  • the called user terminal is used to: receive After paging the ciphertext in the message, decrypt it with its own user ID to obtain the plaintext data, and then check whether the plaintext data contains its own user identifier at the same location as the specific location, if it is included in the same location as the specific location.
  • the user ID of the user considers himself to be the called user

Description

一种寻呼过程中用户标识的保密方法及装置 技术领域
本发明属于通讯技术领域, 尤其涉及一种 LTE ( Long Term Evolution, 长期演进) 系统寻呼过程中用户标识的保密方法及装置。 背景技术
3GPP演进的分组系统( Evolved Packet System , EPS ) 由演进的陆地 无线接入网 ( Evolved UMTS Terrestrial Radio Access Network, EUTRAN ) 和 EPS核心网 (Evolved Packet Core, EPC )组成。
其中,在演进的 UTRAN中,基站设备为演进的基站( evolved Node-B, eNB ), 主要负责无线通信、 无线通信管理和移动性上下文的管理。
移动性管理实体 (Mobility Management Entity,MME)要主动连接用户终 端(UE ), 需要发起寻呼流程。 正常情况下, MME通过临时的 s-TMSI (临 时移动用户标识)进行寻呼,但是在 MME异常的情况下, 需要使用全球移 动用户标识 (International Mobile Subscriber Identity , IMSI)进行寻呼。
寻呼消息在空口是以明文形式传输的,当 MME使用 IMSI进行寻呼时, 会导致 IMSI号码在空口泄露, 从而导致安全隐患。 发明内容
本发明要解决的技术问题是提供几种寻呼过程中用户标识的保密方法 及装置, 以实现寻呼过程中用户标识的保密。
为解决上述技术问题, 本发明提供的第一种寻呼过程中用户标识的保 密方法包括如下步骤:
步骤 A、 使用以被叫用户终端的用户标识生成的密钥对该用户标识进 行加密后生成密文 SI , 并使用所述密文 S 1进行寻呼;
步骤 B、 被叫用户终端收到寻呼消息后, 使用以自身用户标识生成的 密钥对自身用户标识加密后生成密文 S2, 如所述密文 S1与密文 S2—致, 则认为自己即为该次寻呼的被呼叫用户终端。
相应地, 本发明提供的第一种寻呼过程中用户标识的保密装置包括寻 呼发起设备和被叫用户终端;
所述寻呼发起设备, 用于使用以被叫用户终端的用户标识生成的密钥 对该用户标识进行加密后生成密文 S1 , 并使用所述密文 S 1进行寻呼; 所述被叫用户终端, 用于使用以自身用户标识生成的密钥对自身用户 标识加密后获得密文 S2, 并判断寻呼消息中的所述密文 S1与所述密文 S2 是否一致, 若一致, 则认定自己即为该次寻呼的被叫用户终端。
为解决上述技术问题, 本发明提供的第二种寻呼过程中用户标识的保 密方法包括如下步骤:
步骤 A、 生成随机数据 X, 将所述随机数据 X与被叫用户终端的用户 标识组合成数据 Y, 使用以被叫用户终端的用户标识生成的密钥对所述数 据 Y进行加密后生成密文 S 1 , 并使用所述密文 S 1和所述随机数据 X进行 寻呼;
步骤 B、 被叫用户终端收到寻呼消息后, 按照与步骤 A中将所述随机 数据 X与所述用户标识组合成所述数据 Y相同的方法, 将所述随机数据 X 与自己的用户标识组合成一个明文数据, 然后使用以自身用户标识生成的 密钥对该明文数据加密后获得密文 S2, 如所述密文 S1与密文 S2—致, 则 认定自己即为该次寻呼的被呼叫用户终端。
进一步地, 步骤 A中, 将所述随机数据 X与所述用户标识组合成所述 数据 Y的方法可以为:
将所述用户标识放在所述随机数据 X的前面, 直接得到所述数据 Y; 或, 将所述随机数据 X放在所述用户标识的前面, 直接得到所述数据 Y。 相应地, 本发明提供的第二种寻呼过程中用户标识的保密装置包括寻 呼发起设备和被叫用户终端;
所述寻呼发起设备, 用于生成随机数据 X, 将所述随机数据 X与被叫 用户终端的用户标识组合成数据 Υ, 使用以被叫用户终端的用户标识生成 的密钥对所述数据 Υ进行加密后生成密文 S1 , 并使用所述密文 S1和所述 随机数据 X进行寻呼;
所述被叫用户终端, 用于收到寻呼消息后, 按照与所述将所述随机数 据 X与所述用户标识组合成所述数据 Υ的方法相同的方法, 将所述随机数 据 X与自己的用户标识组合成一个明文数据, 然后使用以自身用户标识生 成的密钥对该明文数据加密后获得密文 S2,如所述密文 S1与密文 S2—致, 则认定自己即为该次寻呼的被呼叫用户终端。
为解决上述技术问题, 本发明提供的第三种寻呼过程中用户标识的保 密方法包括如下步骤:
步骤 Α、 随机生成一个数据 Ζ, 将所述随机数据 Ζ与被叫用户终端的 用户标识组合成数据 Υ, 且所述数据 Υ在特定位置包含所述用户标识, 其 中, 所述特定位置为所述用户标识在所述数据 Υ中出现的位置, 且只与所 述用户标识相关;
步骤 Β、 使用以所述用户标识生成的密钥对所述数据 Υ进行加密, 并 使用得到的密文进行寻呼;
步骤 C、 被叫用户终端收到所述寻呼消息中的所述密文后, 使用以自 身的用户标识生成的密钥对所述密文进行解密, 得到明文数据, 然后查看 所述明文数据中在与所述特定位置相同的位置是否包含自身的用户标识, 如果在与所述特定位置相同的位置包含自身的用户标识, 则认为自己即为 该次寻呼的被呼叫用户终端。 进一步地, 步骤 A中, 将所述随机数据 Z与所述用户标识组合成所述 数据 Y的方法可以为:
将所述用户标识放在所述随机数据 Z的前面, 直接得到所述数据 Y; 或, 将所述随机数据 Z放在所述用户标识的前面, 直接得到所述数据 Y。
相应地, 本发明提供的第三种寻呼过程中用户标识的保密装置包括寻 呼发起设备和被叫用户终端;
所述寻呼发起设备, 用于随机生成一个数据 Ζ, 将所述随机数据 Ζ与 被叫用户终端的用户标识组合成数据 Υ, 且所述数据 Υ在特定位置包含所 述用户标识, 其中, 所述特定位置为所述用户标识在所述数据 Υ中出现的 位置, 且只与所述用户标识相关; 然后使用以所述用户标识生成的密钥对 所述数据 Υ进行加密, 并使用得到的密文进行寻呼;
所述被叫用户终端, 用于收到所述寻呼消息中的所述密文后, 使用以 自身的用户标识生成的密钥对所述密文进行解密, 得到明文数据, 然后查 看所述明文数据中在与所述特定位置相同的位置是否包含自身的用户标 识, 如果在与所述特定位置相同的位置包含自身的用户标识, 则认为自己 即为该次寻呼的被呼叫用户终端。
进一步地, 对于本发明提供的三种寻呼过程中用户标识的保密方法及 装置, 均存在如下的优化方案:
所述寻呼过程由移动性管理实体 ΜΜΕ向被叫用户终端发起,所述用户 标识为全球移动用户标识 IMSI。
本发明提供的一种寻呼过程中用户标识的保密方法及装置, 在向用户 终端发起寻呼时, 对用户标识进行加密, 从而克服了现有技术中直接使用 明文寻呼造成的安全隐患, 提供了通讯系统的安全性。 附图说明
图 1为第一实施例的寻呼过程中用户标识保密处理示意图; 图 2为第二实施例的寻呼过程中用户标识保密处理示意图; 图 3为第三实施例的寻呼过程中用户标识保密处理示意图。 具体实施方式 以下结合附图对本发明作进一步详细说明。
本发明提供了三种寻呼过程中用户标识保密方法及装置, 以下分别给 出了三个实施例。
第一实施例:
图 1 为第一实施例的寻呼过程中用户标识保密处理示意图, 该实施例 中, 以 IMSI作为用户标识, 本实施例中, 本发明寻呼过程中用户标识保密 方法具体包括如下步骤:
S 110: MME判断需要使用 IMSI进行寻呼;
S 120: MME用 IMSI作为密钥, 对 IMSI进行加密, 得到密文 S 1; S 130: MME将密文 S 1发送给 eNB;
S 140: eNB用密文 S I进行寻呼;
S 150: UE收到寻呼消息,以该 UE的 IMSI为密钥,加密该 UE的 IMSI 号码, 得到密文 S2 , 并对比密文 S 1和密文 S2是否一致, 如果一致, 则认 为寻呼的是自己。
优选地, 该实施例中, 可将用户标识进行一定变形, 将变形后的数据 作为密钥, 用于生成所述 S 1和 S2 , 应当说明的是 MME和 UE所使用的变 形算法应当一致。
第二实施例:
由于同一 IMSI按照第一实施例的方法进行加密后, 密文总是一样, 为 了避免这种情况, 可以进行如下处理:
在加密前, 随机生成一个数据 X,将随机数据 X与 IMSI组合成明文数 据 Y。 然后以 IMSI为密钥对数据 Y进行加密, 得到密文。 将随机数据 X 与 IMSI组合成明文数据 Y的方法可以为将用户标识放在随机数据 X的前 面, 从而直接得到数据 Y, 也可以为将随机数据 X放在用户标识的前面, 从而直接得到数据 Y。 当然, 这里也可以釆用其它组合方式。
寻呼时, 除了携带密文外, 还需要挟带随机数据 X。
UE收到密文和随机数据 X后, 按照与 ΜΜΕ生成密文相同的方法, 根 据该随机数据 X以及该 UE的 IMSI, 生成一个密文, 即首先按照与将随机 数据 X与 IMSI组合成明文数据 Y的方式相同的方式, 将随机数据 X与该 UE的 IMSI组合成一明文数据,然后以该 UE的 IMSI为密钥对该明文数据 进行加密, 而得到一个密文。 然后对比该两个密文, 如果一致, 则认为寻 呼的是自己。
图 2为第二实施例的寻呼过程中用户标识保密处理示意图, 如图所示, 本实施例中, 本发明寻呼过程中用户标识保密方法具体包括如下步骤: S210: MME判断需要使用 IMSI进行寻呼;
S220: MME用 IMSI作为密钥 , 加密该 IMSI与随机数据 X组合成的 明文数据 Y, 得到密文 S1 ;
S230: MME将密文 S 1发送给 eNB进行寻呼;
S240: eNB用密文 SI进行寻呼;
S250: UE收到寻呼消息, 根据收到的随机数据 X和自己的 IMSI, 按 照与 MME生成密文相同的方法获得密文 S2, 即首先按照与将随机数据 X 与 IMSI组合成明文数据 Y的方式相同的方式, 将随机数据 X与该 UE的 IMSI组合成一明文数据,然后以该 UE的 IMSI为密钥对该明文数据进行加 密, 而得到一个密文 S2, 然后对比密文 S1和 S2, 如果两个密文一致, 则 认为寻呼的是自己。
优选地, 该实施例中, 可将用户标识进行一定变形, 将变形后的数据 作为密钥, 用于生成所述 S 1和 S2, 应当说明的是 MME和 UE所使用的变 形算法应当一致。
第三实施例:
用第二实施例的方法, 能够避免使用同一 IMSI号码每次得到的密文均 相同的情况, 但是需要多携带一个参数, 本实施例提供一种不需要携带参 数的方法。
MME在加密前, 随机生成一个数据 Z, 用 IMSI与随机数据 Z组合成 明文数据丫。数据 Y必须在特定位置包含完整的 IMSI号码,该特定位置指 用户标识在数据 Y中出现的位置, 为了接收端易于识别, 用户标识在数据 Y中出现的位置应该只与 IMSI号码相关。 这里将随机数据 Z与 IMSI组合 成明文数据 Y的方法可以为将用户标识放在随机数据 Z的前面, 从而直接 得到数据 Y, 也可以为将随机数据 Z放在用户标识的前面, 从而直接得到 数据 Y。 当然, 这里也可以釆用其它组合方式。
然后用 IMSI号码对明文数据 Υ进行加密, 得到密文。 寻呼时, 将密文 发送出去。
被叫 UE收到该密文后, 用自己的 IMSI号码进行解密得到明文数据, 判断该明文数据在与上述特定位置相同的位置是否包含自己的用户标识, 如果满足在与该特定位置相同的位置包含自己的用户标识则认为寻呼的是 自己。
图 3为第三实施例的寻呼过程中用户标识保密处理示意图, 如图所示, 本实施例中, 本发明寻呼过程中用户标识保密方法具体包括如下步骤: S310: MME判断需要使用 IMSI进行寻呼;
S320: MME用 IMSI作为密钥, 加密该 IMSI与随机数据 Z组合的明 文数据 Y, 得到密文 S1 , 该明文数据 Y在特定位置包含完整的 IMSI号码; S330: MME将密文 S 1发送给 eNB进行寻呼;
S340: eNB用密文 SI进行寻呼; S350: UE收到寻呼消息, 用自己的 IMSI作为密钥, 对 S 1进行解密, 判断获得的明文在与上述特定位置相同的位置是否包含该 IMSI号码,如果 在与该特定位置相同的位置包含该 IMSI号码, 则认为寻呼的是自己。
优选地, 该实施例中, 可将用户标识进行一定变形, 将变形后的数据 作为密钥, 用于生成所述 SI , UE也使用与 MME相同的变形算法对自己的 用户标识进行变形, 并将变形后的数据作为密钥对 S1进行解密, 从而获得 明文。
本发明提供的第一种寻呼过程中用户标识的保密装置, 包括寻呼发起 设备和被叫用户终端。 其中寻呼发起设备用于以被叫用户终端的用户标识 为密钥, 对该用户标识进行加密, 并使用得到的密文进行寻呼; 被叫用户 终端用于以自己的用户标识为密钥, 加密该用户标识得到一个密文, 判断 该密文与其收到的寻呼消息中的密文是否相同, 若相同则认定自己即为该 次寻呼的被叫用户终端。
本发明提供的第二种寻呼过程中用户标识的保密装置, 包括寻呼发起 设备和被叫用户终端; 其中寻呼发起设备用于随机生成一个数据 X, 将随 机数据 X与被叫用户终端的用户标识组合成数据 Y, 以用户标识为密钥, 对数据 Y进行加密, 并使用得到的密文和随机数据 X进行寻呼; 被叫用户 终端用于收到寻呼消息后, 按照与将随机数据 X与用户标识组合成数据 Y 的方法相同的方法,将随机数据 X与自己的用户标识组合成一个明文数据, 然后以用户标识为密钥对该明文数据加密, 若得到的密文与收到的寻呼消 息中的密文相同, 则认定自己即为该次寻呼的被呼叫用户终端。
本发明第三种寻呼过程中用户标识的保密装置, 包括寻呼发起设备和 被叫用户终端;其中寻呼发起设备用于随机生成一个数据 Z,将所述随机数 据 Z与被叫用户终端的用户标识组合成数据 Y, 且所述数据 Y在特定位置 包含所述用户标识, 其中, 所述特定位置为所述用户标识在所述数据 Y中 出现的位置, 且只与所述用户标识相关; 然后以所述用户标识为密钥, 对 所述数据 Y进行加密, 并使用得到的密文进行寻呼; 被叫用户终端用于: 收到寻呼消息中的密文后, 用自己的用户标识进行解密得到明文数据, 然 后查看明文数据在与上述特定位置相同的位置是否包含自己的用户标识, 如果满足在与该特定位置相同的位置包含自己的用户标识则认为自己即为 该次寻呼的被呼叫用户终端。
以上所述的具体实施例, 对本发明的目的、 技术方案和有益效果进行 了进一步详细说明, 所应注意的是, 以上所述仅为本发明的具体实施例而 的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权利要求 记载的技术方案及其等同技术的范围之内, 则本发明也意图包含这些改动 和变型在内。

Claims

权利要求书
1、 一种寻呼过程中用户标识的保密方法, 其特征在于, 该方法包括: 步骤 A、 使用以被叫用户终端的用户标识生成的密钥对该用户标识进 行加密后生成密文 S1 , 并使用所述密文 S 1进行寻呼;
步骤 B、 被叫用户终端收到寻呼消息后, 使用以自身用户标识生成的 密钥对自身用户标识加密后生成密文 S2, 如所述密文 S1与密文 S2—致, 则认为自己即为该次寻呼的被呼叫用户终端。
2、 根据权利要求 1所述的寻呼过程中用户标识的保密方法, 其特征在 于, 所述用户标识为全球移动用户标识(IMSI )。
3、 一种寻呼过程中用户标识的保密方法, 其特征在于, 该方法包括: 步骤 A、 生成随机数据 X, 将所述随机数据 X与被叫用户终端的用户 标识组合成数据 Y, 使用以被叫用户终端的用户标识生成的密钥对所述数 据 Y进行加密后生成密文 S 1 , 并使用所述密文 S 1和所述随机数据 X进行 寻呼;
步骤 B、 被叫用户终端收到寻呼消息后, 按照与步骤 A中将所述随机 数据 X与所述用户标识组合成所述数据 Y相同的方法, 将所述随机数据 X 与自己的用户标识组合成一个明文数据, 然后使用以自身用户标识生成的 密钥对该明文数据加密后获得密文 S2, 如所述密文 S1与密文 S2—致, 则 认定自己即为该次寻呼的被呼叫用户终端。
4、 根据权利要求 3所述的寻呼过程中用户标识的保密方法, 其特征在 于, 步骤 A中, 将所述随机数据 X与所述用户标识组合成所述数据 Y的方 法为:
将所述用户标识放在所述随机数据 X的前面, 直接得到所述数据 Y。
5、 一种寻呼过程中用户标识的保密方法, 其特征在于, 该方法包括: 步骤 Α、 随机生成一个数据 Ζ, 将所述随机数据 Ζ与被叫用户终端的 用户标识组合成数据 Y, 且所述数据 Υ在特定位置包含所述用户标识, 其 中, 所述特定位置为所述用户标识在所述数据 Υ中出现的位置, 且只与所 述用户标识相关;
步骤 Β、 使用以所述用户标识生成的密钥对所述数据 Υ进行加密, 并 使用得到的密文进行寻呼;
步骤 C、 被叫用户终端收到所述寻呼消息中的所述密文后, 使用以自 身的用户标识生成的密钥对所述密文进行解密, 得到明文数据, 然后查看 所述明文数据中在与所述特定位置相同的位置是否包含自身的用户标识, 如果在与所述特定位置相同的位置包含自身的用户标识, 则认为自己即为 该次寻呼的被呼叫用户终端。
6、 根据权利要求 5所述的寻呼过程中用户标识的保密方法, 其特征在 于, 步骤 A中, 将所述随机数据 Z与所述用户标识组合成所述数据 Y的方 法为:
将所述用户标识放在所述随机数据 Z的前面, 直接得到所述数据 Y。
7、 一种寻呼过程中用户标识的保密装置, 其特征在于:
该装置包括寻呼发起设备和被叫用户终端;
所述寻呼发起设备, 用于使用以被叫用户终端的用户标识生成的密钥 对该用户标识进行加密后生成密文 S1 , 并使用所述密文 S1进行寻呼; 所述被叫用户终端, 用于使用以自身用户标识生成的密钥对自身用户 标识加密后获得密文 S2, 并判断寻呼消息中的所述密文 S1与所述密文 S2 是否一致, 若一致, 则认定自己即为该次寻呼的被叫用户终端。
8、 根据权利要求 7所述的寻呼过程中用户标识的保密装置, 其特征在 于:
所述寻呼发起设备为移动性管理实体 ΜΜΕ,所述用户标识为全球移动 用户标识 IMSI。
9、 一种寻呼过程中用户标识的保密装置, 其特征在于:
该装置包括寻呼发起设备和被叫用户终端;
所述寻呼发起设备, 用于生成随机数据 X, 将所述随机数据 X与被叫 用户终端的用户标识组合成数据 Y, 使用以被叫用户终端的用户标识生成 的密钥对所述数据 Y进行加密后生成密文 S1 , 并使用所述密文 S1和所述 随机数据 X进行寻呼;
所述被叫用户终端, 用于收到寻呼消息后, 按照与所述将所述随机数 据 X与所述用户标识组合成所述数据 Y的方法相同的方法, 将所述随机数 据 X与自己的用户标识组合成一个明文数据, 然后使用以自身用户标识生 成的密钥对该明文数据加密后获得密文 S2,如所述密文 S1与密文 S2—致, 则认定自己即为该次寻呼的被呼叫用户终端。
10、 根据权利要求 9所述的寻呼过程中用户标识的保密装置, 其特征 在于:
所述寻呼发起设备为移动性管理实体 MME,所述用户标识为全球移动 用户标识 IMSI。
11、 一种寻呼过程中用户标识的保密装置, 其特征在于:
该装置包括寻呼发起设备和被叫用户终端;
所述寻呼发起设备, 用于随机生成一个数据 Z, 将所述随机数据 Z与 被叫用户终端的用户标识组合成数据 Y, 且所述数据 Y在特定位置包含所 述用户标识, 其中, 所述特定位置为所述用户标识在所述数据 Y中出现的 位置, 且只与所述用户标识相关; 然后使用以所述用户标识生成的密钥对 所述数据 Y进行加密, 并使用得到的密文进行寻呼;
所述被叫用户终端, 用于收到所述寻呼消息中的所述密文后, 使用以 自身的用户标识生成的密钥对所述密文进行解密, 得到明文数据, 然后查 看所述明文数据中在与所述特定位置相同的位置是否包含自身的用户标 识, 如果在与所述特定位置相同的位置包含自身的用户标识, 则认为自己 即为该次寻呼的被呼叫用户终端。
12、 根据权利要求 11所述的寻呼过程中用户标识的保密装置, 其特征 在于:
所述寻呼发起设备为移动性管理实体 MME,所述用户标识为全球移动 用户标识 IMSI。
PCT/CN2010/072577 2009-09-17 2010-05-10 一种寻呼过程中用户标识的保密方法及装置 WO2011032389A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP10816593.7A EP2479921A4 (en) 2009-09-17 2010-05-10 Method and device for encrypting user identity during paging procedure
JP2012529100A JP5613768B2 (ja) 2009-09-17 2010-05-10 呼び出しプロセスのユーザ識別子の暗号化方法及び暗号化装置
US13/258,218 US20120170745A1 (en) 2009-09-17 2010-05-10 Method and device for encrypting user identity during paging procedure

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910177021.XA CN102026174B (zh) 2009-09-17 2009-09-17 一种寻呼过程中用户标识的保密方法及装置
CN200910177021.X 2009-09-17

Publications (1)

Publication Number Publication Date
WO2011032389A1 true WO2011032389A1 (zh) 2011-03-24

Family

ID=43758056

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/072577 WO2011032389A1 (zh) 2009-09-17 2010-05-10 一种寻呼过程中用户标识的保密方法及装置

Country Status (5)

Country Link
US (1) US20120170745A1 (zh)
EP (1) EP2479921A4 (zh)
JP (1) JP5613768B2 (zh)
CN (1) CN102026174B (zh)
WO (1) WO2011032389A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144411A (zh) * 2013-05-08 2014-11-12 中兴通讯股份有限公司 加密、解密终端及应用于终端的加密和解密方法

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102740297B (zh) * 2012-07-03 2015-04-22 大唐移动通信设备有限公司 一种寻呼方法及寻呼装置、寻呼系统
EP3143797B1 (en) * 2014-05-13 2020-07-29 Telefonaktiebolaget LM Ericsson (publ) Methods and network nodes for managing wireless device associated information in a wireless communication network
CN105142136B (zh) * 2014-06-03 2018-11-16 展讯通信(上海)有限公司 一种防伪基站攻击的方法
US10149168B2 (en) * 2015-12-16 2018-12-04 Qualcomm Incorporated Secured paging
US10873464B2 (en) * 2016-03-10 2020-12-22 Futurewei Technologies, Inc. Authentication mechanism for 5G technologies
KR102425368B1 (ko) * 2016-05-02 2022-07-27 삼성전자주식회사 가상 sim 운용 방법 및 그 장치
US20200322794A1 (en) 2016-05-30 2020-10-08 Telecom Italia S.P.A. Protection of privacy in wireless telecommunication networks
EP3738270B1 (en) * 2018-01-12 2024-03-06 Telefonaktiebolaget LM Ericsson (publ) Managing identifier privacy
CN112134831B (zh) * 2019-06-25 2023-02-21 中兴通讯股份有限公司 接入请求的发送、处理方法及装置
CN113395697B (zh) * 2020-03-12 2023-09-22 华为技术有限公司 传输寻呼信息的方法和通信装置
WO2023039871A1 (zh) * 2021-09-18 2023-03-23 海能达通信股份有限公司 一种数据监听方法、装置、设备以及系统
CN117675214A (zh) * 2022-08-26 2024-03-08 维沃移动通信有限公司 寻呼消息处理方法、装置、通信设备及可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030070067A1 (en) * 2001-09-21 2003-04-10 Shin Saito Communication processing system, communication processing method, server and computer program
CN1705261A (zh) * 2004-05-28 2005-12-07 华为技术有限公司 一种端对端加密通讯系统及方法
CN1708172A (zh) * 2004-06-10 2005-12-14 华为技术有限公司 一种私密呼叫的建立方法
CN101080036A (zh) * 2006-05-25 2007-11-28 华为技术有限公司 无线通信网络中实现寻呼处理的方法

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3271460B2 (ja) * 1995-01-12 2002-04-02 ケイディーディーアイ株式会社 無線通信における識別子秘匿方法
FI107367B (fi) * 1996-12-10 2001-07-13 Nokia Networks Oy Tiedonsiirron osapuolien oikeellisuuden tarkistaminen tietoliikenneverkossa
CN1553610B (zh) * 2003-05-30 2010-04-28 华为技术有限公司 码分多址系统用户漫游到全球移动通信系统的鉴权方法
WO2005120113A1 (en) * 2004-06-04 2005-12-15 Telefonaktiebolaget L.M. Ericsson (Publ) Authentication of mobile comunication networks
JP4622334B2 (ja) * 2004-06-23 2011-02-02 日本電気株式会社 コンテンツデータ利用システム及びその方法並びに移動通信端末及びプログラム
EP1631000A1 (en) * 2004-08-31 2006-03-01 Matsushita Electric Industrial Co., Ltd. Deterministic feedback control for multicast or broadcast services
JP4199779B2 (ja) * 2006-04-06 2008-12-17 株式会社エヌ・ティ・ティ・ドコモ 秘密鍵生成装置および秘密鍵生成方法
US8682357B2 (en) * 2006-05-02 2014-03-25 Intellectual Ventures Holding 81 Llc Paging in a wireless network
TWI425801B (zh) * 2006-06-19 2014-02-01 Interdigital Tech Corp 初始傳信訊息中原始用戶識別碼安全保護的方法及裝置
JP2007181224A (ja) * 2007-01-29 2007-07-12 Kyocera Corp デジタル放送受信方法
KR101442169B1 (ko) * 2007-11-27 2014-11-03 삼성전자주식회사 공개키 기반의 블루투스 스마트 키 시스템 및 동작 방법

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030070067A1 (en) * 2001-09-21 2003-04-10 Shin Saito Communication processing system, communication processing method, server and computer program
CN1705261A (zh) * 2004-05-28 2005-12-07 华为技术有限公司 一种端对端加密通讯系统及方法
CN1708172A (zh) * 2004-06-10 2005-12-14 华为技术有限公司 一种私密呼叫的建立方法
CN101080036A (zh) * 2006-05-25 2007-11-28 华为技术有限公司 无线通信网络中实现寻呼处理的方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104144411A (zh) * 2013-05-08 2014-11-12 中兴通讯股份有限公司 加密、解密终端及应用于终端的加密和解密方法
CN104144411B (zh) * 2013-05-08 2019-09-24 南京中兴新软件有限责任公司 加密、解密终端及应用于终端的加密和解密方法

Also Published As

Publication number Publication date
EP2479921A1 (en) 2012-07-25
EP2479921A4 (en) 2017-07-12
US20120170745A1 (en) 2012-07-05
CN102026174B (zh) 2014-03-12
CN102026174A (zh) 2011-04-20
JP5613768B2 (ja) 2014-10-29
JP2013504955A (ja) 2013-02-07

Similar Documents

Publication Publication Date Title
WO2011032389A1 (zh) 一种寻呼过程中用户标识的保密方法及装置
US11122428B2 (en) Transmission data protection system, method, and apparatus
US10356670B2 (en) Deriving a WLAN security context from a WWAN security context
EP2033479B1 (en) Method and apparatus for security protection of an original user identity in an initial signaling message
US11799650B2 (en) Operator-assisted key establishment
JP5175980B2 (ja) 位置プライバシー支援方法
ES2554671T3 (es) Autenticación eficaz de terminal en redes de telecomunicaciones
US11700245B2 (en) Key distribution method, key receiving method, first key management system, and first network element
WO2014112262A1 (en) Secure communications in a cellular system with split user and control planes
EP2854329B1 (en) Method, system, and device for securely establishing wireless local area network
EP3255914A1 (en) Key generation method, device and system
EP3143785B1 (en) Securing device-to-device communication in a wireless network
JP2006211687A (ja) 移動通信加入者認証の安全な伝送方法
WO2015131379A1 (zh) 一种信息保护方法、基站、用户设备和移动管理实体
JP2010028747A (ja) 秘匿処理を行う送信装置及び受信装置
JP6471039B2 (ja) 無線通信システムおよび無線端末
JP2005341348A (ja) 無線通信システム及び秘匿制御方法
WO2008152611A1 (en) Apparatus, method and computer program product providing transparent container
WO2015064475A1 (ja) 通信制御方法、認証サーバ及びユーザ端末
WO2018072152A1 (zh) 一种安全通信的方法、装置和系统
CHEN et al. Authentication and Privacy in Wireless Systems
Chen et al. Authentication and Privacy.

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10816593

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2012529100

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: 13258218

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2010816593

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2693/CHENP/2012

Country of ref document: IN