WO2019205895A1 - Procédé de radiomessagerie, dispositif de réseau et terminal - Google Patents
Procédé de radiomessagerie, dispositif de réseau et terminal Download PDFInfo
- Publication number
- WO2019205895A1 WO2019205895A1 PCT/CN2019/080775 CN2019080775W WO2019205895A1 WO 2019205895 A1 WO2019205895 A1 WO 2019205895A1 CN 2019080775 W CN2019080775 W CN 2019080775W WO 2019205895 A1 WO2019205895 A1 WO 2019205895A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- identifier
- terminal
- information
- request
- paging
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W68/00—User notification, e.g. alerting and paging, for incoming communication, change of service or the like
- H04W68/005—Transmission of information for alerting of incoming communication
Definitions
- the present disclosure relates to the field of communications technologies, and in particular, to a paging method, a network device, and a terminal.
- a network device In a mobile communication system, such as a Long Time Evolution (LTE) system, a network device usually uses a system architecture evolved Temporary Mobile Station Identifier (S-TMSI) to page a terminal. In special cases, such as a network failure, the terminal can be paged using the International Mobile Station Identifier (IMSI).
- the S-TMSI is composed of a Mobile Management Entity Code (MMEC) and a Mobile Management Entity (MME) Temporary Mobile Station Identifier (M-TMSI).
- MME Mobile Management Entity
- M-TMSI Temporary Mobile Station Identifier
- the S-TMSI is unique under the MME, and usually does not change over a long period of time (such as several hours to several days), and the S-TMSI has the possibility of being reversely cracked to obtain the real identity IMSI of the terminal. Therefore, both IMSI and S-TMSI have the potential to be exploited by illegal attacks. Once the above information is stolen, it will have
- the present disclosure provides a paging method, a network device, and a terminal, which solves the problem of poor security of a paging process in a mobile communication system.
- An embodiment of the present disclosure provides a paging method, which is applied to a network device, and includes:
- the paging method further includes:
- the step of determining the first identifier according to the terminal identifier and/or the first information includes:
- the first algorithm is used to calculate the terminal identifier and/or the first information to obtain a first identifier.
- the first identifier sent by the core network is: the terminal calculates and obtains the terminal identifier and/or the first information by using the first algorithm, and reports the result to the core network.
- the core network calculates the terminal identifier and/or the first information by using the first algorithm.
- the first information includes: identifier information of the first algorithm, time domain resource information of the terminal sending the random access request, time domain resource number for sending the random access request, frequency domain resource information for sending the random access request, and sending random At least one of a frequency domain resource number of the access request, preamble information for transmitting the random access request, a preamble number for transmitting the random access request, a network identifier, and a padding field.
- the paging method further includes:
- the step of configuring a first target transmission location of the paging message according to the first identifier includes:
- the first target transmission location of the paging message is configured according to the first value.
- the paging method further includes:
- the target request includes one of a random access request, an attach request, and a radio resource configuration connection request.
- the second identifier is obtained by the terminal by using the first algorithm to calculate the terminal identifier and/or the second information.
- the paging method further includes:
- the response information of the target request is sent.
- the paging method further includes:
- the paging method further includes:
- the third identifier is obtained by calculating the terminal identifier and/or the second information by using the first algorithm.
- the paging method further includes:
- the authentication is successful.
- the paging method further includes:
- the authentication fails.
- the second information includes: identifier information of the first algorithm, time domain resource information of the terminal sending target request, time domain resource number of the sending target request, frequency domain resource information of the sending target request, and frequency domain resource number of the sending target request. And transmitting at least one of preamble information of the target request, a preamble number of the transmission target request, a terminal identifier, a network identifier, and a padding field.
- the first algorithm includes one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm.
- the terminal identifier includes: an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI), or a Mobile Equipment International Identity (IMEI).
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- An embodiment of the present disclosure provides a paging method, which is applied to a terminal, and includes:
- the paging method further includes:
- the first identifier is reported to the core network.
- the step of determining the first identifier according to the terminal identifier and/or the first information includes:
- the first algorithm is used to calculate the terminal identifier and/or the first information to obtain a first identifier.
- the first information includes: identifier information of the first algorithm, time domain resource information of the terminal sending the random access request, time domain resource number for sending the random access request, frequency domain resource information for sending the random access request, and sending random At least one of a frequency domain resource number of the access request, preamble information for transmitting the random access request, a preamble number for transmitting the random access request, a network identifier, and a padding field.
- the paging method further includes:
- the step of determining a first target transmission location of the paging message according to the first identifier includes:
- a first target transmission location of the paging message is determined based on the first value.
- the paging method further includes:
- the second identifier is obtained by using the first algorithm to calculate the terminal identifier and/or the second information.
- the paging method further includes:
- the target request carrying the second identifier is sent.
- the target request includes one of a random access request, an attach request, and a radio resource configuration connection request.
- the paging method further includes:
- the paging method further includes: after the step of receiving the response information of the target request, the paging method further includes:
- the second information includes: identifier information of the first algorithm, time domain resource information of the terminal sending target request, time domain resource number of the sending target request, frequency domain resource information of the sending target request, and frequency domain resource number of the sending target request. And transmitting at least one of preamble information of the target request, a preamble number of the transmission target request, a terminal identifier, a network identifier, and a padding field.
- the first algorithm includes one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm.
- the terminal identifier includes: an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI), or a Mobile Equipment International Identity (IMEI).
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- Embodiments of the present disclosure provide a paging method, including:
- the network device sends a paging message carrying the first identifier, where the first identifier is determined according to the terminal identifier and/or the first information;
- the terminal receives the paging message
- the terminal determines the second identifier according to the terminal identifier and/or the second information
- the terminal sends a target request to the network device.
- Embodiments of the present disclosure provide a network device including: a processor; a memory coupled to the processor, and a transceiver coupled to the processor; wherein the processor is configured to invoke and execute the program stored in the memory and data,
- the transceiver is configured to send a paging message carrying the first identifier, where the first identifier is determined according to the terminal identifier and/or the first information.
- the processor is used to:
- the processor is also used to:
- the transceiver is also used to:
- the transceiver is also used to:
- the response information of the target request is sent.
- the transceiver is also used to:
- the processor is also used to:
- the third identifier is obtained by calculating the terminal identifier and/or the second information by using the first algorithm.
- the processor is also used to:
- the authentication is successful.
- the processor is also used to:
- the authentication fails.
- Embodiments of the present disclosure provide a terminal, including: a processor; a memory coupled to the processor, and a transceiver coupled to the processor; wherein the processor is configured to call and execute programs and data stored in the memory ,
- the transceiver is configured to receive a paging message carrying the first identifier, where the first identifier is determined according to the terminal identifier and/or the first information.
- the processor is used to:
- the processor is also used to:
- the processor is also used to:
- the second identifier is obtained by using the first algorithm to calculate the terminal identifier and/or the second information.
- the transceiver is also used to:
- the target request carrying the second identifier is sent.
- the transceiver is also used to:
- the transceiver is also used to:
- Embodiments of the present disclosure provide a communication device including: a processor, a memory storing a computer program, and when the computer program is executed by the processor, performing the above method.
- Embodiments of the present disclosure provide a computer readable storage medium comprising instructions that, when executed by a computer, cause a computer to perform the paging method described above.
- the foregoing technical solution of the present disclosure has the beneficial effects that the network device can use the first identifier to page the terminal, and the terminal performs the identification of the paging message according to the first identifier, where the first identifier is more difficult to be illegally attacked or stolen. It is also difficult to copy the call message, which can improve the security of the terminal communication.
- FIG. 1 is a schematic flowchart diagram of a paging method on a network device side according to an embodiment of the present disclosure
- FIG. 2 is a schematic flowchart of another network device side paging method according to an embodiment of the present disclosure
- FIG. 3 is a schematic structural diagram of a network device according to an embodiment of the present disclosure.
- FIG. 4 is a schematic flowchart diagram of a paging method on a terminal side according to an embodiment of the present disclosure
- FIG. 5 is a schematic flowchart diagram of a terminal side paging method according to an embodiment of the present disclosure
- FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure.
- FIG. 7 is a block diagram showing the structure of a communication device according to an embodiment of the present disclosure.
- system and “network” are used interchangeably herein.
- B corresponding to A means that B is associated with A, and B can be determined from A.
- determining B from A does not mean that B is only determined based on A, and that B can also be determined based on A and/or other information.
- an embodiment of the present disclosure provides a paging method, which specifically includes the following steps:
- Step 11 Send a paging message carrying the first identifier, where the first identifier is determined according to the terminal identifier and/or the first information.
- the network device configures the paging message of the terminal, and carries the first identifier determined according to the terminal identifier and/or the first information in the paging message, where the network device can send the paging to the terminal by using a broadcast manner. Message.
- the first identifier here may be a preset hexadecimal value of a preset number of bits.
- the first identifier is represented by an 8-digit hexadecimal number, and the value is 0x1903a30b; or the first identifier is represented by an 11-digit decimal number, and the value is 10000293940; or the first identifier is a 5-bit binary number.
- the value is 00100;
- the terminal identifier includes: an international mobile subscriber identity IMSI, a temporary mobile subscriber identity TMSI or an International Mobile Equipment Identity (IMEI), etc.;
- the network identity includes a network cell ID, Global Cell ID, PLMN, etc.
- the first identifier is determined according to the terminal identifier and/or the first information, but the first identifier cannot be mapped to the terminal identifier or the first information, that is, the first identifier is an irreversible algorithm.
- the terminal identifier is obtained by operation, and the terminal identifier or the first information cannot be obtained by the first identifier, so that the terminal cannot be security attacked, and the terminal identifier is transmitted after the integrity protection is established, so as to effectively protect the terminal. purpose.
- the method may further include: determining, by the network device, the first identifier carried by the paging message.
- the determination method includes but is not limited to the following methods:
- Manner 1 Determine the first identifier according to the terminal identifier and/or the first information.
- the first identifier is determined by the network device, and the manner of determining may be implemented by using a first algorithm (wherein the first algorithm includes but is not limited to a one-way function algorithm or a hash function algorithm or an elliptic function algorithm)
- the irreversible algorithm performs an operation on the terminal identifier and/or the first information to obtain a first identifier. For example, when the system information of the network device is changed, the network device needs to send a paging message to the terminal, and the network device can determine the first identifier by using the terminal identifier and/or the first information carried by the terminal when initiating the random access request.
- the terminal identifier may be directly determined as the first identifier, that is, the terminal identifier is the same as the first identifier.
- the network device performs a one-way function operation or a hash function operation or an elliptic function operation according to the terminal identifier and/or the first information to obtain the first identifier.
- Manner 2 Receive the first identifier sent by the core network.
- the first identifier is sent to the network device by the core network.
- the manner in which the core network determines the first identifier includes, but is not limited to, terminal reporting or core network autonomous determination.
- the first identifier sent by the core network in the terminal reporting mode is: the terminal uses the first algorithm to calculate and obtain the terminal identifier and/or the first information, and reports the result to the core network.
- the terminal uses a one-way function algorithm or a hash function algorithm or an elliptic function algorithm to calculate the terminal identifier and report it to the core network.
- the first identifier is reported by the terminal to the core network when it is randomly accessed, and is stored by the core network.
- the first identifier is that when the terminal sends a random access request, the terminal performs a one-way function operation or a hash operation on the terminal identifier, and the calculation result is the first identifier.
- the terminal identifier may be carried in the first field in the random access request.
- the first field may be the International Mobile Subscriber Identity (IMSI) of the terminal or the Temporary Mobile Subscriber Identity (TMSI) of the terminal or the Mobile Equipment International Identity (IMEI) of the terminal device.
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the first identifier is: the terminal uses a one-way function algorithm or a hash function algorithm or an elliptic function algorithm to calculate the terminal identifier and the first information, and reports the result to the core network.
- the first identifier is that the terminal performs a one-way function operation or a hash operation on the terminal identifier and the first information, and the obtained operation value is used as the first identifier.
- the terminal identifier may be carried in the first field in the random access request, and the first information may be carried in the second field in the random access request.
- the first field may be the International Mobile Subscriber Identity (IMSI) of the terminal or the Temporary Mobile Subscriber Identity (TMSI) of the terminal or the Mobile Equipment International Identity (IMEI) of the terminal device, and the second field is an additional field for the terminal to calculate the first identifier.
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the first identifier is determined by the core network by using the first algorithm to calculate the terminal identifier and/or the first information.
- the core network uses a one-way function algorithm or a hash function algorithm or an elliptic function algorithm to calculate the terminal identifier.
- the first identifier is obtained by the core network, and the core network may be obtained according to the terminal identifier included in the paging request, for example, the core network obtains a one-way encryption function or a hash function operation according to the terminal identifier, where
- the terminal identifier is an International Mobile Subscriber Identity (IMSI) of the terminal, a Temporary Mobile Subscriber Identity (TMSI) of the terminal, or a Mobile Equipment International Identity (IMEI) of the terminal device.
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the first identifier is determined to be a core network element, and the first identifier determined by the core network element is sent to the
- the foregoing first information includes, but is not limited to, identifier information of the first algorithm, time domain resource information of the terminal sending the random access request, time domain resource number for sending the random access request, and sending the random access request.
- the time domain resource information, the frequency domain resource information, and the preamble information may be understood as the size and location of the time-frequency code domain resource.
- the time domain resource information may indicate that the time domain occupies several symbols, and the positions of the symbols are
- the frequency domain resource information may indicate that the frequency occupies several resource blocks, and where are the locations of the resource blocks.
- the time domain resource number, the frequency domain resource number, and the preamble number can be understood as the system may divide all the available resources from the time domain, the frequency domain, and the code domain within a time window and respectively number them, and may be mapped according to the number.
- the padding field can be predefined or dynamically configured by the terminal.
- the terminal is required to inform the network device or the core network of the padding field content.
- the padding field is a random value or other padding field dynamically configured by the terminal
- the network device or the core network is agnostic to its content, and the terminal needs to send the padding field.
- the first information may also be information corresponding to the time domain, the frequency domain, and the code domain resource location used by the terminal to initiate the random access request.
- the network device may determine the first location according to the resource location of the terminal initiated the random access request. The content of a message, the terminal does not need to send the first information to the network device.
- the method may further include: configuring, according to the first identifier, a first target transmission location of the paging message.
- the determination method includes but is not limited to the following methods:
- the first identifier is subjected to a remainder calculation on the preset value to obtain a first value; and the first target transmission location of the paging message is configured according to the first value. That is to say, the first target transmission location of the paging message is determined by the first identifier, and the specific method may be: obtaining the remainder of the specific identifier by the first identifier, for example, obtaining the first identifier pair 1024 to obtain the first A value is used, and the first value is mapped to the 1024 subframes, and the subframe that is sent by the paging message corresponding to the first identifier is determined to be the first target transmission location.
- the method includes:
- Step 21 Send a paging message carrying the first identifier, where the first identifier is determined according to the terminal identifier and/or the first information.
- the method may further include:
- Step 22 Receive a target request sent by the terminal, where the target request carries a second identifier.
- the target request is sent by the terminal after confirming that the paging message is paging itself.
- the target request includes: a random access request, an attach request, or a radio resource configuration connection request.
- the second identifier is obtained by the terminal by using the first algorithm to calculate the terminal identifier and/or the second information. For example, after receiving the paging message, the terminal uses a one-way function algorithm or a hash function algorithm or an elliptic function algorithm on the terminal.
- the identifier is obtained by performing an operation on the terminal identifier and the second information by using a one-way function algorithm or a hash function algorithm or an elliptic function algorithm.
- the terminal receives the paging message sent by the network device at the first target transmission location, and verifies whether the paging message is paging itself.
- the first algorithm is adopted. Performing operation on the terminal identifier and/or the second information to obtain a second identifier, detecting whether the first identifier and the second identifier are consistent, and if yes, determining that the paging message is paging itself, otherwise not paging itself, to improve communication Security.
- the network device If the paging message is paging itself, send a subsequent target request to the network device, such as: a random access request, an attach request (such as receiving a paging message initiated by network error recovery) or a radio resource configuration connection request. Wait. After receiving the target request, the network device verifies the target request, and verifies the response information of the target request by the terminal after the verification.
- the method for the network device to verify the target request includes, but is not limited to, determining whether the target request is legal according to the second identifier, and responding to the response information of the target request, such as a random access request response and an attach establishment response, when the target request is legal. Or wireless resource configuration connection establishment response, etc.
- the network device verifies the second identifier in the target request and the previously determined first identifier. If the second identifier is consistent with the first identifier, determining that the target request is legal, otherwise determining that the target request is not legitimate. That is to say, after step 22, it also includes:
- Step 23 Send the response information of the target request when the second identifier is the same as the first identifier.
- the network device performs secondary verification on the target request sent by the terminal, which can further improve the security of the network communication.
- the terminal After receiving the response information of the target request, the terminal sends the terminal identifier and/or the second information to the network device to perform an authentication process with the network device.
- the network device may further include:
- Step 24 Receive terminal identification and/or second information.
- the network device may further include:
- Step 25 Obtain a third identifier, where the third identifier is obtained by using a first algorithm to calculate the terminal identifier and/or the second information. After determining the third identifier, the network device further performs an authentication process according to the third identifier.
- the authentication process includes but is not limited to:
- Step 26 When the third identifier is the same as the second identifier, or when the third identifier is the same as the first identifier, the authentication succeeds.
- Step 27 When the third identifier is different from the second identifier, or when the third identifier is different from the first identifier, the authentication fails.
- the authentication process no longer uses the traditional plaintext transmission method for authentication, but uses the first algorithm to calculate the ciphertext obtained by the transmitted plaintext, and further authenticates according to the ciphertext, thereby further improving the security of communication. Sex.
- the foregoing second information includes, but is not limited to, the identifier information of the first algorithm, the time domain resource information of the terminal sending target request, the time domain resource number of the sending target request, the frequency domain resource information of the sending target request, and the sending target request. At least one of a frequency domain resource number, a preamble information of a transmission destination request, a preamble number of a transmission destination request, a terminal identifier, a network identifier, and a padding field.
- the padding field can be predefined or dynamically configured by the terminal.
- the first algorithm involved in the embodiments of the present disclosure includes, but is not limited to, one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm, and any one can implement terminal identification, first.
- the algorithms for performing irreversible operations on the information and/or the second information are all applicable to the embodiments of the present disclosure, and are not enumerated here.
- the terminal identifiers involved in the embodiments of the present disclosure include, but are not limited to, an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI), or a Mobile Equipment International Identity (IMEI).
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the network device may use the first identifier to page the terminal, and the terminal performs the identification of the paging message according to the first identifier, where the first identifier is difficult to be illegally attacked or stolen, and the paging is performed. Messages are also difficult to copy, which can improve the security of terminal communication.
- an embodiment of the present disclosure further provides a network device, including: a processor 300; a memory 320 connected to the processor 300 through a bus interface, and a processor 300 through a bus interface.
- a network device including: a processor 300; a memory 320 connected to the processor 300 through a bus interface, and a processor 300 through a bus interface.
- the memory 320 is configured to store programs and data used by the processor in performing operations; to transmit data information or pilots through the transceiver 310, and to receive through the transceiver 310 Uplink control channel; when the processor 300 calls and executes the program and data stored in the memory 320, the following functions are implemented:
- the processor 300 is configured to read a program in the memory 320 and perform the following process.
- the transceiver 310 is configured to receive and send data under the control of the processor 300, and can be used to:
- the processor 300 is further configured to: determine, according to the terminal identifier and/or the first information, the first identifier;
- the processor 300 is further configured to: perform operation on the terminal identifier and/or the first information by using a first algorithm to obtain a first identifier.
- the first identifier sent by the core network is: the terminal calculates and obtains the terminal identifier and/or the first information by using the first algorithm, and reports the result to the core network.
- the core network calculates the terminal identifier and/or the first information by using the first algorithm.
- the first information includes: identifier information of the first algorithm, time domain resource information of the terminal sending the random access request, time domain resource number for sending the random access request, frequency domain resource information for sending the random access request, and sending random At least one of a frequency domain resource number of the access request, preamble information for transmitting the random access request, a preamble number for transmitting the random access request, a network identifier, and a padding field.
- the processor 300 is further configured to: configure, according to the first identifier, a first target transmission location of the paging message.
- the processor 300 is further configured to: perform a remainder calculation on the preset value by using the first identifier to obtain a first value;
- the first target transmission location of the paging message is configured according to the first value.
- the transceiver 310 is further configured to:
- the target request includes one of a random access request, an attach request, and a radio resource configuration connection request.
- the second identifier is obtained by the terminal by using the first algorithm to calculate the terminal identifier and/or the second information.
- the transceiver 310 is further configured to: when the second identifier is the same as the first identifier, send response information of the target request.
- the transceiver 310 is further configured to: receive the terminal identifier and/or the second information.
- the processor 300 is further configured to: obtain a third identifier, where the third identifier is obtained by using a first algorithm to calculate the terminal identifier and/or the second information.
- the processor 300 is further configured to: when the third identifier is the same as the second identifier, or when the third identifier is the same as the first identifier, the authentication succeeds.
- the processor 300 is further configured to: when the third identifier is different from the second identifier, or when the third identifier is different from the first identifier, the authentication fails.
- the second information includes: identifier information of the first algorithm, time domain resource information of the terminal sending target request, time domain resource number of the sending target request, frequency domain resource information of the sending target request, and frequency domain resource number of the sending target request. And transmitting at least one of preamble information of the target request, a preamble number of the transmission target request, a terminal identifier, a network identifier, and a padding field.
- the first algorithm includes one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm.
- the terminal identifier includes: an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI), or a Mobile Equipment International Identity (IMEI).
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the bus architecture may include any number of interconnected buses and bridges, specifically linked by one or more processors represented by processor 300 and various circuits of memory represented by memory 320.
- the bus architecture can also link various other circuits, such as peripherals, voltage regulators, and power management circuits, as is well known in the art and, therefore, will not be further described herein.
- the bus interface provides an interface.
- Transceiver 310 can be a plurality of components, including a transmitter and a transceiver, providing means for communicating with various other devices on a transmission medium.
- the processor 300 is responsible for managing the bus architecture and general processing, and the memory 320 can store data used by the processor 300 in performing operations.
- the network device embodiment of the present disclosure is corresponding to the foregoing embodiment of the paging method. All the implementation methods in the foregoing method embodiments are applicable to the embodiment of the network device, and the same technical effects can be achieved.
- the network device can use the first identifier to page the terminal, and the terminal performs the identification of the paging message according to the first identifier, wherein the first identifier is difficult to be illegally attacked or stolen, and the paging message is difficult to be copied, which can improve Terminal communication security.
- the paging method of the embodiment of the present disclosure is described above from the network device side.
- the paging method on the terminal side will be further described below with reference to the accompanying drawings.
- an embodiment of the present disclosure provides a paging method, which is applied to a terminal, and may include the following steps:
- Step 41 Receive a paging message carrying the first identifier, where the first identifier is determined according to the terminal identifier and/or the first information.
- the received paging message carries the first identifier determined according to the terminal identifier and/or the first information, and the paging message sent by the network device may be received in a broadcast manner.
- the first identifier here may be a preset hexadecimal value of a preset number of bits.
- the first identifier is a 256-bit binary number or a 64-bit hexadecimal number.
- the terminal identifier includes: an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI), or a Mobile Equipment International Identity (IMEI).
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the first identifier is determined according to the terminal identifier and/or the first information, but the first identifier cannot be mapped to the terminal identifier or the first information, so that the terminal cannot perform a security attack and can be effective.
- the method may further include: determining, according to the terminal identifier and/or the first information, the first identifier; and reporting the first identifier to the core network.
- the step of determining the first identifier according to the terminal identifier and/or the first information includes but is not limited to:
- the first algorithm is used to calculate the terminal identifier and/or the first information to obtain a first identifier.
- the terminal uses a one-way function algorithm or a hash function algorithm or an elliptic function algorithm to perform operation on the terminal identifier to obtain a first identifier; wherein, when the terminal sends a random access request, the terminal performs a one-way function operation or hash on the terminal identifier. Operation, the result of the calculation is the first identifier. If the SHA256 algorithm is used, the maximum length of the input message does not exceed 2 64 bits, and the input is processed in 512-bit packets, and the output is a 256-bit binary number or a 64-bit hexadecimal number.
- the terminal identifier may be carried in the first field in the random access request.
- the first field may be the International Mobile Subscriber Identity (IMSI) of the terminal or the Temporary Mobile Subscriber Identity (TMSI) of the terminal or the Mobile Equipment International Identity (IMEI) of the terminal device.
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the terminal uses a one-way function algorithm or a hash function algorithm or an elliptic function algorithm to perform operation on the terminal identifier and the first information to obtain a first identifier.
- the terminal performs a one-way function operation or a hash operation or an elliptic function operation on the terminal identifier and the first information, and the obtained operation value is used as the first identifier.
- the terminal identifier may be carried in the first field in the random access request, and the first information may be carried in the second field in the random access request.
- the first field may be the International Mobile Subscriber Identity (IMSI) of the terminal or the Temporary Mobile Subscriber Identity (TMSI) of the terminal or the Mobile Equipment International Identity (IMEI) of the terminal device, and the second field is an additional field for the terminal to calculate the first identifier.
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the foregoing first information includes, but is not limited to, identifier information of the first algorithm, time domain resource information of the terminal sending the random access request, time domain resource number for sending the random access request, and sending the random access request.
- the time domain resource information, the frequency domain resource information, and the preamble information may be understood as the size and location of the time-frequency code domain resource.
- the time domain resource information may indicate that the time domain occupies several symbols, and the positions of the symbols are
- the frequency domain resource information may indicate that the frequency occupies several resource blocks, and where are the locations of the resource blocks.
- the time domain resource number, the frequency domain resource number, and the preamble number can be understood as the system may divide all the available resources from the time domain, the frequency domain, and the code domain within a time window and respectively number them, and may be mapped according to the number.
- the padding field may be predefined or dynamically configured by the terminal.
- the terminal is required to inform the network device or the core network of the padding field content.
- the first information may also be information corresponding to the time domain, the frequency domain, and the code domain resource location used by the terminal to initiate the random access request.
- the network device may determine the first location according to the resource location of the terminal initiated the random access request. The content of a message, the terminal does not need to send the first information to the network device. If the first information is a random value or other padding field dynamically configured by the terminal, the network device or the core network is unaware of the content thereof, and the terminal needs to send the first information.
- the method may further include: determining, according to the first identifier, a first target transmission location of the paging message.
- the determination method includes but is not limited to the following methods:
- the first identifier is subjected to a remainder calculation on the preset value to obtain a first value; and the first target transmission location of the paging message is determined according to the first value. That is to say, the first target transmission location received by the paging message is determined by the first identifier, and the specific method may be: obtaining the remainder of the specific identifier by the first identifier, for example, obtaining the first identifier pair 1024 to obtain the first A value is used, and the first value is mapped to the 1024 subframes, and the subframe that is sent by the paging message corresponding to the first identifier is determined to be the first target transmission location.
- the paging method includes:
- Step 51 Receive a paging message carrying the first identifier, where the first identifier is determined according to the terminal identifier and/or the first information.
- the method may further include:
- Step 52 Obtain a second identifier, where the second identifier is obtained by using the first algorithm to calculate the terminal identifier and/or the second information.
- the terminal may further perform the following steps:
- Step 53 When the second identifier is the same as the first identifier, send a target request carrying the second identifier to improve communication security.
- the terminal receives the paging message sent by the network device at the first target transmission location, and verifies whether the paging message is paging itself, so as to improve the security of the communication.
- the method for the terminal to verify whether the paging message is paging itself includes but is not limited to: using a one-way function algorithm or a hash function algorithm or an elliptic function algorithm to operate the terminal identifier, or adopting a one-way function algorithm or a hash function algorithm or an ellipse
- the function algorithm performs operation on the terminal identifier and the second information to obtain a second identifier. If the second identifier is the same as the first identifier, determining that the paging message is paging itself.
- the terminal determines the second identifier, specifically: the terminal performs a one-way function operation or a hash operation or an elliptic function operation on the terminal identifier, and the calculation result is the second identifier information, and detects whether the first identifier carried in the second identifier and the paging message is The same, if the same, it is determined that the paging message is paging itself. Or the terminal performs a one-way function operation or a hash operation or an elliptic function operation on the terminal identifier and the second information, and obtains the operation value and uses the second identifier to detect whether the second identifier is the same as the first identifier carried in the paging message. If they are the same, it is determined that the paging message is paging itself.
- the target request includes: a random access request, an attach request, or a radio resource configuration connection request.
- the terminal After transmitting the target request carrying the second identifier, the terminal receives the response information of the target request, and the response information is fed back after the network device confirms that the target request is legal.
- the method for the network device to verify the target request includes, but is not limited to, determining whether the target request is legal according to the second identifier, and responding to the response information of the target request, such as a random access request response and an attach establishment response, when the target request is legal. Or wireless resource configuration connection establishment response, etc. In this way, the network device performs secondary verification on the target request sent by the terminal, which can further improve the security of the network communication.
- the step of determining whether the target request is legal according to the second identifier may include, but is not limited to: the network device, after receiving the target request, verifying the second identifier in the target request with the previously determined first identifier, if the second identifier Consistent with the first identifier, it is determined that the target request is legal, otherwise the target request is determined to be illegal. That is to say, after receiving the target request sent by the terminal, the network device sends the response information of the target request when the second identifier is the same as the first identifier. In this way, the network device performs secondary verification on the target request sent by the terminal, which can further improve the security of the network communication. Accordingly, the terminal performs the following steps:
- Step 54 Receive response information of the target request.
- the terminal may further perform:
- Step 55 Send the terminal identifier and/or the second information to send the terminal identifier and/or the second information to the network device to perform an authentication process with the network device.
- the network device further includes: obtaining the third identifier; wherein the third identifier is obtained by using the first algorithm to calculate the terminal identifier and/or the second information.
- the authentication process includes but is not limited to: the network device uses a one-way function algorithm or a hash function algorithm or an elliptic function algorithm to operate the terminal identifier, or uses a one-way function algorithm or a hash function algorithm or an elliptic function algorithm to identify the terminal and the The second information is calculated to obtain the third identification information.
- the authentication succeeds. Specifically, the network device performs a one-way function operation or a hash operation or an elliptic function operation on the terminal identifier, and the calculation result is the third identifier information, and detects whether the third identifier information is the same as the second identifier carried in the target request, or detects Whether the third identifier information is the same as the first identifier in the paging message, if the same, the authentication succeeds; if different, the authentication fails.
- the network device performs a one-way function operation or a hash operation or an elliptic function operation on the terminal identifier and the second information, obtains the operation value, and uses the third identifier information to detect whether the third identifier information and the second identifier carried in the target request are The same, or detecting whether the third identifier information is the same as the first identifier in the paging message, if the same, the authentication succeeds; if not, the authentication fails.
- the above authentication process no longer uses the traditional plaintext transmission mode for authentication, but uses the first algorithm to calculate the ciphertext obtained by the transmitted plaintext, and further authenticates according to the ciphertext, thereby further improving the security of the communication.
- the above method effectively utilizes two major characteristics of an algorithm such as a one-way function, a hash function, and an elliptic function:
- the randomness of the output value and the input value can only be obtained by a random method to meet the required output value. That is, there is no fixed association between the input value and the output value, and the output value is randomly generated. Therefore, even if the terminal knows the identifier in the paging message sent by the network, the corresponding identifier cannot be obtained through the pseudo-random method, and the network device provides through the terminal.
- the validity of the limit value can be verified by calculating all or part of the input parameters in the first information of the identifier.
- the partial information for calculating the limit such as the time domain, the frequency domain, and/or the code domain resource used by the sending target request, is determined by the network device according to the received target request, the terminal reports the verification service.
- a message only needs to contain other input information and values in addition to the above information.
- the foregoing second information includes, but is not limited to, the identifier information of the first algorithm, the time domain resource information of the terminal sending target request, the time domain resource number of the sending target request, the frequency domain resource information of the sending target request, and the sending target request. At least one of a frequency domain resource number, a preamble information of a transmission destination request, a preamble number of a transmission destination request, a terminal identifier, a network identifier, and a padding field.
- the padding field can be predefined or dynamically configured by the terminal.
- the first algorithm involved in the embodiments of the present disclosure includes, but is not limited to, one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm, and any one can implement terminal identification, first.
- the algorithms for performing irreversible operations on the information and/or the second information are all applicable to the embodiments of the present disclosure, and are not enumerated here.
- the terminal identifiers involved in the embodiments of the present disclosure include, but are not limited to, an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI), or a Mobile Equipment International Identity (IMEI).
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the terminal receives the paging message carrying the first identifier, and the terminal performs the identification of the paging message according to the first identifier, where the first identifier is difficult to be illegally attacked or stolen, and the paging message is It is also difficult to copy, which can improve the security of terminal communication.
- the embodiment provides a terminal, including:
- a processor 63 for storing programs and data used by the processor 61 when performing operations, when the processor 61 calls and When the program and data stored in the memory 63 are executed, the following process is performed.
- the transceiver 64 is connected to the bus interface 62 for receiving and transmitting data under the control of the processor 61, and is specifically configured to: receive a paging message carrying the first identifier; wherein the first identifier is based on the terminal identifier And/or the first information is determined.
- the processor 61 is further configured to: determine, according to the terminal identifier and/or the first information, the first identifier;
- the first identifier is reported to the core network.
- the processor 61 is further configured to: perform operation on the terminal identifier and/or the first information by using the first algorithm to obtain the first identifier.
- the first information includes: identifier information of the first algorithm, time domain resource information of the terminal sending the random access request, time domain resource number for sending the random access request, frequency domain resource information for sending the random access request, and sending random At least one of a frequency domain resource number of the access request, preamble information for transmitting the random access request, a preamble number for transmitting the random access request, a network identifier, and a padding field.
- the processor 61 is further configured to: determine, according to the first identifier, a first target transmission location of the paging message.
- the processor 61 is further configured to: perform a remainder calculation on the preset value by using the first identifier to obtain a first value;
- a first target transmission location of the paging message is determined based on the first value.
- the processor 61 is further configured to: obtain a second identifier
- the second identifier is obtained by using the first algorithm to calculate the terminal identifier and/or the second information.
- the transceiver 64 is further configured to: when the second identifier is the same as the first identifier, send a target request that carries the second identifier.
- the target request includes one of a random access request, an attach request, and a radio resource configuration connection request.
- the transceiver 64 is further configured to: receive response information of the target request.
- the transceiver 64 is further configured to: send the terminal identifier and/or the second information.
- the second information includes: identifier information of the first algorithm, time domain resource information of the terminal sending target request, time domain resource number of the sending target request, frequency domain resource information of the sending target request, and frequency domain resource number of the sending target request. And transmitting at least one of preamble information of the target request, a preamble number of the transmission target request, a terminal identifier, a network identifier, and a padding field.
- the first algorithm includes one of a one-way function algorithm, a hash function algorithm, and an elliptic function algorithm.
- the terminal identifier includes: an International Mobile Subscriber Identity (IMSI), a Temporary Mobile Subscriber Identity (TMSI), or a Mobile Equipment International Identity (IMEI).
- IMSI International Mobile Subscriber Identity
- TMSI Temporary Mobile Subscriber Identity
- IMEI Mobile Equipment International Identity
- the bus architecture may include any number of interconnected buses and bridges, specifically linked by one or more processors represented by processor 61 and various circuits of memory represented by memory 63.
- the bus architecture can also link various other circuits such as peripherals, voltage regulators, and power management circuits, which are well known in the art and, therefore, will not be further described herein.
- the bus interface provides an interface.
- Transceiver 64 can be a plurality of components, including a transmitter and a transceiver, providing means for communicating with various other devices on a transmission medium.
- the user interface 65 may also be an interface capable of externally connecting the required devices, including but not limited to a keypad, a display, a speaker, a microphone, a joystick, and the like.
- the processor 61 is responsible for managing the bus architecture and the usual processing, and the memory 63 can store data used by the processor 61 when performing operations.
- the terminal embodiment of the present disclosure corresponds to the embodiment of the foregoing method, and all the implementation methods in the foregoing method embodiments are applicable to the embodiment of the terminal, and the same technical effects can be achieved.
- the terminal receives the paging message carrying the first identifier, and the terminal performs the identification of the paging message according to the first identifier, wherein the first identifier is difficult to be illegally attacked or stolen, and the paging message is also difficult to be copied, thereby improving the terminal.
- the security of communication is possible to be illegally attacked or stolen.
- the disclosure provides a paging method, including: the network device sends a paging message carrying the first identifier; wherein the first identifier is determined according to the terminal identifier and/or the first information;
- the terminal receives the paging message
- the terminal determines the second identifier according to the terminal identifier and/or the second information
- the terminal sends a target request to the network device.
- a communication device 70 of the present disclosure includes a processor 72, a memory 73 storing a computer program, and when the computer program is executed by the processor 72, performs the method as described in the above embodiments.
- the communication device may be the above-mentioned network device, or may be the above-mentioned terminal, and can achieve the technical effects achieved by the network device or the terminal.
- the communication device may further include: a transceiver 71, which is communicably connected to the processor 72 via a bus interface or an interface, and the transceiver 71 and the memory 73 may also be communicatively connected through a bus interface or an interface.
- the functions of the above transceivers can also be implemented by a processor.
- the communication device of the present disclosure may further include other components for implementing the above method. All the implementations in the foregoing method embodiments are applicable to the embodiment of the communication device, and the same technical effects can be achieved.
- the communication device may be the terminal described in the foregoing embodiment, or may be the network device described in the foregoing embodiment.
- Embodiments of the present disclosure also provide a computer readable storage medium comprising instructions that, when executed by a computer, cause a computer to perform the method as described above.
- the computer readable storage medium stores a computer program, which is implemented by the processor to implement the processes of the paging method embodiment, and can achieve the same technical effect. To avoid repetition, details are not described herein again.
- the computer readable storage medium such as a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.
- the disclosed apparatus and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in various embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product. Based on such understanding, a portion of the technical solution of the present disclosure that contributes in essence or to the related art or a part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several The instructions are for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present disclosure.
- the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
- the objects of the present disclosure can also be achieved by running a program or a set of programs on any computing device.
- the computing device can be a well-known general purpose device.
- the objects of the present disclosure may also be realized by merely providing a program product including program code for implementing the method or apparatus. That is to say, such a program product also constitutes the present disclosure, and a storage medium storing such a program product also constitutes the present disclosure.
- the storage medium may be any known storage medium or any storage medium developed in the future.
- various components or steps may be decomposed and/or recombined.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
La présente invention concerne un procédé de radiomessagerie, un dispositif de réseau et un terminal, le procédé consistant à : envoyer un message de radiomessagerie contenant un premier identifiant, le premier identifiant étant déterminé selon un identifiant de terminal et/ou des premières informations.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810404405.XA CN110418343B (zh) | 2018-04-28 | 2018-04-28 | 寻呼方法、网络设备及终端 |
CN201810404405.X | 2018-04-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019205895A1 true WO2019205895A1 (fr) | 2019-10-31 |
Family
ID=68294877
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/080775 WO2019205895A1 (fr) | 2018-04-28 | 2019-04-01 | Procédé de radiomessagerie, dispositif de réseau et terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110418343B (fr) |
WO (1) | WO2019205895A1 (fr) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2022011618A1 (fr) * | 2020-07-15 | 2022-01-20 | Oppo广东移动通信有限公司 | Procédé de traitement d'informations, dispositif terminal et dispositif de réseau |
CN118250686A (zh) * | 2022-12-23 | 2024-06-25 | 大唐移动通信设备有限公司 | 一种信息处理方法、装置及可读存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101080036A (zh) * | 2006-05-25 | 2007-11-28 | 华为技术有限公司 | 无线通信网络中实现寻呼处理的方法 |
CN102348251A (zh) * | 2010-08-03 | 2012-02-08 | 中国移动通信有限公司 | 呼叫路由方法及装置、通信系统及处理设备 |
CN103369523A (zh) * | 2013-07-18 | 2013-10-23 | 成都鼎桥通信技术有限公司 | 一种提高群组下行安全性的方法 |
CN105491664A (zh) * | 2014-10-13 | 2016-04-13 | 中国移动通信集团山东有限公司 | 一种寻呼终端的方法及设备 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103428809B (zh) * | 2012-05-23 | 2017-05-10 | 华为技术有限公司 | 寻呼窄带终端的方法、网络设备及基站 |
-
2018
- 2018-04-28 CN CN201810404405.XA patent/CN110418343B/zh active Active
-
2019
- 2019-04-01 WO PCT/CN2019/080775 patent/WO2019205895A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101080036A (zh) * | 2006-05-25 | 2007-11-28 | 华为技术有限公司 | 无线通信网络中实现寻呼处理的方法 |
CN102348251A (zh) * | 2010-08-03 | 2012-02-08 | 中国移动通信有限公司 | 呼叫路由方法及装置、通信系统及处理设备 |
CN103369523A (zh) * | 2013-07-18 | 2013-10-23 | 成都鼎桥通信技术有限公司 | 一种提高群组下行安全性的方法 |
CN105491664A (zh) * | 2014-10-13 | 2016-04-13 | 中国移动通信集团山东有限公司 | 一种寻呼终端的方法及设备 |
Also Published As
Publication number | Publication date |
---|---|
CN110418343A (zh) | 2019-11-05 |
CN110418343B (zh) | 2021-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018050081A1 (fr) | Procédé et appareil d'authentification d'identité de dispositif, et support de stockage | |
WO2021196915A1 (fr) | Procédés et systèmes de transmission de données à base d'opérations de chiffrement et de déchiffrement, et dispositif informatique | |
US20170208049A1 (en) | Key agreement method and device for verification information | |
EP3259928B1 (fr) | Établissement et gestion d'identités destinées à des dispositifs contraints | |
CN109688098B (zh) | 数据的安全通信方法、装置、设备及计算机可读存储介质 | |
CN107196972B (zh) | 一种认证方法及系统、终端和服务器 | |
WO2018205148A1 (fr) | Procédé et dispositif de contrôle de paquet de données | |
WO2018054220A1 (fr) | Procédé et dispositif d'isolation de sécurité de réseau en tranches | |
CN112968910B (zh) | 一种防重放攻击方法和装置 | |
CN109729000B (zh) | 一种即时通信方法及装置 | |
US10122755B2 (en) | Method and apparatus for detecting that an attacker has sent one or more messages to a receiver node | |
CN115580396A (zh) | 匿踪查询系统及匿踪查询方法 | |
US20230239693A1 (en) | Association control method and related apparatus | |
WO2021109817A1 (fr) | Procédé de mise à jour de clé, procédé de déchiffrement de données, et procédé d'authentification de signature numérique | |
WO2019205895A1 (fr) | Procédé de radiomessagerie, dispositif de réseau et terminal | |
JP7451738B2 (ja) | 鍵更新方法および関連装置 | |
WO2017132947A1 (fr) | Procédé d'acquisition de paramètres de sécurité de service à transmettre, élément de réseau de gestion de signalement, nœud de fonction de sécurité et terminal transmetteur | |
WO2018099407A1 (fr) | Procédé et dispositif de connexion basée sur une authentification de compte | |
CN113992387B (zh) | 资源管理方法、装置、系统、电子设备和可读存储介质 | |
WO2023236925A1 (fr) | Procédé d'authentification et dispositif de communication | |
CN112242976B (zh) | 一种身份认证方法及装置 | |
WO2018195759A1 (fr) | Procédé, dispositif et système de vérification de signature | |
WO2017206185A1 (fr) | Procédé, appareil et système pour vérifier la légitimité d'un programme d'application | |
CN115761954A (zh) | 一种车辆的蓝牙钥匙连接方法及装置 | |
WO2019205896A1 (fr) | Procédé de traitement d'informations, dispositif de réseau et terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19792173 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08/02/2021) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19792173 Country of ref document: EP Kind code of ref document: A1 |