WO2022116695A1 - 发送用户标识的方法和装置 - Google Patents
发送用户标识的方法和装置 Download PDFInfo
- Publication number
- WO2022116695A1 WO2022116695A1 PCT/CN2021/123683 CN2021123683W WO2022116695A1 WO 2022116695 A1 WO2022116695 A1 WO 2022116695A1 CN 2021123683 W CN2021123683 W CN 2021123683W WO 2022116695 A1 WO2022116695 A1 WO 2022116695A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- suci
- usim card
- card information
- uicc
- communication connection
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000004891 communication Methods 0.000 claims abstract description 89
- 238000012545 processing Methods 0.000 claims description 17
- 230000015654 memory Effects 0.000 description 22
- 238000004590 computer program Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 8
- 230000008878 coupling Effects 0.000 description 5
- 238000010168 coupling process Methods 0.000 description 5
- 238000005859 coupling reaction Methods 0.000 description 5
- 238000012795 verification Methods 0.000 description 5
- 230000004044 response Effects 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/20—Transfer of user or subscriber data
- H04W8/205—Transfer to or from user equipment or user record carrier
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/75—Temporary identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
- H04W12/72—Subscriber identity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/60—Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/183—Processing at user equipment or user record carrier
Definitions
- the present application relates to the field of communications, and in particular, to a method and apparatus for sending a user identity.
- Cloud communication is a method of establishing a communication connection without using an entity subscriber identity module (SIM) card.
- the terminal device can establish the first communication connection through the physical or virtual SIM card, obtain the cloud SIM card information from the cloud through this communication connection, and use the cloud SIM card information to establish the second communication connection, without setting two card slots in the terminal device , thereby saving the cost of terminal equipment.
- SIM entity subscriber identity module
- the SA network needs to identify the terminal device when establishing the second communication connection. For verification, how the terminal device completes the identity verification of the SA network to establish the second communication connection in the cloud communication scenario is a problem that needs to be solved at present.
- the present application provides a method and apparatus for sending a user identity, which can complete the identity verification of the SA network in a cloud communication scenario, thereby establishing a second communication connection.
- a method for sending a user identity comprising: a mobile device (mobile equipment, ME) receives a global user from a universal integrated circuit card (UICC) in a cloud card pool through a first communication connection Identity module (universal subscriber identity module, USIM) card information; the ME receives an identity request from the 5G SA network, and the identity request is used to request to obtain a subscriber concealed identifier (SUCI); the ME according to the identity Request and the USIM card information to obtain the SUCI, the USIM card information is used to indicate that the device generating the SUCI is the ME or the UICC; the ME sends the SUCI to the 5G SA network, and the The SUCI is used to establish a second communication connection.
- a mobile device mobile equipment, ME
- UICC universal integrated circuit card
- USIM subscriber concealed identifier
- the SUCI can be generated on the ME side or on the UICC side.
- the USIM card information indicates that the SUCI is generated on the ME side, then the ME can generate the SUCI locally, which avoids the delay in acquiring the SUCI from the UICC, so that the second communication connection can be quickly established.
- the USIM card information indicates that the SUCI is generated on the UICC side. For example, if the USIM card information lacks the 124 service and the 125 service, the ME can obtain the SUCI from the UICC, thereby ensuring the successful establishment of the second communication connection.
- an apparatus for sending a user identity comprising a unit for performing any one of the methods in the first aspect.
- a device for sending a user identification comprising a processor and a memory, the memory is used for storing a computer program, the processor is used for calling and running the computer program from the memory, so that the device executes the first aspect. either method.
- a computer program product comprising: computer program code, when the computer program code is executed by a device that sends a user identification, the device causes the device to perform any one of the methods in the first aspect .
- a computer-readable medium stores program code, the program code comprising instructions for performing any one of the methods in the first aspect.
- the present application provides a method and device for sending a user identity, which can complete the identity verification of the SA network in a cloud communication scenario, thereby establishing a second communication connection in an independent network of a mobile communication system in 5G.
- FIG. 1 is a schematic diagram of a communication system provided by the present application.
- Fig. 2 is the schematic diagram of a kind of method for sending user identification provided by the present application
- FIG. 3 is a schematic diagram of another method for sending a user identity provided by the present application.
- FIG. 4 is a schematic diagram of yet another method for sending a user identity provided by the present application.
- FIG. 5 is a schematic diagram of a device for sending a user identity provided by the present application.
- FIG. 6 is a schematic diagram of a device for sending a user identity provided by the present application.
- FIG. 1 is a schematic diagram of a communication system applicable to the present application.
- the communication system 100 includes a network device 110 , a network device 120 and a terminal device 130 .
- the network device 110 may be a base station defined by 3GPP, for example, a base station (gNB) in a 5G communication system.
- the network device 110 may also be a relay station, an access point, an in-vehicle device, a wearable device, and other types of communication devices.
- the network device 120 may be a server for providing the terminal device 130 with information required for establishing a communication connection.
- the server may include at least one UICC.
- the server provides authentication services required in the process of establishing a communication connection. Therefore, the network device 120 may also be referred to as a remote authentication service. Entitlement module or cloud card pool.
- the terminal device 130 is capable of communicating with the network device 110 and the network device 120 .
- the terminal device 130 may include various handheld devices, in-vehicle devices or wearable devices with wireless communication functions, for example, user equipment (user equipment, UE) defined by the 3rd Generation Partnership Project (3GPP) , mobile station (mobile station, MS), ME and so on.
- UE user equipment
- 3GPP 3rd Generation Partnership Project
- MS mobile station
- ME mobile station
- the communication system 100 is only an example, and the communication system applicable to the present application is not limited thereto.
- the communication system 100 includes more network devices.
- the network device 110 needs to verify the identity of the terminal device 130 , that is, the network device 110 needs to obtain the SUCI of the terminal device 130 .
- the SUCI can be generated at the terminal device 130 or at the network device 120 .
- the terminal device 130 may send the SUCI to the network device 110, so that the network device 110 can establish a communication connection after performing security verification on the SUCI.
- method 200 includes:
- the ME receives the USIM card information from the UICC in the cloud card pool through the first communication connection.
- the first communication connection may be a wireless connection, such as a cellular network connection or a Wi-Fi connection; the first communication connection may also be a wired connection.
- the present application does not limit the specific form of the first communication connection.
- adjectives such as “first” and “second” are used to distinguish different individuals in the same type of object, for example, the first communication connection and the second communication connection hereinafter refer to two different communication connections.
- the USIM card information may be an EFust file (ie, a USIM service table) or other information, and the specific content of the USIM card information is not limited in this application.
- the USIM card information is used to establish the second communication connection.
- the ME can establish a radio resource control (RRC) link with the 5G SA network, and send the information to the 5G SA network through the RRC link.
- RRC radio resource control
- a registration request containing a globally unique temporary identifier (GUTI) After the 5G SA network receives the registration request and sends an identity request to the ME, the ME can perform the following steps.
- the ME receives an identity request from the 5G SA network, where the identity request is used to request to acquire SUCI.
- the ME acquires the SUCI according to the identity request and the USIM card information, where the USIM card information is used to indicate that the device for generating the SUCI is the ME or the UICC.
- the SUCI can be generated on the ME side or on the UICC side.
- the USIM card information indicates that the SUCI is generated on the ME side, then the ME can generate the SUCI locally, which avoids the delay in acquiring the SUCI from the UICC, so that the second communication connection can be quickly established.
- the USIM card information indicates that the SUCI is generated on the UICC side. For example, if the USIM card information lacks the 124 service and the 125 service, the ME can obtain the SUCI from the UICC, thereby ensuring the successful establishment of the second communication connection.
- Table 1 shows several situations in which the ME acquires SUCI.
- the client refers to the operator.
- the ME obtains the SUCI locally according to the identity request.
- the ME obtains the SUCI from the UICC according to the identity request.
- the USIM card information includes the configuration information that the operator requests to generate SUCI at the ME; the USIM card information includes the configuration information of the unauthorized emergency session; the USIM card information is the information of the card before R15; the USIM card information is the information of the card before R15; The information is that of an R15 card, but the R15 card is configured as a non-encrypted card.
- the ME can determine the SUCI generation method based on whether the EFust file contains 124 services and 125 services, wherein the encryption strategy is, for example, an elliptic curve integrated encryption strategy (elliptic curve integrated encryption strategy). encryption scheme, ECIES).
- the encryption strategy is, for example, an elliptic curve integrated encryption strategy (elliptic curve integrated encryption strategy). encryption scheme, ECIES).
- the ME when the EFust file does not include the 124 service and the 125 service, the ME generates the SUCI locally; when the EFust file includes the 124 service and the 125 service, the ME obtains the SUCI from the UICC.
- the ME may send the SUCI acquisition request to the UICC through the first communication connection, and receive the SUCI from the UICC through the first communication connection.
- the ME sends the SUCI to the 5G SA network, where the SUCI is used to establish a second communication connection.
- the first communication connection may be a roaming communication connection
- the second communication connection may be a non-roaming communication connection.
- the ME After the ME establishes the first communication connection, the ME establishes the RRC link between the 5G SA networks. Subsequently, the ME receives the identity request (identity request) from the 5G SA network through the RRC link, and determines to obtain the SUCI according to the identity request.
- identity request identity request
- the ME can determine whether to implement the non-encryption policy according to the USIM card information. If the unencrypted policy is implemented, SUCI can be obtained from UICC; if the unencrypted policy is not implemented, ECIES can be implemented, and the SUCI generation method can be determined according to whether the EFust file contains 124 services and 125 services.
- the ME When the EFust file does not include the 124 service and the 125 service, the ME generates the SUCI locally; when the EFust file includes the 124 service and the 125 service, the ME obtains the SUCI from the UICC.
- the ME After the ME obtains the SUCI, it can send an identity response including the SUCI to the 5G SA network through the RRC link, and then it can accept the authentication request (authentication request) from the 5G SA network through the RRC link.
- the ME can forward the authentication request to the UICC, and after receiving the authentication response sent by the UICC, forward the authentication response to the 5G SA network through the RRC link, so as to establish a communication connection with the 5G SA network (that is, the second communication connect).
- FIG. 4 is another schematic diagram of establishing a second communication connection.
- the authentication request may include 5G authentication and key agreement (authentication and key agreement, AKA) information, and may also include extensible authentication protocol (extensible authentication protocol, EAP)-AKA information.
- AKA authentication and key agreement
- EAP extensible authentication protocol
- the 5GC After the 5GC completes the authentication task, it can send a non-access stratum (NAS) security mode command to the ME through the radio access network (RAN).
- the ME executes the NAS security mode after receiving the NAS security mode command, and sends a NAS security mode completion message to the 5GC through the RAN.
- NAS non-access stratum
- the RAN sends an access stratum (access stratum, AS) security mode command to the ME, and the ME executes the AS security mode after receiving the AS security mode command, and sends an AS security mode completion message to the RAN.
- AS access stratum
- the RAN may also send a 5G capability query message to the ME, and the ME receives the 5G capability query message and sends a 5G capability report message to the RAN.
- the 5GC may send a registration accept message to the ME through the RAN, and receive a registration complete message from the ME through the RAN, thereby establishing the second communication connection.
- the apparatus for sending the user identification includes corresponding hardware structures and/or software modules for executing each function.
- the present application can be implemented in hardware or a combination of hardware and computer software with the units and algorithm steps of each example described in conjunction with the embodiments disclosed herein. Whether a function is performed by hardware or computer software driving hardware depends on the specific application and design constraints of the technical solution. Skilled artisans may implement the described functionality using different methods for each particular application, but such implementations should not be considered beyond the scope of this application.
- the present application may divide the functional unit of the apparatus for sending the user identification according to the above method example, for example, each function may be divided into each functional unit, or two or more functions may be integrated into one processing unit.
- the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units. It should be noted that the division of units in this application is schematic, and is only a logical function division, and other division methods may be used in actual implementation.
- FIG. 5 shows a schematic structural diagram of an apparatus for sending a user identity provided by the present application.
- the apparatus 500 includes a processing unit 510 , a receiving unit 520 and a sending unit 530 .
- the processing unit 510 can realize the receiving function through the receiving unit 520 , and the processing unit 510 can also realize the sending function through the sending unit 530 .
- the receiving unit 520 is configured to: receive USIM card information from the UICC in the cloud card pool through the first communication connection; receive an identity request from the 5G SA network, where the identity request is used to request to obtain SUCI;
- the processing unit 510 is configured to: obtain the SUCI according to the identity request and the USIM card information, where the USIM card information is used to indicate that the device for generating the SUCI is the apparatus 500 or the UICC;
- the sending unit 530 is configured to: send the SUCI to the 5G SA network, where the SUCI is used to establish a second communication connection.
- processing unit 510 is specifically configured to:
- the USIM card information includes encryption indication information
- the USIM card configuration information does not include the 124 service and the 125 service
- the USIM card information includes encryption indication information
- the USIM card configuration information includes 124 service and 125 service
- the SUCI is obtained from the UICC according to the identity request.
- the processing unit 510 is specifically configured to: send a SUCI acquisition request to the UICC through the first communication connection according to the identity request; and acquire the SUCI from the UICC through the first communication connection.
- processing unit 510 is specifically configured to:
- the USIM card information includes configuration information requested by the operator to generate the SUCI at the device 500; the USIM card information includes configuration information of an unauthorized emergency session; the USIM card information is: Information of the card before R15; the USIM card information is the information of the R15 card, but the R15 card is configured as a non-encrypted card.
- the processing unit 510 is specifically configured to: send a SUCI acquisition request to the UICC through the first communication connection according to the identity request; and acquire the SUCI from the UICC through the first communication connection.
- FIG. 6 shows a schematic structural diagram of a device for sending a user identity provided by the present application, wherein a dashed box indicates that the module or unit is optional.
- the device 600 may be used to implement the methods described in the foregoing method embodiments, and the device 600 may be a chip or a terminal device.
- the device 600 includes one or more processors 601, and the one or more processors 601 can support the device 600 to implement the method in the method embodiment corresponding to FIG. 2 .
- the processor 601 may be a general purpose processor or a special purpose processor.
- the processor 601 may be a central processing unit (CPU) or a baseband processor.
- the baseband processor may be used to process communication data (eg, SUCI), and the CPU may be used to control the device 600, execute software programs, and process data for the software programs.
- the device 600 may also include a transceiving unit 605 and an antenna 606 to implement signal input (reception) and output (transmission).
- the device 600 may be a chip, and the transceiver unit 605 may be an input and/or output circuit of the chip, or the transceiver unit 605 may be a communication interface of the chip, and the chip may be used as a component part of a terminal device or other wireless communication device .
- the device 600 may include one or more memories 602 on which a program 604 is stored, and the program 604 can be executed by the processor 601 to generate instructions 603, so that the processor 601 executes the methods described in the above method embodiments according to the instructions 603.
- data may also be stored in the memory 602 .
- the processor 601 may also read data stored in the memory 602 , the data may be stored at the same storage address as the program 604 , or the data may be stored at a different storage address from the program 604 .
- the processor 601 and the memory 602 can be provided separately, or can be integrated together, for example, integrated on a system on chip (system on chip, SOC).
- SOC system on chip
- the steps in the above method embodiments may be implemented by logic circuits in the form of hardware or instructions in the form of software in the processor 601 .
- the processor 601 may be a CPU, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic devices , for example, discrete gates, transistor logic devices, or discrete hardware components.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA field programmable gate array
- the present application also provides a computer program product, which implements the communication method described in any method embodiment in the present application when the computer program product is executed by the processor 601 .
- the computer program product can be stored in the memory 602 , such as a program 604 , and the program 604 is finally converted into an executable object file that can be executed by the processor 601 after processing processes such as preprocessing, compilation, assembly, and linking.
- the present application also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a computer, implements the communication method described in any method embodiment in the present application.
- the computer program can be a high-level language program or an executable object program.
- the computer-readable storage medium is, for example, memory 602 .
- Memory 602 may be volatile memory or non-volatile memory, or memory 602 may include both volatile and non-volatile memory.
- the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory.
- Volatile memory may be random access memory (RAM), which acts as an external cache.
- RAM random access memory
- SRAM static random access memory
- DRAM dynamic random access memory
- SDRAM synchronous DRAM
- SDRAM double data rate synchronous dynamic random access memory
- double data rate SDRAM double data rate SDRAM
- DDR SDRAM enhanced synchronous dynamic random access memory
- ESDRAM enhanced synchronous dynamic random access memory
- SCRAM synchronous link dynamic random access memory
- direct rambus RAM direct rambus RAM
- the disclosed systems, devices and methods may be implemented in other manners.
- some features of the method embodiments described above may be omitted, or not implemented.
- the device embodiments described above are only illustrative, and the division of units is only a logical function division. In actual implementation, there may be other division methods, and multiple units or components may be combined or integrated into another system.
- the coupling between the units or the coupling between the components may be direct coupling or indirect coupling, and the above-mentioned coupling includes electrical, mechanical or other forms of connection.
- the size of the sequence numbers of each process does not mean the sequence of execution, and the execution sequence of each process should be determined by its functions and internal logic, rather than the embodiments of the present application. implementation constitutes any limitation.
- system and “network” are often used interchangeably herein.
- the term “and/or” in this article is only an association relationship to describe the associated objects, indicating that there can be three kinds of relationships, for example, A and/or B, it can mean that A exists alone, A and B exist at the same time, independently There are three cases of B.
- the character "/" in this text generally indicates that the related objects are an "or” relationship.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims (10)
- 一种发送用户标识的方法,其特征在于,包括:移动设备ME通过第一通信连接从云卡池中的通用集成电路卡UICC接收全球用户身份模块USIM卡信息;所述ME从第五代5G独立SA网络接收身份请求,所述身份请求用于请求获取用户加密标识SUCI;所述ME根据所述身份请求和所述USIM卡信息获取所述SUCI,所述USIM卡信息用于指示所述SUCI的生成设备为所述ME或者所述UICC;所述ME向所述5G SA网络发送所述SUCI,所述SUCI用于建立第二通信连接。
- 根据权利要求1所述的方法,其特征在于,所述ME根据所述身份请求和所述USIM卡信息获取SUCI,包括:当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息不包括124服务和125服务时,所述ME根据所述身份请求在本地获取所述SUCI;或者,当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息包括124服务和125服务时,所述ME根据所述身份请求从所述UICC获取所述SUCI。
- 根据权利要求2所述的方法,其特征在于,所述ME根据所述身份请求从所述UICC获取所述SUCI,包括:所述ME根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;所述ME通过所述第一通信连接从所述UICC获取所述SUCI。
- 根据权利要求1所述的方法,其特征在于,所述ME根据所述身份请求和所述USIM卡信息获取SUCI,包括:当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息不满足下列四个条件中的任意一个时,所述ME根据所述身份请求从所述UICC获取所述SUCI;或者,当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息满足下列四个条件中的任意一个时,所述ME根据所述身份请求在本地获取所述SUCI;所述四个条件为:所述USIM卡信息包括运营商请求在所述ME处生成所述SUCI的配置信息;所述USIM卡信息包括无授权紧急会话的配置信息;所述USIM卡信息为R15之前的卡的信息;所述USIM卡信息为R15的卡的信息,但是所述R15的卡被配置为不加密卡。
- 根据权利要求4所述的方法,其特征在于,所述ME根据所述身份请求从所述UICC获取所述SUCI,包括:所述ME根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;所述ME通过所述第一通信连接从所述UICC获取所述SUCI。
- 一种发送用户标识的装置,其特征在于,包括接收单元、处理单元和发送单元,所述接收单元用于:通过第一通信连接从云卡池中的通用集成电路卡UICC接收全球用户身份模块USIM卡信息;从第五代5G独立SA网络接收身份请求,所述身份请求用于请求获取用户加密标识SUCI;所述处理单元用于:根据所述身份请求和所述USIM卡信息获取所述SUCI,所述USIM卡信息用于指示所述SUCI的生成设备为所述装置或者所述UICC;所述发送单元用于:向所述5G SA网络发送所述SUCI,所述SUCI用于建立第二通信连接。
- 根据权利要求6所述的装置,其特征在于,所述处理单元具体用于:当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息不包括124服务和125服务时,根据所述身份请求在本地获取所述SUCI;或者,当所述USIM卡信息包括加密指示信息时,并且,当所述USIM卡配置信息包括124服务和125服务时,根据所述身份请求从所述UICC获取所述SUCI。
- 根据权利要求7所述的装置,其特征在于,所述处理单元具体用于:根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;通过所述第一通信连接从所述UICC获取所述SUCI。
- 根据权利要求6所述的装置,其特征在于,所述处理单元具体用于:当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息不满足下列四个条件中的任意一个时,根据所述身份请求从所述UICC获取所述SUCI;或者,当所述USIM卡信息不包括加密指示信息时,并且,当所述USIM卡信息满足下列四个条件中的任意一个时,根据所述身份请求在本地获取所述SUCI;所述四个条件为:所述USIM卡信息包括运营商请求在所述装置处生成所述SUCI的配置信息;所述USIM卡信息包括无授权紧急会话的配置信息;所述USIM卡信息为R15之前的卡的信息;所述USIM卡信息为R15的卡的信息,但是所述R15的卡被配置为不加密卡。
- 根据权利要求9所述的装置,其特征在于,所述处理单元具体用于:根据所述身份请求通过所述第一通信连接向所述UICC发送SUCI获取请求;通过所述第一通信连接从所述UICC获取所述SUCI。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/039,851 US20240098487A1 (en) | 2020-12-18 | 2021-10-14 | Method and apparatus for sending subscriber identifiers |
JP2023557473A JP2023552243A (ja) | 2020-12-18 | 2021-10-14 | 利用者識別子を送信する方法と装置 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011391949.0 | 2020-12-03 | ||
CN202011391949.0A CN112770314B (zh) | 2020-12-03 | 2020-12-03 | 建立通信连接的方法和装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022116695A1 true WO2022116695A1 (zh) | 2022-06-09 |
Family
ID=75693740
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/123683 WO2022116695A1 (zh) | 2020-12-03 | 2021-10-14 | 发送用户标识的方法和装置 |
PCT/CN2021/123684 WO2022116696A1 (zh) | 2020-12-03 | 2021-10-14 | 建立通信连接的方法和装置 |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/123684 WO2022116696A1 (zh) | 2020-12-03 | 2021-10-14 | 建立通信连接的方法和装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20230396988A1 (zh) |
EP (1) | EP4221285A4 (zh) |
JP (1) | JP7450816B2 (zh) |
CN (1) | CN112770314B (zh) |
WO (2) | WO2022116695A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112770314B (zh) * | 2020-12-03 | 2024-04-09 | 上海途鸽数据科技有限公司 | 建立通信连接的方法和装置 |
CN115002931A (zh) * | 2022-05-18 | 2022-09-02 | 展讯通信(上海)有限公司 | 驻网方法及相关设备 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104394522A (zh) * | 2014-10-30 | 2015-03-04 | 北京神州泰岳软件股份有限公司 | 一种通信链路的建立方法及装置 |
CN106412887A (zh) * | 2016-06-15 | 2017-02-15 | 苏州畅途网络科技有限公司 | 一种虚拟sim卡的快速鉴权方法、系统、服务器及终端 |
US20170353939A1 (en) * | 2016-06-01 | 2017-12-07 | Intel IP Corporation | Device and method for recovering services from network rejections to wireless communication devices |
CN111083695A (zh) * | 2019-12-30 | 2020-04-28 | 江苏全链通信息科技有限公司 | 5g通信无卡接入方法、设备及存储介质 |
CN111566994A (zh) * | 2018-01-12 | 2020-08-21 | 瑞典爱立信有限公司 | 管理标识符隐私 |
CN112887965A (zh) * | 2020-12-18 | 2021-06-01 | 合肥途鸽科技有限公司 | 发送用户标识的方法和装置 |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013123233A2 (en) | 2012-02-14 | 2013-08-22 | Apple Inc. | Methods and apparatus for large scale distribution of electronic access clients |
CN105163305A (zh) * | 2015-09-23 | 2015-12-16 | 联想(北京)有限公司 | 一种通讯方法及电子设备 |
CN105338515B (zh) * | 2015-11-02 | 2020-08-25 | 联想(北京)有限公司 | 数据业务传输方法和移动通信设备 |
CN106454821A (zh) * | 2016-02-01 | 2017-02-22 | 深圳市途鸽信息有限公司 | 虚拟用户识别模块鉴权方法和装置 |
CN107306387A (zh) * | 2016-04-18 | 2017-10-31 | 中兴通讯股份有限公司 | 网络连接方法及装置、终端、系统 |
CN107567011B (zh) * | 2016-07-01 | 2020-04-28 | 中兴通讯股份有限公司 | 一种网络接入业务实现方法、装置及通信终端 |
US10433156B1 (en) * | 2018-04-24 | 2019-10-01 | Sprint Communications Company L.P. | Adapting subscriber identity module (SIM) card |
CN108449801B (zh) * | 2018-05-11 | 2020-09-18 | 深圳市优克联新技术有限公司 | 网络连接方法、装置、计算机装置及计算机可读存储介质 |
CN111866778B (zh) * | 2019-04-29 | 2022-04-05 | 华为技术有限公司 | 基于漫游场景的鉴权方法、设备及系统 |
CN110401942B (zh) | 2019-08-22 | 2022-05-27 | 天津泰岳小漫科技有限公司 | 云端sim卡处理方法、装置及服务器 |
CN112770314B (zh) * | 2020-12-03 | 2024-04-09 | 上海途鸽数据科技有限公司 | 建立通信连接的方法和装置 |
-
2020
- 2020-12-03 CN CN202011391949.0A patent/CN112770314B/zh active Active
-
2021
- 2021-10-14 JP JP2023525080A patent/JP7450816B2/ja active Active
- 2021-10-14 EP EP21899730.2A patent/EP4221285A4/en active Pending
- 2021-10-14 US US18/033,340 patent/US20230396988A1/en active Pending
- 2021-10-14 WO PCT/CN2021/123683 patent/WO2022116695A1/zh active Application Filing
- 2021-10-14 WO PCT/CN2021/123684 patent/WO2022116696A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104394522A (zh) * | 2014-10-30 | 2015-03-04 | 北京神州泰岳软件股份有限公司 | 一种通信链路的建立方法及装置 |
US20170353939A1 (en) * | 2016-06-01 | 2017-12-07 | Intel IP Corporation | Device and method for recovering services from network rejections to wireless communication devices |
CN106412887A (zh) * | 2016-06-15 | 2017-02-15 | 苏州畅途网络科技有限公司 | 一种虚拟sim卡的快速鉴权方法、系统、服务器及终端 |
CN111566994A (zh) * | 2018-01-12 | 2020-08-21 | 瑞典爱立信有限公司 | 管理标识符隐私 |
CN111083695A (zh) * | 2019-12-30 | 2020-04-28 | 江苏全链通信息科技有限公司 | 5g通信无卡接入方法、设备及存储介质 |
CN112887965A (zh) * | 2020-12-18 | 2021-06-01 | 合肥途鸽科技有限公司 | 发送用户标识的方法和装置 |
Also Published As
Publication number | Publication date |
---|---|
EP4221285A1 (en) | 2023-08-02 |
JP2023546509A (ja) | 2023-11-02 |
US20230396988A1 (en) | 2023-12-07 |
CN112770314A (zh) | 2021-05-07 |
EP4221285A4 (en) | 2024-03-27 |
CN112770314B (zh) | 2024-04-09 |
JP7450816B2 (ja) | 2024-03-15 |
WO2022116696A1 (zh) | 2022-06-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230016378A1 (en) | Pdu session management | |
EP3557898B1 (en) | Authorisation verification method and apparatus | |
US9467432B2 (en) | Method and device for generating local interface key | |
US10743180B2 (en) | Method, apparatus, and system for authenticating WIFI network | |
WO2022116695A1 (zh) | 发送用户标识的方法和装置 | |
US20230262459A1 (en) | Service authorization method, communication apparatus, and system | |
WO2018176441A1 (zh) | 用户鉴权方法和装置 | |
CN109891921B (zh) | 下一代系统的认证的方法、装置和计算机可读存储介质 | |
WO2017133021A1 (zh) | 一种安全处理方法及相关设备 | |
WO2022170994A1 (zh) | Pc5根密钥处理方法、装置、ausf及远程终端 | |
US20230179997A1 (en) | Method, system, and apparatus for determining user plane security algorithm | |
CN112514436A (zh) | 发起器和响应器之间的安全的、被认证的通信 | |
CN112449323B (zh) | 一种通信方法、装置和系统 | |
CN107104932A (zh) | 密钥更新方法、装置及系统 | |
US20240098487A1 (en) | Method and apparatus for sending subscriber identifiers | |
US20160044487A1 (en) | Network access method and apparatus, and network system | |
WO2018170703A1 (zh) | 一种连接建立方法及装置 | |
US10136283B2 (en) | Methods for providing a response to a command requesting the execution of a proactive command | |
WO2021035740A1 (zh) | 访问控制方法、服务器、访问设备及存储介质 | |
CN113543131A (zh) | 网络连接管理方法、装置、计算机可读介质及电子设备 | |
CN116158100A (zh) | 一种蓝牙设备接入认证方法、电子设备及存储介质 | |
US20210120411A1 (en) | Method for obtaining a profile for access to a telecommunications network | |
WO2023159603A1 (zh) | 一种安全实现方法及装置、终端设备、网元 | |
WO2023185513A1 (zh) | 通信方法、装置以及系统 | |
WO2024183537A1 (zh) | 一种通信方法以及通信装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21899729 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18039851 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023557473 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21899729 Country of ref document: EP Kind code of ref document: A1 |