Method for reinforcing security and protecting privacy right of positioning service in Wimax network

A positioning service and positioning server technology, applied in the field of mobile communication, can solve the problems of not complying with Wimax network, the privacy check mechanism is obscure, and the protocol stack cannot transmit and process the message of positioning service authentication and authorization check, etc.

Inactive Publication Date: 2013-10-23
BEIJING SAMSUNG TELECOM R&D CENT +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0031] (2) The privacy check mechanism of LBS in 3GPP is obscure and difficult to understand, has poor practicability, and does not meet the popular and practical original intention of Wimax network;
[0032] (3) The privacy check mechanism of LBS in 3GPP is relatively complicated, which does not conform to the simple and practical principle of Wimax network;
[0033] (4) The LBS privacy check mechanism in 3GPP leaves too much space for operators
[0042] (2) How to authenticate the LBS business to ensure that only the contracted LBS business can obtain the service, and the unsigned business cannot obtain the service;
[0044] (4) Since the protocol stack in the current Wimax network cannot transmit and process the authentication and authorization check message for the positioning service, what kind of protocol stack is used to transmit the authentication and authorization check request / response message in Figure 1 and how to process it, etc.
[0071] The advantage of implementing the authentication and authorization check function of LBS services in AAA is that the functions are concentrated, and the disadvantage is that the modification of AAA is slightly larger

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for reinforcing security and protecting privacy right of positioning service in Wimax network
  • Method for reinforcing security and protecting privacy right of positioning service in Wimax network
  • Method for reinforcing security and protecting privacy right of positioning service in Wimax network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] To achieve the above object, the method for enhancing security and protecting privacy rights for positioning services in the Wimax network according to the present invention will be described from the following three aspects:

[0086] 1. Authentication of LBS clients

[0087] (1) A list of clients allowed to access LBS is stored in LS;

[0088] For specific technical solutions, please refer to Patent Document 1.

[0089](2) LBS client and LS use existing security protocols such as SSL / TLS

[0090] The interface protocol stack between LBS client and LS includes 201 IP layer, 202 TCP layer, 203 TLS record layer, 204 TLS handshake protocol and 205 LBS control layer.

[0091] The process of LBS client and LS using existing security protocols such as SSL / TLS to authenticate and start LBS services includes the following five steps:

[0092] 1. Establish security capability attributes;

[0093] 2. Server authentication and key exchange; (optional)

[0094] 3. Client authe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for enhancing location-based service security and protecting user privacy in a Wimax network includes three aspects of LBS client authentication, LBS authentication and LBS requester authorization checking. The first method for LBS client authentication is to save the list of LBS clients that are authorized to access in LS. The second method for LBS client authentication is to employ security protocols like TLS, SSL, etc. in authentication process. LBS authentication is realized by checking whether the LBS and related QoS are matched with the subscribed LBS or not. The first method for LBS requester authorization checking is to perform LBS requester authorization checking by LS. The second method for LBS requester authorization checking is to perform LBS requester authorization checking by AAA. Thus, the present invention prevents illegal LBS clients or non-subscribed LBS service or unauthorized MSs from being provided with requested LBS service in virtue of the above three aspects. Therefore, the security can be enhanced for LBS service and user privacy can be protected in a Wimax network, and relevant blank space in current Wimax standard can be made up for.

Description

technical field [0001] The present invention relates to the field of mobile communications, and more specifically, to an authentication / authorization / accounting (hereinafter referred to as AAA) pair in a globally interoperable microwave access (Worldwide Interoperability for Microwave Access, hereinafter referred to as Wimax) network. Location based service (Location Based Service, hereinafter abbreviated as LBS) authentication and authorization check method to ensure the security of location services in the Wimax network and ensure the privacy of users. Background technique [0002] The third generation partnership project (hereinafter referred to as 3GPP) technical specifications 3GPP TS 22.071 and 3GPP TS 23.271 stipulate the mechanism of confidentiality check for positioning services in wideband code division multiple access (hereinafter referred to as WCDMA) networks. Among them, it is stipulated that the modules related to the privacy check include: [0003] (1) Priva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/00H04L12/28H04L12/16
CPCH04L63/10H04L63/166H04L2209/80H04L9/3273H04L63/08H04L9/321H04L63/06H04L63/0892
Inventor 刘美丽
Owner BEIJING SAMSUNG TELECOM R&D CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products