Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for anonymous communication as well as registering method and access node adopted in same

A technology for accessing nodes and anonymous communication, which is applied in the field of communication and can solve problems such as the inability to determine the location identification of communication nodes and the inability to establish communication node connections

Inactive Publication Date: 2011-05-04
ZTE CORP
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identity mark must be the real identity of the communication node, and the identity mark must be passed between the communication nodes, otherwise the location mark of the communication node cannot be determined, and the connection between the communication nodes cannot be established

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for anonymous communication as well as registering method and access node adopted in same
  • Method for anonymous communication as well as registering method and access node adopted in same
  • Method for anonymous communication as well as registering method and access node adopted in same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] figure 2 The overall implementation process of the method for realizing anonymous communication is shown, including:

[0086] 201: After the terminal applies for opening the anonymous communication service, save the information that the terminal has opened the anonymous communication service in the user attribute of the terminal in the authentication center, assuming that the access identifier of the terminal is AIDm, then use the AIDm to identify the user attribute of the terminal;

[0087] 202: The terminal accesses the network, and the accessed ASN (ASNm) allocates a RID (RIDm) for it, and the ASNm registers the mapping information with the ILR (ILRm) where the terminal belongs, and the ILRm stores the AIDm-RIDm mapping information of the terminal;

[0088] 203: The terminal applies for anonymous communication;

[0089] 204: The terminal initiates end-to-end anonymous communication with the communication peer;

[0090] 205: The terminal cancels the anonymous communi...

Embodiment 2

[0092] image 3 Shown is a detailed description of the above step 203, which step includes:

[0093] 301: The terminal sends an anonymous communication request to ASNm, and the request carries the identity identifier AIDm;

[0094] 302: ASNm confirms to the authentication center whether the terminal has the authority for anonymous communication services;

[0095] 303: The authentication center queries the user attributes of the terminal, and if the terminal has the authority for anonymous communication services, sends a confirmation message to ASNm;

[0096] The steps 302-303 are optional steps according to operational needs.

[0097] 304: After receiving the confirmation message, ASNm sends an anonymous identity identifier allocation request to ILRm;

[0098] 305: After ILRm receives the anonymous identity allocation request from ASNm, it allocates an anonymous identity for the terminal, saves the terminal's anonymous identity in the terminal's record, and can add AIDx to ...

Embodiment 3

[0105] Figure 4 Shown is the equivalent alternative of the above-mentioned embodiment 2, the difference is that the following method uses ASN to complete the distribution process of the anonymous identity identifier AIDx, including:

[0106] 401: After receiving the confirmation message from the authentication center, ASNm assigns AIDx to the terminal, and binds the terminal's AIDx with the terminal's line ID to form AIDx-line ID mapping information, which is stored in the terminal's data area and records that the terminal is anonymous communication status;

[0107] 402: ASNm initiates the AIDm-AIDx registration process to ILRm, and ILRm adds AIDx to the AIDm-RIDm mapping information of the terminal saved locally to save the AIDm-AIDx-RIDm mapping information, or saves the AIDm-AIDx mapping information separately;

[0108] 403: The ASNm sends an anonymous communication confirmation message to the terminal, carrying the anonymous identity identifier AIDx assigned to the termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for anonymous communication, which is applied to a network with a separating framework of identity identifiers and position identifiers and comprises the following steps of: sending an anonymous communication request to the network by a terminal; after the anonymous communication request is received by the network, allocating an anonymous identity identifier to the terminal, and returning the anonymous identity identifier to the terminal; and sending a data message to a communication opposite end by the terminal through an access node accessed in the terminal in the network, wherein the source address of the data message is the anonymous identity identifier of the terminal, and the destination address is the identity identifier of the communication opposite end of the terminal. The solution for separating the identity identifiers from the position identifiers based on the method provided by the invention can provide an anonymous space on the basis of constructing a real-name trust domain to satisfy the requirements of business development. Under the separating framework of the identity identifiers and the position identifiers, the real-name trust domain is ensured by network credit, and the business of the anonymous space is developed by the network according to business authorization.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an anonymous communication method, a registration method and the adopted access node. Background technique [0002] At present, the IP address in the TCP / IP (Transmission Control Protocol / Internet Internet Protocol) protocol widely used on the Internet has dual functions. The identity of the interface. At the beginning of the TCP / IP protocol design, the movement of the host was not considered. However, when the host mobile becomes more and more common, the semantic overload defect of this IP address becomes more and more obvious. When the IP address of the host changes, not only the route will change, but also the identity of the communication terminal host will change, which will lead to an increasingly heavy routing load, and the change of the host identity will lead to interruption of applications and connections. [0003] The purpose of proposing the separat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/26H04W76/02H04L29/12
CPCH04L61/2539H04L67/14H04L61/50
Inventor 孙翼舟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products