Privacy Enhancement Method for Mobile Communication Sessions Based on Physical Layer Security
A technology for physical layer security and mobile communication, which is applied in the field of enhancing the privacy of mobile communication sessions. It can solve the problems of leakage of sensitive information such as user identity identification and easy leakage of user identity information in plaintext transmission, and achieve the effect of enhancing security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0035] Embodiment one: if figure 2 As shown, a method for enhancing the privacy of a mobile communication session based on physical layer security comprises the following steps:
[0036] Step 100: the terminal sends an initial access request, and the base station allocates a dedicated key negotiation channel for the terminal;
[0037] Step 200: the base station and the terminal respectively extract the channel characteristics of the private key negotiation channel, and use the channel characteristics to generate a consensus key;
[0038] Step 300: the base station allocates a dedicated traffic channel for the terminal, and releases the aforementioned dedicated key negotiation channel;
[0039] Step 400: The terminal and the base station use the key generated in step B to encrypt the communication session on the dedicated traffic channel;
[0040] Step 500: The terminal and the base station regularly measure and extract the channel characteristics of the dedicated traffic ch...
Embodiment 2
[0053] Embodiment 2: On the basis of Embodiment 1, the above method for enhancing the privacy of mobile communication sessions based on physical layer security, wherein in step C, the base station bases the available channel resources in the network, the support capabilities of the terminal, and the required interaction information The rate request allocates an applicable dedicated service channel for the terminal to meet the large amount of subsequent interactive information; after receiving the dedicated service channel allocation instruction, the terminal releases the dedicated key negotiation channel and enables the dedicated service channel.
[0054] In step D, the terminal and the base station encrypt the information with a light-weight encryption method, and select an appropriate codec and rate matching for the encrypted information, and interact on the dedicated traffic channel enabled in step C.
[0055] Further, in step D, it is assumed that the plaintext signal to be...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com