Method and user device for sending user identity authentication information
A technology for user identity authentication and user identity information, which is applied in wireless communication, electrical components, network data management, etc., and can solve problems such as unfavorable user information confidentiality.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
specific Embodiment approach
[0144] Combine below Figure 10 Introduces the specific implementation of the improved user identity confidentiality method in EPS (Evolved Packet System)-AKA (Authentication and Key Agreement). Because in the existing EPS-AKA process, when the user initiates a service request to the MME, the IMSI information will be transmitted in clear text on the wireless link. The specific implementation method comprises the following steps:
[0145] Step 801: service request: the UE sends a service request to the MME, requesting access to the service network.
[0146] Step 802: User identity request: After receiving the service request sent by the UE, the MME sends a user identity request message to the UE.
[0147] Step 803: User identity response: After UE receives the request message, the USIM generates a random serial number Random, uses the first key stored in the USIM to encrypt the serial number formed by concatenating Random and IMSI, and obtains the encrypted serial number E R...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com