Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy-protected mobile communication authentication method

A mobile communication and privacy protection technology, which is applied in the field of privacy protection mobile communication authentication, can solve the problems of not being able to stop opponents and leak user privacy, and achieve the effect of protecting user privacy and protecting user privacy

Active Publication Date: 2020-09-15
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a series of studies in recent years have shown that the 5G-AKA protocol cannot prevent an adversary from distinguishing different users and linking multiple sessions of the same user by setting up pseudo base stations and actively sending mobile signals, so user privacy will still be leaked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy-protected mobile communication authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] Embodiment 1. Apply the ECIES algorithm included in the 5G-AKA protocol to implement a privacy-protected mobile communication authentication method proposed by the present invention. The KEM scheme included in the ECIES algorithm is denoted as KEM ECIES =(Encap ECIES ,Decap ECIES ).

[0036] The procedure of this method is as follows figure 1 As shown, the specific description is as follows:

[0037] 1) During the initialization phase of the 5G-AKA protocol, the user equipment encrypts its user identifier (SUPI) and sends it to the mobile operator through the ECIES algorithm (the encrypted SUPI is denoted as SUCI).

[0038] 1-1) The user equipment executes EncapECIES Algorithm, get {c,k UE}. Afterwards, in addition to using k in accordance with the provisions of the 5G-AKA agreement UE Encrypt SUPI with the corresponding data encapsulation algorithm, and send SUCI to the mobile operator, and save k UE as a session key for the challenge-response phase.

[0039] ...

Embodiment 2

[0052] Embodiment 2. Using the KEM scheme resistant to quantum computer attacks to implement a privacy-protected mobile communication authentication method proposed by the present invention.

[0053] In this embodiment, the KEM scheme that is resistant to quantum computer attacks is used to protect user privacy in a 5G mobile communication system. Remember KEM PQ =(Encap PQ ,Decap PQ ) is a KEM scheme that can resist quantum computer attacks, and the specific description of this embodiment is as follows:

[0054] 1) During the initialization phase of the 5G-AKA protocol, the user equipment and the mobile operator pass the KEM PQ Negotiate a session key:

[0055] 1-1) The user equipment calls Encap PQ The algorithm obtains {c,k UE}, store k UE , and send c to the mobile operator via the 5G-AKA information flow.

[0056] 1-2) The mobile operator calls Decap PQ Algorithm to get k HN , and store k HN .

[0057] 2) In the challenge-response phase of the 5G-AKA protocol,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a privacy-protected mobile communication authentication method, belongs to the field of communication technologies and information security technologies, and aims to enhance privacy protection in mobile communication authentication. In an initialization stage of a 5G-AKA protocol, user equipment and a mobile operator negotiate to generate a session key through a key encapsulation mechanism and store the session key; in a challenge-response stage of the 5G-AKA protocol, the mobile operator randomly selects a challenge value R, encrypts the challenge value R by adopting the session key, and generates an authentication vector according to the encrypted challenge value R'; after receiving the authentication vector, the user equipment decrypts the R' by adopting the session key to obtain a decrypted challenge value, and generates information corresponding to the execution state of an SIM card according to the decrypted challenge value; and the mobile operator selectsa corresponding processing mode according to the type of the information.

Description

technical field [0001] The invention belongs to the technical field of communication technology and information security, aims at enhancing privacy protection in mobile communication authentication, and is embodied as a privacy-protecting mobile communication authentication method. Background technique [0002] The 3GPP alliance is currently working on the standardization of the fifth generation mobile communication technology (5G), and has proposed a new version of the authentication and key establishment protocol for 5G, that is, the 5G-AKA protocol. Compared with the AKA protocol in the 3G and 4G era, an important improvement of 5G-AKA is to protect the user identifier (SUPI) through the ECIES public key encryption algorithm, thereby preventing the adversary from obtaining the identifier by eavesdropping on the wireless channel and protecting user privacy. the goal of. However, a series of studies in recent years have shown that the 5G-AKA protocol cannot prevent an adve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W12/06
Inventor 张振峰王宇辰
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products