Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User identity secret-keeping method in communication system

A communication system and user identity technology, which is applied in the field of keeping user identity confidential, can solve problems such as security identity information leakage, security damage, etc., and achieve the effect of meeting security requirements and good confidentiality

Active Publication Date: 2006-06-21
ZTE CORP
View PDF0 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Malicious people can take the opportunity to eavesdrop on the user's identity information, causing security damage
If the malicious attacker has enough resources, he can also take a more direct attack method, build a fake network, and send a permanent identification request signal to the mobile station. At this time, the mobile station will send its own identity information to the attacker. Or, this will directly lead to the leakage of security identity information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity secret-keeping method in communication system
  • User identity secret-keeping method in communication system
  • User identity secret-keeping method in communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Specific embodiments of the present invention will be described in detail below, so as to fully understand the technical effects and solutions of the present invention.

[0043] The main idea of ​​the present invention is to adopt the asymmetric encryption technology in the cryptography in the identification process of the communication system. In cryptography, asymmetric cryptography is relative to symmetric cryptography. Symmetric cryptography uses the same key for encryption and decryption, while asymmetric cryptography uses different keys for encryption and decryption. The common asymmetric Cryptographic algorithms such as RSA, etc. Asymmetric cryptography uses a pair of corresponding keys—a public key and a private key. The public key is usually public and does not need to be kept secret; the private key needs to be kept carefully by the user, and only the user knows it. In common applications, the public key is used to keep data confidential to prevent malicious...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed secret method for ID in communication system with at least a user terminal and an identification server comprises: the user terminal accesses into network; the provide network identification server asks user to provide ID information; the user terminal enciphers self ID information with public key from server to send to server; the server deciphers the ID information with self private key to identify ID and provide service and charge. This invention uses asymmetric cryptography technology to satisfy security request.

Description

technical field [0001] The invention relates to the security field of communication systems, in particular to a method for realizing confidentiality of user identities in the communication system. Background technique [0002] With the development of computer technology, communication technology has also achieved rapid development. Various communication methods have greatly facilitated human production and life, and have profoundly affected the way of human existence. Common communication network systems include fixed network communication systems, mobile communication systems (cellular systems), wireless local area networks (IEEE802.11), etc.; possible future communication systems include wireless metropolitan area networks (IEEE802.16), etc. [0003] At present, various communication systems are usually constructed, operated and managed by specialized operators. Operators invest a certain amount of funds to build and maintain communication networks, and charge fees by pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 赵志飞彭志威李卓明孙鲁东
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products