CN111148094A - Registration method of 5G user terminal, user terminal equipment and medium - Google Patents

Registration method of 5G user terminal, user terminal equipment and medium Download PDF

Info

Publication number
CN111148094A
CN111148094A CN201911402049.9A CN201911402049A CN111148094A CN 111148094 A CN111148094 A CN 111148094A CN 201911402049 A CN201911402049 A CN 201911402049A CN 111148094 A CN111148094 A CN 111148094A
Authority
CN
China
Prior art keywords
public key
block
temporary identity
user terminal
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911402049.9A
Other languages
Chinese (zh)
Other versions
CN111148094B (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201911402049.9A priority Critical patent/CN111148094B/en
Publication of CN111148094A publication Critical patent/CN111148094A/en
Application granted granted Critical
Publication of CN111148094B publication Critical patent/CN111148094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/75Temporary identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The embodiment of the invention provides a registration method of a 5G user terminal, user terminal equipment and a medium, wherein the method comprises the following steps: the 5G user terminal equipment sends a registration application to a temporary identity registration server in the block chain, wherein the registration application comprises a first public key corresponding to the temporary identity generated by the equipment; receiving block information returned by the temporary identity registration server, and performing hash value verification on the block chain and blocks in the block chain according to the block information; when the verification is passed, searching and acquiring a public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator; and according to a preset encryption algorithm, encrypting the second public key of the user by adopting the public key of the target operator and the first public key, and sending encrypted data obtained by encryption to the temporary identity registration server for identity registration. The scheme provided by the embodiment of the invention improves the data security and confidentiality of the 5G user terminal equipment during identity registration.

Description

Registration method of 5G user terminal, user terminal equipment and medium
Technical Field
The embodiment of the invention relates to the technical field of block chains, in particular to a registration method of a 5G user terminal, user terminal equipment and a medium.
Background
In a standard 5G registration process, a SIM card is inserted into a 5G user terminal device (UE for short), the SIM card has a public key of an operator, or a shared key of the 5G UE and the operator, and any man in the middle cannot modify the built-in public key of the SIM card, so man in the middle attack cannot be performed, but in a SIM card-less access scheme, when the 5G UE without the SIM card submits its own public key, a malicious man in the middle or a listener can easily replace the public key, and the operator cannot sense the public key, so all confidential communications between the 5G UE and the operator may be monitored.
Disclosure of Invention
The embodiment of the invention provides a registration method of a 5G user terminal, user terminal equipment and a medium, which are used for improving the data security and confidentiality of the 5G user terminal equipment without an SIM card during identity registration.
A first aspect of an embodiment of the present invention provides a registration method for a 5G user terminal, where the method includes:
the method comprises the steps that 5G user terminal equipment sends a registration application to a temporary identity registration server in a block chain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and a public key of an operator is recorded in a block of the block chain; the 5G user terminal equipment receives the block information of the block chain returned by the temporary identity registration server according to the registration application, and performs hash value verification on the block chain and the blocks in the block chain according to the block information; when the block chain and the blocks in the block chain are verified, the 5G user terminal equipment searches and obtains the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator; and the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In a possible embodiment, the block information returned by the temporary identity registration server is information of all blocks in the block chain.
In a possible implementation, the registration application further includes an identifier of the target operator.
In a possible implementation manner, the block information returned by the temporary identity registration server includes information of the first block recorded with the public key of the target operator.
In a possible implementation manner, the block information returned by the temporary identity registration server further includes: information of a first N blocks and a last M blocks of the first block in the block chain, wherein N and M are positive integers.
A second aspect of an embodiment of the present invention provides a 5G user terminal device, including:
a processor and a memory, the memory having instructions stored therein that when executed by the processor perform the following: sending a registration application to a temporary identity registration server in a block chain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and a public key of an operator is recorded in a block of the block chain; receiving the block information of the block chain returned by the temporary identity registration server according to the registration application, and performing hash value verification on the block chain and the blocks in the block chain according to the block information; when the block chain and the blocks in the block chain are verified, searching and acquiring the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator; and according to a preset encryption algorithm, encrypting a second public key corresponding to the permanent identity of the user by adopting the public key of the target operator and the first public key, and sending encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In a possible embodiment, the block information returned by the temporary identity registration server is information of all blocks in the block chain.
In a possible implementation, the registration application further includes an identifier of the target operator.
In a possible implementation manner, the block information returned by the temporary identity registration server includes information of the first block recorded with the public key of the target operator.
In a possible implementation manner, the block information returned by the temporary identity registration server further includes: information of a first N blocks and a last M blocks of the first block in the block chain, wherein N and M are positive integers.
A third aspect of embodiments of the present invention provides a computer-readable storage medium, which includes instructions that, when executed on a computer, cause the computer to perform the method of the first aspect.
In the embodiment of the invention, the 5G user terminal equipment carries the first public key corresponding to the pre-generated temporary identity in the registration application and sends the first public key to the temporary identity registration server in the block chain, so that the temporary identity registration server returns the block information of the block chain according to the registration application, the 5G user terminal equipment carries out hash value verification on the block chain and the blocks in the block chain according to the block information returned by the temporary identity registration server, and searches and obtains the public key of the target operator from the block information returned by the temporary identity registration server according to the identification of the target operator when the verification is passed, because the embodiment of the invention does not directly send the public key of the target operator to the 5G user terminal equipment as in the prior art, but sends the block information of the block chain to the 5G user terminal equipment, because the difficulty of forging the block chain block is far greater than the difficulty of forging the public key of the operator, therefore, the issuing security and confidentiality of the public key of the target operator can be improved, further, after the 5G user terminal equipment obtains the public key of the target operator, the public key of the target operator and the first public key corresponding to the temporary identity of the 5G user terminal equipment are adopted to encrypt the second public key corresponding to the permanent identity of the 5G user terminal equipment through a preset encryption algorithm, the encrypted data are sent to the temporary identity registration server to perform identity registration, the security and confidentiality of the permanent identity public key sent by the 5G user terminal equipment to the temporary identity registration server can be improved, and the security and confidentiality of the whole registration process are further protected.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a communication system according to an embodiment of the present invention;
fig. 3 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a 5G user terminal device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "comprises" and "comprising," and any variations thereof, in the description and claims of this invention, are intended to cover non-exclusive inclusions, e.g., a process or an apparatus that comprises a list of steps is not necessarily limited to those structures or steps expressly listed but may include other steps or structures not expressly listed or inherent to such process or apparatus.
Fig. 1 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application, and as shown in fig. 1, the method includes:
step 101, the 5G user terminal device sends a registration application to a temporary identity registration server in a block chain, wherein the registration application comprises a first public key corresponding to the temporary identity generated by the 5G user terminal device, and a public key of an operator is recorded in a block of the block chain.
The blockchain referred to in this embodiment is a blockchain maintained by an operator, the temporary identity registration server accesses the blockchain and records and maintains the latest public keys of all operators in the blockchain, the 5G UE or other terminal devices may be accessed into the blockchain as nodes of the blockchain, and the blockchain may be used to record registration information of each node in the blockchain and transaction information between each node. The 5G UE referred to in this embodiment may not have an access function of a complete block chain, as long as the capability of verifying and analyzing the block on the block chain and retrieving the block record under a certain specified condition is available.
For example, fig. 2 is a schematic structural diagram of a communication system according to an embodiment of the present invention, where in the system shown in fig. 2, a device UE may be understood as a 5G user terminal device referred to in this embodiment, a 5G core network (5G core network, 5GC) of an operator accounts a public key of the operator in a block chain, and a temporary identity registration server accesses the block chain and records and maintains the public key of each operator. In the registration process, the 5G UE first generates a public key and a private key (for convenience of distinguishing a first public key and a first private key), which correspond to a temporary identity, and then sends a registration application carrying the first public key to an Access and mobility Management Function (AMF) or a Session Management Function (SMF) in the 5GC through the 5G base station gNB, the AMF or the SMF notifies a User Plane network Function (User Plane Function, UPF) to transfer the registration application to the temporary identity registration server, and after receiving the registration application, the temporary identity registration server signs block information of all blocks in a block chain by using its own private key, and returns the signed information to the 5G UE. The block information of the block includes, but is not limited to: the hash value of the block, the hash value of the previous block, and the content information of the block.
And 102, the 5G user terminal equipment receives the block information of the block chain returned by the temporary identity registration server according to the registration application, and performs hash value verification on the block chain and the blocks in the block chain according to the block information.
After receiving the block information fed back by the temporary identity registration server, the 5G UE firstly verifies the private key signature in the block information based on the pre-obtained public key of the temporary identity registration server, if the verification is passed, further calculates the hash value of each block based on the block information of each block fed back by the temporary identity registration server, and comparing the hash value of each block obtained by calculation with the hash value of each block carried in the block information fed back by the temporary identity registration server, verifying whether the hash value of each block obtained by calculation is consistent with the hash value of each block recorded in the block information, and verifying whether the hash value of each block is less than the predetermined difficulty value and whether the hash value of the previous block is recorded in each block, if the above-mentioned verification is passed, and searching and obtaining the public key of the target operator from the block information fed back by the temporary identity registration server according to the identifier of the target operator.
Step 103, when the block chain and the blocks in the block chain are verified, the 5G user terminal device searches and obtains the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator.
Optionally, in a feasible manner, the 5G UE may traverse the block information of each block returned by the temporary identity registration server one by one to obtain the public key of the target operator.
Optionally, in another feasible manner, in order to improve the efficiency of searching the target operator public key by the 5G UE, pointer information of the target block may be further added to the block information fed back by the temporary identity registration server, where the target block is a block in which the target operator public key is recorded, and the pointer information of the target block is used to notify the 5G UE which block is the target block, so that the 5G UE can quickly and accurately lock the target block according to the pointer information of the target block, and the efficiency of acquiring the target operator public key is improved.
And step 104, the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by using the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
The preset encryption algorithm referred to in this embodiment is an encryption algorithm shared by the 5G UE and the temporary identity registration server. In order to ensure that the second public key of the permanent identity sent by the 5G UE is not monitored or replaced, the 5G UE needs to encrypt the second public key by adopting the public key of the target operator or the public key of the target operator and the first public key before sending the second public key to the temporary identity registration server according to a preset encryption algorithm, the encrypted data is sent to the temporary identity registration server after being signed by adopting the first private key of the 5G UE, after the temporary identity registration server receives the encrypted data, the signature of the private key of the encrypted data is firstly verified by adopting the first public key of the 5G UE, and if the encrypted data passes the verification, the encrypted data is decrypted based on the preset encryption algorithm to obtain the second public key of the 5G UE, so that the 5G UE is registered based on the second public key.
Of course, it should be understood by those skilled in the art that although the above embodiment only describes a method for encrypting the second public key of the 5G UE, in an actual scenario, not only the second public key but also other registration information of the 5gu may be encrypted, for example, in a possible scenario, an International Mobile Equipment Identity (IMEI) number of the 5G UE may also be encrypted, or in yet another possible scenario, a hash value of the second public key and/or the IMEI number may also be encrypted.
In this embodiment, the 5G user terminal device carries the first public key corresponding to the pre-generated temporary identity in the registration application and sends the first public key to the temporary identity registration server in the block chain, so that the temporary identity registration server returns the block information of the block chain according to the registration application, and the 5G user terminal device performs hash value verification on the block chain and the block in the block chain according to the block information returned by the temporary identity registration server, and searches and obtains the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator when the verification is passed, because the embodiment of the present invention does not directly send the public key of the target operator to the 5G user terminal device as in the prior art, but sends the block information of the block chain to the 5G user terminal device, because the difficulty of forging the block chain block is much greater than the difficulty of forging the public key of the operator, therefore, the issuing security and confidentiality of the public key of the target operator can be improved, further, after the 5G user terminal equipment obtains the public key of the target operator, the public key of the target operator and the first public key corresponding to the temporary identity of the 5G user terminal equipment are adopted to encrypt the second public key corresponding to the permanent identity of the 5G user terminal equipment through a preset encryption algorithm, the encrypted data are sent to the temporary identity registration server to perform identity registration, the security and confidentiality of the permanent identity public key sent by the 5G user terminal equipment to the temporary identity registration server can be improved, and the security and confidentiality of the whole registration process are further protected.
Fig. 3 is a flowchart of a registration method of a 5G user terminal according to an embodiment of the present application, and as shown in fig. 3, on the basis of the foregoing embodiment, the method includes:
step 301, the 5G user terminal device sends a registration application to a temporary identity registration server in a block chain, where the registration application includes a first public key corresponding to the temporary identity generated by the 5G user terminal device and an identifier of a target operator, and a public key of the operator is recorded in a block of the block chain.
In this embodiment, the 5G UE searches for 5G signal strength information around itself, and determines a target operator according to the signal strength information of each operator around itself. And the identifier of the target operator and the first public key of the target operator are carried in the registration application and are sent to the temporary identity registration server.
Step 302, the 5G user terminal device receives information of the first block recorded with the public key of the target operator, returned by the temporary identity registration server according to the registration application, and performs hash value verification on the block chain and the first block according to the information of the first block.
For example, after receiving the block information of the first block, the hash value of the first block may be calculated, and whether the calculated hash value is consistent with the hash value of the first block fed back by the temporary identity registration server, whether the calculated hash value is smaller than the preset difficulty value, and whether the first block includes the hash value of the previous block may be determined, if all the results of the above determination are yes, the verification is passed, otherwise, the verification fails. Of course, this is only an example and is not the only limitation to the verification method of the present application. For example, in some scenarios, considering that the more the tile information fed back to the 5G UE by the temporary identity registration server, the greater the difficulty of forging the tile information, on the basis of returning the tile information of the first tile to the 5G UE, the tile information of N tiles before the first tile and M tiles after the first tile may also be returned to the 5G UE, so that the 5G UE performs hash value verification based on the received tile information of all tiles. The values of N and M can be set according to requirements, and the larger the value of N and/or M is, the higher the security and confidentiality of the registered data are.
Step 303, when the block chain and the first block are verified, the 5G user terminal device searches for and obtains the public key of the target operator from the block information of the first block returned by the temporary identity registration server according to the identifier of the target operator.
And step 304, the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by using the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In this embodiment, the 5G user terminal device carries the first public key corresponding to the pre-generated temporary identity in the registration application and sends the first public key to the temporary identity registration server in the block chain, so that the temporary identity registration server returns the block information of the block chain according to the registration application, and the 5G user terminal device performs hash value verification on the block chain and the block in the block chain according to the block information returned by the temporary identity registration server, and searches and obtains the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator when the verification is passed, because the embodiment of the present invention does not directly send the public key of the target operator to the 5G user terminal device as in the prior art, but sends the block information of the block chain to the 5G user terminal device, because the difficulty of forging the block chain block is much greater than the difficulty of forging the public key of the operator, therefore, the issuing security and confidentiality of the public key of the target operator can be improved, further, after the 5G user terminal equipment obtains the public key of the target operator, the public key of the target operator and the first public key corresponding to the temporary identity of the 5G user terminal equipment are adopted to encrypt the second public key corresponding to the permanent identity of the 5G user terminal equipment through a preset encryption algorithm, the encrypted data are sent to the temporary identity registration server to perform identity registration, the security and confidentiality of the permanent identity public key sent by the 5G user terminal equipment to the temporary identity registration server can be improved, and the security and confidentiality of the whole registration process are further protected.
Fig. 4 is a schematic structural diagram of a 5G user terminal device provided in an embodiment of the present application, and as shown in fig. 4, a device 40 includes a processor 41 and a memory 42, where the memory 42 stores instructions, and when the processor 41 executes the instructions, the following operations are performed: sending a registration application to a temporary identity registration server in a block chain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and a public key of an operator is recorded in a block of the block chain; receiving the block information of the block chain returned by the temporary identity registration server according to the registration application, and performing hash value verification on the block chain and the blocks in the block chain according to the block information; when the block chain and the blocks in the block chain are verified, searching and acquiring the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator; and according to a preset encryption algorithm, encrypting a second public key corresponding to the permanent identity of the user by adopting the public key of the target operator and the first public key, and sending encrypted data obtained by encryption to the temporary identity registration server for identity registration.
In a possible embodiment, the block information returned by the temporary identity registration server is information of all blocks in the block chain.
In a possible implementation, the registration application further includes an identifier of the target operator.
In a possible implementation manner, the block information returned by the temporary identity registration server includes information of the first block recorded with the public key of the target operator.
In a possible implementation manner, the block information returned by the temporary identity registration server further includes: information of a first N blocks and a last M blocks of the first block in the block chain, wherein N and M are positive integers.
The device provided by this embodiment can execute the method of any of the above embodiments, and the execution manner and effect are similar, which are not described herein again.
Embodiments of the present invention also provide a computer-readable storage medium, which includes instructions that, when executed on a computer, cause the computer to perform the method provided in any of the above embodiments.
Finally, it should be noted that, as one of ordinary skill in the art will appreciate, all or part of the processes of the methods of the embodiments described above may be implemented by hardware related to instructions of a computer program, where the computer program may be stored in a computer-readable storage medium, and when executed, the computer program may include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), a Random Access Memory (RAM), or the like.
Each functional unit in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium. The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
The above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A registration method of a 5G user terminal is characterized by comprising the following steps:
the method comprises the steps that 5G user terminal equipment sends a registration application to a temporary identity registration server in a block chain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and a public key of an operator is recorded in a block of the block chain;
the 5G user terminal equipment receives the block information of the block chain returned by the temporary identity registration server according to the registration application, and performs hash value verification on the block chain and the blocks in the block chain according to the block information;
when the block chain and the blocks in the block chain are verified, the 5G user terminal equipment searches and obtains the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator;
and the 5G user terminal equipment encrypts a second public key corresponding to the permanent identity of the user terminal equipment by adopting the public key of the target operator and the first public key according to a preset encryption algorithm, and sends encrypted data obtained by encryption to the temporary identity registration server for identity registration.
2. The method according to claim 1, wherein the tile information returned by the temporary identity registration server is information of all tiles in the tile chain.
3. The method of claim 1, wherein the registration application further includes an identification of a target operator.
4. The method according to claim 3, wherein the block information returned by the temporary identity registration server includes information of the first block recorded with the public key of the target operator.
5. The method according to claim 4, wherein the block information returned by the temporary identity registration server further comprises: information of a first N blocks and a last M blocks of the first block in the block chain, wherein N and M are positive integers.
6. A 5G user terminal device comprising a processor and a memory, the memory having stored therein instructions that when executed by the processor perform the following:
sending a registration application to a temporary identity registration server in a block chain, wherein the registration application comprises a first public key corresponding to a temporary identity generated by the 5G user terminal equipment, and a public key of an operator is recorded in a block of the block chain;
receiving the block information of the block chain returned by the temporary identity registration server according to the registration application, and performing hash value verification on the block chain and the blocks in the block chain according to the block information;
when the block chain and the blocks in the block chain are verified, searching and acquiring the public key of the target operator from the block information returned by the temporary identity registration server according to the identifier of the target operator;
and according to a preset encryption algorithm, encrypting a second public key corresponding to the permanent identity of the user by adopting the public key of the target operator and the first public key, and sending encrypted data obtained by encryption to the temporary identity registration server for identity registration.
7. The apparatus according to claim 6, wherein the tile information returned by the temporary identity registration server is information of all tiles in the tile chain.
8. The apparatus of claim 6, wherein the registration application further includes an identification of a target operator.
9. The apparatus of claim 8, wherein the block information returned by the temporary identity registration server comprises information of a first block in which a public key of the target operator is recorded.
10. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of any of claims 1-5.
CN201911402049.9A 2019-12-30 2019-12-30 Registration method of 5G user terminal, user terminal equipment and medium Active CN111148094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911402049.9A CN111148094B (en) 2019-12-30 2019-12-30 Registration method of 5G user terminal, user terminal equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911402049.9A CN111148094B (en) 2019-12-30 2019-12-30 Registration method of 5G user terminal, user terminal equipment and medium

Publications (2)

Publication Number Publication Date
CN111148094A true CN111148094A (en) 2020-05-12
CN111148094B CN111148094B (en) 2023-11-21

Family

ID=70522256

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911402049.9A Active CN111148094B (en) 2019-12-30 2019-12-30 Registration method of 5G user terminal, user terminal equipment and medium

Country Status (1)

Country Link
CN (1) CN111148094B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569210A (en) * 2021-07-09 2021-10-29 远光软件股份有限公司 Distributed identity authentication method, equipment access method and device
CN114172923A (en) * 2021-12-08 2022-03-11 中国联合网络通信集团有限公司 Data transmission method, communication system and communication device
CN114239072A (en) * 2021-12-28 2022-03-25 中国联合网络通信集团有限公司 Block chain node management method and block chain network
CN114584314A (en) * 2022-02-28 2022-06-03 天翼安全科技有限公司 Registration method, device, equipment and medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209835A (en) * 2016-07-08 2016-12-07 北京众享比特科技有限公司 Peer-to-peer network communication system and method
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
CN108616532A (en) * 2018-04-26 2018-10-02 中国联合网络通信集团有限公司 Ballot processing method, apparatus and terminal device
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
CN108881296A (en) * 2018-07-24 2018-11-23 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
JP2019004263A (en) * 2017-06-13 2019-01-10 Kddi株式会社 Gateway device, usage management system, usage control method, and usage control program
WO2019034014A1 (en) * 2017-08-16 2019-02-21 华为技术有限公司 Method and apparatus for access authentication
US20190074968A1 (en) * 2017-09-06 2019-03-07 Alibaba Group Holding Limited Method, apparatus and system for data encryption and decryption
CN109905874A (en) * 2019-01-04 2019-06-18 中国联合网络通信集团有限公司 The method and system of the autonomous number of selecting based on block chain
CN110177101A (en) * 2019-05-28 2019-08-27 四川城市职业学院 Information processing method and device and relevant device based on 5G communication
US20190268466A1 (en) * 2016-07-28 2019-08-29 Nec Corporation Number portability information management system
CN110581860A (en) * 2019-09-19 2019-12-17 腾讯科技(深圳)有限公司 identity authentication method, device, storage medium and equipment based on block chain
WO2019241605A1 (en) * 2018-06-13 2019-12-19 Konstantinos Bakalis Systems and methods for secure access to property or information using blockchain

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209835A (en) * 2016-07-08 2016-12-07 北京众享比特科技有限公司 Peer-to-peer network communication system and method
US20190268466A1 (en) * 2016-07-28 2019-08-29 Nec Corporation Number portability information management system
JP2019004263A (en) * 2017-06-13 2019-01-10 Kddi株式会社 Gateway device, usage management system, usage control method, and usage control program
CN107257336A (en) * 2017-06-15 2017-10-17 北京汇通金财信息科技有限公司 A kind of user authen method and system
WO2019034014A1 (en) * 2017-08-16 2019-02-21 华为技术有限公司 Method and apparatus for access authentication
US20190074968A1 (en) * 2017-09-06 2019-03-07 Alibaba Group Holding Limited Method, apparatus and system for data encryption and decryption
CN108616532A (en) * 2018-04-26 2018-10-02 中国联合网络通信集团有限公司 Ballot processing method, apparatus and terminal device
CN108712395A (en) * 2018-04-27 2018-10-26 腾讯科技(深圳)有限公司 Account management method, device, server based on block chain and storage medium
WO2019241605A1 (en) * 2018-06-13 2019-12-19 Konstantinos Bakalis Systems and methods for secure access to property or information using blockchain
CN108881296A (en) * 2018-07-24 2018-11-23 中国联合网络通信集团有限公司 Block chain real name identification method, device, equipment and storage medium
CN109905874A (en) * 2019-01-04 2019-06-18 中国联合网络通信集团有限公司 The method and system of the autonomous number of selecting based on block chain
CN110177101A (en) * 2019-05-28 2019-08-27 四川城市职业学院 Information processing method and device and relevant device based on 5G communication
CN110581860A (en) * 2019-09-19 2019-12-17 腾讯科技(深圳)有限公司 identity authentication method, device, storage medium and equipment based on block chain

Non-Patent Citations (11)

* Cited by examiner, † Cited by third party
Title
3GPP: ""Draft 33.126r15_tracked_changes"", 《3GPP TSG_SA\WG3_SECURITY》 *
3GPP: ""Draft 33.126r15_tracked_changes"", 《3GPP TSG_SA\WG3_SECURITY》, 28 September 2017 (2017-09-28) *
JONG-HO NOH,HUN-YEONG KWON: "A Study on smart city security policy based on blockchain in 5G Age", 《2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON)》 *
JONG-HO NOH,HUN-YEONG KWON: "A Study on smart city security policy based on blockchain in 5G Age", 《2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON)》, 21 March 2019 (2019-03-21) *
姚英英等: "基于区块链的去中心化身份认证及密钥管理方案", 《网络空间安全》 *
姚英英等: "基于区块链的去中心化身份认证及密钥管理方案", 《网络空间安全》, no. 06, 25 June 2019 (2019-06-25) *
梁伟,刘小欧,罗维,马文平,王凌: "基于多变量二次方程的抗量子区块链快速签名算法", 《信息技术与网络安全》 *
梁伟,刘小欧,罗维,马文平,王凌: "基于多变量二次方程的抗量子区块链快速签名算法", 《信息技术与网络安全》, 10 January 2019 (2019-01-10) *
谢剑超: "区块链将改变运营商运作模式", 《通信企业管理》 *
谢剑超: "区块链将改变运营商运作模式", 《通信企业管理》, no. 08, 10 August 2017 (2017-08-10) *
阎军智;彭晋;左敏;王珂;: "基于区块链的PKI数字证书***", 电信工程技术与标准化, no. 11 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569210A (en) * 2021-07-09 2021-10-29 远光软件股份有限公司 Distributed identity authentication method, equipment access method and device
CN114172923A (en) * 2021-12-08 2022-03-11 中国联合网络通信集团有限公司 Data transmission method, communication system and communication device
CN114172923B (en) * 2021-12-08 2023-07-07 中国联合网络通信集团有限公司 Data transmission method, communication system and communication device
CN114239072A (en) * 2021-12-28 2022-03-25 中国联合网络通信集团有限公司 Block chain node management method and block chain network
CN114584314A (en) * 2022-02-28 2022-06-03 天翼安全科技有限公司 Registration method, device, equipment and medium

Also Published As

Publication number Publication date
CN111148094B (en) 2023-11-21

Similar Documents

Publication Publication Date Title
US10187202B2 (en) Key agreement for wireless communication
CN106899410B (en) A kind of method and device of equipment identities certification
CN111148094B (en) Registration method of 5G user terminal, user terminal equipment and medium
CA2820502C (en) Key agreement using a key derivation key
CN108243176B (en) Data transmission method and device
CN109729000B (en) Instant messaging method and device
CN111065101A (en) 5G communication information encryption and decryption method and device based on block chain and storage medium
CN111132149B (en) Registration method of 5G user terminal, user terminal equipment and medium
CN111132155B (en) 5G secure communication method, device and storage medium
CN111148213B (en) Registration method of 5G user terminal, user terminal equipment and medium
CN111107550A (en) Dual-channel access registration method and device for 5G terminal equipment and storage medium
CN111246464B (en) Identity authentication method, device and system, and computer readable storage medium
CN111132156B (en) Registration method of 5G user terminal, user terminal equipment and medium
CN111148098A (en) 5G terminal equipment registration method, equipment and storage medium
CN111132167B (en) Method for 5G user terminal to access 5G network, user terminal equipment and medium
CN111163466B (en) Method for 5G user terminal to access block chain, user terminal equipment and medium
CN114423001A (en) Decryption method, server and storage medium
CN113079506A (en) Network security authentication method, device and equipment
CN111065092A (en) 5G communication information encryption and decryption method, equipment and storage medium
CN109474624B (en) Application program authentication system and method
CN108471613B (en) Verification method of wireless router
CN110730187A (en) Transaction verification method, accounting node and medium based on block chain
CN112422292A (en) Network security protection method, system, equipment and storage medium
CN116137568A (en) Instant chat data query method and device based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

GR01 Patent grant
GR01 Patent grant