US-20260129458-A1 - METHOD AND DEVICE FOR SUPPORTING USER PRIVACY PROTECTION IN WIRELESS COMMUNICATION SYSTEM
Abstract
The present disclosure relates to a method and apparatus for supporting protection of a user's privacy in a wireless communication system. An operating method of a home network (HN) in a wireless communication system may include receiving, from a serving network (SN), a registration request message including a subscription concealed identifier (SUCI), in response to a registration request of a user equipment, obtaining a first key, based on the SUCI, and transmitting the first key to the SN.
Inventors
- Donghyun JE
- Yongdae Kim
- Insu Yun
- Sangwook BAE
- Mincheol Son
- Junho AHN
- Beomseok OH
- Jiho LEE
- Yeongbin HWANG
Assignees
- SAMSUNG ELECTRONICS CO., LTD.
- KOREA ADVANCED INSTITUTE OF SCIENCE AND TECHNOLOGY
Dates
- Publication Date
- 20260507
- Application Date
- 20221007
Claims (15)
- 1 . An operating method of a home network (HN) for supporting protection of a user's privacy in a wireless communication system, the operating method comprising: receiving, from a serving network (SN), a registration request message comprising a subscription concealed identifier (SUCI), in response to a registration request of a user equipment (UE); obtaining a first key, based on the SUCI; and transmitting the first key to the SN.
- 2 . The operating method of claim 1 , further comprising transmitting, to the SN, manipulated information comprising a manipulated identifier (ID), and wherein the manipulated ID is obtained in a trusted execution environment (TEE) of the HN, based on a subscription permanent identifier (SUPI), and the SUPI is obtained in the TEE based on the SUCI.
- 3 . The operating method of claim 2 , wherein the obtaining of the first key comprises: generating a 5 th -generation home environment authentication vector (5G HE AV) in the TEE based on the SUPI; obtaining a second key, based on the 5G HE AV and the SUCI; and obtaining the first key, based on the second key.
- 4 . The operating method of claim 3 , further comprising: obtaining a 5G serving environment authentication vector (5G SE AV), based on the 5G HE AV; and transmitting the 5G SE AV to the SN.
- 5 . The operating method of claim 2 , wherein the manipulated ID is generated by using a symmetric key algorithm or a public key algorithm, based on the SUPI, the symmetric key algorithm comprises at least one of advanced encryption standard (AES), an international data encryption algorithm (IDEA), or Rivest Cipher 6 (RC6), and the public key algorithm comprises at least one of Rivest, Shamir and Adleman (RSA) or ElGamal.
- 6 . The operating method of claim 2 , further comprising: receiving, from the SN, at least one manipulated information and data usage information mapped to the at least one manipulated information; and obtaining, in the TEE, information about an amount of data usage for each SUPI, based on the at least one manipulated information and the data usage information.
- 7 . The operating method of claim 2 , further comprising: receiving, from the SN, at least one manipulated information and location information mapped to the at least one manipulated information; obtaining, in the TEE, location record accumulation information for each SUPI, based on the at least one manipulated information and the location information; obtaining location pattern information for one or more anonymous UEs, from the location record accumulation information for each SUPI; and transmitting, to the SN, the location pattern information.
- 8 . An operating method of a serving network (SN) for supporting protection of a user's privacy in a wireless communication system, the operating method comprising: receiving, from a user equipment (UE), a registration request message comprising a subscription concealed identifier (SUCI); transmitting, to a home network (HN), the registration request message; receiving, from the HN, a first key obtained based on the SUCI; performing a non-access stratum security mode command (NAS SMC) procedure and a radio resource control security mode command (RRC SMC) procedure; generating a global unique temporary identifier (GUTI); and transmitting, to the UE, a registration accept message comprising the GUTI.
- 9 . The operating method of claim 8 , further comprising receiving, from the HN, manipulated information comprising a manipulated identifier (ID), and wherein the manipulated ID is obtained in a trusted execution environment (TEE) of the HN, based on a subscription permanent identifier (SUPI), and the SUPI is obtained in the TEE based on the SUCI.
- 10 . The operating method of claim 9 , further comprising receiving, from the HN, a 5 th -generation serving environment authentication vector (5G SE AV), wherein the 5G SE AV is obtained by the HN, based on a 5G home environment authentication vector (5G HE AV).
- 11 . The operating method of claim 8 , further comprising transmitting, to the HN, at least one manipulated information and data usage information mapped to the at least one manipulated information.
- 12 . The operating method of claim 8 , further comprising: transmitting, to the HN, at least one manipulated information and location information mapped to the at least one manipulated information; and receiving, from the HN, location pattern information for one or more anonymous UEs.
- 13 . A home network (HN) for supporting protection of a user's privacy in a wireless communication system, the HN comprising: a transceiver; and at least one processor connected to the transceiver, wherein the at least one processor is configured to: receive, via the transceiver, from a serving network (SN), a registration request message comprising a subscription concealed identifier (SUCI), in response to a registration request of a user equipment (UE); obtain a first key, based on the SUCI; and transmit, via the transceiver, the first key to the SN.
- 14 . The HN of claim 13 , further comprising a trusted execution environment (TEE), wherein the at least one processor is configured to transmit, via the transceiver, to the SN, manipulated information comprising a manipulated identifier (ID), the manipulated ID is obtained in the TEE, based on a subscription permanent identifier (SUPI), and the SUPI is obtained in the TEE based on the SUCI.
- 15 . The HN of claim 14 , wherein the at least one processor is further configured to: generate a 5 th -generation home environment authentication vector (5G HE AV) in the TEE based on the SUPI; obtain a second key, based on the 5G HE AV and the SUCI; and obtain the first key, based on the second key.
Description
TECHNICAL FIELD The present disclosure relates to a method and apparatus for supporting protection of a user's privacy in a wireless communication system. BACKGROUND ART Considering the development of wireless communication from generation to generation, technologies have been developed mainly for services targeting humans, such as voice calls, multimedia services, data services, and the like. Following the commercialization of 5th generation (5G) communication systems, it is expected that connected devices that have been exponentially growing will be connected to communication networks. Examples of things connected to networks may include vehicles, robots, drones, home appliances, displays, smart sensors installed in various infrastructures, construction machines, factory equipment, and the like. Mobile devices are expected to evolve in various form-factors such as augmented reality glasses, virtual reality headsets, hologram devices, and the like. In order to provide various services by connecting hundreds of billions of devices and things in the 6th generation (6G) era, there have been ongoing efforts to develop enhanced 6G communication systems. For these reasons, 6G communication systems are referred to as beyond-5G systems. 6G communication systems, which are expected to be commercialized around 2030, will have a peak data rate of tera (i.e., 1,000 giga)-level bps and radio latency less than 100 μsec. That is, the 6G communication systems will be 50 times as fast as 5G communication systems and have one tenth the radio latency of 5G. In order to achieve such a high data rate and ultra-low latency, it has been considered to implement the 6G communication systems in a terahertz band (for example, 95 GHz to 3 THz bands). It is expected that, due to more severe path loss and atmospheric absorption in the terahertz bands than those in mmWave bands introduced in 5G, technologies capable of securing the signal transmission distance, that is, coverage, will become more important. It is necessary to develop, as major technologies for securing the coverage, radio frequency (RF) elements, antennas, novel waveforms having better coverage than orthogonal frequency division multiplexing (OFDM), beamforming and massive multiple input multiple output (MIMO), full dimensional MIMO (FD-MIMO), array antennas, and multiantenna transmission technologies such as large-scale antennas. In addition, in order to improve the coverage of terahertz-band signals, there has been ongoing discussion about new technologies such as metamaterial-based lenses and antennas, a high-dimensional spatial multiplexing technology using orbital angular momentum (OAM), reconfigurable intelligent surface (RIS), and the like. Moreover, in order to improve spectral efficiency and overall network performance, the following technologies have been developed for 6G communication systems: a full-duplex technology for enabling an uplink transmission and a downlink transmission to simultaneously use the same frequency resource at the same time; a network technology for using satellites, high-altitude platform stations (HAPS), and the like in an integrated manner; an improved network structure for supporting mobile base stations and the like and enabling network operation optimization and automation and the like; a dynamic spectrum sharing technology via collision avoidance based on a prediction of spectrum usage; use of artificial intelligence (AI) in wireless communication for improvement of overall network operation by using AI in a designing phase for developing 6G and internalizing end-to-end AI support functions; and a next-generation distributed computing technology for overcoming the limit of UE computing ability through reachable super-high-performance communication and computing resources (such as mobile edge computing (MEC), clouds, and the like) over the network. In addition, through designing new protocols to be used in the 6G communication systems, developing mechanisms for implementing a hardware-based security environment and safe use of data, and developing technologies for maintaining privacy, attempts to strengthen the connectivity between devices, optimize the network, promote softwarization of network entities, and increase the openness of wireless communications are continuing. It is expected that research and development of the 6G communication systems in hyper-connectivity, including person to machine (P2M) as well as machine to machine (M2M), will facilitate the next hyper-connected experience. In more detail, it is expected that services such as truly immersive extended reality (XR), high-fidelity mobile hologram, and digital replication could be provided through the 6G communication systems. In addition, services such as remote surgery for security and reliability enhancement, industrial automation, and emergency response will be provided through the 6G communication system, such that the technologies could be applied in various f