Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for realizing network safety control

A network security and security technology, applied in the transmission system, digital transmission system, data exchange network, etc., can solve the problems of large impact of mobile device changes, network equipment impact, unfavorable standardization, etc., to ensure standardization and reduce the impact of network elements , Simplify the effect of the implementation plan

Inactive Publication Date: 2008-11-12
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the introduction of new interfaces, it will have a great impact on network devices, which is not conducive to the standardization of function realization, and also has a relatively large impact on the internal changes of mobile devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing network safety control
  • Method and system for realizing network safety control
  • Method and system for realizing network safety control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] At present, the logical entity PDF is introduced in the version R5 of the third-generation mobile communication 3GPP system. The PDF is a logical policy decision function network element, which uses the standard IP mechanism to implement the policy of the IP media layer, and passes the corresponding IP policy through the standard sent to the GGSN through the Go interface, such as figure 2 shown. The PDF can be either an independent network element or a part of the P-CSCF, but the function of the PDF is relatively single at present.

[0025] Since PDF already has a standard interface with GGSN, and PDF is a special policy decision function entity, therefore, the core idea of ​​the present invention is: to increase the interface between the PDF entity and the security service entity, and increase the corresponding security command The conversion function enables the PDF to be connected between the security service entity and the GGSN, and the security command, security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a kind of network security control method. It is adequate for mobile communication network of security service entity, PDF and GGSN. The method concludes: the corresponding relation between security command and standard interface information is set in PDF. PDF receives the security command from security service entity. Then according to the set corresponding relation, the received security command is changed into standard interface information. The changed standard interface information is transmitted to GGSN through the standard interface. According to the received standard interface information, GGSN carries out corresponding user service control. This invention also discloses a kind of system which achieves network security control. This invention can use existing network functional entity to provide standard security control interface. It achieves mobile network data security control and management.

Description

technical field [0001] The invention relates to a packet data function (PDF) application technology, in particular to a method and system for realizing network security control by utilizing PDF. Background technique [0002] Since the packet technology is gradually applied in the third generation mobile communication network, problems such as data viruses and data security that only existed in traditional IP networks such as the Internet in the past have also gradually produced important influences in mobile networks. With the development of mobile packet data services, packet services tend to replace traditional circuit voice and become the mainstream technology in the field of mobile communications. In this situation, the relevant technologies to ensure the security of mobile packet data are more urgent. [0003] At present, the prevention and control of viruses in the mobile communication network, especially the business control method for non-secure users is mainly: add...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/02
Inventor 郑志彬黄华
Owner HUAWEI TECH CO LTD