Processing method for ensuring information safety in communication system

An information security and communication system technology, applied in the field of information security assurance, can solve the problems of delayed PDG and terminal communication, data loss, dropped data packets, etc., to achieve the effect of strengthening flexible processing capabilities, enhancing functions, and saving air interface resources

Inactive Publication Date: 2007-07-25
HUAWEI TECH CO LTD
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, although the air interface resources are saved due to the deletion of the security tunnel, if the data packet sent from the network to the terminal reaches the PDG, since the PDG does not have any information about the terminal, the communication between the PDG and the terminal will be delayed, or even In the case where the PDG cannot find the terminal, this packet will be discarded resulting in data loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method for ensuring information safety in communication system
  • Processing method for ensuring information safety in communication system
  • Processing method for ensuring information safety in communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] The present invention will be described in further detail below through specific embodiments and accompanying drawings.

[0098] Fig. 6 is a flowchart of the method of the present invention. Referring to Fig. 6, the present invention is an information security processing method in a communication system, which is applicable to a communication system in which information is transmitted between a core network gateway and a terminal through a secure tunnel to ensure information security, including:

[0099] Step 61. When the terminal enters the inactive state, trigger deletion of the data channel between the terminal and the access network.

[0100] Step 62: When sending information to the terminal, the core network gateway notifies the access network to establish a data channel with the terminal, and sends the information to the terminal through the secure tunnel between the core network gateway and the terminal.

[0101] The access network described in the present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is used for transmitting messages between core network gateway and terminal through a security tunnel in order to ensure the security of information. It comprises: when the terminal enters into a disenabled state, it triggers the deletion of data channel between terminal and access network; b) when core network gateway sends down message to terminal, it informs the access network to establish the data channel between the access network and the terminal; sending down said message to the terminal through the security tunnel between the core network and the terminal.

Description

technical field [0001] The invention relates to an information security guarantee technology in a communication system, in particular to a processing method for ensuring information security by transmitting information through a secure tunnel between a core network gateway and a terminal of the communication system. Background technique [0002] Currently, networks in the communications field are mainly divided into access networks and core networks. Access networks include various types, such as Wireless Local Area Network (WLAN, Wireless Local Area Network), World Interoperability for Microwave Access (WiMax, World Interoperability for Microwave Access) network, etc.; the core network has been developed to the third generation, such as 3GPP Core Network. Various problems in the integration of various access networks and core networks have become the focus of the industry. [0003] The converged architecture of WLAN / WiMax and 3GPP hopes to be able to access services of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04Q7/38
Inventor 陈卫民
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products