Method and system for policy control in associated response system

A technology for correlating responses and implementing strategies, which is applied in radio/inductive link selection arrangements, synchronization devices, user identity/authority verification, etc. It can solve problems such as account theft, abuse of user paid services, and damage to system performance to achieve security Control and ensure the effect of reliable delivery

Active Publication Date: 2008-02-20
HUAWEI TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] End users: misappropriating accounts and stealing other private information; abusing paid services for users, resulting in a decline in service quality;
[0008] Terminal system: Damage to the system r

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for policy control in associated response system
  • Method and system for policy control in associated response system
  • Method and system for policy control in associated response system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0051]In order to solve the problem of how to interact between the security server and the control execution device in the existing association response system to reliably issue the strategy and realize the strategy control, the present invention establishes a strategy transmission channel between the security server and the control execution device , Sending the security control strategy selected by the security server to the control execution device through the strategy transmission channel.

[0052] In the embodiment of the present invention, the mobile station organizes its own security related information, generates a security related information report, and sends the security related information report to the security server on the network side; the security server receives and analyzes the security related information report to determine the mobile According to the security level of the station, a corresponding user control strategy is selected, and then the user control st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model discloses a method to provide policy service in interconnected response system, which is characterized in that: a request of control policy is sent to the security server by a control and executive device; the security server determines the user control policy related to the object controlled, and sends the request to the control and executive device; the control and executive device executes the user control policy, and sends a policy-executed response to the security server. Thus, the problem is resolved to realize the policy control about how to interact and reliably send policy between the security server and the control and executive device in prior interconnected response system. In addition, the utility model also discloses an interconnected response system.

Description

technical field [0001] The present invention relates to a mobile communication system, in particular to a method and system for implementing strategy control in an association response system. Background technique [0002] As packet data services gradually replace traditional circuit voice, mobile operators' networks tend to be IP-based. In the Internet system based on the TCP / IP protocol stack, each network node, each host, and each user are equal, and there is a danger of a breakthrough and the entire network being paralyzed. [0003] With the great enrichment of application business, third-party application service provider ASP is gradually increasing, and the business tends to be value-added service and refined operation. While mobile users obtain more diversified services, the security risks they bring to themselves and the network are also greatly increased. For example: due to user identity theft, enterprises may expose their internal resources to unauthorized users...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/38H04Q7/22H04L9/32H04W12/37H04W56/00
Inventor 姬长锋贾科
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products