Configuration method of secure policy

A technology of security policy and configuration method, applied in the field of mobile communication and information security

Inactive Publication Date: 2008-03-19
唐晓萍
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The above-mentioned patents only propose corresp...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration method of secure policy
  • Configuration method of secure policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The specific implementation manners of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0036] The division method of the security policy of the present invention is completed by the security policy table. The ITU-T's X805 standard describes eight security measures, called security elements, that can counter all major security threats. Includes access control, authentication, data confidentiality, communication security, data integrity, non-repudiation, availability, and privacy. According to the number of security elements, a security policy table is established for each security element. And before the security policy tables of all security elements, create a security policy header table.

[0037] Both the security policy header table and the security policy table described in the present invention are composed of two layers, wherein the security policy header table includes: (1) an input layer, includi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a configuration method for a safety strategy and aims to solves the problem that the prior art fails to realize the configuration of allaround safety integrity level. The inventive configuration method for the safety strategy comprises the following steps: (1) the system sets up a safety strategy table containing safety level, scene and algorithm protocol in each safety element; (2) the system determines the safety level and current scene and extracts a required algorithm protocol from the safety strategy table; and (3) the system applies the obtained algorithm protocol to the safety service to complete the configuration of safety strategy. As a result, the invention sets up the safety strategy table for each safety element, determines the required algorithm protocol based on the determined safety level and current scene and extracts the algorithm protocol from the safety strategy table. The invention can realizes the configuration of the allaround safety integrity level according to the actual situation that the user utilizes the mobile network.

Description

technical field [0001] The invention relates to the fields of mobile communication and information security, in particular to a method for configuring security policies. Background technique [0002] With the increase of mobile network transmission capacity, services based on multimedia transmission are increasingly diversified. Different businesses have different security requirements for different occasions and different users, and a single security mechanism cannot meet the needs of multiple businesses. Therefore, from the perspective of business requirements, it is necessary to provide a technical mechanism so that specific services can choose an appropriate level of security. On the other hand, in mobile networks, mobile security policies shield users from the underlying technical details and complex security management operations, allowing users to enjoy simple and easy-to-use security services. Through the mobile security policy control server, operators can provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04Q7/34H04L9/00H04L29/06H04L12/24H04Q7/38H04W12/0433H04W24/00
Inventor 张峰陈剑勇
Owner 唐晓萍
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products