Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Configuration method of secure policy

A technology of security policy and configuration method, applied in the field of mobile communication and information security

Inactive Publication Date: 2010-09-01
唐晓萍
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The above-mentioned patents only propose corresponding content from a certain aspect of security level setting

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration method of secure policy
  • Configuration method of secure policy
  • Configuration method of secure policy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039]

[0040] Table 1

[0041] The security policy table includes: (1) security level, as a column (row) of the security policy table. (2) Scenario, which defines the abstraction of various services in terms of security, as a row (column) of the security policy table. (3) The entry is stored in the corresponding cell of the security policy table. Provides an entry point for collecting security algorithm protocols. Its input is the selected security level and scenario, and its output is the entry of the algorithm protocol. As shown in Table 2 below.

[0042]

[0043] Table 2

[0044] The relationship between the two layers of elements in the above two tables can be expressed as: f(x, y)=z. Among them, the independent variables x and y are security levels and scenarios, the dependent variable z is the output, and the function f is the mapping relationship between x, y and z.

[0045] The security policy header table provides a unified entry when the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a configuration method for a safety strategy and aims to solves the problem that the prior art fails to realize the configuration of allaround safety integrity level. The inventive configuration method for the safety strategy comprises the following steps: (1) the system sets up a safety strategy table containing safety level, scene and algorithm protocol in each safety element; (2) the system determines the safety level and current scene and extracts a required algorithm protocol from the safety strategy table; and (3) the system applies the obtained algorithm protocol to the safety service to complete the configuration of safety strategy. As a result, the invention sets up the safety strategy table for each safety element, determines the required algorithm protocol based on the determined safety level and current scene and extracts the algorithm protocol from the safety strategy table. The invention can realizes the configuration of the allaround safety integrity level according to the actual situation that the user utilizes the mobile network.

Description

technical field [0001] The invention relates to the fields of mobile communication and information security, in particular to a method for configuring security policies. Background technique [0002] With the increase of mobile network transmission capacity, services based on multimedia transmission are increasingly diversified. Different businesses have different security requirements for different occasions and different users, and a single security mechanism cannot meet the needs of multiple businesses. Therefore, from the perspective of business requirements, it is necessary to provide a technical mechanism so that specific services can choose an appropriate level of security. On the other hand, in mobile networks, mobile security policies shield users from the underlying technical details and complex security management operations, allowing users to enjoy simple and easy-to-use security services. Through the mobile security policy control server, operators can provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24H04L9/00H04W4/00H04W84/00H04W12/0433H04W24/00
Inventor 张峰陈剑勇
Owner 唐晓萍
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products