Security control method and system thereof

A technology of safety control and safety mode control, applied in the field of safety control, method and system thereof, can solve the problem of not having measures to ensure the safety of the startup process, etc.

Inactive Publication Date: 2009-07-15
HUAWEI TECH CO LTD
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In the process of research and practice of the prior art, the inventor found that the prior art has at least the following problems: the startup when the connection is initialized, the s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method and system thereof
  • Security control method and system thereof
  • Security control method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0084] Example 1, see Figure 5 , a flow chart for selecting a security algorithm for a mobility management entity:

[0085] S501: The terminal sends a radio resource control connection request to the network side.

[0086] S502: The network side sends a radio resource control connection establishment message to the terminal.

[0087] S503: The terminal sends a non-access stratum service request to the network side.

[0088] S504: The network side sends an initial context message or a network-side security capability message to the mobility management entity.

[0089] S505: The mobility management entity selects a security algorithm.

[0090] S506: The mobility management entity returns an initial context response message to the network side, and the message carries security algorithm information. Steps 504 to 506 may also be that the network side obtains relevant security algorithm information through a dedicated security capability information transmission message. Includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for safety control and a system thereof. The method of the invention comprises the following steps: when the connection initialization is executed, receiving the safety-mode control information by terminal; alternating the radio resource control entity of terminal with the convergence protocol entity of packet data; collocating and initiating a security process according to a security algorithm carried in the security mode control information, checking the received security mode control information; and returning the response information to the network side. If the security process after key updating is executed, the method comprises the following steps: receiving the security mode control information; obtaining the security algorithm, caching and stopping processing the data, collocating and initiating the security process; and checking the wholeness of received security mode control information according to the security algorithm, and returning to the security mode for controlling the response information. The invention can realize safe startup of system through security control when the system is started.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method and system for safety control. Background technique [0002] In order to maintain the long-term competitive advantage of the 3GPP (3rd Generation Partnership Project, third generation mobile communication system) system, the standard formulation work of the long-term evolution system (LTE, Long Team Evolution) is ongoing and developing rapidly. In a mobile communication system, it is very important to ensure the communication security of users. The backward compatibility of the evolved network structure to the existing network is an important indicator. In terms of security, it is required that the user security process in the evolved network must ensure at least the same level of security mechanism as the current 2G system or 3G system. [0003] The core network of the LTE system mainly includes logic functions such as MME (Mobility Management Entity, mobile mana...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/28H04L29/06H04L12/56
Inventor 谢铂云陈璟黄颖华黄敏
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products