Consultation method and system for security policy in next generation network (NGN)

A security policy and policy query technology, applied in the field of communication security, to meet the needs of management

Active Publication Date: 2012-05-30
ZTE CORP
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] It should be noted that due to the particularity of security policy research, although the industry has conducted research on terminal trusted acce

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Consultation method and system for security policy in next generation network (NGN)
  • Consultation method and system for security policy in next generation network (NGN)
  • Consultation method and system for security policy in next generation network (NGN)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The technical solutions of the present invention will be further elaborated below in conjunction with the accompanying drawings and specific embodiments.

[0035] The present invention aims to provide a method and system for negotiating security policies in NGN. By extending the existing NGN architecture, adding security policy-related network elements and standardizing security policy negotiation and execution procedures, so as to meet the requirements of security policy management in NGN need.

[0036] A security policy management framework in the NGN domain provided by the embodiment of the present invention, such as figure 2 As shown, a Security Policy Server (SPS, Security Policy System) and a Security Policy Enforcement Point (PEP, Policy Enforcement Point) are added to the transmission plane of the existing NGN architecture to implement decision-making and execution of security policies. SPS is mainly used to store and distribute security policies, and PEP is u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a consultation method and system for a security policy in a next generation network (NGN). The method comprises the following steps: after a security policy enforcement point (PEP) receives a connection request message initiated by user equipment (UE) in the affiliated NGN, sending a policy query request message to a security policy server (SPS) in the affiliated NGN to request to query a security policy relevant to the policy query request message; and returning the queried security policy back to the PEP for performing by the SPS via policy query response. According to the consultation method and system for the security policy in the NGN, the requirement of managing the security policy in the NGN is satisfied.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a method and system for negotiating a security policy in a next generation network (NGN, Next Generation Network). Background technique [0002] As more and more operators are developing towards the full service direction, NGN is also developing towards the direction of integration. Existing NGN architecture such as figure 1 As shown, the service plane includes application / service support function modules, service control and content distribution function modules, and the transmission plane includes network attachment control function modules, mobility management control function modules, and resource admission control functions (RACF, Resource and Admission Control Functions) module, transmission function module; the management function module, identity management module (IDM, Identity Management) function module, end user function module, other service provider function m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/56
CPCH04L63/00H04L63/20
Inventor 陈书义高峰林兆骥
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products