Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, user equipment and packet access gateway for secure access to Internet services

An Internet business and secure access technology, applied in the field of secure Internet access business, can solve privacy issues, user security and privacy threats, without considering user security issues, etc., to enhance security, prevent random access, improve safety effect

Inactive Publication Date: 2013-04-17
ZTE CORP
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The above control method is relatively simple. In the process of implementing policy control, users do not directly participate, which cannot meet the needs of some services with relatively high security levels.
For example, IP Multimedia Subsystem (IMS for short), instant messaging, micropayment, virtual community, etc., use the user's IP address or identity to identify the user's identity and derive services, so that when the user's user equipment is Others use, because the existing protection mechanism is relatively simple, the user can use the user equipment to carry out the above business at will, which poses a great threat to user security and privacy
[0013] From the above analysis, it can be seen that because the current technology does not consider the security issues of Internet access for users, it may lead to Internet access and business application security issues, as well as privacy issues. Therefore, it is necessary to adopt new technologies to improve Internet access security and provide more Various Security Services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, user equipment and packet access gateway for secure access to Internet services
  • Method, user equipment and packet access gateway for secure access to Internet services
  • Method, user equipment and packet access gateway for secure access to Internet services

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to meet the needs of users to access the Internet safely, the present invention introduces a Security Access Identification Number (SAIN for short). SAIN can be a string of readable character strings, consisting of numbers, English letters, and some Read symbols (such as "*", "!", etc.). According to the security requirements, set the SAIN check policy on the UE side or the network side. When the user uses the Internet service, the SAIN check point such as the UE or packet access network checks the user's service request according to the SAIN check policy. When it is found that the user accesses a specific target application That is, when the data flow corresponding to the service request needs to be protected by SAIN, the user is required to input SAIN on the user equipment, and only when the SAIN input by the user is correct, the SAIN checkpoint allows the user equipment to access the target application. In this way, the security of Internet access services i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for secure access to Internet services. In a packet access network, the control problem caused when the current technology does not consider the user access to specific target application is solved. After UE (User Equipment) successfully accesses to the Internet, when a certain target application is to be accessed, the method comprises the following steps of: checking a service request for the target application by an SAIN (Secure Access Identity Number) checking point according to an SAIN check policy, and when the SAIN checking point determines that the service request needs the SAIN check, prompting a user to input an SAIN by the UE; and if the SAIN checking point determines that the input SAIN result is correct, transferring the target application service request, and if not, refusing the service request. By introducing the SAIN, the secure inspection and protection of the corresponding data stream are applied to a target Internet, thereby the access security of the Internet application is improved. The method especially aims at a scene of Internet access in a user identification mode.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to a method for securely accessing Internet services. Background technique [0002] The Internet has been widely used and has achieved great success. With the widespread deployment of high-speed mobile packet networks and the popularization of smart mobile terminals, Internet services will become more abundant. [0003] figure 1 shows a schematic diagram of Internet access, for figure 1 The description of each entity in is as follows: [0004] User Equipment 101 (User Equipment, referred to as UE), located on the user side, supports the Internet Protocol (Internet Protocol, referred to as IP). If the identity and location separation technology is adopted, the UE uses the user access identity instead of the IP address to access the Internet. Other user equipment and services are provided for communication. [0005] The access control function 102 (Access Control Functi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 郝振武符涛江鸿
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products