Supercharge Your Innovation With Domain-Expert AI Agents!

GTP tunnel communication system and method

A technology of tunnel and corresponding relationship, which is applied in the field of wireless communication based on GTP tunnel, which can solve the hidden dangers of communication data security, etc., and achieve the effect of enhancing security and information complexity, improving security, and enhancing reliability

Inactive Publication Date: 2017-02-22
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the current communication architecture of the GTP tunnel has brought huge security risks to the transmission of communication data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • GTP tunnel communication system and method
  • GTP tunnel communication system and method
  • GTP tunnel communication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0035] As mentioned above, there are increasingly higher requirements for the confidentiality of user data in the current communication field, and the GTP tunnel transmission protocol, as a transmission node between the access network and the core network, needs to improve the security of the protocol. The following will pass figure 1 and figure 2 The solution of using the GPRS tunneling protocol for communication in the prior art will be introduced.

[0036] figure 1 A scene diagram of a GTP tunnel transmitting data in a protocol stack in the prior art is shown. exist figure 1 In the shown scenario, the user sends data to the base station (eNode B), and the base station sends the data to the communication core network including the radio network controller (RNC), and sends the data to the GTP tunnel through the RNC. The GTP Tunnel iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a GTP tunnel communication system and method. The system comprises: a protocol pool unit arranged at a GTP tunnel sending terminal, a ubiquitous bearer selection device and a solution protocol camouflage unit arranged at a GTP tunnel receiving terminal, wherein the protocol pool is used for storing various transmission layer protocols; the ubiquitous bearer selection device is used for selecting at least one transmission layer protocol from the various transmission layer protocols to camouflage data transmitted by a GTP tunnel; and the solution protocol camouflage unit is used for analyzing data contents transmitted by the GTP tunnel. According to the system provided by the invention, the protocol pool for setting various protocol types is added between a transmission layer and the GTP tunnel, so that the GTP tunnel can support various transmission protocols; and moreover, the system provided by the invention can also perform protocol camouflage on the data transmitted by the GTP tunnel through the ubiquitous bearer selection device so as to ensure that an aggressor is difficult to obtain important information of a data packet.

Description

technical field [0001] The present invention relates to wireless communication, in particular to wireless communication based on GTP tunnel. Background technique [0002] With the intelligentization of mobile terminals and the enablement of 4G, packet data is important user data, and its security is widely concerned by users. However, in the current mobile communication network, user group data leakage is serious, and more and more users report that their personal information is stolen by a third party when ordering or experiencing certain business applications. For example, the user data of T-Mobile was stolen, tens of millions of credit cards in the United States were leaked, and domestic celebrity phones were published on the Internet. According to CNCERT data, the number of malicious codes on my country's mobile Internet reached 1.7 billion in 2014, an increase of 2.5 times compared to last year. Among the malicious behaviors caused by malicious codes, the proportion of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W76/02H04L29/06
Inventor 龙隆刘子辰石晶林张玉成韦伟韩雪
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More