A management system, method and apparatus for network security

A management system and network security technology, applied in security devices, secure communication devices, transmission systems, etc., can solve problems such as lack of relevant design, no consideration of authentication protocols or algorithms, and inability to better guarantee network security

Active Publication Date: 2018-01-12
HUAWEI TECH CO LTD
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The existing technology does not consider information such as the authentication protocol or algorithm sup

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A management system, method and apparatus for network security
  • A management system, method and apparatus for network security
  • A management system, method and apparatus for network security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0375] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0376] see figure 2 , is a schematic diagram of the architecture of the 5G network slice provided by the embodiment of the present invention. Such as figure 2 As shown, in the architecture of 5G network slicing (referred to as slicing), all slices share the access network ((English: Access Network, AN) or (English: Radio Access Network, RAN), the following will use AN as an example to illustrate) With the slice selection function (English: SliceSelection Functi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a management system, method and apparatus for network security. The system includes UE, an AN, a network function selection module and at least two authentication modules. The UE is used to send a first service request to the network function selection module, wherein the first service request carries authentication protocol information. The network function selection module is used to select a target authentication module according to the authentication protocol information and send a second service request to the target authentication module; and thetarget authentication module is used to perform mutual authentication with the UE; and the target authentication module is further used to determine first security configuration according to a specified security policy and send the first security configuration to the AN. The AN is used to determine second security configuration according to the first security configuration or the specified security policy and send the second security configuration to the UE. The technical solution provided by the invention can meet the security requirements of differentiated authentication protocols and security policies of the network so as to improve network security.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a network security management system, method and device. Background technique [0002] In a 4G network, in order to support services with different requirements, network leasing, network sharing, etc., multiple dedicated core networks can share the access network. Each dedicated core network is optimized in terms of function and performance for specific services to meet differentiated requirements for service functions and performance. Such as figure 1 , figure 1 It is a schematic diagram of the 4G dedicated core network architecture. The access network can be connected to multiple operators, each operator can have a dedicated core network (English: Dedicated Core Network, DCN), and multiple DNCs share the access network. User equipment (English: User Equipment, UE) is connected to the access network, and realizes interaction with business services of dedicated...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L45/85
CPCH04L63/205H04W12/06H04L63/0892H04L63/0869H04W12/10H04W12/03H04L9/40H04L67/1001H04L63/20
Inventor 李漓春刘斐司马可
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products