Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safety mode starting method and device

A technology of security mode and mode, which is applied in the field of communication, can solve the problem of enabling the security mode in scenarios without slicing networks, etc., and achieve the effects of reducing computing resource consumption, improving security processing efficiency, and improving efficiency

Inactive Publication Date: 2018-03-27
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In related technologies, there is only a security mode activation scheme for physical networks, and there is no security mode activation scheme for network slices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety mode starting method and device
  • Safety mode starting method and device
  • Safety mode starting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] Such as figure 2 As shown, this embodiment provides a method for enabling a security mode, which is applied to a sliced ​​network, and may include:

[0064] Step 202, the CPF sends a first signaling to the terminal, carrying slice network security information, for instructing the terminal to enable slice network security mode.

[0065] In some implementation manners, the slice network security information may include one or more of slice network identifier, slice network name, and slice network selection information; and include one of integrity algorithm information and confidentiality algorithm information.

[0066] In some implementation manners, the method in this embodiment may further include: the CPF receiving second signaling from the terminal, the slice network security information corresponding to a slice network; the CPF using the Processing the second signaling with a key related to the network slice.

[0067] In some implementation manners, the above-men...

Embodiment 2

[0075] Such as image 3 As shown, this embodiment provides a method for enabling a security mode, which is applied to a sliced ​​network, and may include:

[0076] Step 302, the terminal receives first signaling from the network side, carrying security information of the network slice, used to indicate that the security mode of the network slice has been enabled on the network side.

[0077] In some implementations, the slice network security information may include one or more of slice network identifiers, slice network names, and slice network selection information; and may include one of integrity algorithm information and confidentiality algorithm information .

[0078] In some implementation manners, the terminal may also send a second signaling to the network side, and the slice network security information corresponds to a slice network; the terminal may use a key related to the slice network to process all Describe the second signaling.

[0079] In some implementati...

Embodiment 3

[0087] Figure 4 It is a flow chart of the method for enabling the security mode in this embodiment, and the process includes:

[0088] In step 401, the terminal and the CPF complete access to the physical network.

[0089] Step 402, the terminal sends a signaling message to the network, the message carries user identification and signature information, and the message reaches the CPF.

[0090] For example, the subscriber identity may be an International Mobile Subscriber Identity (IMSI, International Mobile Subscriber Identity) or a temporary subscriber identity assigned by the network.

[0091] In this embodiment, the terminal carries signature information in the signaling message to protect the integrity of the message. Specifically, the manner in which the terminal carries the signature information is: calculating the signature information using a key not related to any slice network.

[0092] Step 403, the CPF receives the signaling message, and verifies the message, p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety mode starting method and device which are used for a slice network. The method can comprise the step that: a CPF (Control Plane Function) entity sends a first signal to a terminal, wherein the first signal carries slice network safety information and is used for indicating the terminal to start a slice network safety mode. According to the technical scheme providedby the invention, the safety mode starting for the slice network is implemented.

Description

technical field [0001] The present application relates to the field of communications, and in particular to a method and device for enabling a security mode. Background technique [0002] The 3rd Generation Partnership Project (3GPP) proposed a network slicing scheme, so that a physical mobile network can be virtualized into multiple virtual mobile networks, and each virtual mobile network is called a slice network (slice), users can access multiple slice networks to obtain corresponding services, which greatly increases the flexibility of the network. [0003] figure 1 It is an example diagram of the relationship between the network and the slice network. A sliced ​​network is a network virtualized from the physical network and attached to the physical network. Because of the existence of the dependency relationship, users accessing the slice network first need to be able to access the physical network to which the slice network is attached. Since the sliced ​​network i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/02H04W12/10H04W24/02H04W12/106
CPCH04L63/0272H04W12/02H04W12/10H04W24/02H04W12/037H04W12/033H04W12/106H04L9/40
Inventor 谢振华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products