Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security realization method, equipment and system

A technology for implementing methods and devices, applied in the field of communications, capable of solving problems such as waste of resources and data leakage

Active Publication Date: 2018-07-31
HUAWEI TECH CO LTD
View PDF4 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that in the process of data transmission, if there is a problem with the intermediate node, it may lead to data leakage
Moreover, encrypting and restoring data multiple times during data transmission will also lead to waste of resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security realization method, equipment and system
  • Security realization method, equipment and system
  • Security realization method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0144] In order to facilitate understanding of the solution, the network architecture to which the solution of the embodiment of the present application may be applied is firstly introduced below with reference to related drawings. Such as figure 1 As shown, the future mobile communication network architecture includes a terminal device 110 , an access network node 120 and a user plane node 130 . Wherein, the terminal device 110 accesses the operation network through the access network node 120 , so as to implement communication with the user plane node 130 .

[0145] The terminal device 110 is a logical entity, and specifically may be any one of a user equipment (User Equipment), a communication device (Communication Device), and an Internet of Things (Internet of Things, IoT) device. Wherein, the user equipment may be a smart phone (smart phone), a smart watch (smart watch), a smart tablet and so on. The communication device may be a server, a gateway (Gateway, GW), a base...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a security realization method, equipment and a system. The method comprises the steps that first equipment obtains a security policy and at least one key of asession; and the first equipment sends protection data to second equipment, wherein the protection data is obtained by protecting security of session data of the session through unitization of the atleast key according to the security policy of the session, and the second equipment is used for restoring the protection data through utilization of the at least one key according to the security policy, thereby obtaining the session data, when the first equipment is terminal equipment, the second equipment is an access network node or a user plane node, and when the first equipment is the accessnetwork node or the user plane node, the second equipment is the terminal equipment.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method, device and system for implementing security. Background technique [0002] In the existing network security architecture, data security protection adopts a hop-by-hop approach, that is, security protection is performed in segments. Taking the transmission link of data from terminal device-base station-serving gateway-PDN gateway as an example, a security protection is performed between the terminal device-base station, a security protection is performed between the base station-serving gateway, and a security protection is performed between the serving gateway-PDN gateway. Perform a security protection at a time. It can be seen that in the process of data transmission, if there is a problem with the intermediate node, it may lead to data leakage. Moreover, encrypting and restoring data multiple times during data transmission will also lead to waste of resources. Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04W12/041H04W12/06H04W12/106H04W12/033H04W12/10H04L63/0428H04L63/06H04L63/20H04L67/14H04L9/0861H04L2209/80
Inventor 张博吴荣甘露
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products