Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cellular mobile communication network and packet data network protection method

A packet data network and cellular mobile technology, applied in the field of mobile communication, can solve the problem that the authentication and password protection strength of cellular mobile communication network terminals cannot meet the requirements of high security level users, cannot meet user security requirements, and the security function does not have sufficient and reliable evidence. Proof and other issues, to achieve the effect of convenient implementation, simple protocol, small calculation and protocol overhead

Inactive Publication Date: 2019-01-29
广州市科航通信科技有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] User data is still transmitted in clear text in the core network of the mobile communication network, and the terminal authentication and password protection strength of the cellular mobile communication network cannot meet the requirements of users with high security levels
In particular, the equipment of the cellular mobile communication network has not undergone a high-level security assurance assessment, and there is no sufficient and reliable evidence to prove whether the security functions of these equipment are implemented correctly
Therefore, for a dedicated computer network with a high security level, neither the security protocol at the computer network layer nor the security measures of the mobile communication network can meet the user's security requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0025] Embodiment: determine the demarcation line between the cellular mobile communication network and the packet data network; determine the security boundary inside the dedicated terminal in the cellular mobile communication network; obtain the count value and the enhanced count value of the packet data network convergence protocol data packet, and enhance the count The value is logically the high bit of the count value. After the count value reaches the predetermined threshold value, the enhanced count value increases by a predetermined value; according to the count value, the enhanced count value and the security protection key, the packet data network aggregation protocol data packet transmitted to the upstream Perform security processing; provide security password service functions to dedicated terminals and border protection gateways; complete border protection of cellular mobile communication network packet data networks through border protection gateways according to s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cellular mobile communication network and packet data network protection method. The method includes the following steps that: a boundary line is defined between a cellular mobile communication network and a packet data network; a security boundary is defined inside a dedicated terminal in the cellular mobile communication network; the count value and enhanced count valueof a packet data network convergence protocol data packet are acquired, wherein the enhanced count value is logically a high bit of the count value, after the count value reaches a predetermined threshold value, the enhanced count value is increased by a predetermined numerical value; and security processing is performed on the above transmitted packet data network convergence protocol data packetaccording to the count value, the enhanced count value, and a security protection key. Compared with a network layer security protocol, the data link layer security protocol used in the method of thepresent invention has the advantages of simplicity, convenience in implementation, low computation and protocol overhead, and can better meet high security requirements especially in the field of information security.

Description

technical field [0001] The invention relates to a method for protecting a packet data network of a cellular mobile communication network, which belongs to the field of mobile communication. Background technique [0002] In the prior art, as the cellular mobile communication network transitions from a voice-centric network to a data-centric network, the cellular mobile communication network constitutes the physical layer and data link layer of the computer network, and the cellular mobile communication network is no longer directly Provide specific services to users. [0003] User data is still transmitted in clear text in the core network of the mobile communication network, and the terminal authentication and password protection strength of the cellular mobile communication network cannot meet the requirements of users with high security levels. In particular, the equipment of the cellular mobile communication network has not passed a high-level security assurance assessme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/04H04W12/033
CPCH04W12/02H04W12/04
Inventor 邱岳光
Owner 广州市科航通信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products