Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A safety control method and system and related equipment

A security control and user technology, applied in the field of communication, can solve the problems of adverse effects on public security, inability to legally monitor signals, etc.

Active Publication Date: 2019-05-03
CHINA TELECOM CORP LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The implementation of IPSec improves the access security of IMS, but because IPSec encrypts the SIP signaling sent by the terminal on the Gm interface, it is impossible to legally monitor the signaling sent by the terminal, which may cause public safety Negative Effects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safety control method and system and related equipment
  • A safety control method and system and related equipment
  • A safety control method and system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the drawings in the embodiments of the present disclosure.

[0043] figure 1 It is a schematic flowchart of an embodiment of the security control method of the present disclosure. When the security control method in this embodiment is applied to an IMS system, the method may be executed by a Serving Call Session Control Function (S-CSCF, Serving CallSession Control Function).

[0044] Such as figure 1 As shown, the method 10 of this embodiment includes:

[0045] Step 110, in response to the registration request initiated by the user, obtain the user's authentication data, for example, obtain the user's authentication data from a Home Subscriber Server (HSS, Home Subscriber Server).

[0046] Step 120, extracting the IPsec encryption enable indication parameter in the user's authentication data.

[0047] Wherein, the value of the IP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety control method and system and related equipment, and relates to the field of communication. The method comprises the steps of obtaining authentication data of a user in response to a registration request initiated by the user; extracting an IPsec encryption opening indication parameter in the authentication data of the user; and under the condition that the value of the IPsec encryption starting indication parameter indicates that the IPsec encryption function is closed, indicating the user to close the IPsec encryption function through the response message soas to monitor the signaling sent by the user. Therefore, the IPsec function of the local user is closed according to monitoring needs, and legal monitoring of the local user is achieved while the communication security of most legal users is guaranteed.

Description

technical field [0001] The present disclosure relates to the communication field, in particular to a security control method and system and related equipment. Background technique [0002] The IP Multimedia Subsystem (IMS, IP Multimedia Subsystem) has an all-IP architecture based on the Session Initiation Protocol (SIP, Session Initiation Protocol). The IP protocol enables IMS terminals to be directly connected to the Internet, but the Internet is an insecure network, which makes access devices and IMS terminals easily attacked by hackers. In addition, the SIP protocol adopted by IMS is a text protocol with a simple structure and syntax, and is prone to security issues such as counterfeiting, tampering and interception. The transmission of malicious SIP signaling to the core control layer will pose a great security threat to the IMS network. [0003] Security features using Internet Protocol Security (IPSec) can provide security protection for the IMS system. The 3GPP IMS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 赵飞毛安平孙艺宸
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products