Security control method and system and related equipment

A security control and user technology, applied in the field of communication, can solve the problems of adverse effects on public security, inability to legally monitor signaling, etc., and achieve the effect of ensuring communication security

Active Publication Date: 2021-06-11
CHINA TELECOM CORP LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The implementation of IPSec improves the access security of IMS, but because IPSec encrypts the SIP signaling sent by the terminal on the Gm interface, it is impossible to legally monitor the signaling sent by the terminal, which may cause public safety Negative Effects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security control method and system and related equipment
  • Security control method and system and related equipment
  • Security control method and system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present disclosure with reference to the drawings in the embodiments of the present disclosure.

[0043] figure 1 It is a schematic flowchart of an embodiment of the security control method of the present disclosure. When the security control method in this embodiment is applied to an IMS system, the method may be executed by a Serving Call Session Control Function (S-CSCF, Serving CallSession Control Function).

[0044] Such as figure 1 As shown, the method 10 of this embodiment includes:

[0045] Step 110, in response to the registration request initiated by the user, obtain the user's authentication data, for example, obtain the user's authentication data from a Home Subscriber Server (HSS, Home Subscriber Server).

[0046] Step 120, extracting the IPsec encryption enable indication parameter in the user's authentication data.

[0047] Wherein, the value of the IP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure discloses a security control method, system and related equipment, and relates to the communication field. The method includes obtaining the authentication data of the user in response to the registration request initiated by the user; extracting the IPsec encryption enable indication parameter in the user authentication data; when the value of the IPsec encryption enable indication parameter indicates that it is closed, through the response message Instruct the user to disable the IPsec encryption function so as to monitor the signaling sent by the user. Therefore, the IPsec function of some users can be turned off according to the monitoring needs, and the legal monitoring of some users can be realized while ensuring the communication security of most legitimate users.

Description

technical field [0001] The present disclosure relates to the communication field, in particular to a security control method and system and related equipment. Background technique [0002] The IP Multimedia Subsystem (IMS, IP Multimedia Subsystem) has an all-IP architecture based on the Session Initiation Protocol (SIP, Session Initiation Protocol). The IP protocol enables IMS terminals to be directly connected to the Internet, but the Internet is an insecure network, which makes access devices and IMS terminals easily attacked by hackers. In addition, the SIP protocol adopted by IMS is a text protocol with a simple structure and syntax, and is prone to security issues such as counterfeiting, tampering and interception. The transmission of malicious SIP signaling to the core control layer will pose a great security threat to the IMS network. [0003] Security features using Internet Protocol Security (IPSec) can provide security protection for the IMS system. The 3GPP IMS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 赵飞毛安平孙艺宸
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products