Supercharge Your Innovation With Domain-Expert AI Agents!

Data security implementation method and related equipment

A technology of data security and implementation methods, which is applied to secure communication devices, data exchange networks, data exchange through path configuration, etc., and can solve problems such as IPSec static deployment not applicable to 5G networks

Active Publication Date: 2020-05-12
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since 5G is an elastic network, obviously, the static deployment of IPSec in traditional networks is not suitable for 5G networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security implementation method and related equipment
  • Data security implementation method and related equipment
  • Data security implementation method and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0055] Figure 6 A schematic flow diagram of the method for implementing data security provided by Embodiment 1 of the present invention, as shown in Figure 6 As shown, the method includes:

[0056] Step 601, the first security gateway function on the access network side obtains first information, and the first information includes at least one of the following: the IP address of the network element on the access network side, the network topology on the access network side information;

[0057] Step 602: According to the first information, the first security gateway function negotiates with the second security gateway function on the core network side to establish an IP security tunnel IPSec.

[0058] Wherein, the first information obtained by the first security gateway function includes:

[0059] The first topology management function TMF on the access network side acquires and saves the first information;

[0060] The first TMF acquires address information of the first...

Embodiment 2

[0092] Figure 7 A schematic flow diagram of the method for implementing data security provided by Embodiment 2 of the present invention, as shown in Figure 7 As shown, the method includes:

[0093] Step 701, the second security gateway function on the core network side obtains second information, the second information includes at least one of the following: the IP address of the core network side network element, the network topology of the core network public network element domain Information, network topology information of network slicing;

[0094] Step 702: According to the second information, the second security gateway function negotiates with the first security gateway function on the access network side to establish an IP security tunnel IPSec.

[0095] Wherein, the second security gateway function acquires second information, including:

[0096] The second topology management function TMF on the core network side obtains and saves the second information;

[00...

Embodiment 3

[0129] Embodiment 3 is applied to a communication system including functions such as communication function, security gateway function and topology management function (Topology Management Function, TMF). Among them, the communication function is the wireless access network and functional network elements in the 5GCN network, such as CU, AMF, etc.; the security gateway function is the IPSec tunnel endpoint, which is used to perform IPSec protection on the interactive data between communication functions; the topology management function It is used to manage the network topology, such as the networking structure between network elements and the IP address segment used by the network or the IP address of each communication function in the network. In the communication system, the first network includes at least a first communication function, a first security gateway function, and a first topology management function; the second network includes at least a second communication fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data security implementation method and related equipment, one of the methods comprises the steps that a first security gateway function of an access network side acquires first information, and the first information comprises at least one of the following information: an IP address of a network element of the access network side and network topology information of the access network side; and an IP security tunnel IPSec is established between the first security gateway function and the second security gateway function at a core network CN side through negotiation according to the first information. Therefore, the security gateway function can dynamically establish IPSec, and data security between the access network side and the core network sidein the elastic network is realized.

Description

technical field [0001] Embodiments of the present invention relate to but are not limited to the field of elastic network data security, and more specifically relate to a data security implementation method and related equipment. Background technique [0002] The traditional 2G / 3G / 4G telecommunications network is a closed network composed of a large number of special equipment and single-function network nodes. The software and hardware are deeply bound, and usually face problems such as long construction period, high maintenance cost, and limited scalability, making it difficult to adapt Internet OTT (Over The Top), Internet of Things and other business needs for rapid development. [0003] The 5G (Fifth Generation, fifth-generation mobile communication) telecom network introduces software definition and virtualization technology to reconstruct the traditional telecom network. Through the decoupling of software and hardware, it realizes the construction of a virtualized net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/46H04L12/66H04L29/06
CPCH04L12/4633H04L41/12H04L12/66H04L63/18H04L12/46H04L9/40
Inventor 毛玉欣闫新成
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More