Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communication method, system and device based on security gateway

A technology of a security gateway and a communication method, applied in the field of communication methods, systems and equipment based on a security gateway, can solve the problems of transmission security attacks, poor communication service quality, communication data leakage, etc., and achieve enhanced security and accurate transmission. , the effect of reducing business pressure

Pending Publication Date: 2021-03-26
FIBRLINK NETWORKS +4
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of the Internet, ordinary communication terminals are connected to the mobile core network through fixed network broadband, which greatly expands the coverage of mobile communication signals, enabling users to carry out daily communication well through communication terminals. During the communication process, the system gateway The system gateway and the core network need to process a large number of communication data packets, which brings great business pressure to the system gateway and the core network, resulting in a significant decline in the processing capabilities of the system gateway and the core network, and even packet loss, resulting in poor communication service quality. Inadequate problems, and with the convenience of Internet data transmission, and the security of transmission will also be attacked, which will easily lead to the leakage and misinformation of communication data. Therefore, we propose a communication method, system and equipment based on a security gateway for solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method, system and device based on security gateway
  • Communication method, system and device based on security gateway
  • Communication method, system and device based on security gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment example

[0047] In a preferred implementation case, a security gateway forms a corresponding encryption key and a digital certificate with at least two communication terminals, so as to realize secure communication between the two communication terminals.

[0048]In a preferred implementation case, in step S2, the secure tunnel is to perform one-way identity authentication or two-way identity authentication based on the SSL protocol through a preset digital certificate between the communication terminal and the security gateway, and establish a VPN encrypted secure tunnel, and the established secure tunnel Only access to specified services and specific operations is allowed, and the broadband standard of the security gateway is the same as that of the communication terminal that has established a secure tunnel with the security gateway.

[0049] In a preferred implementation case, in step S4, the method for judging the security tunnel between the security gateway and the communication t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a communication method, system and device based on a security gateway, and the device comprises a communication terminal and the security gateway, and the communication terminal and the security gateway are initialized, and respectively import a corresponding digital certificate and an encryption key; the communication terminal and the security gateway perform identity authentication by using a preset digital identity certificate, and if the authentication is passed, the communication terminal and the security gateway establish a security tunnel; the communication terminal encrypts the communication data packet through the encryption key, and sends the encrypted data packet to the security gateway through the communication base station; the security gateway receivesthe encrypted data packet and judges whether the communication terminal from which the data packet comes establishes a corresponding security tunnel with the security gateway; and the security gateway processes the data packet according to the judgment result. Service pressure of a system gateway and a core network is reduced, identity authentication such as an encryption key and a digital certificate is introduced on the basis of a traditional security gateway, the security of the traditional security gateway is enhanced, and secure and accurate transmission of communication data is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of communication technology, in particular to a communication method, system and equipment based on a security gateway. Background technique [0002] With the rapid development of the Internet, ordinary communication terminals are connected to the mobile core network through fixed network broadband, which greatly expands the coverage of mobile communication signals, enabling users to carry out daily communication well through communication terminals. During the communication process, the system gateway The system gateway and the core network need to process a large number of communication data packets, which brings great business pressure to the system gateway and the core network, resulting in a significant decline in the processing capabilities of the system gateway and the core network, and even packet loss, resulting in poor communication service quality. Inadequate problems, and with the conveni...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0485H04L63/0823H04L9/3263H04L63/168H04L63/0272
Inventor 贾少堃许剑刘松阳孙乔赵鲲鹏张洁孔维康白洁孟丹吴明雷丁强李志祥于波
Owner FIBRLINK NETWORKS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products