Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety ability consultation method

A technology of security capabilities and protocols, applied in secure communication devices, synchronous send/receive encryption equipment, digital transmission systems, etc., can solve the problems of many protocol interaction processes, poor scalability, and impact on interoperability, and achieve a simple interaction process. , The effect of strong scalability and wide application range

Inactive Publication Date: 2005-08-24
HUAWEI TECH CO LTD
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. Only the extended header field of SIP is defined, only for the application of SIP protocol, the application range is narrow, and the scalability is not strong;
[0007] 2. There are too many protocol interaction processes, and the efficiency of security capability negotiation is not high;
[0008] 3. The protocol process does not clearly define how it is applied in the NGN network, and how it is combined with the session process in the NGN network, which affects future intercommunication;
[0009] 4. The security capability is determined by the terminal, and the terminal is usually untrustworthy, and the security capability negotiation process exposes the security capability of the server, which is not conducive to the security of the system, and the security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety ability consultation method
  • Safety ability consultation method
  • Safety ability consultation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In the NGN network, network security is an important problem encountered in the actual operation of the NGN network. If the security problem of the NGN network cannot be solved well, the NGN network will not be able to be applied on a large scale.

[0056] In an NGN network, network equipment mainly includes terminals, gateways and soft switches, etc. figure 1 It is a simple single-domain network diagram of NGN, that is, there is only one softswitch (also called media gateway controller) device, and the actual network may have multiple softswitch devices. Such as figure 1 In the NGN network environment shown, the softswitch is connected to the trunk media gateway, SIP (Session Initiation Protocol) terminal, H.323 terminal and H.248 terminal through the IP network, and the trunk media gateway is connected to the analog telephone T1 and T2 , In addition, the soft switch is also connected with the authentication center AuC.

[0057] The present invention combines the cha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a negotiatory method of safety capability and is applied to the next generation network. It includes the following processes: a) the terminal sends the request of information registering to the soft exchange; b) the soft exchange sends identification request to the identifying center; c) the identifying center identifies the terminal, the terminal and the soft exchange negotiate the safety capability and communicate with each other according to the negotiated results. Because this invention realizes the safety capability negotiation during the registering identification process, so the safety capability negotiation is not restrained by the specific applying agreement of NGN network and is a general method. It has wide application range and strong extent capability and also has the strong points of simple exchanging process and high negotiation efficiency.

Description

technical field [0001] The invention relates to security management technology in communication, especially a security capability negotiation method applied in NGN (next generation network). Background technique [0002] NGN is a comprehensive and open network framework that can provide various services including voice, data and multimedia, and provides users with real-time conversational services. Its network equipment is composed of a small number of core equipment and a large number of user terminals. In addition to the interaction with PSTN / PLMN in the network, which is relatively safe based on circuit mode, the interaction between other network equipment is based on packet core network and various Packets are connected to the network for transmission. On the open IP network, the NGN network is extremely vulnerable to various illegal attacks, especially the large number of packet terminals in the NGN network, which can easily become the initiator of illegal attacks. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/12
Inventor 严军吴东君
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products