Handshake negotiation method and system in safe grade

A security level, security protocol technology, applied in the field of mobile communication and information security, can solve the problems of increasing network security protocol parameters, security protocol signaling format restrictions, etc., to promote personalization, convenient billing, easy configuration and use. Effect

Inactive Publication Date: 2006-02-01
ZTE CORP
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] One of the purposes of the present invention is to propose a security level handshake negotiation system, which solves the problem that the expansion of security protocol parameters may be limited by the signaling format in the prior art, adapts to the coexistence of multiple security protocols in mobile networks, and diversifies mobile terminals And the characteristics of increasing network security protocol parameters brought about by the increasingly rich mobile services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handshake negotiation method and system in safe grade
  • Handshake negotiation method and system in safe grade
  • Handshake negotiation method and system in safe grade

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Below in conjunction with accompanying drawing, the implementation of technical scheme is described in further detail:

[0051] Add a security level description layer outside the security protocol layer, the rules are as follows figure 1 shown. The security protocol layer generally refers to the general term of security protocols that can be supported in mobile terminals and servers. It provides security technical support for the security level description layer. The functional entity of the security level description layer can divide the security level into n levels according to application requirements, where n is the level code. Each level of security level corresponds to specific protocol parameters to achieve a certain degree of security.

[0052] When the handshake signaling issued by the security protocol layer passes through the security level description layer, the security level description layer converts the protocol parameters into signaling with a level ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Security level description layer and security protocol layer are setup at mobile terminal and server. Dividing capabilities of security safeguards into different levels, the security level description layer converts parameters of security protocol from security protocol layer to security levels, and receives information of security level sent from security level description layer of opposite end, as well as converts security level to be sent to security protocol layer to parameters of security protocol. Security protocol layer stores needed parameters of security protocol, and receives parameters of security protocol sent from security protocol layer of opposite end. The invention uses original handshake signaling of security protocol fully to carry out information of level description so as to avoid potential safety loophole if additional signaling for describing security level is added. Advantages are: easy of configuring and using security technique and convenience for charging.

Description

technical field [0001] The invention relates to the field of mobile communication and information security, in particular to a security level handshake negotiation method. Background technique [0002] With the development of mobile networks and services, mobile networks must support more and more security protocols and algorithms. This motivation mainly comes from the following aspects: (1) As the mobile network is becoming more and more integrated, such as the integration of 3G and WLAN, the mobile network must support a wide variety of mobile terminals at the same time, but different mobile terminals may have different security requirements. Protocol support, so the number of security protocols that the server must support is increasing day by day. (2) Due to the mobility of the mobile terminal, once a mobile terminal supporting a certain security protocol is put into use, it is objectively required for the operator to configure the security protocol for servers within t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
Inventor 陈剑勇彭志威罗忠生
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products