Universal safety strategy constituting method

A technology of security policy and construction method, applied in the field of mobile communication and information security, can solve problems such as security guarantee restrictions, and achieve the effect of good support, scalability and compatibility

Inactive Publication Date: 2006-05-17
ZTE CORP
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This limits the user's security
[0005] The development of security technologies such as authentication, encryption, and signature has laid a technical foundation for communication security an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal safety strategy constituting method
  • Universal safety strategy constituting method
  • Universal safety strategy constituting method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0035] According to the content of the invention, we introduce specific embodiments of the invention with examples.

[0036] Suppose the operator classifies the mobile general security policy according to the security threat. combine figure 1 The framework of security policy in , expounds the construction method of general security policy.

[0037] (1) Classification of safety levels;

[0038] It is assumed that operators divide security requirements into two categories according to the different security requirements of various services provided by operators in the market: 1. At a specified time, there are idle lines for communication between mobile terminals and application services. 2. Provide a secure communication line. For category 2, the business requires security guarantees with three security strengths. Strong security guarantee, free from any attack; medium security guarantee, to meet most communications. Low security, able to communicate. For each type of guar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for structuring universal safety policy includes dividing safety requirements to be a numbers of layers and correspondingly dividing safety policy to be the same numbers of levels, confirming protective object of each safety policy level, configuring safety element combination and safety algorithm for application server and applied mobile terminal i.e. configuring safety element combination listing for protective object according to each level of safety policy.

Description

technical field [0001] The invention relates to the field of mobile communication and information security, in particular to a method for constructing a general security policy for mobile communication. Background technique [0002] With the increase of mobile network transmission capacity, various new services are also developed. The business scope is no longer limited to the voice service for calls between mobile terminals, or the data service for mobile terminals to access specific server content, but the multimedia service for mobile terminals to fully participate in multi-party information interaction. The mobile terminal is not only a receiver of multimedia information, but also a provider of multimedia information. Increasingly rich applications require adequate security. However, not all information requires the same level of security. Therefore, it is necessary to provide different levels of security services for different business needs. Therefore, on the basis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L29/06
Inventor 张晔张峰陈剑勇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products