A method and system to realize network shield in packet network

A packet network system and network shielding technology, applied in the field of communication, can solve the problems of network shielding limitation and low security of network shielding, and achieve the effect of improving security and operability, good security and strong adaptability

Inactive Publication Date: 2007-05-16
HUAWEI TECH CO LTD
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The present invention provides a method and system for implementing network shielding in a packet network to solve the problem of low security in implementing network shielding in a packet network in the prior art; There is a problem with network blocking limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system to realize network shield in packet network
  • A method and system to realize network shield in packet network
  • A method and system to realize network shield in packet network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The network logic structure of the packet core network using SIP protocol as call control signaling is shown in Figure 1, where the packet core network can be either IMS or IMS-based PSTN / ISDN Emulation Subsystem (PES). Among them: interfaces E1-E6 are all SIP protocol interfaces, and each functional entity is only functionally independent, and can be combined in one physical entity arbitrarily, and the interface between the combined functional entities can be an internal interface; the application server (AS ) may be a third party or a special AS with security requirements. In an IMS-based PES network, the Access Gateway Control Function (AGCF) is also one of the network access points; in addition, when interworking with other heterogeneous IP networks, the Interworking Border Gateway Control Function (I-BGCF) is also a network shielding point one.

[0062] In order to improve security in the process of network shielding in the packet network, the present invention se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed method for shielding network in packet network comprises: sending the SIP information to be outside to the network shielding point in this network; using the said network shielding point to store the relative information to be shielded in SIP information, and hiding the relative information in SIP information to send it out of the network. It also discloses a shielding device for packet network, which includes: a storage module for the information required to shield, a first process module to store the relative information into last module and shield the relative information in SIP information, and a second process module to recover the shielded information according to stored relative information.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method and system for realizing network shielding in a packet network. Background technique [0002] The traditional telecom network is a secure network, a trusted network. However, in the packet telecommunication network architecture using the Session Initiation Protocol (SIP) as the call control signaling of the core network, with the IP-based bearer, access security and network domain security have become issues that must be considered in operation. Leakage of addresses of non-boundary functional entities in the network has security risks. [0003] In IETF RFC3608, it is described that the SIP Proxy needs to return its address in the Service-Route message header of the 200 OK response of the REGISTER request. In 3GPP TS 24.229, the registration and basic session processing of the IMS architecture of call control signaling with SIP as the core network are described: ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06
CPCH04L63/04H04L65/1006H04L29/06027H04L29/06197H04L65/1104
Inventor 施有铸徐培利
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products