Universal safety grade consulting method

A technology of security level and security algorithm, applied in the field of mobile communication and information security, can solve problems such as increasing negotiation steps, and achieve the effect of narrowing the search range, reducing negotiation steps, and improving negotiation efficiency

Active Publication Date: 2009-12-16
ZTE CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although authentication after negotiation reduces the probability of being attacked, it increases the number of negotiation steps

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal safety grade consulting method
  • Universal safety grade consulting method
  • Universal safety grade consulting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] According to the content of the invention, we introduce the specific implementation of the invention.

[0033] Refer to figure 1 As shown, the security strategy is divided into a basic security strategy and a value-added security strategy. The basic security policy corresponds to ordinary services. Value-added security policies correspond to value-added services. Operators need to provide security guarantees for value-added services. The realization of security guarantee requires operators to increase investment in mobile networks. Therefore, four security layers of high, medium, low and extended are configured in the value-added security strategy. The high, medium, and low levels are configured by the operator, and the extended level is configured by the user. Each security layer achieves different strength security guarantees. The security layer of each security level contains its corresponding security element combination and the security algorithm corresponding to the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a general security level negotiation method, which includes the following steps: first, the initiator sends the security level selected by the called party to the called party; A security algorithm with the best performance; in the third step, the two parties establish a secure communication channel by executing the negotiated security algorithm. The invention can reduce the probability of being attacked during the negotiation process, can also improve the negotiation efficiency and narrow the search range.

Description

Technical field [0001] The invention is suitable for the fields of mobile communication and information security, and specifically relates to a general security level negotiation method. Background technique [0002] With the development of mobile networks and services, mobile networks must support more and more security protocols and security algorithms. This motivation mainly comes from the following aspects: (1) With the increasing integration of mobile networks, such as the integration of 3G and WLAN, mobile networks must support a wide variety of mobile terminals at the same time, but different mobile terminals may have different security Protocol support, so the security protocols that the server must support are increasing day by day. (2) Due to the mobility of mobile terminals, once a mobile terminal supporting a certain security protocol is put into use, the operator is objectively required to configure the security protocol for servers within the roaming range of the mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/12H04L9/32
Inventor 张晔张峰陈剑勇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products