Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Processing method and device as well as acquisition method and device for security information

A security information and processing method technology, applied in the field of security information processing method and device, acquisition method and device, can solve problems such as different security algorithms and keys, inability to achieve security isolation of different network slices, and inability to provide different network slices , to achieve security isolation and improve access security

Active Publication Date: 2017-08-25
DATANG MOBILE COMM EQUIP CO LTD
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to provide a security information processing method and device, and an acquisition method and device, which solves the problem that in the prior art, different security algorithms and keys cannot be provided for different network slices, and therefore it is impossible to realize security information between different network slices. The problem of safe isolation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method and device as well as acquisition method and device for security information
  • Processing method and device as well as acquisition method and device for security information
  • Processing method and device as well as acquisition method and device for security information

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0071] Such as figure 2 As shown, the first embodiment of the present invention provides a processing method for security information, the processing method comprising:

[0072] Step 101, the access control functional entity generates security information;

[0073] Step 102, sending the security information to a control entity.

[0074] It should be noted that the access control function entity provided by the embodiment of the present invention may be AAA or HSS. Among them, AAA is Authentication Authorization Accounting, authentication authorization accounting; HSS is Home Subscriber Server, belonging to the user server

[0075] Such as image 3 Shown is the system architecture of the terminal access network slicing method provided by the embodiment of the present invention. The system architecture separates the authentication and authorization functions from each network slice to form an independent function, that is, image 3 In the access control function, the access...

no. 2 example

[0108] The second embodiment of the present invention provides a method for obtaining security information of a terminal, which is applied to network slicing, and the method for obtaining includes:

[0109] Step 201, receiving terminal security information sent by an access control functional entity; or,

[0110] Step 301: Send a first request message to the access control function entity, the first request message carries the identifier of the terminal requesting to access the network slice, and the first request message is used to request to obtain the terminal's security information;

[0111] Step 302, receiving the security information of the terminal sent by the access control function; or,

[0112] Step 401, receiving an access request message of a terminal sent by an access device, where the access request message carries security information of the terminal.

[0113] Specifically, in step 201, the access control entity actively provides terminal information to the ne...

no. 3 example

[0118] The third embodiment of the present invention provides a method for obtaining security information of network slicing, which is applied to a terminal, including:

[0119] Step 501, receiving the security information of each network slice subscribed by the terminal sent by the access control function entity; or,

[0120] Step 601: Send a second request message to the access control function entity, where the second request message carries information about the network slice accessed by the terminal, and the second request message is used to request to obtain the security information of the network slice. information;

[0121] Step 602: Receive the security information of the network slice sent by the access control function entity.

[0122] Specifically, step 501 is actively provided by the access control function, which means that it sends security information of each network slice subscribed by the terminal to the terminal during the authentication process (or after t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a processing method and device as well as acquisition method and device for security information. The processing method for the security information comprises the following steps: enabling an access control functional entity to generate security information; and sending the security information to a control entity. According to the embodiment of the invention, the access control functional entity authenticates and authorizes the terminal and is responsible for generating different security information for different network slices signed with the terminal, the network slices process high layer information sent by the terminal by using the generated security information to ensure that the terminal is accessed to the network slices, and thus the security isolation among the different network slices can be achieved, the access security can be improved, and the security isolation among the different network slices can be achieved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for processing security information, and an acquisition method and device. Background technique [0002] While supporting traditional mobile broadband (Mobile Broadband, MBB) scenarios, a mobile communication network also needs to support new scenarios. New scenarios have different requirements on the network, such as functions such as billing, policy control, security, and mobility. Mobile broadband scenarios may require application-dependent charging and policy control, while other scenarios may require simpler charging or policy. [0003] In order to better support different scenarios, services in different scenarios need to be isolated. With network slicing technology, a single physical network can be divided into multiple virtual networks. For example, a large number of electronic sensor failures cannot affect MBB users. Each network sl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/06H04W12/08
CPCH04L63/0876H04L63/0892H04L63/18H04L63/20H04W12/06H04W12/08
Inventor 侯云静徐晖艾明
Owner DATANG MOBILE COMM EQUIP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products