Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Networking method and system of LTE private network in public security field

A technology in the field of public security and private network, applied in the field of networking methods and systems, can solve problems such as performance degradation, solution cost increase, violation of network isolation requirements, etc., and achieve the effect of meeting business application requirements and efficient support

Active Publication Date: 2018-12-07
CHENGDU TD TECH LTD
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The convergence of public and private networks requires that the mobile terminal data flow can reach the broadband application server after the operator's VPDN is connected. Currently, broadband application services are deployed on the private video network, and the gatekeeper isolation is required between the private video network and the operator's VPDN. The broadband application service agent is deployed synchronously in the zone, which leads to an increase in the overall solution cost and a decrease in performance
[0009] Deploying the Jingwutong APP on smart terminals on LTE private networks requires that the SSL VPN secure tunnel between the terminal TF card and the security gateway of the mobile security access sub-platform pass through the isolation gatekeeper between the video private network and the operator’s mobile access sub-platform. This violates network isolation requirements (for auditing reasons, data traversing the isolation gatekeeper must be in cleartext), therefore, this is not feasible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Networking method and system of LTE private network in public security field
  • Networking method and system of LTE private network in public security field

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be further described in detail below with reference to the accompanying drawings and examples.

[0037] figure 2 For the network diagram of the public safety network for this application, see figure 2 , the networking structure provided by this application includes: public security intranet, video private network, mobile access sub-platform, networking service sub-platform, LET private network and operator public network, wherein:

[0038] Deploy the LTE private network independently, that is to say: the LTE private network is independently deployed as the "fourth operator" network;

[0039] Deploy broadband application services on the mobile access sub-platform;

[0040] Deploy a security boundary between the LTE private network and the video private network;

[0041] Deploy a firewall between the LTE private network and the networking ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a networking method of an LTE private network in the public security field. The method comprises the following steps: independently deploying the LTE private network; deployinga broadband application service in a networking service sub-platform; deploying a security boundary between the LTE private network and a video private network; deploying a firewall between the LTE private network and the networking service sub-platform; deploying a security boundary between the video private network and the networking service sub-platform; deploying a security boundary between the video private network and a police intranet; and deploying a mobile security access sub-platform between the networking service sub-platform and the police intranet. The invention also discloses acorresponding networking system of the LTE private network in the public security field. According to the technical scheme, the networking method and system, under the premise of meeting public safetynetwork isolation requirements, can support new service applications efficiently, comprising but not limited to requirement of service integration of public and private networks and requirement of deployment of police-related APP of private network terminals and the like.

Description

technical field [0001] The present application relates to the technical field of public safety, in particular to a method and system for networking of an LTE private network in the field of public safety. Background technique [0002] The public safety network is composed of multiple private networks, including multiple relatively independent networks such as the public security information network, the public security video private network, and the public security mobile information network. in: [0003] The public security information network is networked nationwide, carrying the core data and services of public security security, with the highest security level, and other networks must pass through the security boundary to connect with it; [0004] The public security video private network is independently built by various regions, carrying video surveillance services, and intercommunicating with the public security information network through the video isolation gatekee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W84/18H04W12/00H04W4/50H04L29/06H04L12/28H04W12/088
CPCH04L12/2858H04L63/02H04W4/50H04W12/00H04W84/18
Inventor 闫锐刘明陈贵荣袁乃华王军
Owner CHENGDU TD TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products