Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Universal safety strategy constituting method

A technology of security policy and construction method, applied in the field of mobile communication and information security, can solve problems such as security guarantee restrictions, and achieve the effect of good support, scalability and compatibility

Inactive Publication Date: 2006-05-17
ZTE CORP
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This limits the user's security
[0005] The development of security technologies such as authentication, encryption, and signature has laid a technical foundation for communication security and mobile data communication, but there is currently no effective way for operators to use these security technologies to provide users with easy-to-operate and easy-to-billing security services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Universal safety strategy constituting method
  • Universal safety strategy constituting method
  • Universal safety strategy constituting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] According to the content of the invention, we introduce the specific implementation manner of the invention with examples.

[0036] It is assumed that operators classify mobile general security policies according to security threats. combine figure 1 The framework of the security policy in the paper expounds the construction method of the general security policy.

[0037] (1) Divide the security level;

[0038] Assume that the operator divides the security requirements into two categories according to the different security requirements of various services provided to users by operators in the market: 1. At a specified time, there are idle lines for communication between mobile terminals and application services. 2. Provide a secure communication line. For category 2, the business needs security guarantees of three security intensities. Strong security guarantee, free from any attack; medium security guarantee, satisfying most communications. Low security, able to ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for structuring universal safety policy includes dividing safety requirements to be a numbers of layers and correspondingly dividing safety policy to be the same numbers of levels, confirming protective object of each safety policy level, configuring safety element combination and safety algorithm for application server and applied mobile terminal i.e. configuring safety element combination listing for protective object according to each level of safety policy.

Description

technical field [0001] The invention relates to the field of mobile communication and information security, in particular to a method for constructing a general security policy for mobile communication. Background technique [0002] With the increase of mobile network transmission capacity, various new services are also developed. The business scope is no longer limited to the voice service for calls between mobile terminals, or the data service for mobile terminals to access specific server content, but the multimedia service for mobile terminals to fully participate in multi-party information interaction. The mobile terminal is not only a receiver of multimedia information, but also a provider of multimedia information. Increasingly rich applications require adequate security. However, not all information requires the same level of security. Therefore, it is necessary to provide different levels of security services for different business needs. Therefore, on the basis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L29/06
Inventor 张晔张峰陈剑勇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products