CN101146305A - Configuration method of secure policy - Google Patents

Configuration method of secure policy Download PDF

Info

Publication number
CN101146305A
CN101146305A CNA2006101541414A CN200610154141A CN101146305A CN 101146305 A CN101146305 A CN 101146305A CN A2006101541414 A CNA2006101541414 A CN A2006101541414A CN 200610154141 A CN200610154141 A CN 200610154141A CN 101146305 A CN101146305 A CN 101146305A
Authority
CN
China
Prior art keywords
security
safe class
security strategy
scene
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2006101541414A
Other languages
Chinese (zh)
Other versions
CN101146305B (en
Inventor
张峰
陈剑勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tang Xiaoping
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2006101541414A priority Critical patent/CN101146305B/en
Publication of CN101146305A publication Critical patent/CN101146305A/en
Application granted granted Critical
Publication of CN101146305B publication Critical patent/CN101146305B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a configuration method for a safety strategy and aims to solves the problem that the prior art fails to realize the configuration of allaround safety integrity level. The inventive configuration method for the safety strategy comprises the following steps: (1) the system sets up a safety strategy table containing safety level, scene and algorithm protocol in each safety element; (2) the system determines the safety level and current scene and extracts a required algorithm protocol from the safety strategy table; and (3) the system applies the obtained algorithm protocol to the safety service to complete the configuration of safety strategy. As a result, the invention sets up the safety strategy table for each safety element, determines the required algorithm protocol based on the determined safety level and current scene and extracts the algorithm protocol from the safety strategy table. The invention can realizes the configuration of the allaround safety integrity level according to the actual situation that the user utilizes the mobile network.

Description

The collocation method of security strategy
Technical field
The present invention relates to mobile communication and information security field, particularly the collocation method of security strategy.
Background technology
Along with the increase of mobile network's transmittability, be based upon the business variation day by day on the multimedia transmission basis.Different business is for different occasions, and different user has different demands for security, adopts single security mechanism can't adapt to multiple services demand.Therefore, analyze, mechanism need be provided technically, allow concrete business can select the safety guarantee of suitable grade from the angle of business demand.On the other hand, among the mobile network, the mobile security strategy has shielded the ins and outs of bottom and complicated safety management operation to the user, makes the user can enjoy the security service that is simple and easy to usefulness.By mobile security policy control server, operator can provide as a business secure communication to the user, thereby opens up new value-added service field.The user is high-grade security service defrayment, uses or the payment small charge low-grade security service is free.So, operator can either be converted into the investment of foundation for security and facility the business of profit, has satisfied the differentiated demand of user to safety again.The appearance of customizable, personalized mobile security service helps the popularization of secure communication, also might therefore expedite the emergence of out a huge industry.
The mobile subscriber's is universal day by day, and portable terminal becomes popular product.Yet most of user security knowledge is limited, also is difficult at portable terminal security strategy be carried out the configuration of specialty.In this sense, need implement simply, intuitively the level of security choice mechanism according to the different safety requirements of different information.The user selects suitable level of security to communicate according to communicating requirement flexibly.This just requires network can support the security service of different brackets technically.
Aspect safe class is provided with:
Patent WO03081932 has proposed to select according to user's geographical position the method for safe class based on mobile communication environment.Being divided into high and low two-stage safe class with safe class is example:
High safety grade safeguard protection degree is higher, needs the user to import identity or secure data more frequently.Lower security hierarchically secure degree of protection is lower, and the user only need import identity or secure data once in a while, perhaps need not import any authentication information.
Patent US6363150 has proposed in the IP phone service in conversation beginning and conversation the method to safe class control.Calling party can be selected a kind of privacy of conversing guaranteed from a plurality of safe classes, also can in conversation, change the safe class of current talking according to actual conditions, charge system can be charged accordingly according to the safe class that the user selects, and rate increases along with the lifting of safe class.The user can the real time altering safe class.When the user in conversation, can import suitable DTMF (Dual Tone Multi Frequency) sequence, change to needed safe class, and chargeed accordingly.
Patent EP1183818 has then proposed need provide corresponding authentication mechanism when safe class changes from high to low.System's user mode indicating device indicates the level of security that is performed.Level of security can be upgraded to allow more senior easier being performed of safety.Yet,, adopt the fail safe that confirms this change based on the authentication method of authentication codes in order to change to the safety of even lower level from more senior safety.
The proposition content corresponding in a certain respect that above-mentioned patent just is provided with from safe class.As: based on the geographical position, based on encryption technology, based on the dynamic change of safe class.Yet,, need to propose comprehensive safe class method to set up along with mobile network's development.
Summary of the invention
For defective and the deficiency that overcomes prior art, the object of the present invention is to provide a kind of collocation method of security strategy, can use mobile network's actual conditions according to the user, realize the configuration of comprehensive security grade.
In order to achieve the above object, the collocation method of a kind of security strategy of the present invention is characterized in that, may further comprise the steps:
(1) system sets up the security strategy table that comprises safe class, scene and algorithm protocol for each security element;
(2) system determines safe class and current scene, and obtains the algorithm protocol that all need in the security strategy table;
(3) system is applied to the algorithm protocol of obtaining in the security service, finishes the configuration of security strategy.
Preferably, described step (1) is specially:
(11) to set up the row or column of input layer be that safe class, column or row are scene in system, and output layer is the security strategy head table of algorithm protocol inlet;
(12) system's row or column of setting up input layer for each security element is that safe class, column or row are scene, and output layer is the security strategy table of algorithm protocol.
Preferably, described step (2) is specially:
(21) system determines safe class and current scene, and it is inquired about the inlet that obtains algorithm protocol in security strategy head table as initial conditions;
(22) system obtains the algorithm protocol of all needs in the security strategy table of each security element according to the inlet of algorithm protocol.
Preferably, described step (21) is specially:
(211) system determines safe class and current scene;
(212) row or column of safe class correspondence is selected by system in security strategy head table according to the safe class of determining;
(213) column or row of current scene correspondence are selected by system in security strategy head table according to the current scene of determining;
(214) system determines the cell at the inlet place of algorithm protocol according to the column or row of the row or column of the safe class correspondence of selecting and current scene correspondence.
Preferably, described step (22) is specially:
(221) system is according to the link in the inlet place cell of determining in security strategy head table, and obtains the algorithm protocol that all need successively in the cell of the security strategy table correspondence of each security element.
Preferably, the method for described definite safe class and current scene is:
Under the situation of static security grade, determine according to the type of service compulsory safe class of using of institute or by user's corresponding relation of realizing safe class, scene and business of contracting; Under the situation of dynamic security grade, communicate preceding the selection by the user and determine; And determine current scene according to the service security demand.
Preferably, described security element comprises: access control, checking, data confidentiality, communications security, data integrity, resisting denying, utilizability, privacy.
After adopting above-mentioned method, owing to set up the security strategy table according to each security element, and utilize definite safe class and current scene to determine the algorithm protocol that needs, in the security strategy table, obtain this algorithm protocol, can use mobile network's actual conditions according to the user, realize the configuration of comprehensive security grade.
Description of drawings
Fig. 1 is the schematic diagram of collection algorithm protocol procedures of the present invention;
When Fig. 2 changes for safe class under the Same Scene of the present invention, collection algorithm agreement schematic diagram;
When Fig. 3 changes for scene under the same safe class of the present invention, collection algorithm agreement schematic diagram.
Embodiment
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described in further detail.
The division methods of security strategy of the present invention is finished by the security strategy table.The X805 standard to describe of ITU-T the eight kinds of safety measures that can resist all main security threats, be called security element.Comprise access control, checking, data confidentiality, communications security, data integrity, resisting denying, utilizability, privacy.According to the number of security element, each security element is set up a security strategy table.And before the security strategy table of all security elements, set up a security strategy head table.
Security strategy head table of the present invention and security strategy table all are made up of two-layer, and wherein, security strategy head table comprises: (1) input layer comprises safe class and scene.(2) output layer, the output of security strategy head table is the inlet of algorithm protocol, and is as shown in table 1 below.One row of form are safe classes, and the delegation of form is a scene.Each cell (Grid) is deposited under the particular safety grade, and the algorithm protocol in the special scenes, this algorithm protocol are used to satisfy the security service that this security element provides.Each security element is set up a security strategy table provide convenience for management.Upgrade or when revising algorithm protocol, need not make amendment, only need make amendment the security strategy table of the security element that relates to the algorithm of all security elements.
High Medium Low Extending
Scene 1 Inlet 1.1 Inlet 1.2 Inlet 1.3 Inlet 1.4
Scene 2 …… …… …… ……
…… …… …… …… ……
Scene n Inlet n.1 Inlet n.2 Inlet n.3 Inlet n.4
Table 1
The security strategy table comprises: (1) safe class, and as row (OK) of security strategy table.(2) scene has defined multiple business abstract at secure context, as delegation's (row) of security strategy table.(3) inlet is stored in the units corresponding lattice of security strategy table.The inlet of collecting the security algorithm agreement is provided.Its input is chosen safe class and scene, and output is the inlet of algorithm protocol.As shown in table 2 below.
High Medium Low Extending
Scene 1 I.1.1 the ﹠ agreement is i.1.1 for algorithm I.1.2 the ﹠ agreement is i.1.2 for algorithm I.1.3 the ﹠ agreement is i.1.3 for algorithm I.1.4 the ﹠ agreement is i.1.4 for algorithm
Scene 2 …… …… …… ……
…… …… …… …… ……
Scene n Algorithm i.n.1 ﹠ agreement i.n.1 Algorithm i.n.2 ﹠ agreement i.n.2 Algorithm i.n.3 ﹠ agreement i.n.3 Algorithm i.n.4 ﹠ agreement i.n.4
Table 2
Relation between the two-layer element of above-mentioned two tables can be expressed as: and f (x, y)=z.Wherein, independent variable x, y are safe class and scene, and dependent variable z is output, and function f is x, the y mapping relations to z.
Security strategy head table is for providing a unified entrance when the system search algorithm agreement, and it has identical row and column with the security strategy table, and the algorithm protocol that all safe classes comprised under any scene all is to begin search from security strategy head table.Safe class and scene have determined the entry position of respective algorithms agreement in security strategy head table, and it is in the single linked list of a node that the security algorithm protocol package that needs in the communication is contained in a certain cell in the security strategy head table.
In the security strategy table of the present invention:
The safe class of security strategy head table has defined the degree of protection for different demands for security.
The scene of security strategy head table is professional abstract at secure context, has identical pattern and feature at these service security services.
The inlet of security strategy head table is provided to the link of the algorithm protocol table element in the security strategy table, is stored in the cell, by chosen safe class and current scene, can output to the link of the form in the security strategy table uniquely.
In the security strategy table of the present invention corresponding to each security element:
The safe class of security strategy table has defined the degree of protection for different demands for security.
The scene of security strategy table is professional abstract at secure context, has identical pattern and feature at these service security services.
The algorithm protocol of security strategy table is concrete algorithm protocol, is stored in the cell, and it has directly determined the fail safe of communication.By chosen safe class and current scene, need the security algorithm agreement that adopts uniquely in the output communication.Simultaneously, cell also provides the link corresponding to the next security strategy table of same security element.The present invention is under concrete communication environment, and the flow process of selection algorithm agreement is:
The first step: safe class and current scene are chosen.
Second step: the row (OK) of safe class correspondence are selected according to chosen safe class by system in security strategy head table.
The 3rd step: the row (row) of current scene correspondence is selected according to chosen current scene by system in security strategy head table.
The 4th step: the cell of determining the inlet place of algorithm protocol collection by row and column.
The 5th step:, in the security strategy table of first security element that signal post needs, find corresponding cell, the algorithm protocol in the collector unit lattice according to the link in the inlet place cell of in security strategy head table, determining.
The 6th step:, in the security strategy table of the next security element that signal post needs, find the cell of identical ranks, the algorithm protocol in the collector unit lattice according to the link in the cell of the security strategy table that finds.
The 7th step: repeated for the 6th step, collect the algorithm protocol that all need.
The 8th step: use algorithm protocol in security service.
The present invention collects the security algorithm agreement under the situation of static security grade method is: the user need not select safe class before communication, system is searched for the security element table according to current scene and this professional compulsory safe class of type of service correspondence, the Matching Algorithm agreement is issued to security network element, and security network element is used algorithm protocol in specific security service.
The present invention collects the security algorithm agreement under the situation of dynamic security grade method is: the user selects a safe class to serve before communication, system is searched for the security element table according to current scene and this user-selected safe class of type of service correspondence, the Matching Algorithm agreement is issued to security network element, and security network element is used algorithm protocol in specific security service.
In the security strategy table, different safe classes provides in various degree security service for the user.Difference according to safe coefficient, the keeper can have multiple dividing mode to safe class, as shown in Figure 1, a kind of division methods is divided into safe class in security strategy head table: High, Medium, four safe classes of Low, Extending have four inlets to be respectively inlet 1.1, inlet 1.2, inlet 1.3, inlet 1.4 corresponding to scene 1; Security element i corresponding security strategy table divided rank is: High, Medium, four safe classes of Low, Extending, corresponding to scene 1 cell of four algorithm protocol is arranged, be respectively cell i.1.1, cell i.1.2, cell i.1.3, cell i.1.4; Security element j corresponding security strategy table divided rank is: High, Medium, four safe classes of Low, Extending, corresponding to scene 1 cell of four algorithm protocol is arranged, be respectively cell j.1.1, cell j.1.2, cell j.1.3, cell j.1.4; The Extending layer is self-defining according to local communication environment by service provider.Defining from high to low corresponding to High, Medium, Low safe class, all is identical for all users in the mobile network.In addition, in order to satisfy the user, also can carry out finer division to each grade to the more accurate control of safe class, as High being divided into two sublayers of Very High and High or more sublayer, yet it is meticulous to divide level, will increase the complexity that the user selects.When the user selected safe class and communicates, system may further comprise the steps according to the safe class and the professional corresponding corresponding security algorithm agreement of scene search of input:
Step 11, explicit user have been selected high safety grade High service;
Step 12, display system identify type of service and belong to scene 1, and system finds corresponding entry position according to these two inputs in security strategy head table, promptly enter the mouth 1.1;
Step 13 shows to enter the mouth 1.1 for i.1.1 the pointer of a node directly points to cell, promptly need to use algorithm i.1.1 with agreement i.1.1;
Step 14 shows that j.1.1 the pointer that i.1.1 Grid is comprised directly points to Grid again, promptly need to use algorithm j.1.1 with agreement j.1.1.Algorithm protocol among the Gridj.1.1 is the algorithm protocol of last security element, so the pointed sky among the Gird.j.1.1.
As shown in Figure 2, comprise four grade High, Medium, Low, Extending, have four inlets to be respectively inlet 1, inlet 2, inlet 3, inlet 4 corresponding to scene 1, when the user dynamically changes safe class, system needs again algorithm protocol to be collected, and may further comprise the steps:
Step 21, explicit user select the High safe class to serve before communication, and when the user dynamically changed to Low with safe class by High according to security needs in communication process, system was searched for the security algorithm agreement again;
Step 22, display system identify business and belong to scene 1;
Step 23, be presented at scene 1 in the security strategy head table from High to the Low safe class, the algorithm protocol of using according to needs under the inlet search Low safe class of security algorithm agreement.
As shown in Figure 3, comprise scene 1 n scene to scene n, the High grade is had n inlet, when the user security grade does not change and scene when changing, system's needs be collected algorithm protocol again; May further comprise the steps:
Step 31, explicit user have been selected safe class High before communication be communication service, and the business that the user uses belongs to scene 1; When the user's communications scene changed to scene n by scene 1, system was searched for the security algorithm agreement again;
Step 32 is presented under the High safe class, changes to scene n from scene 1, according to the algorithm and the agreement of needs use under the inlet search scene n of security algorithm agreement.
When user's scene and safe class were all moved, system needed according to the safe class and the scene that redefine security protocol and algorithm to be collected, and step is identical with the flow process of described selection algorithm agreement.
The present invention is owing to set up the security strategy table according to each security element, and utilize definite safe class and current scene to determine the algorithm protocol that needs, in the security strategy table, obtain this algorithm protocol, can use mobile network's actual conditions, realize the setting of comprehensive security grade according to the user.

Claims (7)

1. the collocation method of a security strategy is characterized in that, may further comprise the steps:
(1) system sets up the security strategy table that comprises safe class, scene and algorithm protocol for each security element;
(2) system determines safe class and current scene, and obtains the algorithm protocol that all need in the security strategy table;
(3) system is applied to the algorithm protocol of obtaining in the security service, finishes the configuration of security strategy.
2. according to the collocation method of the described security strategy of claim 1, it is characterized in that described step (1) is specially:
(11) to set up the row or column of input layer be that safe class, column or row are scene in system, and output layer is the security strategy head table of algorithm protocol inlet;
(12) system's row or column of setting up input layer for each security element is that safe class, column or row are scene, and output layer is the security strategy table of algorithm protocol.
3. according to the collocation method of the described security strategy of claim 2, it is characterized in that described step (2) is specially:
(21) system determines safe class and current scene, and it is inquired about the inlet that obtains algorithm protocol in security strategy head table as initial conditions;
(22) system obtains the algorithm protocol of all needs in the security strategy table of each security element according to the inlet of algorithm protocol.
4. according to the collocation method of the described security strategy of claim 3, it is characterized in that described step (21) is specially:
(211) system determines safe class and current scene;
(212) row or column of safe class correspondence is selected by system in security strategy head table according to the safe class of determining;
(213) column or row of current scene correspondence are selected by system in security strategy head table according to the current scene of determining;
(214) system determines the cell at the inlet place of algorithm protocol according to the column or row of the row or column of the safe class correspondence of selecting and current scene correspondence.
5. according to the collocation method of the described security strategy of claim 4, it is characterized in that described step (22) is specially:
(221) system is according to the link in the inlet place cell of determining in security strategy head table, and obtains the algorithm protocol that all need successively in the cell of the security strategy table correspondence of each security element.
6. according to the collocation method of claim 3 or 4 or 5 described security strategies, it is characterized in that the method for described definite safe class and current scene is:
Under the situation of static security grade, determine according to the type of service compulsory safe class of using of institute or by user's corresponding relation of realizing safe class, scene and business of contracting; Under the situation of dynamic security grade, communicate preceding the selection by the user and determine; And determine current scene according to the service security demand.
7. according to the collocation method of the described security strategy of claim 1, it is characterized in that described security element comprises: access control, checking, data confidentiality, communications security, data integrity, resisting denying, utilizability, privacy.
CN2006101541414A 2006-09-13 2006-09-13 Configuration method of secure policy Expired - Fee Related CN101146305B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2006101541414A CN101146305B (en) 2006-09-13 2006-09-13 Configuration method of secure policy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2006101541414A CN101146305B (en) 2006-09-13 2006-09-13 Configuration method of secure policy

Publications (2)

Publication Number Publication Date
CN101146305A true CN101146305A (en) 2008-03-19
CN101146305B CN101146305B (en) 2010-09-01

Family

ID=39208542

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2006101541414A Expired - Fee Related CN101146305B (en) 2006-09-13 2006-09-13 Configuration method of secure policy

Country Status (1)

Country Link
CN (1) CN101146305B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457476A (en) * 2010-10-15 2012-05-16 中兴通讯股份有限公司 Security defend method and system for peer-to-peer network
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN102932382A (en) * 2011-08-08 2013-02-13 中兴通讯股份有限公司 Safety on-demand supply method and system, and service type acquisition method
CN105488417A (en) * 2014-12-25 2016-04-13 哈尔滨安天科技股份有限公司 Method and system for realizing system security level division
CN105846996A (en) * 2016-03-17 2016-08-10 上海携程商务有限公司 Automatic server certificate deployment system and method
CN106161378A (en) * 2015-04-13 2016-11-23 中国移动通信集团公司 Security service device, method and business processing device, method and system
CN106355053A (en) * 2008-05-13 2017-01-25 微软技术许可有限责任公司 Cell-based security representation for data access
WO2017210811A1 (en) * 2016-06-06 2017-12-14 华为技术有限公司 Security strategy execution method and apparatus
CN108337486A (en) * 2018-04-19 2018-07-27 北京软通智城科技有限公司 A kind of device and method of the video analysis of the algorithm configuration based on scene
CN110737410A (en) * 2019-10-22 2020-01-31 上海理工大学 Heterogeneous memory system data page migration method of dynamic singly linked list window
CN111209081A (en) * 2019-12-31 2020-05-29 北京指掌易科技有限公司 Method for realizing double isolation security domains by VSA technology

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1773903A (en) * 2004-11-08 2006-05-17 中兴通讯股份有限公司 Universal safety strategy constituting method
CN100571130C (en) * 2004-11-08 2009-12-16 中兴通讯股份有限公司 A kind of general safety grade arranging method
CN100518187C (en) * 2005-11-15 2009-07-22 中兴通讯股份有限公司 Safety grade arranging method

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355053A (en) * 2008-05-13 2017-01-25 微软技术许可有限责任公司 Cell-based security representation for data access
CN102457476B (en) * 2010-10-15 2015-04-01 中兴通讯股份有限公司 Security defend method and system for peer-to-peer network
CN102457476A (en) * 2010-10-15 2012-05-16 中兴通讯股份有限公司 Security defend method and system for peer-to-peer network
CN102932382B (en) * 2011-08-08 2018-03-23 中兴通讯股份有限公司 Safe supply method and system, type of service acquisition methods on demand
CN102932382A (en) * 2011-08-08 2013-02-13 中兴通讯股份有限公司 Safety on-demand supply method and system, and service type acquisition method
WO2013020409A1 (en) * 2011-08-08 2013-02-14 中兴通讯股份有限公司 Secure on-demand supply method and system and service type acquisition method
US9356967B2 (en) 2011-08-08 2016-05-31 Zte Corporation Secure on-demand supply method and system and traffic type acquisition method
CN102685106B (en) * 2012-03-27 2015-09-30 北京百纳威尔科技有限公司 A kind of safe verification method and equipment
CN102685106A (en) * 2012-03-27 2012-09-19 北京百纳威尔科技有限公司 Safety verification method and equipment
CN105488417A (en) * 2014-12-25 2016-04-13 哈尔滨安天科技股份有限公司 Method and system for realizing system security level division
CN106161378A (en) * 2015-04-13 2016-11-23 中国移动通信集团公司 Security service device, method and business processing device, method and system
CN105846996A (en) * 2016-03-17 2016-08-10 上海携程商务有限公司 Automatic server certificate deployment system and method
CN105846996B (en) * 2016-03-17 2019-03-12 上海携程商务有限公司 The automatic deployment system and method for server certificate
WO2017210811A1 (en) * 2016-06-06 2017-12-14 华为技术有限公司 Security strategy execution method and apparatus
CN108337486A (en) * 2018-04-19 2018-07-27 北京软通智城科技有限公司 A kind of device and method of the video analysis of the algorithm configuration based on scene
CN110737410A (en) * 2019-10-22 2020-01-31 上海理工大学 Heterogeneous memory system data page migration method of dynamic singly linked list window
CN110737410B (en) * 2019-10-22 2023-02-03 上海理工大学 Heterogeneous memory system data page migration method of dynamic singly linked list window
CN111209081A (en) * 2019-12-31 2020-05-29 北京指掌易科技有限公司 Method for realizing double isolation security domains by VSA technology

Also Published As

Publication number Publication date
CN101146305B (en) 2010-09-01

Similar Documents

Publication Publication Date Title
CN101146305B (en) Configuration method of secure policy
CN101018259B (en) Telecom integrated information system and method
CN101625649A (en) Loading method and loading device of software
CN106231586A (en) A kind of multi-card terminal and communication means thereof
CN107645497A (en) Internet of things equipment control and authority share system and method based on public number
CN109618392A (en) Method, apparatus, equipment and the computer readable storage medium of network share
US20110268261A1 (en) Method of using prefix and suffix for identifying user of a calling terminal
CN109274838B (en) Generation and application method and secret communication system based on SIM card virtual-number
CN103888435B (en) For the methods, devices and systems of business admission control
CN101026650A (en) Communication service access system and method
CN101729929B (en) System for accessing mass data with intelligent network business libraries, device and method
CN101790254B (en) Mobile phone terminal and system for supporting group communication and method thereof
CN102958030A (en) Charging method and charging system
CN102739881A (en) Method for carrying out summarizing after conversation and apparatus thereof
CN100502298C (en) Method for realizing management authorization in network management system
CN100568879C (en) A kind of security strategy method to set up
CN103761323B (en) Database permission control method and device
CN100361447C (en) Wireless network ability controlled centralized management system and method
CN107426595A (en) Interface navigation data handling system
CN109389274A (en) Scorecard configuration method, device, equipment and readable storage medium storing program for executing
CN1921656A (en) Mobile phone universal function spreading apparatus and its using method
CN113596812B (en) APN automatic configuration and switching method based on android platform
CN105898047A (en) Contact dialing management method, dialing method and related devices
CN107403386A (en) Insure management method and system based on bank outlets
CN100375442C (en) Communication network management and processing system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: ZHOU SHAOMING

Effective date: 20150122

Owner name: CHENGDU XUYUFENG SCIENCE + TECHNOLOGY CO., LTD.

Free format text: FORMER OWNER: TIAN DEFANG

Effective date: 20150122

Free format text: FORMER OWNER: ZHOU SHAOMING

Effective date: 20150122

Owner name: TIAN DEFANG

Free format text: FORMER OWNER: ZTE CORPORATION

Effective date: 20150122

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 518057 SHENZHEN, GUANGDONG PROVINCE TO: 610042 CHENGDU, SICHUAN PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20150122

Address after: 610042, No. 1, building 1, building 25, four, 9 South Renmin Road, Chengdu, Sichuan, Wuhou District, 2

Patentee after: Chengdu Xu Yu Feng Technology Co.,Ltd.

Address before: 610042, No. 3, building 2, building 19, building 6, 1 Lin Bei Road, Tongzi, Sichuan, Chengdu, Wuhou District

Patentee before: Tian Defang

Patentee before: Zhou Shaoming

Effective date of registration: 20150122

Address after: 610042, No. 3, building 2, building 19, building 6, 1 Lin Bei Road, Tongzi, Sichuan, Chengdu, Wuhou District

Patentee after: Tian Defang

Patentee after: Zhou Shaoming

Address before: 518057, Guangdong Shenzhen hi tech Industrial Park Nanshan District science and technology south road ZTE building 6 floor of the Ministry of law

Patentee before: ZTE Corp.

ASS Succession or assignment of patent right

Owner name: TANG XIAOPING

Free format text: FORMER OWNER: CHENGDU XUYUFENG SCIENCE + TECHNOLOGY CO., LTD.

Effective date: 20150525

C41 Transfer of patent application or patent right or utility model
COR Change of bibliographic data

Free format text: CORRECT: ADDRESS; FROM: 610042 CHENGDU, SICHUAN PROVINCE TO: 611330 CHENGDU, SICHUAN PROVINCE

TR01 Transfer of patent right

Effective date of registration: 20150525

Address after: 611330, ERON village, Dayi County, Sichuan City, Chengdu province 3

Patentee after: Tang Xiaoping

Address before: 610042, No. 1, building 1, building 25, four, 9 South Renmin Road, Chengdu, Sichuan, Wuhou District, 2

Patentee before: Chengdu Xu Yu Feng Technology Co.,Ltd.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20100901

Termination date: 20150913

EXPY Termination of patent right or utility model