CN116723555A - Terminal access and data distribution method and system based on 5G-R - Google Patents

Terminal access and data distribution method and system based on 5G-R Download PDF

Info

Publication number
CN116723555A
CN116723555A CN202310780554.7A CN202310780554A CN116723555A CN 116723555 A CN116723555 A CN 116723555A CN 202310780554 A CN202310780554 A CN 202310780554A CN 116723555 A CN116723555 A CN 116723555A
Authority
CN
China
Prior art keywords
mobile terminal
access
terminal
data
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310780554.7A
Other languages
Chinese (zh)
Inventor
刘畅
高尚勇
蒋志勇
王芳
张秀广
石波
李春铎
欧阳智辉
梁轶群
姜博
杨居丰
李毅
张玉金
姜宏敏
唐茂顺
周宏伟
汪洋
王巍
张弘毅
王宇飞
田园
王祖元
孙宝钢
魏军
崔明星
周晓智
于进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Railway Sciences Corp Ltd CARS
China State Railway Group Co Ltd
Signal and Communication Research Institute of CARS
Beijing Huatie Information Technology Co Ltd
Original Assignee
China Academy of Railway Sciences Corp Ltd CARS
China State Railway Group Co Ltd
Signal and Communication Research Institute of CARS
Beijing Huatie Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Railway Sciences Corp Ltd CARS, China State Railway Group Co Ltd, Signal and Communication Research Institute of CARS, Beijing Huatie Information Technology Co Ltd filed Critical China Academy of Railway Sciences Corp Ltd CARS
Priority to CN202310780554.7A priority Critical patent/CN116723555A/en
Publication of CN116723555A publication Critical patent/CN116723555A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method and a system for terminal access and data distribution based on 5G-R, which realize terminal authentication and data transmission management by separating a control plane from a data plane, and simultaneously do not perform any processing on service data transmitted by a terminal, thereby ensuring consistency in the data transmission process and keeping a clear interface. Meanwhile, as the control plane and the data plane are separated, even if a control plane module fails, the whole system can be smoothly degraded and operated, namely, the terminal is not authenticated, service data can be normally transmitted, and the usability of the whole system is ensured at first. In addition, since the secondary processing is not performed on the service data, no influence is caused on the transmission rate of the service data, the expansion of the service data packet is not caused, and the extra transmission bandwidth is not occupied.

Description

Terminal access and data distribution method and system based on 5G-R
Technical Field
The invention relates to the technical field of railway communication, in particular to a method and a system for terminal access and data distribution based on 5G-R.
Background
The 5G-R is short for a railway 5G special mobile communication system, and is a mobile communication system which is customized and expanded based on the 5G mobile communication system and is specially used for railway business service. Compared with commercial 5G operator networks, the 5G-R network needs higher stability and security because of being special for railway service, and has higher requirements on access management, data transmission and the like of the mobile terminal. Besides the authentication flow of the 5G standard to the SIM card, the secondary authentication to the terminal equipment is also added. In the secondary authentication, different transmission authorities are required to be given to different types of terminals, so that unauthorized access of the terminals is avoided.
VPN is known collectively as Virtual private network, which provides a private network through a public network. So that the user's device can send and receive data through the public network as in the private network, so called virtual private network.
Compared to data transmission of public networks, the VPN security model provides:
1) Confidentiality, the encryption of the transmitted content, even if the network traffic is sniffed at the packet level, the attacker will only see the encrypted data.
2) Sender authentication to prevent unauthorized users from accessing the VPN.
3) Message integrity to detect any tampering with the instance of the transmitted message.
The VPN may assist remote users, corporate branches, business partners and suppliers in establishing trusted secure connections with the corporate intranet and ensuring secure transmission of data. Meanwhile, an authentication flow can be added when the VPN connection is established so as to realize access authentication of the terminal. However, it has the following drawbacks:
1) The VPN needs to repackage and encrypt all data transmitted by the user at the sending end according to its implementation principle, and unpack and decrypt the data at the receiving end, where the operation procedure may cause the original data to change. For railway service, the reliability of data is particularly important, and the adoption of VPN can bring risk to the integrity of service data, and simultaneously, trouble is brought to the problem tracing when the service is in problem.
2) The VPN needs to perform secondary processing on all data packets according to its implementation principle, so that the delay of data processing is increased, railway service has higher requirements on the delay, and the processing delay added by the VPN may affect the service.
3) The VPN secondary processing of data packets also causes data expansion, increasing the pressure on the link transmission bandwidth. The 5G-R network also belongs to a bandwidth limited system due to the limited physical frequency band, and the data expansion caused by VPN can greatly influence the loadable service capacity of the 5G-R network.
Disclosure of Invention
The invention aims to provide a method and a system for terminal access and data distribution based on 5G-R, which can carry out secondary authentication on a mobile terminal (5G-R terminal), endow fine-granularity transmission permission to different types of terminals in the secondary authentication, avoid unauthorized access of the mobile terminal, adopt transparent transmission during service data transmission, do not change service data and ensure transmission efficiency.
The invention aims at realizing the following technical scheme:
a 5G-R based terminal access, data distribution system comprising:
the terminal authentication module is used for receiving an access request of the mobile terminal through the 5G-R system, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
the permission management module is used for storing and maintaining access permission information of the mobile terminal, and returning corresponding permission query response after receiving the permission query request;
and the data forwarding module is used for sending the strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and realizing service data interaction of the accessed mobile terminal according to the configuration.
A method for terminal access and data distribution based on 5G-R comprises the following steps:
receiving an access request of the mobile terminal through a 5G-R system by utilizing a terminal authentication module, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
storing and maintaining access rights information of the mobile terminal by using a rights management module, and returning a corresponding rights inquiry response after receiving a rights inquiry request;
and the data forwarding module is utilized to send a strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and the service data interaction of the accessed mobile terminal is realized according to the configuration.
According to the technical scheme provided by the invention, through separating the control surface from the data surface, terminal authentication and data transmission management are realized, meanwhile, no processing is performed on service data transmitted by the terminal, the consistency in the data transmission process is ensured, and the interface is kept clear. Meanwhile, as the control plane and the data plane are separated, even if a control plane module fails, the whole system can be smoothly degraded and operated, namely, the terminal is not authenticated, service data can be normally transmitted, and the usability of the whole system is ensured at first. In addition, since the secondary processing is not performed on the service data, no influence is caused on the transmission rate of the service data, the expansion of the service data packet is not caused, and the extra transmission bandwidth is not occupied.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a system for terminal access and data distribution based on 5G-R according to an embodiment of the present invention;
fig. 2 is a working flow chart of a system for terminal access and data distribution based on 5G-R according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
The terms that may be used herein will first be described as follows:
the term "and/or" is intended to mean that either or both may be implemented, e.g., X and/or Y are intended to include both the cases of "X" or "Y" and the cases of "X and Y".
The terms "comprises," "comprising," "includes," "including," "has," "having" or other similar referents are to be construed to cover a non-exclusive inclusion. For example: including a particular feature (e.g., a starting material, component, ingredient, carrier, formulation, material, dimension, part, means, mechanism, apparatus, step, procedure, method, reaction condition, processing condition, parameter, algorithm, signal, data, product or article of manufacture, etc.), should be construed as including not only a particular feature but also other features known in the art that are not explicitly recited.
The method and the system for terminal access and data distribution based on 5G-R provided by the invention are described in detail below. What is not described in detail in the embodiments of the present invention belongs to the prior art known to those skilled in the art. The specific conditions are not noted in the examples of the present invention and are carried out according to the conditions conventional in the art or suggested by the manufacturer.
Example 1
The embodiment of the invention provides a system for terminal access and data distribution based on 5G-R, which mainly comprises the following components as shown in figure 1: the system comprises a terminal authentication module, a right management module and a data forwarding module.
1. The terminal authentication module is used for receiving an access request of the mobile terminal through the 5G-R system, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response.
Specifically, the terminal authentication module is mainly used for processing control plane information, and includes: 1) The identity of the mobile terminal may be authenticated by an identity authentication element (e.g., username/password, digital certificate, etc.) in the access request; 2) The authority management module can inquire the access authority of the terminal after passing the authentication; 3) The data forwarding module can be dynamically configured according to the access authority of the mobile terminal, so that the mobile terminal can only transmit and receive data in the authority of the mobile terminal; 4) The method can interact with 5G-EIR (5G equipment identifier registration equipment) in a 5G-R system, add the abnormal terminal to a blacklist, and prohibit the abnormal mobile terminal in the blacklist from accessing a 5G-R network.
2. And the permission management module is used for storing and maintaining the access permission information of the mobile terminal, providing a user permission query interface for the terminal authentication module, and returning a corresponding permission query response after receiving the permission query request.
3. And the data forwarding module is used for sending the strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and realizing service data interaction of the accessed mobile terminal according to the configuration.
Specifically, the data forwarding module is mainly responsible for processing data plane information, forwarding the terminal service data transparently, and forwarding the service data only without modifying the service data load. The data forwarding module can customize forwarding rules for the terminal, and allow/prohibit the mobile terminal from receiving and transmitting data of the specified service. The data forwarding module may provide a forwarding rule configuration interface for the terminal authentication module.
As shown in fig. 2, a workflow diagram of the system is shown. Mainly comprises the following steps:
1) Access request: the mobile terminal initiates an access request to a terminal authentication module through a 5G-R system, wherein the request contains identity authentication elements such as a user name/password, a digital certificate and the like.
2) Permission query request: the terminal authentication module verifies the authentication element provided by the mobile terminal, and after verification, the authentication module performs an authority inquiry request to the authority management module, wherein the request contains information such as terminal identity element, terminal ID and the like.
3) Permission query response: the authority management module inquires the access authority of the mobile terminal according to the terminal identity element in the authority inquiry request, and returns an authority inquiry response to the terminal authentication module, wherein the response contains the access authority of the mobile terminal.
4) Policy configuration request: after the terminal authentication module obtains the terminal access right, a policy configuration request is generated according to the access right and sent to the data forwarding module, wherein the policy configuration request contains a data forwarding policy customized according to the terminal access right.
5) Policy configuration response: after receiving the policy configuration request, the data forwarding module configures according to the data forwarding policy in the request, and sends the configuration result to the terminal authentication module.
6) Access response: and after the processes are successfully completed, the terminal authentication module sends an access response to the mobile terminal.
7) And (3) service data transmission: after the terminal is successfully accessed, the terminal can directly realize service communication with a service system by carrying out data interaction with a data forwarding module, and particularly, the data forwarding module realizes service data interaction between the accessed mobile terminal and the service system according to a configured data forwarding strategy, wherein the configured data forwarding strategy comprises permission and/or prohibition of the mobile terminal to send and receive appointed service data.
The method can realize the separation of terminal access authentication and data forwarding on a control plane and a data plane, and carry out identity authentication and data transmission management and control on the terminal on the premise of not interfering the transmission of terminal service data.
Preferably, the terminal authentication module is further configured to interact with a 5G-EIR in the 5G-R system, add the abnormal mobile terminal to the blacklist, prohibit the abnormal mobile terminal in the blacklist from accessing the 5G-R network, and implement closed-loop management on the mobile terminal.
Furthermore, the interaction with the 5G-EIR can be modified into interaction with related network elements responsible for user authentication in 5G systems such as AMF (access and mobility management function network element), AUSF (authentication server function network element) and the like, so as to realize closed loop management on the network access side of the terminal.
The scheme provided by the embodiment of the invention mainly has the following beneficial effects:
1) By separating the control plane from the data plane, the terminal authentication and the data transmission management are realized, meanwhile, the service data transmitted by the terminal is not processed, the consistency in the data transmission process is ensured, and the interface is kept clear.
2) Since the service data is not processed twice, no influence is caused on the transmission rate of the service data. And meanwhile, the expansion of the service data packet is not caused, and the extra transmission bandwidth is not occupied.
3) By linking with the 5G-EIR, the abnormal interruption of the access to the 5G-R network can be forbidden, and the closed loop management of the 5G-R terminal can be realized. Interaction with related network elements responsible for user authentication in other 5G systems can be performed to realize closed-loop management of terminal access side
4) Because the control plane and the data plane are separated, even if the control plane module fails, the whole system can be smoothly degraded and operated, namely, the terminal is not authenticated, service data can be normally transmitted, and the usability of the whole system is ensured first.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the system is divided into different functional modules to perform all or part of the functions described above.
Example two
The embodiment of the invention provides a method for terminal access and data distribution based on 5G-R, which mainly comprises the following steps:
receiving an access request of the mobile terminal through a 5G-R system by utilizing a terminal authentication module, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
storing and maintaining access rights information of the mobile terminal by using a rights management module, and returning a corresponding rights inquiry response after receiving a rights inquiry request;
and the data forwarding module is utilized to send a strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and the service data interaction of the accessed mobile terminal is realized according to the configuration.
In the embodiment of the invention, the authentication of the identity of the mobile terminal according to the access request comprises the following steps: the access request comprises an identity authentication element of the mobile terminal; and authenticating the identity of the mobile terminal according to the identity authentication element of the mobile terminal.
In the embodiment of the invention, the generating the policy configuration request according to the received permission query response comprises the following steps: the permission query response comprises the access permission of the corresponding mobile terminal, a policy configuration request is generated according to the access permission, and the policy configuration request comprises a data forwarding policy corresponding to the corresponding access permission.
In the embodiment of the present invention, the service data interaction of the mobile terminal implementing access according to the configuration includes: and realizing business data interaction between the accessed mobile terminal and a business system according to a configured data forwarding strategy, wherein the configured data forwarding strategy comprises permission and/or prohibition of the mobile terminal to transmit and receive appointed business data.
In the embodiment of the invention, the terminal authentication module is also used for interacting with the 5G-EIR in the 5G-R system, adding the abnormal mobile terminal into the blacklist, and prohibiting the abnormal mobile terminal in the blacklist from accessing the 5G-R network.
From the description of the above embodiments, it will be apparent to those skilled in the art that the above embodiments may be implemented in software, or may be implemented by means of software plus a necessary general hardware platform. With such understanding, the technical solutions of the foregoing embodiments may be embodied in a software product, where the software product may be stored in a nonvolatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.), and include several instructions for causing a computer device (may be a personal computer, a server, or a network device, etc.) to perform the methods of the embodiments of the present invention.
The foregoing is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present invention should be included in the scope of the present invention. Therefore, the protection scope of the present invention should be subject to the protection scope of the claims.

Claims (10)

1. A system for terminal access and data distribution based on 5G-R, comprising:
the terminal authentication module is used for receiving an access request of the mobile terminal through the 5G-R system, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
the permission management module is used for storing and maintaining access permission information of the mobile terminal, and returning corresponding permission query response after receiving the permission query request;
and the data forwarding module is used for sending the strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and realizing service data interaction of the accessed mobile terminal according to the configuration.
2. The system for 5G-R based terminal access and data distribution according to claim 1, wherein the authenticating the identity of the mobile terminal according to the access request comprises:
the access request comprises an identity authentication element of the mobile terminal;
and authenticating the identity of the mobile terminal according to the identity authentication element of the mobile terminal.
3. The 5G-R based terminal access, data distribution system of claim 1, wherein generating a policy configuration request from the received permission query response comprises:
the permission query response comprises the access permission of the corresponding mobile terminal, a policy configuration request is generated according to the access permission, and the policy configuration request comprises a data forwarding policy corresponding to the corresponding access permission.
4. The system for terminal access and data distribution based on 5G-R according to claim 1, wherein the service data interaction of the mobile terminal implementing access according to the configuration comprises:
and realizing business data interaction between the accessed mobile terminal and a business system according to a configured data forwarding strategy, wherein the configured data forwarding strategy comprises permission and/or prohibition of the mobile terminal to transmit and receive appointed business data.
5. The system for terminal access and data distribution based on 5G-R of claim 1, wherein the terminal authentication module is further configured to interact with a 5G-EIR in the 5G-R system, add an abnormal mobile terminal to the blacklist, and prohibit the abnormal mobile terminal in the blacklist from accessing the 5G-R network.
6. A method for terminal access and data distribution based on 5G-R, comprising:
receiving an access request of the mobile terminal through a 5G-R system by utilizing a terminal authentication module, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
storing and maintaining access rights information of the mobile terminal by using a rights management module, and returning a corresponding rights inquiry response after receiving a rights inquiry request;
and the data forwarding module is utilized to send a strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and the service data interaction of the accessed mobile terminal is realized according to the configuration.
7. The method for 5G-R based terminal access and data distribution according to claim 6, wherein authenticating the identity of the mobile terminal according to the access request comprises:
the access request comprises an identity authentication element of the mobile terminal;
and authenticating the identity of the mobile terminal according to the identity authentication element of the mobile terminal.
8. The method for 5G-R based terminal access and data distribution of claim 6, wherein generating a policy configuration request from the received permission query response comprises:
the permission query response comprises the access permission of the corresponding mobile terminal, a policy configuration request is generated according to the access permission, and the policy configuration request comprises a data forwarding policy corresponding to the corresponding access permission.
9. The method for accessing and distributing data by a terminal based on 5G-R according to claim 6, wherein the service data interaction of the mobile terminal accessing according to the configuration comprises:
and realizing business data interaction between the accessed mobile terminal and a business system according to a configured data forwarding strategy, wherein the configured data forwarding strategy comprises permission and/or prohibition of the mobile terminal to transmit and receive appointed business data.
10. The method for accessing and distributing data to a terminal based on 5G-R according to claim 6, wherein the terminal authentication module is further configured to interact with a 5G-EIR in a 5G-R system, add an abnormal mobile terminal to a blacklist, and prohibit the abnormal mobile terminal in the blacklist from accessing the 5G-R network.
CN202310780554.7A 2023-06-29 2023-06-29 Terminal access and data distribution method and system based on 5G-R Pending CN116723555A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310780554.7A CN116723555A (en) 2023-06-29 2023-06-29 Terminal access and data distribution method and system based on 5G-R

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310780554.7A CN116723555A (en) 2023-06-29 2023-06-29 Terminal access and data distribution method and system based on 5G-R

Publications (1)

Publication Number Publication Date
CN116723555A true CN116723555A (en) 2023-09-08

Family

ID=87867802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310780554.7A Pending CN116723555A (en) 2023-06-29 2023-06-29 Terminal access and data distribution method and system based on 5G-R

Country Status (1)

Country Link
CN (1) CN116723555A (en)

Similar Documents

Publication Publication Date Title
US20180091978A1 (en) Universal Integrated Circuit Card Having A Virtual Subscriber Identity Module Functionality
KR101438243B1 (en) Sim based authentication
EP1394982B1 (en) Methods and apparatus for secure data communication links
KR101518362B1 (en) Method and apparatus for providing network communication association information to applications and services
KR20110103473A (en) Virtual subscriber identity module
JP2012503945A (en) HOMENODE-B device and security protocol
CN113596009B (en) Zero trust access method, system, zero trust security proxy, terminal and medium
CN111918284B (en) Safe communication method and system based on safe communication module
CN112788594B (en) Data transmission method, device and system, electronic equipment and storage medium
CN114143068A (en) Electric power internet of things gateway equipment container safety protection system and method thereof
CN114143788A (en) Method and system for realizing authentication control of 5G private network based on MSISDN
US20090136043A1 (en) Method and apparatus for performing key management and key distribution in wireless networks
CN113873510A (en) Secure communication method, related device and system
CN114726523B (en) Password application service system and quantum security capability open platform
CN114301967B (en) Control method, device and equipment for narrowband Internet of things
CN112416528B (en) Method for realizing non-invasive micro service interface safety call
CN116723555A (en) Terminal access and data distribution method and system based on 5G-R
CN111698263A (en) Beidou satellite navigation data transmission method and system
CN115835194B (en) NB-IOT terminal safety access system and access method
WO2023221502A1 (en) Data transmission method and system, and signaling security management gateway
CN117479154B (en) Office terminal data processing method and system based on unified multi-domain identification authentication
WO2022183427A1 (en) Method, device, and system for protecting sequence number in wireless network
US20060173981A1 (en) Secure web browser based system administration for embedded platforms
CN113473475A (en) Operation method and device for hiding position of mobile user based on wide area network
Gagnon et al. A security architecture for TMN inter-domain management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination