CN116723555A - Terminal access and data distribution method and system based on 5G-R - Google Patents
Terminal access and data distribution method and system based on 5G-R Download PDFInfo
- Publication number
- CN116723555A CN116723555A CN202310780554.7A CN202310780554A CN116723555A CN 116723555 A CN116723555 A CN 116723555A CN 202310780554 A CN202310780554 A CN 202310780554A CN 116723555 A CN116723555 A CN 116723555A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- access
- terminal
- data
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000009826 distribution Methods 0.000 title claims abstract description 20
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000004044 response Effects 0.000 claims description 36
- 230000003993 interaction Effects 0.000 claims description 17
- 230000002159 abnormal effect Effects 0.000 claims description 11
- 230000005540 biological transmission Effects 0.000 abstract description 24
- 238000010295 mobile communication Methods 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- -1 carrier Substances 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 239000000306 component Substances 0.000 description 1
- 238000009472 formulation Methods 0.000 description 1
- 239000004615 ingredient Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 239000007858 starting material Substances 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/60—Context-dependent security
- H04W12/69—Identity-dependent
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method and a system for terminal access and data distribution based on 5G-R, which realize terminal authentication and data transmission management by separating a control plane from a data plane, and simultaneously do not perform any processing on service data transmitted by a terminal, thereby ensuring consistency in the data transmission process and keeping a clear interface. Meanwhile, as the control plane and the data plane are separated, even if a control plane module fails, the whole system can be smoothly degraded and operated, namely, the terminal is not authenticated, service data can be normally transmitted, and the usability of the whole system is ensured at first. In addition, since the secondary processing is not performed on the service data, no influence is caused on the transmission rate of the service data, the expansion of the service data packet is not caused, and the extra transmission bandwidth is not occupied.
Description
Technical Field
The invention relates to the technical field of railway communication, in particular to a method and a system for terminal access and data distribution based on 5G-R.
Background
The 5G-R is short for a railway 5G special mobile communication system, and is a mobile communication system which is customized and expanded based on the 5G mobile communication system and is specially used for railway business service. Compared with commercial 5G operator networks, the 5G-R network needs higher stability and security because of being special for railway service, and has higher requirements on access management, data transmission and the like of the mobile terminal. Besides the authentication flow of the 5G standard to the SIM card, the secondary authentication to the terminal equipment is also added. In the secondary authentication, different transmission authorities are required to be given to different types of terminals, so that unauthorized access of the terminals is avoided.
VPN is known collectively as Virtual private network, which provides a private network through a public network. So that the user's device can send and receive data through the public network as in the private network, so called virtual private network.
Compared to data transmission of public networks, the VPN security model provides:
1) Confidentiality, the encryption of the transmitted content, even if the network traffic is sniffed at the packet level, the attacker will only see the encrypted data.
2) Sender authentication to prevent unauthorized users from accessing the VPN.
3) Message integrity to detect any tampering with the instance of the transmitted message.
The VPN may assist remote users, corporate branches, business partners and suppliers in establishing trusted secure connections with the corporate intranet and ensuring secure transmission of data. Meanwhile, an authentication flow can be added when the VPN connection is established so as to realize access authentication of the terminal. However, it has the following drawbacks:
1) The VPN needs to repackage and encrypt all data transmitted by the user at the sending end according to its implementation principle, and unpack and decrypt the data at the receiving end, where the operation procedure may cause the original data to change. For railway service, the reliability of data is particularly important, and the adoption of VPN can bring risk to the integrity of service data, and simultaneously, trouble is brought to the problem tracing when the service is in problem.
2) The VPN needs to perform secondary processing on all data packets according to its implementation principle, so that the delay of data processing is increased, railway service has higher requirements on the delay, and the processing delay added by the VPN may affect the service.
3) The VPN secondary processing of data packets also causes data expansion, increasing the pressure on the link transmission bandwidth. The 5G-R network also belongs to a bandwidth limited system due to the limited physical frequency band, and the data expansion caused by VPN can greatly influence the loadable service capacity of the 5G-R network.
Disclosure of Invention
The invention aims to provide a method and a system for terminal access and data distribution based on 5G-R, which can carry out secondary authentication on a mobile terminal (5G-R terminal), endow fine-granularity transmission permission to different types of terminals in the secondary authentication, avoid unauthorized access of the mobile terminal, adopt transparent transmission during service data transmission, do not change service data and ensure transmission efficiency.
The invention aims at realizing the following technical scheme:
a 5G-R based terminal access, data distribution system comprising:
the terminal authentication module is used for receiving an access request of the mobile terminal through the 5G-R system, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
the permission management module is used for storing and maintaining access permission information of the mobile terminal, and returning corresponding permission query response after receiving the permission query request;
and the data forwarding module is used for sending the strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and realizing service data interaction of the accessed mobile terminal according to the configuration.
A method for terminal access and data distribution based on 5G-R comprises the following steps:
receiving an access request of the mobile terminal through a 5G-R system by utilizing a terminal authentication module, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
storing and maintaining access rights information of the mobile terminal by using a rights management module, and returning a corresponding rights inquiry response after receiving a rights inquiry request;
and the data forwarding module is utilized to send a strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and the service data interaction of the accessed mobile terminal is realized according to the configuration.
According to the technical scheme provided by the invention, through separating the control surface from the data surface, terminal authentication and data transmission management are realized, meanwhile, no processing is performed on service data transmitted by the terminal, the consistency in the data transmission process is ensured, and the interface is kept clear. Meanwhile, as the control plane and the data plane are separated, even if a control plane module fails, the whole system can be smoothly degraded and operated, namely, the terminal is not authenticated, service data can be normally transmitted, and the usability of the whole system is ensured at first. In addition, since the secondary processing is not performed on the service data, no influence is caused on the transmission rate of the service data, the expansion of the service data packet is not caused, and the extra transmission bandwidth is not occupied.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a system for terminal access and data distribution based on 5G-R according to an embodiment of the present invention;
fig. 2 is a working flow chart of a system for terminal access and data distribution based on 5G-R according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
The terms that may be used herein will first be described as follows:
the term "and/or" is intended to mean that either or both may be implemented, e.g., X and/or Y are intended to include both the cases of "X" or "Y" and the cases of "X and Y".
The terms "comprises," "comprising," "includes," "including," "has," "having" or other similar referents are to be construed to cover a non-exclusive inclusion. For example: including a particular feature (e.g., a starting material, component, ingredient, carrier, formulation, material, dimension, part, means, mechanism, apparatus, step, procedure, method, reaction condition, processing condition, parameter, algorithm, signal, data, product or article of manufacture, etc.), should be construed as including not only a particular feature but also other features known in the art that are not explicitly recited.
The method and the system for terminal access and data distribution based on 5G-R provided by the invention are described in detail below. What is not described in detail in the embodiments of the present invention belongs to the prior art known to those skilled in the art. The specific conditions are not noted in the examples of the present invention and are carried out according to the conditions conventional in the art or suggested by the manufacturer.
Example 1
The embodiment of the invention provides a system for terminal access and data distribution based on 5G-R, which mainly comprises the following components as shown in figure 1: the system comprises a terminal authentication module, a right management module and a data forwarding module.
1. The terminal authentication module is used for receiving an access request of the mobile terminal through the 5G-R system, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response.
Specifically, the terminal authentication module is mainly used for processing control plane information, and includes: 1) The identity of the mobile terminal may be authenticated by an identity authentication element (e.g., username/password, digital certificate, etc.) in the access request; 2) The authority management module can inquire the access authority of the terminal after passing the authentication; 3) The data forwarding module can be dynamically configured according to the access authority of the mobile terminal, so that the mobile terminal can only transmit and receive data in the authority of the mobile terminal; 4) The method can interact with 5G-EIR (5G equipment identifier registration equipment) in a 5G-R system, add the abnormal terminal to a blacklist, and prohibit the abnormal mobile terminal in the blacklist from accessing a 5G-R network.
2. And the permission management module is used for storing and maintaining the access permission information of the mobile terminal, providing a user permission query interface for the terminal authentication module, and returning a corresponding permission query response after receiving the permission query request.
3. And the data forwarding module is used for sending the strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and realizing service data interaction of the accessed mobile terminal according to the configuration.
Specifically, the data forwarding module is mainly responsible for processing data plane information, forwarding the terminal service data transparently, and forwarding the service data only without modifying the service data load. The data forwarding module can customize forwarding rules for the terminal, and allow/prohibit the mobile terminal from receiving and transmitting data of the specified service. The data forwarding module may provide a forwarding rule configuration interface for the terminal authentication module.
As shown in fig. 2, a workflow diagram of the system is shown. Mainly comprises the following steps:
1) Access request: the mobile terminal initiates an access request to a terminal authentication module through a 5G-R system, wherein the request contains identity authentication elements such as a user name/password, a digital certificate and the like.
2) Permission query request: the terminal authentication module verifies the authentication element provided by the mobile terminal, and after verification, the authentication module performs an authority inquiry request to the authority management module, wherein the request contains information such as terminal identity element, terminal ID and the like.
3) Permission query response: the authority management module inquires the access authority of the mobile terminal according to the terminal identity element in the authority inquiry request, and returns an authority inquiry response to the terminal authentication module, wherein the response contains the access authority of the mobile terminal.
4) Policy configuration request: after the terminal authentication module obtains the terminal access right, a policy configuration request is generated according to the access right and sent to the data forwarding module, wherein the policy configuration request contains a data forwarding policy customized according to the terminal access right.
5) Policy configuration response: after receiving the policy configuration request, the data forwarding module configures according to the data forwarding policy in the request, and sends the configuration result to the terminal authentication module.
6) Access response: and after the processes are successfully completed, the terminal authentication module sends an access response to the mobile terminal.
7) And (3) service data transmission: after the terminal is successfully accessed, the terminal can directly realize service communication with a service system by carrying out data interaction with a data forwarding module, and particularly, the data forwarding module realizes service data interaction between the accessed mobile terminal and the service system according to a configured data forwarding strategy, wherein the configured data forwarding strategy comprises permission and/or prohibition of the mobile terminal to send and receive appointed service data.
The method can realize the separation of terminal access authentication and data forwarding on a control plane and a data plane, and carry out identity authentication and data transmission management and control on the terminal on the premise of not interfering the transmission of terminal service data.
Preferably, the terminal authentication module is further configured to interact with a 5G-EIR in the 5G-R system, add the abnormal mobile terminal to the blacklist, prohibit the abnormal mobile terminal in the blacklist from accessing the 5G-R network, and implement closed-loop management on the mobile terminal.
Furthermore, the interaction with the 5G-EIR can be modified into interaction with related network elements responsible for user authentication in 5G systems such as AMF (access and mobility management function network element), AUSF (authentication server function network element) and the like, so as to realize closed loop management on the network access side of the terminal.
The scheme provided by the embodiment of the invention mainly has the following beneficial effects:
1) By separating the control plane from the data plane, the terminal authentication and the data transmission management are realized, meanwhile, the service data transmitted by the terminal is not processed, the consistency in the data transmission process is ensured, and the interface is kept clear.
2) Since the service data is not processed twice, no influence is caused on the transmission rate of the service data. And meanwhile, the expansion of the service data packet is not caused, and the extra transmission bandwidth is not occupied.
3) By linking with the 5G-EIR, the abnormal interruption of the access to the 5G-R network can be forbidden, and the closed loop management of the 5G-R terminal can be realized. Interaction with related network elements responsible for user authentication in other 5G systems can be performed to realize closed-loop management of terminal access side
4) Because the control plane and the data plane are separated, even if the control plane module fails, the whole system can be smoothly degraded and operated, namely, the terminal is not authenticated, service data can be normally transmitted, and the usability of the whole system is ensured first.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the system is divided into different functional modules to perform all or part of the functions described above.
Example two
The embodiment of the invention provides a method for terminal access and data distribution based on 5G-R, which mainly comprises the following steps:
receiving an access request of the mobile terminal through a 5G-R system by utilizing a terminal authentication module, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
storing and maintaining access rights information of the mobile terminal by using a rights management module, and returning a corresponding rights inquiry response after receiving a rights inquiry request;
and the data forwarding module is utilized to send a strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and the service data interaction of the accessed mobile terminal is realized according to the configuration.
In the embodiment of the invention, the authentication of the identity of the mobile terminal according to the access request comprises the following steps: the access request comprises an identity authentication element of the mobile terminal; and authenticating the identity of the mobile terminal according to the identity authentication element of the mobile terminal.
In the embodiment of the invention, the generating the policy configuration request according to the received permission query response comprises the following steps: the permission query response comprises the access permission of the corresponding mobile terminal, a policy configuration request is generated according to the access permission, and the policy configuration request comprises a data forwarding policy corresponding to the corresponding access permission.
In the embodiment of the present invention, the service data interaction of the mobile terminal implementing access according to the configuration includes: and realizing business data interaction between the accessed mobile terminal and a business system according to a configured data forwarding strategy, wherein the configured data forwarding strategy comprises permission and/or prohibition of the mobile terminal to transmit and receive appointed business data.
In the embodiment of the invention, the terminal authentication module is also used for interacting with the 5G-EIR in the 5G-R system, adding the abnormal mobile terminal into the blacklist, and prohibiting the abnormal mobile terminal in the blacklist from accessing the 5G-R network.
From the description of the above embodiments, it will be apparent to those skilled in the art that the above embodiments may be implemented in software, or may be implemented by means of software plus a necessary general hardware platform. With such understanding, the technical solutions of the foregoing embodiments may be embodied in a software product, where the software product may be stored in a nonvolatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.), and include several instructions for causing a computer device (may be a personal computer, a server, or a network device, etc.) to perform the methods of the embodiments of the present invention.
The foregoing is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present invention should be included in the scope of the present invention. Therefore, the protection scope of the present invention should be subject to the protection scope of the claims.
Claims (10)
1. A system for terminal access and data distribution based on 5G-R, comprising:
the terminal authentication module is used for receiving an access request of the mobile terminal through the 5G-R system, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
the permission management module is used for storing and maintaining access permission information of the mobile terminal, and returning corresponding permission query response after receiving the permission query request;
and the data forwarding module is used for sending the strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and realizing service data interaction of the accessed mobile terminal according to the configuration.
2. The system for 5G-R based terminal access and data distribution according to claim 1, wherein the authenticating the identity of the mobile terminal according to the access request comprises:
the access request comprises an identity authentication element of the mobile terminal;
and authenticating the identity of the mobile terminal according to the identity authentication element of the mobile terminal.
3. The 5G-R based terminal access, data distribution system of claim 1, wherein generating a policy configuration request from the received permission query response comprises:
the permission query response comprises the access permission of the corresponding mobile terminal, a policy configuration request is generated according to the access permission, and the policy configuration request comprises a data forwarding policy corresponding to the corresponding access permission.
4. The system for terminal access and data distribution based on 5G-R according to claim 1, wherein the service data interaction of the mobile terminal implementing access according to the configuration comprises:
and realizing business data interaction between the accessed mobile terminal and a business system according to a configured data forwarding strategy, wherein the configured data forwarding strategy comprises permission and/or prohibition of the mobile terminal to transmit and receive appointed business data.
5. The system for terminal access and data distribution based on 5G-R of claim 1, wherein the terminal authentication module is further configured to interact with a 5G-EIR in the 5G-R system, add an abnormal mobile terminal to the blacklist, and prohibit the abnormal mobile terminal in the blacklist from accessing the 5G-R network.
6. A method for terminal access and data distribution based on 5G-R, comprising:
receiving an access request of the mobile terminal through a 5G-R system by utilizing a terminal authentication module, authenticating the identity of the mobile terminal according to the access request, sending a permission query request after the authentication is passed, generating a policy configuration request according to the received permission query response, and sending an access corresponding after receiving the policy configuration response;
storing and maintaining access rights information of the mobile terminal by using a rights management module, and returning a corresponding rights inquiry response after receiving a rights inquiry request;
and the data forwarding module is utilized to send a strategy configuration response to the terminal authentication module after the strategy configuration request is configured, and the service data interaction of the accessed mobile terminal is realized according to the configuration.
7. The method for 5G-R based terminal access and data distribution according to claim 6, wherein authenticating the identity of the mobile terminal according to the access request comprises:
the access request comprises an identity authentication element of the mobile terminal;
and authenticating the identity of the mobile terminal according to the identity authentication element of the mobile terminal.
8. The method for 5G-R based terminal access and data distribution of claim 6, wherein generating a policy configuration request from the received permission query response comprises:
the permission query response comprises the access permission of the corresponding mobile terminal, a policy configuration request is generated according to the access permission, and the policy configuration request comprises a data forwarding policy corresponding to the corresponding access permission.
9. The method for accessing and distributing data by a terminal based on 5G-R according to claim 6, wherein the service data interaction of the mobile terminal accessing according to the configuration comprises:
and realizing business data interaction between the accessed mobile terminal and a business system according to a configured data forwarding strategy, wherein the configured data forwarding strategy comprises permission and/or prohibition of the mobile terminal to transmit and receive appointed business data.
10. The method for accessing and distributing data to a terminal based on 5G-R according to claim 6, wherein the terminal authentication module is further configured to interact with a 5G-EIR in a 5G-R system, add an abnormal mobile terminal to a blacklist, and prohibit the abnormal mobile terminal in the blacklist from accessing the 5G-R network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310780554.7A CN116723555A (en) | 2023-06-29 | 2023-06-29 | Terminal access and data distribution method and system based on 5G-R |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310780554.7A CN116723555A (en) | 2023-06-29 | 2023-06-29 | Terminal access and data distribution method and system based on 5G-R |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116723555A true CN116723555A (en) | 2023-09-08 |
Family
ID=87867802
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310780554.7A Pending CN116723555A (en) | 2023-06-29 | 2023-06-29 | Terminal access and data distribution method and system based on 5G-R |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116723555A (en) |
-
2023
- 2023-06-29 CN CN202310780554.7A patent/CN116723555A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20180091978A1 (en) | Universal Integrated Circuit Card Having A Virtual Subscriber Identity Module Functionality | |
KR101438243B1 (en) | Sim based authentication | |
EP1394982B1 (en) | Methods and apparatus for secure data communication links | |
KR101518362B1 (en) | Method and apparatus for providing network communication association information to applications and services | |
KR20110103473A (en) | Virtual subscriber identity module | |
JP2012503945A (en) | HOMENODE-B device and security protocol | |
CN113596009B (en) | Zero trust access method, system, zero trust security proxy, terminal and medium | |
CN111918284B (en) | Safe communication method and system based on safe communication module | |
CN112788594B (en) | Data transmission method, device and system, electronic equipment and storage medium | |
CN114143068A (en) | Electric power internet of things gateway equipment container safety protection system and method thereof | |
CN114143788A (en) | Method and system for realizing authentication control of 5G private network based on MSISDN | |
US20090136043A1 (en) | Method and apparatus for performing key management and key distribution in wireless networks | |
CN113873510A (en) | Secure communication method, related device and system | |
CN114726523B (en) | Password application service system and quantum security capability open platform | |
CN114301967B (en) | Control method, device and equipment for narrowband Internet of things | |
CN112416528B (en) | Method for realizing non-invasive micro service interface safety call | |
CN116723555A (en) | Terminal access and data distribution method and system based on 5G-R | |
CN111698263A (en) | Beidou satellite navigation data transmission method and system | |
CN115835194B (en) | NB-IOT terminal safety access system and access method | |
WO2023221502A1 (en) | Data transmission method and system, and signaling security management gateway | |
CN117479154B (en) | Office terminal data processing method and system based on unified multi-domain identification authentication | |
WO2022183427A1 (en) | Method, device, and system for protecting sequence number in wireless network | |
US20060173981A1 (en) | Secure web browser based system administration for embedded platforms | |
CN113473475A (en) | Operation method and device for hiding position of mobile user based on wide area network | |
Gagnon et al. | A security architecture for TMN inter-domain management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |