CN109714300A - Method of controlling security and system and relevant device - Google Patents

Method of controlling security and system and relevant device Download PDF

Info

Publication number
CN109714300A
CN109714300A CN201711012582.5A CN201711012582A CN109714300A CN 109714300 A CN109714300 A CN 109714300A CN 201711012582 A CN201711012582 A CN 201711012582A CN 109714300 A CN109714300 A CN 109714300A
Authority
CN
China
Prior art keywords
user
ipsec
instruction parameter
open instruction
authorization data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711012582.5A
Other languages
Chinese (zh)
Other versions
CN109714300B (en
Inventor
赵飞
毛安平
孙艺宸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201711012582.5A priority Critical patent/CN109714300B/en
Publication of CN109714300A publication Critical patent/CN109714300A/en
Application granted granted Critical
Publication of CN109714300B publication Critical patent/CN109714300B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses a kind of method of controlling security and system and relevant devices, are related to the communications field.Method therein includes obtaining the authorization data of user in response to Client-initiated registration request;The IPsec extracted in the authorization data of user encrypts open instruction parameter;In the case where the value of IPsec encryption open instruction parameter indicates to close, indicate that user closes IPsec encryption function by response message, to monitor the signaling that user issues.To realize the IPsec function of needing to close local users according to monitoring, while ensureing the communications security of most of legitimate users, realize to local users Lawful Interception.

Description

Method of controlling security and system and relevant device
Technical field
This disclosure relates to the communications field, in particular to a kind of method of controlling security and system and relevant device.
Background technique
IP multimedia subsystem (IMS, IP Multimedia Subsystem) have dialogue-based initiation protocol (SIP, Session Initiation Protocol) full IP framework.IP agreement interconnects IMS terminal and internet directly, and interconnects Net is unsafe network, causes access device and IMS terminal easily by the attack of hacker.In addition, used by IMS For Session Initiation Protocol as a kind of text protocol, structural grammar is simple, it is prone to the safety issues such as copy, distorts and intercept.Maliciously SIP signaling is transmitted to core control layer, and great security threat can be caused to IMS network.
Using the security feature of internet protocol secure (IPSec) safeguard protection can be provided for IMS system.3GPP IMS Terminal and Proxy Call Session Control Function (P-CSCF, Proxy Call Session Control are defined in security architecture Function the Confidentiality protection of SIP signaling, including encryption and completeization protection are realized between) by IPsec.
The implementation of IPSec improves the access safety of IMS, but terminal is issued on Gm by IPSec SIP signaling is encrypted, and is led to not the signaling issued to terminal and is carried out Lawful Interception, may cause to public safety Adverse effect.
Summary of the invention
Inventors have found that whether IMS network opens IPSec by parameter instruction terminal side, but the parameter is global at present Property setting, i.e., IMS network can only select that whole terminals is required to open or close IPSec.If whole terminals open IPSec, Lawful Interception cannot achieve;If needing IMS network to indicate that whole terminals close IPSec it is required that Lawful Interception is normally realized, The communications security and carrier network safety that will lead to most of legitimate users decline to a great extent.
An embodiment of the present disclosure technical problem to be solved is: in the communications security for ensureing most of legitimate users While, realize Lawful Interception.
According to one aspect of the disclosure, a kind of method of controlling security is proposed, comprising:
In response to Client-initiated registration request, the authorization data of the user is obtained;
Extract the internet protocol secure IPsec encryption open instruction parameter in the authorization data of the user;
In the case where the value of IPsec encryption open instruction parameter indicates to close, indicated by response message described in User closes IPsec encryption function, so that the signaling issued to the user is monitored.
Optionally, this method further include: according to the user information of the eavesdropping target of acquisition, by the authorization data of relative users In IPsec encryption open instruction parameter value be set off.
Optionally, this method further include: the value setting of the IPsec encryption open instruction parameter in the authorization data of user After closing, the login state of the user is checked;It is whole by the registration of extension in the state that the user is in registered Only request message triggers the user and re-initiates registration request, and the cancellation in the registration termination request message of the extension is former Because IPsec encrypts open instruction parameter change.
Optionally, the expansion that service call conversation control function S-CSCF is sent in response to home signature user server HSS The registration termination request message of exhibition checks the cancellation reason in the registration termination request message of the extension as IPsec encryption Open instruction parameter change notifies the user to re-initiate registration request.
Optionally, it in the state that the user is in unregistered, removes to the IP multimedia public identity of the user The S-CSCF information of assignment waits the user to initiate registration request.
Optionally, the Encryption Algorithm of the security service header field of response message is assigned a value of sky, to indicate that the user closes IPsec encryption function.
According to another aspect of the disclosure, a kind of service call conversation control function S-CSCF of security control is proposed, Include:
Authorization data obtains module, for obtaining the authorization data of the user in response to Client-initiated registration request; Extract the internet protocol secure IPsec encryption open instruction parameter in the authorization data of the user;
Notification module, for passing through response in the case where the value of IPsec encryption open instruction parameter indicates to close Message indicates that the user closes IPsec encryption function, so that the signaling issued to the user is monitored.
Optionally, the notification module is also used to the registration in response to the home signature user server HSS extension sent Request message is terminated, checking the cancellation reason in the registration termination request message of the extension is that IPsec encrypts open instruction Parameter change notifies the user to re-initiate registration request.
Optionally, the notification module, for indicating the case where closing in the value of IPsec encryption open instruction parameter Under, the Encryption Algorithm of the security service header field of response message is assigned a value of sky, to indicate that the user closes IPsec encryption function Energy.
According to another aspect of the present disclosure, a kind of home signature user server HSS of security control is proposed, comprising:
Authorization data setup module, for the user information according to the eavesdropping target of acquisition, by the authentication number of relative users The value of IPsec encryption open instruction parameter in is set off;
Login state checks module, for checking the login state of the user;
Message transmission module, for passing through the registration termination request of extension in the state that the user is in registered Message triggers the user and re-initiates registration request, and the cancellation reason in the registration termination request message of the extension is IPsec encrypts open instruction parameter change.
Optionally, HSS further include: processing module, for removing to described in the state that the user is in unregistered The S-CSCF information of the IP multimedia public identity assignment of user, waits the user to initiate registration request.
According to the another aspect of the disclosure, a kind of safety control system is proposed, including S-CSCF above-mentioned and above-mentioned HSS。
According to the another further aspect of the disclosure, a kind of safety control is proposed, comprising:
Memory;And
It is coupled to the processor of the memory, the processor is configured to the finger based on storage in the memory It enables, executes method of controlling security above-mentioned.
According to another aspect of the present disclosure, it proposes a kind of computer readable storage medium, is stored thereon with computer program, The step of program realizes method of controlling security above-mentioned when being executed by processor.
To realize the IPsec function of needing to close local users according to monitoring, ensure leading to for most of legitimate users While believing safety, realize to local users Lawful Interception.
Detailed description of the invention
Attached drawing needed in embodiment or description of Related Art will be briefly described below.According to following ginseng According to the detailed description of attached drawing, the disclosure can be more clearly understood,
It should be evident that the accompanying drawings in the following description is only some embodiments of the present disclosure, skill common for this field For art personnel, without any creative labor, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of disclosure method of controlling security one embodiment.
Fig. 2 is the flow diagram of another embodiment of disclosure method of controlling security.
Fig. 3 is that the disclosure initiates registered users to nullify and require the process of the one embodiment re-registered to illustrate Figure.
Fig. 4 is the flow diagram of one embodiment that disclosure core net instruction terminal closes IPsec function.
Fig. 5 is the structural schematic diagram of disclosure safety control system one embodiment.
Fig. 6 is the structural schematic diagram of S-CSCF one embodiment of disclosure security control.
Fig. 7 is the structural schematic diagram of HSS one embodiment of disclosure security control.
Fig. 8 is the structural schematic diagram of disclosure safety control one embodiment.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present disclosure, the technical solution in the embodiment of the present disclosure is carried out clear, complete Site preparation description.
Fig. 1 is the flow diagram of disclosure method of controlling security one embodiment.When the security control side of the embodiment When method is applied to IMS system, this method can be by service call conversation control function (S-CSCF, Serving Call Session Control Function) it executes.
As shown in Figure 1, the method 10 of the embodiment includes:
Step 110, in response to Client-initiated registration request, the authorization data of user is obtained, such as can be signed from ownership The about authorization data of client server (HSS, Home Subscriber Server) acquisition user.
Step 120, the IPsec encryption open instruction parameter in the authorization data of user is extracted.
Wherein, the value that IPsec encrypts open instruction parameter, which includes at least, to be opened and closed, and is respectively indicated and is opened IPsec function It can and close IPsec function.
Step 130, it in the case where the value of IPsec encryption open instruction parameter indicates to close, is indicated by response message User closes IPsec encryption function, to monitor the signaling that user issues.
For example, the Encryption Algorithm of the security service header field of response message is assigned a value of sky, added with indicating that user closes IPsec Close function.
To realize the IPsec function of needing to close local users according to monitoring, ensure leading to for most of legitimate users While believing safety, realize to local users Lawful Interception.
Fig. 2 is the flow diagram of another embodiment of disclosure method of controlling security.
As shown in Fig. 2, the method 20 of the embodiment includes:
Step 210, HSS is according to the user information of the eavesdropping target of acquisition, by the IPsec in the authorization data of relative users The value of encryption open instruction parameter is set off.
Wherein, HSS can be notified for the user information of eavesdropping target by monitoring platform, and the user information of eavesdropping target is, for example, Name, telephone number, phone number of user etc..
Step 220, HSS checks the login state of user;
Step 230, in the state that user is in unregistered, HSS is removed to the IP multimedia public identity of user (IMPU) the S-CSCF information assigned waits user to initiate registration request.Then, step 250 is executed.
Step 240, in the state that user is in registered, HSS passes through the registration termination request RTR of extension (Registration-Termination-Request) message, triggering user re-initiate registration request, and the registration of extension is whole Only the cancellation reason in request message is that IPsec encrypts open instruction parameter change.Then, step 250 is executed.
Step 250, user is switched on or is re-registered according to network side the requirement of authentication, initiates register and authentication process.
Then, execute step 260,270,280, these three steps respectively with step 110,120, it is 130 identical, here no longer It repeats.
To realize the IPsec function of needing to close local users according to monitoring, ensure leading to for most of legitimate users While believing safety, realize to local users Lawful Interception.In addition, realized based on the general network element of IMS, it is special without disposing Business device saves equipment cost.And it can be realized based on such as SIP of the puppy parc in IMS network, but need to existing association View carries out the simple extension of header field and process.For the program convenient for introducing network, the influence to network and business is small.
Fig. 3 is that the disclosure initiates registered users to nullify and require the process of the one embodiment re-registered to illustrate Figure.
As shown in figure 3, the method 30 of the embodiment includes:
Step 310, the S-CSCF that HSS is currently registered to user sends the registration termination request RTR message of extension, disappears to this Cancellation reason (Deregistration-Reason) attribute value in breath is " SEC_CHANGED " (table to (AVP) extension value Show that IPsec encrypts open instruction parameter change), to indicate that the reason of this network is nullified is ipsec encryption open instruction parameter It changes.HSS encrypts open instruction parameter by the S-CSCF User IP sec that the spreading parameter notifies user currently to register and becomes Change, needs to initiate network and nullify and require user's discrimination weight process.
Step 320, S-CSCF returns to Registration Termination Answer (RTA) message to HSS, and RTR message has been received in expression.
Step 330, S-CSCF checks the Deregistration-Reason AVP in RTR message, and when discovery, the AVP is taken Value is " SEC_CHANGED " (that is, IPsec encrypts open instruction parameter change), is sent by P-CSCF to UE (user equipment) NOTIFY (notice) message notifies user to re-initiate register and authentication event, extends " event (event) " in NOTIFY message body Header field initiates to re-register authentication immediately with event=" re-register (re-register) " instruction UE.
Step 340, UE returns to 200OK to S-CSCF by P-CSCF, and expression has received the notice for re-registering authentication.
Subsequent, UE re-initiates registration process according to network requirement, to complete to authenticate.
Fig. 4 is the flow diagram of one embodiment that disclosure core net instruction terminal closes IPsec function.
As shown in figure 4, the method 40 of the embodiment includes:
Step 410, user is switched on or is re-registered according to network side the requirement of authentication, sends REGISTER (registration) and disappears Breath, initiates new register and authentication process.
Step 420, S-CSCF to HSS send multimedia authentication request (MAR,
Multimedia-Auth-Request) message requests subscription authentication data.
Step 430, HSS returns to corresponding data by multimedia authentication responses (MAA) message, wherein encrypting comprising IPsec Open instruction parameter " SIP-Authentication-Ipsec ", value are to close.
It step 440, is the user of " closing " for the value of IPsec encryption open instruction parameter, S-CSCF is according to " SIP- The instruction of Authentication-Ipsec " parameter, in 401 response messages of user's REGISTER message, by will be safe The Encryption Algorithm (ealg) of service (Security-Server) header field is assigned a value of empty (null), is added with indicating that user closes IPSec Close function.
Step 450, UE closes ipsec capability, completes authentication, accesses IMS network.
Fig. 5 is the structural schematic diagram of disclosure safety control system one embodiment.
As shown in figure 5, the system 50 of the embodiment includes: S-CSCF510 and HSS520.
Wherein, HSS520 is used for the user information of the eavesdropping target according to acquisition, will be in the authorization data of relative users The value of IPsec encryption open instruction parameter is set off.It is also used to check the login state of user;It is in registered in user In the state of, by the registration termination request message of extension, triggers user and re-initiate registration request, the registration termination of extension is asked Seeking the cancellation reason in message is that IPsec encrypts open instruction parameter change.In the state that user is in unregistered, removing is given The S-CSCF information of the IP multimedia public identity assignment of user, waits user to initiate registration request.
Wherein, S-CSCF510 is used to obtain the authorization data of user in response to Client-initiated registration request;It extracts and uses Internet protocol secure IPsec in the authorization data at family encrypts open instruction parameter;In IPsec encryption open instruction parameter Value indicates in the case where closing, and indicates that user closes IPsec encryption function by response message, so as to the signaling issued to user It is monitored.
To realize the IPsec function of needing to close local users according to monitoring, ensure leading to for most of legitimate users While believing safety, realize to local users Lawful Interception.
Fig. 6 is the structural schematic diagram of S-CSCF one embodiment of disclosure security control.
As shown in fig. 6, the S-CSCF60 of the embodiment includes:
Authorization data obtains module 610, for obtaining the authorization data of user in response to Client-initiated registration request; The internet protocol secure IPsec extracted in the authorization data of user encrypts open instruction parameter;
Notification module 620, for passing through response in the case where the value of IPsec encryption open instruction parameter indicates to close Message indicates that user closes IPsec encryption function, to monitor the signaling that user issues.
Wherein, notification module 620, for that will ring in the case where the value of IPsec encryption open instruction parameter indicates to close The Encryption Algorithm of the security service header field of message is answered to be assigned a value of sky, to indicate that user closes IPsec encryption function.
Wherein, notification module 620 are also used to the registration end in response to the home signature user server HSS extension sent Only request message, checking the cancellation reason in the registration termination request message of extension is that IPsec encryption open instruction parameter changes Become, user is notified to re-initiate registration request.
To realize the IPsec function of needing to close local users according to monitoring, ensure leading to for most of legitimate users While believing safety, realize to local users Lawful Interception.
Fig. 7 is the structural schematic diagram of HSS one embodiment of disclosure security control.
As shown in fig. 7, the HSS70 of the embodiment includes:
Authorization data setup module 710, for the user information according to the eavesdropping target of acquisition, by the authentication of relative users The value of IPsec encryption open instruction parameter in data is set off;
Login state checks module 720, for checking the login state of user;
Message transmission module 730, for being disappeared in the state that user is in registered by the registration termination request of extension Breath, triggering user re-initiate registration request, and the cancellation reason in the registration termination request message of extension is that IPsec encryption is opened Indicate parameter change.
In addition, HSS further include: processing module 740, for removing to user's in the state that user is in unregistered The S-CSCF information of IP multimedia public identity assignment, waits user to initiate registration request.
Fig. 8 is the structural schematic diagram of disclosure safety control one embodiment.
As shown in figure 8, the device 80 includes:
Memory 810;And
It is coupled to the processor 820 of the memory 810, is configured as holding based on the instruction being stored in memory 810 Row method of controlling security above-mentioned.
Wherein, memory 810 is such as may include system storage, fixed non-volatile memory medium.System storage Device is for example stored with operating system, application program, Boot loader (Boot Loader) and other programs etc..
Device 80 can also include input/output interface 830, network interface 840, memory interface 850 etc..These interfaces It can for example be connected by bus 860 between 830,840,850 and memory 810 and processor 820.Wherein, input and output The input-output equipment such as interface 830 is display, mouse, keyboard, touch screen provide connecting interface.Network interface 840 is various Networked devices provide connecting interface.The external storages such as memory interface 850 is SD card, USB flash disk provide connecting interface.
The disclosure also proposes a kind of computer readable storage medium, is stored thereon with computer program, and the program is processed The step of device realizes method of controlling security above-mentioned when executing.
Those skilled in the art should be understood that embodiment of the disclosure can provide as method, system or computer journey Sequence product.Therefore, complete hardware embodiment, complete software embodiment or combining software and hardware aspects can be used in the disclosure The form of embodiment.Moreover, it wherein includes the calculating of computer usable program code that the disclosure, which can be used in one or more, Machine can use the meter implemented in non-transient storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of calculation machine program product.
The disclosure is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present disclosure Figure and/or block diagram describe.It is interpreted as to be realized by computer program instructions each in flowchart and/or the block diagram The combination of process and/or box in process and/or box and flowchart and/or the block diagram.It can provide these computer journeys Sequence instruct to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor with A machine is generated, so that the instruction generation executed by computer or the processor of other programmable data processing devices is used for Realize the dress for the function of specifying in one or more flows of the flowchart and/or one or more blocks of the block diagram It sets.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is merely the preferred embodiments of the disclosure, not to limit the disclosure, all spirit in the disclosure and Within principle, any modification, equivalent replacement, improvement and so on be should be included within the protection scope of the disclosure.

Claims (14)

1. a kind of method of controlling security, comprising:
In response to Client-initiated registration request, the authorization data of the user is obtained;
Extract the internet protocol secure IPsec encryption open instruction parameter in the authorization data of the user;
In the case where the value of IPsec encryption open instruction parameter indicates to close, the user is indicated by response message IPsec encryption function is closed, so that the signaling issued to the user is monitored.
2. the method as described in claim 1, further includes: according to the user information of the eavesdropping target of acquisition, by relative users The value of IPsec encryption open instruction parameter in authorization data is set off.
3. method according to claim 2, further includes: the IPsec in the authorization data of user encrypts open instruction parameter Value be set off after, check the login state of the user;
In the state that the user is in registered, by the registration termination request message of extension, the user is triggered again Registration request is initiated, the cancellation reason in the registration termination request message of the extension is that IPsec encryption open instruction parameter changes Become.
4. method as claimed in claim 3, wherein service call conversation control function S-CSCF is in response to home signature user The registration termination request message for the extension that server HSS is sent, checks the note in the registration termination request message of the extension Selling reason is that IPsec encrypts open instruction parameter change, and the user is notified to re-initiate registration request.
5. method as claimed in claim 3, wherein in the state that the user is in unregistered, remove to the user IP multimedia public identity assignment S-CSCF information, wait the user to initiate registration request.
6. the Encryption Algorithm of the security service header field of response message is the method for claim 1, wherein assigned a value of sky, To indicate that the user closes IPsec encryption function.
7. a kind of service call conversation control function S-CSCF of security control, comprising:
Authorization data obtains module, for obtaining the authorization data of the user in response to Client-initiated registration request;It extracts Internet protocol secure IPsec in the authorization data of the user encrypts open instruction parameter;
Notification module, for passing through response message in the case where the value of IPsec encryption open instruction parameter indicates to close Indicate that the user closes IPsec encryption function, so that the signaling issued to the user is monitored.
8. S-CSCF as claimed in claim 7, wherein
The notification module is also used to disappear in response to the registration termination request of the home signature user server HSS extension sent Breath, checking the cancellation reason in the registration termination request message of the extension is that IPsec encrypts open instruction parameter change, is led to Know that the user re-initiates registration request.
9. S-CSCF as claimed in claim 7, wherein
The notification module, in the case where the value of IPsec encryption open instruction parameter indicates to close, response to be disappeared The Encryption Algorithm of the security service header field of breath is assigned a value of sky, to indicate that the user closes IPsec encryption function.
10. a kind of home signature user server HSS of security control, comprising:
Authorization data setup module will be in the authorization data of relative users for the user information according to the eavesdropping target of acquisition IPsec encryption open instruction parameter value be set off;
Login state checks module, for checking the login state of the user;
Message transmission module, in the state that the user is in registered, by the registration termination request message of extension, It triggers the user and re-initiates registration request, the cancellation reason in the registration termination request message of the extension adds for IPsec Close open instruction parameter change.
11. HSS as claimed in claim 10, further includes:
Processing module, for removing to the IP multimedia public mark of the user in the state that user is in unregistered The S-CSCF information for knowing assignment waits the user to initiate registration request.
12. a kind of safety control system, including described in the described in any item S-CSCF of claim 7-9 and claim 10 or 11 HSS.
13. a kind of safety control, comprising:
Memory;And
It is coupled to the processor of the memory, the processor is configured to the instruction based on storage in the memory, Perform claim requires method of controlling security described in any one of 1-6.
14. a kind of computer readable storage medium, is stored thereon with computer program, power is realized when which is executed by processor Benefit requires the step of method of controlling security described in any one of 1-6.
CN201711012582.5A 2017-10-26 2017-10-26 Safety control method and system and related equipment Active CN109714300B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711012582.5A CN109714300B (en) 2017-10-26 2017-10-26 Safety control method and system and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711012582.5A CN109714300B (en) 2017-10-26 2017-10-26 Safety control method and system and related equipment

Publications (2)

Publication Number Publication Date
CN109714300A true CN109714300A (en) 2019-05-03
CN109714300B CN109714300B (en) 2021-06-11

Family

ID=66253360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711012582.5A Active CN109714300B (en) 2017-10-26 2017-10-26 Safety control method and system and related equipment

Country Status (1)

Country Link
CN (1) CN109714300B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111405557A (en) * 2020-03-19 2020-07-10 中国电子科技集团公司第三十研究所 Method and system for enabling 5G network to flexibly support multiple main authentication algorithms

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286896A (en) * 2008-06-05 2008-10-15 上海交通大学 IPSec VPN protocol drastic detecting method based on flows
CN101909056A (en) * 2010-07-21 2010-12-08 北京星网锐捷网络技术有限公司 Client state recognition method, device and network equipment
CN102802275A (en) * 2012-08-22 2012-11-28 汉柏科技有限公司 Wireless encryption access method
CN104219705A (en) * 2014-09-24 2014-12-17 中国联合网络通信集团有限公司 VoLTE terminal re-registering method and device
CN106549923A (en) * 2015-09-22 2017-03-29 中国联合网络通信集团有限公司 A kind of control method and device of secure access

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286896A (en) * 2008-06-05 2008-10-15 上海交通大学 IPSec VPN protocol drastic detecting method based on flows
CN101909056A (en) * 2010-07-21 2010-12-08 北京星网锐捷网络技术有限公司 Client state recognition method, device and network equipment
CN102802275A (en) * 2012-08-22 2012-11-28 汉柏科技有限公司 Wireless encryption access method
CN104219705A (en) * 2014-09-24 2014-12-17 中国联合网络通信集团有限公司 VoLTE terminal re-registering method and device
CN106549923A (en) * 2015-09-22 2017-03-29 中国联合网络通信集团有限公司 A kind of control method and device of secure access

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111405557A (en) * 2020-03-19 2020-07-10 中国电子科技集团公司第三十研究所 Method and system for enabling 5G network to flexibly support multiple main authentication algorithms
CN111405557B (en) * 2020-03-19 2022-03-15 中国电子科技集团公司第三十研究所 Method and system for enabling 5G network to flexibly support multiple main authentication algorithms

Also Published As

Publication number Publication date
CN109714300B (en) 2021-06-11

Similar Documents

Publication Publication Date Title
US9992176B2 (en) Systems and methods for encrypted communication in a secure network
US20180295137A1 (en) Techniques for dynamic authentication in connection within applications and sessions
CN104735065B (en) A kind of data processing method, electronic equipment and server
CN104917721B (en) Authorization method, device and system based on oAuth agreement
US9881304B2 (en) Risk-based control of application interface transactions
US10771624B1 (en) Data store for communication authentication
CN104869102B (en) Authorization method, device and system based on xAuth agreement
CN105991614B (en) It is a kind of it is open authorization, resource access method and device, server
JP2017509076A (en) Method and apparatus for verifying processed data
CN104054321A (en) Security management for cloud services
CN103347020B (en) A kind of system and method across application authorization access
CN106133735B (en) For accessing the safety method and device of internet protocol multi-media sub-system
CN108605264A (en) Network management
CN108712376B (en) Verification method and device for server login
CN104579657A (en) Method and device for identity authentication
EP3381166B1 (en) Systems and methods for cross-channel device binding
US10148629B1 (en) User-friendly multifactor authentication
US11689517B2 (en) Method for distributed application segmentation through authorization
US20190149991A1 (en) Technique for authenticating a user device
CN109714300A (en) Method of controlling security and system and relevant device
Wu et al. IoT network traffic analysis: Opportunities and challenges for forensic investigators?
Reimair et al. MoCrySIL-Carry your Cryptographic keys in your pocket
US20160191493A1 (en) System and method of authenticating a live video stream
US10893035B2 (en) Network architecture for controlling data signalling
Benzidane et al. Secured architecture for inter-VM traffic in a Cloud environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant