TW200635305A - Bearer control of encrypted data flows in packet data communications - Google Patents

Bearer control of encrypted data flows in packet data communications

Info

Publication number
TW200635305A
TW200635305A TW094124012A TW94124012A TW200635305A TW 200635305 A TW200635305 A TW 200635305A TW 094124012 A TW094124012 A TW 094124012A TW 94124012 A TW94124012 A TW 94124012A TW 200635305 A TW200635305 A TW 200635305A
Authority
TW
Taiwan
Prior art keywords
spis
data
communication session
data flows
flows
Prior art date
Application number
TW094124012A
Other languages
Chinese (zh)
Other versions
TWI378694B (en
Inventor
Jun Wang
Arungundram C Mahendran
Raymond Tah-Sheng Hsu
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of TW200635305A publication Critical patent/TW200635305A/en
Application granted granted Critical
Publication of TWI378694B publication Critical patent/TWI378694B/en

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

In a communication session in which data flows with encrypted data packets pass through a monitoring intermediary for data traffic control. The encrypted data packets include SPIs (Secured Parameter Indexes) which are used to identify Sas (Security Associations) for data decryption. During the initial signaling process for the communication session, the nodes seeking the communication session include the SPIs in the signaling messages and send the signaling messages through the monitoring intermediary which in turn matches the SPIs of the signaling messages with the corresponding SPIs extracted from the data packets. In enforcing data traffic control, the monitoring intermediary allows data flows to pass through if comparison matches in the SPIs are found. Otherwise, the data flows are rejected.
TW94124012A 2004-07-15 2005-07-15 Bearer control of encrypted data flows in packet data communications TWI378694B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US58866404P 2004-07-15 2004-07-15

Publications (2)

Publication Number Publication Date
TW200635305A true TW200635305A (en) 2006-10-01
TWI378694B TWI378694B (en) 2012-12-01

Family

ID=38701554

Family Applications (2)

Application Number Title Priority Date Filing Date
TW094124016A TW200627886A (en) 2004-07-15 2005-07-15 Packet data filtering
TW94124012A TWI378694B (en) 2004-07-15 2005-07-15 Bearer control of encrypted data flows in packet data communications

Family Applications Before (1)

Application Number Title Priority Date Filing Date
TW094124016A TW200627886A (en) 2004-07-15 2005-07-15 Packet data filtering

Country Status (2)

Country Link
CN (2) CN101006700A (en)
TW (2) TW200627886A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5554066B2 (en) * 2007-12-27 2014-07-23 株式会社Into Information distribution system, information terminal and program
CN102056118B (en) * 2009-10-30 2015-05-20 中兴通讯股份有限公司 Method, device and system for charge control

Also Published As

Publication number Publication date
CN101006700A (en) 2007-07-25
TWI378694B (en) 2012-12-01
CN101014925B (en) 2012-07-04
TW200627886A (en) 2006-08-01
CN101014925A (en) 2007-08-08

Similar Documents

Publication Publication Date Title
CN105763557B (en) Exchange chip or NP cooperate with the method and system for completing message IPSEC encryption with CPU
BRPI0513342A (en) bearer control of encrypted data streams in packet data communications
CN102347870B (en) A kind of flow rate security detection method, equipment and system
EP1650915B8 (en) Method of authenticating a mobile network node for establishing a secure peer-to-peer context between a pair of communicating mobile network nodes
WO2006047643A3 (en) System and method for providing security for a wireless network
WO2007146045A3 (en) Securing network traffic by distributing policies in a hierarchy over secure tunnels
ATE506785T1 (en) METHOD FOR AVOIDING DOUBLE ENCRYPTION IN MOBILE NETWORKS
WO2009038831A3 (en) Methods and apparatus for providing pmip key hierarchy in wireless communication networks
CN107079023A (en) User plane safety for next generation cellular network
CN105721317B (en) A kind of data stream encryption method and system based on SDN
IL172516A0 (en) Security checking program for communication between networks
CN106998333A (en) A kind of bilateral network security isolation system and method
CN106375298A (en) Method for realizing configurable secure communication protocol
WO2005077134A3 (en) A method and apparatus for a per-packet encryption system
WO2008005162A3 (en) Method and apparatus for security protection of an original user identity in an initial signaling message
WO2004001520A3 (en) QoS SIGNALING FOR MOBILE IP
WO2003049357A3 (en) Lawful interception of end-to-end encrypted data traffic
CN108040058A (en) The security protection system and method that a kind of locomotive monitoring equipment data wirelessly change the outfit
EP1523149A3 (en) Encryption error monitoring system and method for packet transmission
CN105610790B (en) The user face data processing method that ipsec encryption card is cooperateed with CPU
CN103188351A (en) IPSec VPN communication service processing method and system under IPv6 environment
WO2009011621A8 (en) Method for reducing the control signaling in handover situations
WO2008051879A3 (en) Method and system for mitigating traffic congestions in a communication network
WO2005092001A3 (en) Methods and apparatus for confidentiality protection for fibre channel common transport
TW200503497A (en) Wireless network and methods for communicating in a wireless network