METHOD OF CONFIGURING KEY, METHOD OF DETERMINING SECURITY POLICY AND DEVICE Russian patent published in 2020 - IPC H04W12/00 

Abstract RU 2719447 C1

FIELD: electrical communication engineering.

SUBSTANCE: invention relates to determining security policy in a mobile communication network. Method comprises steps of: obtaining, by a network session control element in a communication network, a security requirement, wherein security requirement is configured to indicate whether integrity protection is required; determining, by a network session control element, a security policy based on a security requirement, wherein the security policy is configured to indicate whether integrity protection is required; and, by a network session control element, sending a security policy to the base station.

EFFECT: technical result is enabling the session control element in the communication network to determine a security policy based on safety requirements.

12 cl, 5 tbl, 21 dwg

Similar patents RU2719447C1

Title Year Author Number
METHOD OF IMPLEMENTING SAFETY, DEVICE AND SYSTEM 2018
  • Zhang, Bo
  • Wu, Rong
  • Gan, Lu
RU2728893C1
SECONDARY AUTHENTICATION OF USER DEVICE 2017
  • Ben Henda, Noamen
  • Castellanos Zamora, David
  • Torvinen, Vesa
RU2755258C2
SECURITY ON THE ACCESS LEVEL IN WIRELESS COMMUNICATIONS 2018
  • Wifvesson, Monica
  • Saarinen, Pasi
  • Torvinen, Vesa
  • Nakarmi, Prajwol, Kumar
RU2743578C1
TRANSMISSION OF USER DATA THROUGH THE CONTROL PLANE IN THE COMMUNICATION SYSTEM USING DESIGNATED TYPES OF PAYLOAD CONTAINERS 2020
  • Lyu Dzhennifer Dzh-N.
RU2788399C1
SYSTEMS AND A METHOD FOR PROTECTING THE SECURITY OF NAS MESSAGES 2019
  • Lyu Dzhennifer
RU2772709C1
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY 2017
  • Novak, Mark, F.
RU2756040C2
WIRELESS COMMUNICATION 2016
  • Wifvesson Monica
  • Pfeffer Katharina
  • Karlsson Magnus
  • Ben Henda Noamen
  • Lehtovirta Vesa
  • Torvinen Vesa
RU2688251C1
METHOD FOR TERMINAL INFORMATION TRANSMISSION AND CORRESPONDING PRODUCTS 2018
  • Tang, Hai
RU2760869C1
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY 2017
  • Novak, Mark, F.
RU2756048C2
GENERATION OF CRYPTOGRAPHIC KEY 2008
  • Norrman Karl
  • Neslund Mats
RU2480925C2

RU 2 719 447 C1

Authors

Zhang, Bo

Wu, Rong

Gan, Lu

Dates

2020-04-17Published

2017-05-05Filed