FIELD: protection of data transmission.
SUBSTANCE: method comprises steps of: obtaining, using a user device, a session security policy; wherein the session security policy is used to indicate the session data security mode between the user device and the network access node; obtaining, using the user device, at least one key; using a user device, protecting security of session data for a session using said at least one key based on said session policy to obtain secure data and transmitting, using the user device, secure session data to the network access node.
EFFECT: securing session data based on a security policy indicating a security mode for a session between a user node and an access node.
27 cl, 26 dwg
Title |
Year |
Author |
Number |
METHOD OF CONFIGURING KEY, METHOD OF DETERMINING SECURITY POLICY AND DEVICE |
2017 |
|
RU2719447C1 |
SAFETY PROTECTION METHOD, DEVICE, AND NETWORK ACCESS DEVICE |
2019 |
- Li, He
- Chen, Jing
- Qiu, Liwei
- Lou, Chong
|
RU2782345C2 |
METHOD FOR DECENTRALIZED DISTRIBUTION OF KEY INFORMATION |
2019 |
- Reshotka Aleksandr Vladimirovich
- Chizhikov Vladimir Ivanovich
- Sabin Vladislav Olegovich
|
RU2716207C1 |
SYSTEMS AND A METHOD FOR PROTECTING THE SECURITY OF NAS MESSAGES |
2019 |
|
RU2772709C1 |
INTERACTION AND INTEGRATION OF VARIOUS NETWORKS OF RADIO ACCESS |
2015 |
- Norrman, Karl
- Vikberg, Jari
- Stattin, Magnus
- Johansson, Niklas
- Teyeb, Oumer
- Mestanov, Filip
|
RU2669780C2 |
SYSTEM, METHOD AND AIR INTERFACE DATA PROCESSING MEANS |
2013 |
- U Tszyantszyun
- Pen Chenkhoj
- Chzhan Vej
|
RU2615500C2 |
METHOD, DEVICE AND SYSTEM FOR UPDATING A BOND KEY IN A COMMUNICATION NETWORK FOR ENCODED COMMUNICATION WITH PROVISION APPLICATIONS |
2020 |
- Yu, Shilin
- Tsaj, Tsziyan
- Lyu, Yujtsze
- Pen, Tszin
- Yuj, Vantao
- Lin, Chzhaotszi
- Mao, Yujsin
- Lyu, Tszyankhua
|
RU2801267C1 |
SECURITY ON THE ACCESS LEVEL IN WIRELESS COMMUNICATIONS |
2018 |
- Wifvesson, Monica
- Saarinen, Pasi
- Torvinen, Vesa
- Nakarmi, Prajwol, Kumar
|
RU2743578C1 |
SOLVING PROBLEM OF PERMISSION TASKS OF AUTHENTICATION PROCEDURE DURING TRANSITION TO NETWORK WITH CHANNEL SWITCHING (CSFB) FOR REDUCING CALL SET-UP TIME |
2015 |
- Shan, Chang Hong
- Parron, Jerome
|
RU2644386C1 |
METHOD AND DEVICE FOR PROTECTING DATA INTEGRITY |
2018 |
- Lou, Chong
- Huang, Qufang
- Liu, Xing
|
RU2767778C2 |