Abstract:
A method for preventing Spam over Internet Telephony (SPIT), includes: a terminal receives a call request of a calling user; the terminal sets an identifier of the calling user into a SPIT reporting request upon receipt of the call request; and sends the SPIT reporting request to a server in response to an instruction of a called user that the call request is the SPIT.
Abstract:
A method, device for identifying service flows and a method, system for protecting against a denial of service attack are provided. The method for identifying service flows includes: detecting a user access to a target system; dynamically generating a set of user identifier information according to the detected user access to the target system and a preset user access statistical model; when the service flow needs to be identified, extracting the user identifier information from the service flow; comparing the extracted user identifier information with the user identifier information in the set of user identifier information to determine whether they are matched; determining whether the service flow is legal service flow according to the comparison result.
Abstract:
The present invention discloses a method for determining encryption algorithm used in security communication based on Mobile Country Code (MCC) number. In this method, a Mobile Country Code (MCC) number list is preset in a Core Network (CN), and all the MCC numbers of those countries or service providers adopting the same self-developed encryption algorithms as those adopted by the homeland are stored in this MCC number list. When a User Equipment (UE) is calling or being called, the UE sends an International Mobile Subscriber Identifier (IMSI) information of the current subscriber to the CN, and the CN parses the information and extracts the MCC number after receiving the IMSI information. The CN compares the extracted MCC number of the current subscriber with elements of the MCC number list one by one, if the MCC number of the current subscriber is identical with a certain MCC number in the MCC number list, the CN selects the domestic self-developed encryption algorithm; if the MCC number of the current subscriber is not identical with any MCC number in the MCC number list, the CN selects an available standard encryption algorithm for the security communication. The CN sends the UEA of the selected encryption algorithm to an access network; then the access network sends the UEA of the selected encryption algorithm to the UE. The present method not only allows the coexistence of standard encryption algorithms and self-developed encryption algorithm, but also simplifies the process of encryption algorithm selection. Accordingly, the subscriber interest and service quality is guaranteed.
Abstract:
A method for implementing data service security in a mobile communication system includes: obtaining security condition of a user terminal based on security-relevant configuration information reported by the user terminal; determining a security policy for the user terminal based on the security-relevant configuration information of the user terminal and security policy information stored, and sending the security policy determined to a packet service support node and/or the user terminal; implementing, by the packet service support node and/or the user terminal, a control process based on the security policy. The method, system and apparatus provided by the embodiments of the present invention introduce a security mechanism cooperated by the mobile communication network and a user terminal to effectively prevent the mobile communication network against viruses.
Abstract:
This invention provides a method and system for network security control. A server at the network side analyzes local security correlation information collected and reported by terminal devices, and determines a security strategy according to the result of the analysis. Since correlative reacting between the network side and the terminal side is implemented and the security strategy is established according to the information from the terminal devices, threats against security from a terminal device can be resisted from the beginning. A relative large number of information sources can be taken into account when determining the security strategy such that the determined security strategy is more reasonable and accurate. Furthermore, a differential security service can be provided for terminal devices with different subscriber levels. This invention also provides a method and system for preventing junk mails based on the concept of correlative reacting between a terminal and a server.
Abstract:
A method for identifying the primary cell under Site Selective Diversity Transmit comprises the steps of: (1) An ID is assigned by the system to each cell; (2) The ID indicating the primary cell is transmitted periodically by UE to the connected cells via the up link FBI fields; (3) The ID indicating the primary cell transmitted by the mobile station is received by the base station, if the signals received by the base station satisfy with one of the following conditions, then the said base station will consider itself as a primary cell; the identification conditions are: A. The ID code word indicating the primary cell received by the base station is matched with the ID code word of itself; B. The quality of the up link signals received does not satisfy with a quality threshold Qth, at the same time, there is a certain matching degree between the received ID code word indicating the primary cell and the ID code word of the cell itself; and C. The bits of dropping of the ID code word caused by using the up link compression mode excess a limitation. The signals transmitted form some of the non-primary cells having extremely bad quality to UE can be prevented, thereby the system interference is reduced, and the system stability and the system capacity are increased.
Abstract:
The invention discloses a power control method for the multiple time-slot power control pattern in a CDMA system. The method pre-stores two encoded symbols which correspond to the all “1” and all “0” TPC commands respectively. Based on whether the current TPC command is identical with the last TPC command, the receiving end determines whether sending the original TPC command or the encoded TPC command. In the transmitting end, based on consistent degree of the received N TPC command data group and the encoded symbol, a corresponding power control mode is determined. The invention replaces the all “0” or all “1” TPC command with an encoded symbol, so the reliability of a TPC command is raised and the performance of power control is improved.
Abstract:
A system and method for generating analog-digital mixed chaotic signal and an encryption communication method thereof are provided. In the system and method, the complementarity between continuous chaotic systems (12, 22) and digital chaotic systems (11, 21) are reasonably utilized. In specific, the digital chaotic systems, which are separated from each other, control the local continuous chaotic systems respectively, so as to enable the continuous chaotic systems, which are also separated from each other, to stably and synchronously work for a long time. Thus, there is no need to transmit the synchronizing signal, and as a result the anti-attack capability is increased effectively. Further, the continuous chaotic systems disturb the local digital chaotic systems to prevent the digital chaotic systems from degradation. This compensates the drawbacks of digital chaotic systems.
Abstract:
A message forwarding method includes: receiving a SIP registration request message carrying a contact address; obtaining the contact address carried in the SIP registration request message; and determining that the contact address is one of SIP proxy server addresses in a network stored in advance; and executing an abnormal process on the SIP registration request message. The present invention also discloses a network device. The message forwarding method and network device in the present invention can prevent a SIP loop attack.
Abstract:
A method for implementing security communication. A bit for representing CI is added, and a judge process for the CI and encryption algorithm supported by both the current subscriber and network is added. If the CN supports more than one encryption algorithm, if the CI is 1 and a standard encryption algorithm is supported by both UE and CN, the standard encryption algorithm is determined as the encryption algorithm for security communication: otherwise, the communication is disconnected; if the CI is 0 and a self-developed non-standard encryption algorithm is supported by both UE and CN, the encryption algorithm is determined as the encryption algorithm for security communication; otherwise, the communication is disconnected. If the CN only supports the standard encryption algorithm, if this algorithm is also supported by UE, this standard encryption algorithm is determined as the encryption algorithm for security communication directly; otherwise, the communication is disconnected.