This application provides a key configuration method in which session management network elements receive end-to-end communication requests and obtain security policies based on user security requirements of the user equipment preset in the home user server, business security requirements from the user equipment, security capability requirements supported by the user equipment, and security capabilities from the operator network. Force requirements and at least one determination of the security requirements of the device at the other end of the end-to-end communication. The session management network element acquires a protection key for protecting the end-to-end communication, which is determined according to the security policy and the shared key between the user equipment and the operator network. Session management network elements send security policies and/or protection keys to devices at both ends of end-to-end communication. It can be seen that session management network elements can configure session protection keys for end-to-end devices, thus improving the security of end-to-end communication.
【技术实现步骤摘要】
【国外来华专利技术】PCT国内申请,说明书已公开。
【技术保护点】
PCT国内申请,权利要求书已公开。
【技术特征摘要】
【国外来华专利技术】2016.07....
【专利技术属性】
技术研发人员:张博,吴荣,甘露,
申请(专利权)人:华为技术有限公司,
类型:发明
国别省市:广东,44
还没有人留言评论。发表了对其他浏览者有用的留言会获得科技券。