Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method of safety authentication between media gateway and media gateway controller

A media gateway and security authentication technology, applied in the field of authentication management, can solve problems such as network system paralysis, equipment flooding, and impossibility of implementation, and achieve the effect of preventing repeated attacks, preventing counterfeiting events, and a wide range of applications

Inactive Publication Date: 2008-07-16
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1) Counterfeit media gateways, pretending to be real media gateways to make calls, but the call charges are included in the accounts corresponding to the real media gateways, so that the security of user call charges cannot be guaranteed
[0004] 2) When attacking MGC, the security of the system cannot be guaranteed, and it is easy to cause illegal and counterfeit devices to be included in the management; Paralysis of the network system
[0008] From a security point of view, although H.248 considers IP-based security, for the solution using IPSec, the protection of the underlying IPSec can only ensure the security of the transport layer, and cannot prevent users from the security of the high-level H.248, especially Illegals forge the security of legitimate users
As for the scheme of adding the AH header in H.248, although identity authentication can be performed, on the one hand, this scheme has not proposed a clear implementation process at present, so it cannot be implemented at all; Illegal forgery also cannot play a role in resisting copying attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of safety authentication between media gateway and media gateway controller
  • A method of safety authentication between media gateway and media gateway controller
  • A method of safety authentication between media gateway and media gateway controller

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039]The basic idea of ​​the present invention is to separate the shared authentication key negotiation and determination process from the authentication process in the entire security authentication process between the MG and the MGC, and perform each relatively independently. More specifically: after determining the shared authentication key of both parties, further use the determined shared authentication key and the random number randomly generated by the MGC to calculate the respective signatures used for authentication and current use by the MG or MGC, Then, by comparing the signature currently used by oneself with the signature used by the other party for authentication, the legitimacy of the other party can be judged, thereby completing the authentication of the other party's security identity. The above ideas can better realize the management of the security authentication mechanism.

[0040] During the negotiation and determination of the shared authentication key, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety certification method between media gateway and media gateway controller. MGC and share cryptographic key corresponding MG are set in advance at the MG and MGC. The method also includes that the MG and the MGC utilize the share cryptographic key and the random number generated at random to finger out and confirm share rights identification cryptographic key used for both sides; after the confirming of the identification cryptographic key, the MGC and the MG utilize the confirmed share rights identification cryptographic key, random number generated initially, and the confirmed digital signature algorithm to doing rights identify that means each of the signatures which are used in certification and at present is fingered out, and the other party is confirmed whether he is legal by comparing the own signature used at present to the signature which the other party uses in certification. If both of them are legal, the rights identification is success, otherwise failure. This method can insure illegal media gateway can not rightly access the media gateway controller to use, meanwhile ensue the illegal media gateway controller can not be applied in network.

Description

technical field [0001] The invention relates to authentication management technology, in particular to a method for security authentication between a media gateway and a media gateway controller based on the media gateway control protocol. Background technique [0002] In the next generation network (NGN), there are many media gateways (MG) that support the media gateway control protocol. The media gateway control protocol here refers to the MGCP protocol, the H.248 protocol, the H.323 protocol and the session initiation ) and other protocols, the MG is connected through a softswitch media gateway controller (MGC) to implement IP voice services. These gateway devices are distributed in enterprises or users' homes, and have the characteristics of wide coverage, large number, and based on dynamic IP. Here, the MGCP protocol is a media gateway control standard formulated by the Internet Engineering Task Force (IETF), the H.248 protocol is a media gateway control protocol formu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/66H04L9/32H04L12/24H04L29/02
Inventor 郑志彬魏强
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products