Unlock instant, AI-driven research and patent intelligence for your innovation.

Improved identifying and key consultation method for IP multimedia sub-system

A technology of multimedia subsystem and key negotiation, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve the problems of increasing signaling overhead, difficulty in serial number management, inability to distinguish serial numbers, etc., and achieve improvement. Redirection attacks, the effect of resisting damage to the network, and the effect of resisting redirection attacks

Inactive Publication Date: 2009-10-14
ZTE CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] (2). Vulnerable to active attacks in the destructive network
[0015] (3). Serial number management is difficult
Because the sequence number is not in the correct range does not necessarily mean that the counter SQN HSS The failure may also be caused by the attacker replaying a pair of used RAND and AUTN, and the out-of-order use of the authentication vector in the S-CSCF may also cause synchronization failure, but the user cannot distinguish the real cause of the serial number error
Also, fake resyncs add signaling overhead and may delete unused authentication vectors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved identifying and key consultation method for IP multimedia sub-system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The implementation of the improved protocol scheme will be further described in detail below with reference to the accompanying drawings.

[0034] The improved IP multimedia subsystem authentication and key negotiation method of the present invention, such as figure 1 shown, it includes the following steps:

[0035] (1) The user equipment sends a session initiation protocol registration information to the proxy call session control function, which includes the IP multimedia private identity and the IP multimedia public identity. The proxy call session control function and the inquiry call session control function send the Session Initiation Protocol registration message to the serving call session control function; if the IP Multimedia Public Identity IMPU is not registered in the S-CSCF, then the S-CSCF sets the registration flag in the HSS. Indeterminate, which means that the initial registration is in progress or not completed successfully. If the IMPU is registere...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An improved IP multimedia subsystem authentication and key negotiation method of the present invention, the method includes the following steps: the user equipment checks the correctness of the MAC address, if the authentication fails, the user rejects the network; otherwise the user continues to verify the correctness of the MAC address included in the authentication Whether the SQN or RNidx in the flag is acceptable; if the verification is successful, the user equipment will calculate the RES and send it to the proxy CSCF, and the user equipment will also calculate the encryption key and the integrity key; the proxy CSCF will send the message Sent to the Query-CSCF, which requests the Home Subscriber Server to give the address of the Serving-CSCF; the Query-CSCF sends the RES to the Serving-CSCF. The method of the invention eliminates the redirection attack, network camouflage and serial number management difficulties in the prior art, and improves the security.

Description

technical field [0001] The present invention relates to an authentication and key agreement method in the communication field, and more particularly, to an improved authentication and key agreement (IMS AKA) method of an IP multimedia subsystem in the communication field. Background technique [0002] The 3rd Generation Mobile Communication Partnership Project (3GPP) is working on the definition of the third generation mobile communication standard based on WCDMA, which can provide high-speed mobile communication services based on the circuit domain and the packet domain. In order to ensure the interoperability of IP real-time and non-real-time services in fixed networks and mobile networks, the 3GPP organization defines an IP multimedia subsystem (IP multimedia subsystem, hereinafter referred to as IMS) in the packet domain. In IMS, authentication and key agreement use a mechanism similar to UMTS (Universal Mobile Land System) Authentication and Key Agreement (AKA), which i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 吕东旭芦东昕陈璟
Owner ZTE CORP