Safety interacting method for user terminal access softswitch system

A technology of user terminal and interaction method, which is applied in the field of secure interactive two-way authentication and key distribution, which can solve problems such as low password security and replay attacks, and achieve the effects of avoiding algorithm instability, avoiding attacks, and meeting communication security requirements

Inactive Publication Date: 2010-02-10
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the security system of the communication system, there are already some security authentication processes, but due to the design problems of these processes, some processes will suffer from replay attacks or the password security is relatively low due to password negotiation problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety interacting method for user terminal access softswitch system
  • Safety interacting method for user terminal access softswitch system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The implementation of the technical solution will be further described in detail below in conjunction with the accompanying drawings.

[0028] see figure 1 As shown in the figure, it describes the schematic diagram of the softswitch network access domain. Among them, SS (Soft Switch) refers to the soft switch core control device 101, SP (Signing Point) refers to the access control point 102, Client refers to the user terminal 103, and AUC (Authentication Center) refers to the security authentication server / authentication center 104; figure 1 The dotted line 105 in the figure means that the security authentication parameters of each functional entity are stored on the security authentication server AUC 104, while the solid line 106 indicates the communication connection relationship between each functional entity.

[0029] exist figure 1 Among them, in the IP network architecture based on softswitch technology, there is at least one softswitch core control device 101;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Being applicable to soft switching system based on IP network, the disclosed method includes following steps: (1) setting up user terminal authentication security parameter group (ASPG) on user terminal, and setting up access control point ASPG on access control point; setting up user terminal authentication authorization parameter group corresponding to user terminal ASPG, and setting up access control point authentication authorization parameter group corresponding to access control point ASPG on security authentication server (SAS); (2) through access control point, user terminal is connected to soft switching core control device (SSCCD); (3) user terminal carries out authentication for system, and access control point carries out security protection for message between user terminal and SSCCD; SAS carries out security access authentication for user terminal. The invention enhances requirement of security, and reduces attack on SSCCD.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a method for secure interactive bidirectional authentication and key distribution of a user terminal securely accessing a system in an access domain in a system such as a soft switch based on an IP communication network. Background technique [0002] With the maturity of IP communication technologies such as softswitches, voice technology based on IP networks has been more and more used in enterprise networks and public networks. Due to the developmental design concept of IP networks, there are some Security issues, especially in the access domain of systems such as softswitches, due to the uncontrollable network, account theft, device deception, system hijacking, and illegal wiretapping of communications are particularly prominent. In response to these security issues, it is required that the terminal is connected to a system such as a softswitch to authenticate the user te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/14
Inventor 权海斌吴晨曹刚胡宪利
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products