Security interaction method for the roam terminals to access soft switching network system

A network system and terminal access technology, which is applied in the field of communication security, can solve problems such as low password security and replay attacks, and achieve the effects of meeting communication security requirements, avoiding attacks, and enhancing security

Inactive Publication Date: 2011-05-11
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in the security system of the communication system, there are already some security authentication processes, but due to the design problems of these processes, some processes will suffer from replay attacks or the password security is relatively low due to password negotiation problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security interaction method for the roam terminals to access soft switching network system
  • Security interaction method for the roam terminals to access soft switching network system
  • Security interaction method for the roam terminals to access soft switching network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The implementation of the technical solution will be further described in detail below in conjunction with the accompanying drawings.

[0032] see figure 1 As shown in FIG. 1 , it is a schematic diagram of a nomadic terminal accessing a softswitch network system according to the present invention. Among them, H-SS (Homed-Soft Switch) refers to the core control device 101 of the home soft switch, V-SS (Visit-Soft Switch) refers to the core control device 102 of the soft switch in the nomadic area, and V-SP (Visited-Signaling Proxy ) refers to the nomadic land access control point 103, Client refers to the nomadic terminal 104, and AuC (Authentication Center) refers to the security authentication server / authentication center 105.

[0033] exist figure 1 Among them, in the IP Network network architecture based on softswitch technology, there is at least one home softswitch core control device 101; at least one nomadic softswitch core control device 102; one or more nomad...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method comprises: 1) setting up a roaming terminal authentication security parameter set on the roaming terminal while setting up a roaming terminal authentication authorization parameter set corresponding to said roaming terminal authentication security parameter set on the security authentication server; when the roaming terminal accesses, said authentication server generates a relevant authentication authorization parameter set used by the access point to authenticate the roaming terminal; 2) said roaming terminal is allowed to access the soft-switch cored control unit at visited place via said access point; said visited place soft switch core control unit accesses said security authentication server via the home location soft switch core control unit; 3) making bi-directional authentication.

Description

technical field [0001] The invention relates to the field of communication security, in particular to a method for secure interactive bidirectional authentication and key distribution of a nomadic terminal secure access system in a network system such as a soft switch based on an IP (Internet Protocol, Internet Protocol) communication network. Background technique [0002] With the maturity of IP communication technologies such as softswitches, voice technology based on IP networks has been more and more used in enterprise networks and public networks. Due to the developmental design concept of IP networks, there are some Security issues, especially in the access domain of systems such as softswitches, due to the uncontrollable network, account theft, device deception, system hijacking, and illegal wiretapping of communications are particularly prominent. In view of these security issues, nomadic terminals are required to be authenticated by systems such as terminals connect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 胡宪利吴晨权海斌
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products