Method and system for implementing end-to-end media stream cryptographic key negotiation

A technology of key negotiation and media streaming, applied in transmission systems, usage of multiple keys/algorithms, and key distribution, it can solve the problems of inability to meet legal interception, inability to obtain keys, etc. Effect

Inactive Publication Date: 2008-05-07
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, only the terminals participating in the interaction can obtain the key. The terminals participating in the interaction mentioned here may be two terminals, the callin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing end-to-end media stream cryptographic key negotiation
  • Method and system for implementing end-to-end media stream cryptographic key negotiation
  • Method and system for implementing end-to-end media stream cryptographic key negotiation

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0104] Method embodiment one

[0105] In this embodiment, the encryption service is a value-added service. Both the calling terminal and the called terminal support encryption capabilities, and both have signed in advance; in this embodiment, the calling service entity is the call session control function of the service. Entity (S-CSCF), the called side call service entity is the called side S-CSCF; the calling side key application server and the called side key application server are both SIP application servers; the call response message sent by the calling terminal The SIP message header in contains precondition negotiation.

[0106] figure 2 It is a schematic diagram of the message flow of this embodiment. Such as figure 2 As shown, the method for implementing end-to-end media stream key negotiation in this embodiment includes the following steps:

[0107] Step 201: The calling terminal sends a call request message to the S-CSCF on the calling side.

[0108] The call reques...

Example Embodiment

[0175] Method embodiment two

[0176] In this embodiment, the encryption service is a value-added service. Both the calling terminal and the called terminal support encryption capabilities, but only the called terminal has signed a contract; in this embodiment, the calling side call service entity is the calling side S- CSCF, the called side calling service entity is the called side S-CSCF; the calling side key application server and the called side key application server are both SIP application servers; the SIP message header in the call response message sent by the calling terminal The precondition negotiation is not included.

[0177] image 3 It is a schematic diagram of the message flow of this embodiment. Such as image 3 As shown, the method for implementing end-to-end media stream key negotiation in this embodiment includes the following steps:

[0178] Steps 301 to 303 are the same as steps 201 to 203 in the first embodiment, and will not be repeated here.

[0179] Step...

Example Embodiment

[0194] Method embodiment three

[0195] In this embodiment, the encryption service is regarded as a basic service, and the key application server obtains encryption capability information from the call response message; in this embodiment, the calling service entity on the calling side is the calling side S-CSCF, and the called side calling service The entity is the called side S-CSCF; the calling side key application server and the called side key application server are both SIP proxy mode units in the S-CSCF; the SIP message header in the call response message sent by the calling terminal is not Contains precondition negotiation.

[0196] Figure 4 It is a schematic diagram of the message flow of this embodiment. Such as Figure 4 As shown, this embodiment includes the following steps:

[0197] Steps 401 to 409: The calling terminal sends a call request message to the called terminal. During the sending process, when the calling service entity receives the call request message,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for realizing terminal-to-terminal media stream encrypt negotiation, in details: a calling terminal calls, meanwhile an encryption application server acquires encryption capability information and distributes the information to the calling terminal and a called terminal after generating encrypt according to the acquired encryption capability. With the application of the invention scheme, the calling terminal and the called terminal do not generate encrypt by themselves, but an encryption application server generates encrypt, without clock synchronization or the support of PKI system, the complication of terminal-to-terminal media stream encrypt negotiation is greatly reduced, and the population of media stream encryption. In addition is convenient, the encryption application server can be controlled by operator, so the actual need of legal monitoring can be fulfilled.

Description

technical field [0001] The invention relates to media stream encryption technology, in particular to a method and system for realizing end-to-end media stream key negotiation. Background technique [0002] Media streams are generally transmitted based on Real-time Transport Protocol (RTP, Real-time Transport Protocol), and the media streams mentioned here are audio media streams, video media streams, and the like. However, since the RTP protocol itself does not involve security issues, there are security risks such as leaks and attacks during the transmission of media streams. [0003] In order to enhance the security of media streams during transmission, various methods for generating and distributing keys, ie, key agreement methods, have been proposed. Afterwards, the terminal can use the assigned key to transmit the media stream, so as to achieve the purpose of securely transmitting the media stream. [0004] In the prior art, there are two typical key agreement methods...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/14
Inventor 孙恺孔涛高江海黎静侯晓钧
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products