Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for implementing end-to-end media stream cryptographic key negotiation

A technology of key negotiation and media streaming, applied in transmission systems, usage of multiple keys/algorithms, and key distribution, it can solve the problems of inability to meet legal interception, inability to obtain keys, etc. Effect

Inactive Publication Date: 2008-05-07
HUAWEI TECH CO LTD
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, only the terminals participating in the interaction can obtain the key. The terminals participating in the interaction mentioned here may be two terminals, the calling terminal and the called terminal, or multiple terminals. Any third party other than the interaction cannot obtain the key, that is, cannot meet the requirements of legal interception

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for implementing end-to-end media stream cryptographic key negotiation
  • Method and system for implementing end-to-end media stream cryptographic key negotiation
  • Method and system for implementing end-to-end media stream cryptographic key negotiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0105] In this embodiment, the encryption service is a value-added service, and both the calling terminal and the called terminal support the encryption capability, and both have signed a contract in advance; in this embodiment, the call service entity on the calling side is the call session control function Entity (S-CSCF), the call service entity of the called side is the called side S-CSCF; the key application server of the calling side and the key application server of the called side are both SIP application servers; the call response message sent by the calling terminal The SIP message header in contains the precondition negotiation.

[0106] figure 2 is a schematic diagram of message flow in this embodiment. Such as figure 2 As shown, the method for implementing end-to-end media stream key negotiation in this embodiment includes the following steps:

[0107] Step 201: the calling terminal sends a call request message to the calling side S-CSCF.

[0108] The call r...

Embodiment 2

[0176] In this embodiment, the encryption service is a value-added service. Both the calling terminal and the called terminal support the encryption capability, but only the called terminal has signed a contract; CSCF, the call service entity of the called side is the called side S-CSCF; the key application server of the calling side and the key application server of the called side are both SIP application servers; the SIP message header in the call response message sent by the calling terminal does not include precondition negotiation.

[0177] image 3 is a schematic diagram of message flow in this embodiment. Such as image 3 As shown, the method for implementing end-to-end media stream key negotiation in this embodiment includes the following steps:

[0178] Steps 301 to 303 are the same as steps 201 to 203 in Embodiment 1, and will not be repeated here.

[0179] Step 304: The key application server on the calling side records the encryption capability infor...

Embodiment 3

[0195] In this embodiment, the encryption service is regarded as a basic service, and the key application server obtains the encryption capability information from the call response message; The entity is the called side S-CSCF; the calling side key application server and the called side key application server are both SIP proxy mode units in the S-CSCF; the SIP message header in the call response message sent by the calling terminal does not contain Contains precondition negotiation.

[0196] Figure 4 is a schematic diagram of message flow in this embodiment. Such as Figure 4 As shown, this embodiment includes the following steps:

[0197] Steps 401 to 409: The calling terminal sends a call request message to the called terminal. During the sending process, when the calling service entity on the calling side receives the call request message, it filters the call request message according to the filter criteria obtained in advance , and send the call request mess...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a system for realizing terminal-to-terminal media stream encrypt negotiation, in details: a calling terminal calls, meanwhile an encryption application server acquires encryption capability information and distributes the information to the calling terminal and a called terminal after generating encrypt according to the acquired encryption capability. With the application of the invention scheme, the calling terminal and the called terminal do not generate encrypt by themselves, but an encryption application server generates encrypt, without clock synchronization or the support of PKI system, the complication of terminal-to-terminal media stream encrypt negotiation is greatly reduced, and the population of media stream encryption. In addition is convenient, the encryption application server can be controlled by operator, so the actual need of legal monitoring can be fulfilled.

Description

technical field [0001] The invention relates to media stream encryption technology, in particular to a method and system for realizing end-to-end media stream key negotiation. Background technique [0002] Media streams are generally transmitted based on Real-time Transport Protocol (RTP, Real-time Transport Protocol), and the media streams mentioned here are audio media streams, video media streams, and the like. However, since the RTP protocol itself does not involve security issues, there are security risks such as leaks and attacks during the transmission of media streams. [0003] In order to enhance the security of media streams during transmission, various methods for generating and distributing keys, ie, key agreement methods, have been proposed. Afterwards, the terminal can use the assigned key to transmit the media stream, so as to achieve the purpose of securely transmitting the media stream. [0004] In the prior art, there are two typical key agreement methods...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/14
Inventor 孙恺孔涛高江海黎静侯晓钧
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products