Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for multi-network guard end-to-end conversation cryptographic key negotiation of striding field

A session key and gatekeeper technology, applied to the public key and key distribution of secure communication, can solve the problem of no end-to-end key negotiation and exchange technology, no consideration of processing capacity, and difficulties in intercommunication communication security, etc. problems, to achieve the effect of increasing flexibility, preventing forgery, and simple layout

Inactive Publication Date: 2008-06-25
ZTE CORP
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it has not proposed an end-to-end key negotiation and exchange technology for cross-domain multi-gatekeepers, nor has it considered how to make full use of the processing capabilities of endpoints and gatekeepers, and how terminals with different key negotiation capabilities can dynamically negotiate a key agreement. A cryptographic method supported by both parties
Especially in the direct routing call mode of H.323 multi-gatekeeper environment, the existing terminal equipment has multiple methods for establishing session keys, and it is impossible to pre-configure the communication between the two endpoints. Security creates difficulties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for multi-network guard end-to-end conversation cryptographic key negotiation of striding field
  • Method for multi-network guard end-to-end conversation cryptographic key negotiation of striding field

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0032] To illustrate the method of the present invention, the following symbols are referenced to represent endpoint and gatekeeper capabilities, or a combination of both, or to distinguish between calling / called endpoints maintaining a shared secret.

[0033] the symbol

Meaning

[0034] ″I0″

Indicates that the calling endpoint does not support D-H, and the calling or called gatekeeper does not support the D-H key exchange algorithm.

″I1″

Used in the independent ClearToken handed over to the calling endpoint, indicating that this ClearToken contains the shared secret.

″I2″

It is used in the independent ClearToken delivered to the called endpoint, indicating that this ClearToken contains the shared secret.

″I3″

Indicates that the calling endpoint does not support the D-H ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-domain multi network keeper end-to-end session key negotiation method, which dynamically negotiates a best key negotiation method in the end-to-end communication through signaling execution flows of ARQ / ACF and LRQ / LCF based on that whether D-H key exchange algorithm and security strategy are supported by the network keepers. The method comprises the following steps: a called network keeper generates a sharing secret, a calling network keeper and a calling endpoint obtain the session key according to the sharing secret, and the calling network keeper and the called network keeper generate the session key by using the D-H key exchange algorithm, thereby the generation and the exchange of the sharing secret or the session key are carried out among each endpoint, thus the limits of low efficiency and bad interconnection and interoperability, which are caused by the fact that the key negotiation method is based on pre-configuration, are overcome under the prior cross-domain multi network keeper end-to-end calling mode.

Description

technical field [0001] The invention relates to the field of packet network communication security, in particular to an end-to-end communication session key negotiation method in a cross-domain multi-gatekeeper direct routing call mode. Background technique [0002] In the field of packet-based network communication security, the key is the most important. The shared or session key obtained through key exchange between H.323 endpoints on the network can be used for RAS (registration, access and status) signaling, Call signaling, H.245 control signaling, etc. implement security measures such as identity verification, signaling message integrity check, and encryption / decryption of media data streams. [0003] At present, the method of sharing or session key exchange in multi-gatekeeper routing mode basically adopts pre-configuration and out-of-band methods such as telephone and E-Mail. [0004] The Direct Routing Call (hereinafter referred to as DRC) mode is an important meth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/12H04L29/06H04L9/30H04L12/46H04L12/56
Inventor 卢忱王云峰陈剑勇胡焰龙张则宝
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products