Unlock instant, AI-driven research and patent intelligence for your innovation.

Certifying method based on identity, method, equipment and system for secure communication

An authentication method and identity technology, applied in the field of network communication, can solve problems such as difficulty in guaranteeing user information security and poor security, and achieve the effect of ensuring business use and user experience, and enhancing security

Inactive Publication Date: 2010-01-13
HUAWEI TECH CO LTD +1
View PDF0 Cites 60 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The security of the existing identity-based password mechanism for SIP authentication is not good, and the security of user information is difficult to guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certifying method based on identity, method, equipment and system for secure communication
  • Certifying method based on identity, method, equipment and system for secure communication
  • Certifying method based on identity, method, equipment and system for secure communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] The embodiment of the present invention provides an identity-based authentication method. The method takes the sending party Alice sending a SIP request message to the receiving party Bob as an example. The IDs of Alice and Bob are respectively Alice@proxyA.com and Bob@proxyB.com, The ID is their respective public keys Kp, and Alice and Bob have applied to their respective private key generation centers (Private KeyGenerator, PKG) to generate private keys Ks, see figure 1 , the authentication process of implementing the SIP authentication scheme based on the identity-based password mechanism includes:

[0038] 101: Alice sends a SIP request message to Bob. In order for Bob to authenticate herself, Alice uses the private key Ks to sign the field indicating Alice's identity and other additional fields in the request message. These fields include at least From, To and Date; The signature is placed in the Identity field, and the signature algorithm Hess used is placed in th...

Embodiment 2

[0048] An embodiment of the present invention provides an identity-based authentication method, which includes:

[0049] The recipient receives the message, and the message carries the signature of the specified field in the message, where the private key used for the signature is generated according to the sender's identity and public key additional parameters;

[0050] The receiver verifies the signature using the sender's identity and public key as additional parameters.

[0051] The sender's public key in the embodiment of the present invention can be selected by the sender itself, and the public key can be composed of the sender's identifier and additional parameters of the public key. When the message is a SIP message, the identifier of the sender can be the AoR (Address of Record, address record) value in the From field in the SIP message, which is determined during registration and is fixed during message delivery Yes, the additional parameter of the public key can be...

Embodiment 3

[0095] Some services have high requirements on the confidentiality of SIP messages, and the contents of the messages can be further encrypted. The embodiment of the present invention provides a secure communication method, see image 3 , the method includes:

[0096] 301: Alice sends a public parameter request message to PPS_B;

[0097] 302: PPS_B returns the public parameters of PPS_B to Alice after receiving the public parameter request message;

[0098] The public parameters of PPS_B are used when encrypting the message. If Alice saves the public parameters of PPS_B, it is not necessary to perform 301 and 302 to obtain its public parameters, that is, 301 and 302 are optional steps. Of course, the public parameters of PPS_B can also be obtained once and used multiple times. In the embodiment of the present invention The description of the public parameters can refer to the second embodiment, which will not be described in detail here;

[0099] 303: Alice sends an encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a certifying method based on identity, a method, equipment and a system for secure communication, and belongs to the technical field of network communication. The method comprises the following steps that: a receiving party receives a message, wherein the message carries signature of a given field in the message, and the signature uses a private key which is generated according to identification of a transmitting party and an additional parameter of a first public key; and the receiving party certifies the signature by using the identification of the transmitting party and the additional parameter of the first public key. The system comprises equipment of the transmitting party and equipment of the receiving party. The invention also provides a secure communication method, the equipment of the transmitting party and the equipment of the receiving party. The methods, the equipment and the system can realize identification and integrity protection on the message through taking the identification of the user and the additional parameter of the public key as the public key of the user and using the public key to sign the corresponding private key, and ensure normal service application and user experience without changing identification of the user when a signer reveals own private key and applies a new private key.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to an identity-based authentication method, a secret communication method, equipment and a system. Background technique [0002] Application layer protocol--SIP (Session Initiation Protocol, Session Initiation Protocol) is a call control protocol in an IP network. Its basic functions are to create, modify and terminate sessions, and to support user mobility. Combined with other protocols, SIP can provide multimedia communication services such as audio, video and instant messaging on the Internet. At present, SIP has been widely used in important communication mechanisms such as message services and third-generation communication network core network signaling systems. [0003] Before using the SIP protocol to establish a session, the user is required to be legal, that is, the user needs to be authenticated. There are currently several SIP security technologies, amon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L29/08H04L29/06
Inventor 江为强高洪涛辛阳杨亚涛杨义先
Owner HUAWEI TECH CO LTD