Method and system for realizing safe bifurcation call session in IP multimedia subsystem

A technology for calling sessions and calling parties, applied in transmission systems, digital transmission systems, secure communication devices, etc., and can solve the problems that media streams cannot be encrypted and protected, no key negotiation mechanism is provided, and no real processing volume is solved. Achieve the effect of alleviating storage computing requirements, reducing computing processing capacity requirements, and reducing computing processing pressure

Inactive Publication Date: 2010-06-02
ZTE CORP
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method does not provide a new key agreement mechanism, but only reduces the requirements for the processing capacity of the call terminal. Moreover, since the key agreement has not been completed when the answer is made, the media stream at this time cannot be protected by encryption, which introduces another A new delay problem for the calling terminal and the answering terminal to negotiate the media key after answering
Therefore, this method of adding a delay mechanism cannot realize the key negotiation on the one hand, and on the other hand, it does not really solve the problems of large processing capacity and high computational requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing safe bifurcation call session in IP multimedia subsystem
  • Method and system for realizing safe bifurcation call session in IP multimedia subsystem
  • Method and system for realizing safe bifurcation call session in IP multimedia subsystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The KMS in this article does not specifically refer to a certain device, but is a general term for a trusted third party used to implement key management and distribution.

[0076] Figure 4 The flow chart of the method for realizing safe bifurcation call session of the present invention, as Figure 4 Shown, the inventive method comprises the following steps:

[0077] Step 400: the calling party and each called party respectively authenticate with the KMS and obtain their respective shared keys with the KMS.

[0078] The two parties in the call establish a secure trust relationship with KMS through GBA or other methods; through the establishment of the trust relationship between the two parties in the call and KMS, the two parties in the call also establish a mutual trust relationship, that is, a shared key. The specific implementation of this step belongs to the technical means commonly used by those skilled in the art, and will not be repeated here. A shared key is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for realizing a safe bifurcation call session in an IP multimedia system. In the invention, based on Otway Rees key agreement protocol, a key agreement system is provided and is enabled to realize the safe bifurcation call session in the IP multimedia subsystem (IMS). When a called party receives a call, a slave calling key management server (KMS) acquires a media root key K used for deriving media keys; then based on a random number and the media root key K which are derived by each called party, each called party and each calling party can derive a media key respectively by utilizing a media key deviation function (KDF). The media key of each called party is unique and cannot be learned by other terminals, thereby realizing media safety of the bifurcation call session. The invention has simple logic, reduces computing and processing pressure of the calling party, interacts less with a KMS signaling, relieves storage and computation requirements for the KMS, and excellently provides the safety protection for ensuring the bifurcation call session for the IMS.

Description

technical field [0001] The invention relates to network communication security technology, in particular to a method and a system for realizing safe bifurcation call session based on the Otway-Rees key negotiation protocol in an IP multimedia subsystem (IMS). Background technique [0002] In the Session Initiation Protocol (SIP) system, forking call session (Forking call) is a very useful service, which enables multiple terminals of the called party to be called at the same time, thus improving the probability of call connection . IMS uses the SIP protocol as the control protocol for various IP multimedia services. In the technical specifications of IMS media security, forking call sessions have been listed as a very important user scenario, and corresponding security requirements have also been proposed. [0003] Figure 1a and Figure 1b They are schematic diagrams of two scenarios of the existing forked call session respectively. in, Figure 1a It is the case that the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04M7/00
CPCH04L9/0822H04L9/0833H04L9/321
Inventor 田甜朱允文韦银星滕志猛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products