Method and device for safely consulting session key

A session key and security technology, applied in security devices, secure communication devices, and key distribution, can solve the problems of simple algorithm, unfeasible, easy to be cracked, etc., to ensure the security of voice calls, not easy to be stolen, The effect of reducing system overhead

Inactive Publication Date: 2010-07-28
ZTE CORP
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] However, each of the above three methods has disadvantages that cannot be ignored. Among them, the disadvantages of the preset shared key method are: simple algorithm, poor security, and easy to be cracked; the disadvantages of the public key method are: PKI system is required support, and the PKI system currently used in the communication field has yet to be established, so this method is not feasible for the time being; the disadvantage of this method of DH exchange is: although the security is high, due to the complexity of the algorithm, and each call before A DH exchange is required, so the amount of calculation is too large, which seriously affects the performance of the system
Due to these reasons, the voice security guarantee in the current NGN system is difficult to achieve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for safely consulting session key
  • Method and device for safely consulting session key
  • Method and device for safely consulting session key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make those skilled in the technical field of the present invention understand the present invention more clearly, the implementation process of the present invention will now be described in detail in conjunction with the accompanying drawings.

[0043] image 3 A schematic diagram of securely negotiating a session key for the present invention, such as image 3 As shown, the method for safely negotiating a session key of the present invention includes the following steps:

[0044] In step A, after AG successfully registers with SS, the two obtain shared keys KEY-AG and KEY-SS respectively, and store the shared keys in themselves.

[0045] Step B, before each session of the registered AG, the SS allocates an SK for the session according to the request of the AG, and encrypts the allocated SK with the shared key KEY-SS;

[0046] Among them, the SS side encrypts the SK according to the formula (1):

[0047] KEY-SALT=MD5(KEY-SS, SK) (1)

[0048] The encrypt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for safely consulting a session key, comprising the following steps of: respectively acquiring a sharing key by an access gateway and a soft switch after the access gateway successfully registers to the soft switch, and respectively storing the sharing key in the access gateway and the soft switch; distributing the session key to sessions by using the soft switch according to the request of the access gateway before the registered access gateway carries out the session each time, and encrypting the session key distributed each time by using the sharing key, and then transmitting the encrypted session key to the access gateway; decrypting the encrypted session key by using the sharing key after the access gateway receives the encrypted session key each time so that the session key is acquired. The invention also provides a device for safely consulting the session key. The invention can further ensure the security of voice conversation when ensuring the security of the key, and has easy implementation.

Description

technical field [0001] The invention relates to key processing technology, in particular to a method and device for safely negotiating a session key. Background technique [0002] In the next generation network (NGN) system, in order to reduce construction costs and facilitate user access, operators transmit VoIP signaling and media data through the Internet. Since the Internet Protocol (IP) network is an open network, its security is not high. Therefore, in order to prevent the user's phone from being eavesdropped, it is necessary to encrypt the media stream transmitted in the session to ensure the security of the voice call. The key is called a session key (SK, Session Key). [0003] At present, there are mainly two ways of negotiating a session key in the prior art: point-to-point direct negotiation and Soft Switch (SS) key distribution. [0004] figure 1 It shows an example of two access gateways (AGs) directly negotiating to obtain an SK through point-to-point negoti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04
CPCH04L9/0838H04L9/08
Inventor 梁丽
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products