Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key negotiation method, key management server and terminal

A technology of key management and key negotiation, which is applied in key distribution to reduce the transmission of signaling and ensure the security of media streams

Active Publication Date: 2011-04-20
ZTE CORP
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention is proposed in view of the potential safety hazard caused by KMS-based IMS media security reduction in signaling overhead in the related art. Therefore, the main purpose of the present invention is to provide a key agreement solution to solve at least one of the above-mentioned problems one

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method, key management server and terminal
  • Key negotiation method, key management server and terminal
  • Key negotiation method, key management server and terminal

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0059] Figure 7 is a flowchart of a method for common end-to-end key agreement according to an embodiment of the present invention, such as Figure 7 As shown, the method includes the following steps S701 to S707:

[0060] In step S701, the caller IMS user A first determines the ticket policy, takes corresponding methods according to the policy, and generates corresponding parameters.

[0061] From step S702 to step S703, user A generates a random number Ra, writes Ra into TICKET in OR payload Ea(Ra||ID-A||ID-B), and then puts ID-A, ID-B and TICKET into TRANSFER_INIT message, put the TRANSFER_INIT message in the SIP INVITE message and send it to user B through the IMS network, where Ea(Ra||ID-A||ID-B) is Ra| encrypted by the shared secret key Ka of user A and KMS |ID-A||ID-B, where ID-A and ID-B are the public user IDs of users A and B respectively. In addition, BTIDa needs to be carried in the plain text, which is used to instruct KMS to go to the BSF to obtain the A's sh...

example 2

[0069] Figure 8 is a flowchart of a method for key agreement in a Forking scenario according to an embodiment of the present invention, such as Figure 8 As shown, the method includes the following steps S801 to S810:

[0070] Step S801: First, the caller IMS user A determines the ticket policy, takes a corresponding method according to the policy, and generates corresponding parameters.

[0071] From step S802b to step S803b, user A generates random number Ra, writes Ra into TICKET in OR payload Ea(Ra||ID-A||ID-R), and then puts ID-A, ID-R and TICKET into TRANSFER_INIT message, put the TRANSFER_INIT message in the SIP INVITE message and send it to user B through the IMS network, where Ea(Ra||ID-A||ID-R) is Ra| encrypted by the shared secret key Ka of user A and KMS |ID-A||ID-R, where ID-A and ID-R are the public user IDs of the calling user and the called user respectively. In addition, the plain text also needs to carry BTIDa, which is used to instruct KMS to go to BSF to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key negotiation method, a key management server and a terminal. The method comprises the steps of: receiving the first information from the called party by the key management server KMS, wherein the first information carries the first load encrypted by the first shared key between the calling party corresponded to the called party and KMS and the second load encrypted bythe second shared key between the called party and KMS, generating media root key needed by the calling party and the called party by KMS according to the first information, and encrypting the media root key and sending to the called party, so as to send the encrypted media key to the calling party conveniently by the called party. The invention solves the problem of the potential safety hazard caused by the minimizing signaling cost based on IMS media safety of the KMS in the correlated technology, reduces the transmission of the signaling, and guarantees the safety of end-to-end media stream.

Description

technical field [0001] The present invention relates to the field of communication, in particular, to a key agreement method, a key management server and a terminal. Background technique [0002] In the latest technical specification TS33.328v0.1.1 of the 3rd Generation Partnership Project (3rd Generation Partnership Project, referred to as 3GPP) about Internet Protocol (Internet Protocol, referred to as IP) multimedia subsystem (IPMultimediaSubsystem, referred to as IMS) media security, proposed Use the key management server-based solution to protect the end-to-end security of IMS media streams. The scheme in TS33.328 is based on the concept of key management server (Key Management Server, referred to as KMS) and ticket (ticket). The implementation process of this scheme is as follows: first, the session caller requests the relevant key and a ticket from the KMS, and the caller The relevant key requested by KMS is stored in the ticket after being encrypted; after obtaining...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
Inventor 田甜韦银星朱允文高峰
Owner ZTE CORP
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More