Key negotiation method, key management server and terminal
A technology of key management and key negotiation, which is applied in key distribution to reduce the transmission of signaling and ensure the security of media streams
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0058] Example one
[0059] Figure 7 It is a flowchart of a common end-to-end key agreement method according to an embodiment of the present invention, such as Figure 7 As shown, the method includes the following steps S701 to S707:
[0060] In step S701, the calling party IMS user A first determines a bill policy, and adopts a corresponding method according to the policy to generate corresponding parameters.
[0061] From step S702 to step S703, user A generates a random number Ra, writes Ra into the OR payload Ea (Ra||ID-A||ID-B) in TICKET, and then puts ID-A, ID-B and TICKET in TRANSFER_INIT message, and put the TRANSFER_INIT message in the SIP INVITE message and send it to user B through the IMS network, where Ea(Ra||ID-A||ID-B) is the shared secret key Ka encrypted by user A and KMS Ra ||ID-A||ID-B, where ID-A and ID-B are the public user IDs of users A and B respectively. In addition, BTIDa needs to be carried in the plaintext, which is used to instruct KMS to go to BSF to o...
Example Embodiment
[0068] Example two
[0069] Figure 8 It is a flowchart of a method for key negotiation in a Forking scenario according to an embodiment of the present invention, such as Figure 8 As shown, the method includes the following steps S801 to S810:
[0070] Step S801: First, the calling party IMS user A determines a bill policy, and adopts a corresponding method according to the policy to generate corresponding parameters.
[0071] From step S802b to step S803b, user A generates random number Ra, writes Ra into OR payload Ea (Ra||ID-A||ID-R) in TICKET, and then puts ID-A, ID-R and TICKET into TRANSFER_INIT message, and put the TRANSFER_INIT message in the SIP INVITE message and send it to user B through the IMS network, where Ea (Ra||ID-A||ID-R) is the shared secret key Ka encrypted by user A and KMS Ra ||ID-A||ID-R, where ID-A and ID-R are the public user identifications of the calling user and the called user respectively. In addition, BTIDa must be carried in the plaintext, which is ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap