Key negotiation method, key management server and terminal

A technology of key management and key negotiation, which is applied in key distribution to reduce the transmission of signaling and ensure the security of media streams

Active Publication Date: 2011-04-20
ZTE CORP
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention is proposed in view of the potential safety hazard caused by KMS-based IMS media security reduction in signaling overhead in the re

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method, key management server and terminal
  • Key negotiation method, key management server and terminal
  • Key negotiation method, key management server and terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0058] Example one

[0059] Figure 7 It is a flowchart of a common end-to-end key agreement method according to an embodiment of the present invention, such as Figure 7 As shown, the method includes the following steps S701 to S707:

[0060] In step S701, the calling party IMS user A first determines a bill policy, and adopts a corresponding method according to the policy to generate corresponding parameters.

[0061] From step S702 to step S703, user A generates a random number Ra, writes Ra into the OR payload Ea (Ra||ID-A||ID-B) in TICKET, and then puts ID-A, ID-B and TICKET in TRANSFER_INIT message, and put the TRANSFER_INIT message in the SIP INVITE message and send it to user B through the IMS network, where Ea(Ra||ID-A||ID-B) is the shared secret key Ka encrypted by user A and KMS Ra ||ID-A||ID-B, where ID-A and ID-B are the public user IDs of users A and B respectively. In addition, BTIDa needs to be carried in the plaintext, which is used to instruct KMS to go to BSF to o...

Example Embodiment

[0068] Example two

[0069] Figure 8 It is a flowchart of a method for key negotiation in a Forking scenario according to an embodiment of the present invention, such as Figure 8 As shown, the method includes the following steps S801 to S810:

[0070] Step S801: First, the calling party IMS user A determines a bill policy, and adopts a corresponding method according to the policy to generate corresponding parameters.

[0071] From step S802b to step S803b, user A generates random number Ra, writes Ra into OR payload Ea (Ra||ID-A||ID-R) in TICKET, and then puts ID-A, ID-R and TICKET into TRANSFER_INIT message, and put the TRANSFER_INIT message in the SIP INVITE message and send it to user B through the IMS network, where Ea (Ra||ID-A||ID-R) is the shared secret key Ka encrypted by user A and KMS Ra ||ID-A||ID-R, where ID-A and ID-R are the public user identifications of the calling user and the called user respectively. In addition, BTIDa must be carried in the plaintext, which is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key negotiation method, a key management server and a terminal. The method comprises the steps of: receiving the first information from the called party by the key management server KMS, wherein the first information carries the first load encrypted by the first shared key between the calling party corresponded to the called party and KMS and the second load encrypted bythe second shared key between the called party and KMS, generating media root key needed by the calling party and the called party by KMS according to the first information, and encrypting the media root key and sending to the called party, so as to send the encrypted media key to the calling party conveniently by the called party. The invention solves the problem of the potential safety hazard caused by the minimizing signaling cost based on IMS media safety of the KMS in the correlated technology, reduces the transmission of the signaling, and guarantees the safety of end-to-end media stream.

Description

technical field [0001] The present invention relates to the field of communication, in particular, to a key agreement method, a key management server and a terminal. Background technique [0002] In the latest technical specification TS33.328v0.1.1 of the 3rd Generation Partnership Project (3rd Generation Partnership Project, referred to as 3GPP) about Internet Protocol (Internet Protocol, referred to as IP) multimedia subsystem (IPMultimediaSubsystem, referred to as IMS) media security, proposed Use the key management server-based solution to protect the end-to-end security of IMS media streams. The scheme in TS33.328 is based on the concept of key management server (Key Management Server, referred to as KMS) and ticket (ticket). The implementation process of this scheme is as follows: first, the session caller requests the relevant key and a ticket from the KMS, and the caller The relevant key requested by KMS is stored in the ticket after being encrypted; after obtaining...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
Inventor 田甜韦银星朱允文高峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products