Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for examining validity of bill and network signaling node

A technology of signaling node and inspection method, applied in the field of communication

Inactive Publication Date: 2011-04-20
ZTE CORP
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] The present invention is proposed to solve the problem in the related art that the end user can use the expired key by modifying the local time or modifying the validity period of the ticket. Therefore, the main purpose of the present invention is to provide an improved method for checking the validity of the ticket and network signaling node to address at least one of the above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for examining validity of bill and network signaling node
  • Method for examining validity of bill and network signaling node
  • Method for examining validity of bill and network signaling node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Functional Overview

[0043] Considering the problem in the related art that the terminal user uses the expired key by modifying the local time or modifying the validity period of the ticket, the embodiment of the present invention provides two kinds of ticket validity checking methods and network signaling nodes. When the terminal user does not When capable of modifying the ticket, the network signaling node only needs to compare its local time with the validity period of the ticket to determine whether the ticket has expired. This scheme is simple and efficient, and can deal with low-capability attackers, but does not perform integrity checks on the bills, and cannot deal with high-capability attackers;

[0044] When the end user has the ability to tamper with the ticket, KMS sends the ticket integrity key to the network signaling node (for example, P-CSCF), so that the network signaling node can check the integrity of the received ticket, thereby preventing malicious...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method examining validity of bill and a network signaling node. The method comprises the following steps of: the network signaling node receiving a bill from a sender, determining whether the bill is valid according to the local time of the network signaling node and the validity date of the bill, or examining the integrity of the bill according to the integrity of a main key obtained. The method solves the problem that a terminal user may use an overdue secret key by modifying the local time or the validity date of the bill, thereby effectively preventing the attackers using overdue bills.

Description

technical field [0001] The invention relates to the communication field, in particular, to a ticket validity checking method and a network signaling node. Background technique [0002] At present, the media plane of the IP Multimedia Subsystem (IP Multimedia Core Network Subsystem, referred to as IMS) adopts a security mechanism based on a key management system to realize end-to-end media key negotiation. [0003] For the IMS media plane security solution based on the key management system, such as figure 1 The schematic diagram of the system network architecture shown in the figure shows that after networking, the implementation process of establishing a secure media channel between user A and user B through the IMS media security solution based on the key management system (KeyManage System, referred to as KMS) includes the following processes (step S101-step S110): [0004] Step S101: User A and user B respectively establish a secure connection with the KMS using a gene...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/10H04L29/06H04W12/0431H04W12/106
Inventor 朱允文田甜韦银星高峰
Owner ZTE CORP