Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for examining validity of bill and network signaling node

A technology of signaling nodes and verification methods, applied in the field of communication

Inactive Publication Date: 2014-04-09
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] The present invention is proposed to solve the problem in the related art that the end user can use the expired key by modifying the local time or modifying the validity period of the ticket. Therefore, the main purpose of the present invention is to provide an improved method for checking the validity of the ticket and network signaling node to address at least one of the above

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for examining validity of bill and network signaling node
  • Method for examining validity of bill and network signaling node
  • Method for examining validity of bill and network signaling node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Functional Overview

[0043] Taking into account the problem in the related art that the terminal user can modify the local time or modify the validity period of the ticket to achieve the purpose of using the expired key, the embodiment of the present invention provides two methods for checking the validity of the ticket and the network signaling node. When it has the ability to modify the bill, the network signaling node only needs to compare its local time with the validity period of the bill to determine whether the bill has expired. This solution is simple to implement, efficient, and able to deal with attackers with low capabilities, but without checking the integrity of the bill, it cannot deal with attackers with high capabilities;

[0044] When the end user has the ability to tamper with the ticket, KMS sends the ticket integrity key to the network signaling node (for example, P-CSCF), so the network signaling node can perform integrity check on the received ticket, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method examining validity of bill and a network signaling node. The method comprises the following steps of: the network signaling node receiving a bill from a sender, determining whether the bill is valid according to the local time of the network signaling node and the validity date of the bill, or examining the integrity of the bill according to the integrity of a main key obtained. The method solves the problem that a terminal user may use an overdue secret key by modifying the local time or the validity date of the bill, thereby effectively preventing the attackers using overdue bills.

Description

Technical field [0001] The present invention relates to the field of communication, in particular to a method for checking the validity of a bill and a network signaling node. Background technique [0002] At present, the IP Multimedia Core Network Subsystem (IMS) media plane adopts a security mechanism based on a key management system to implement end-to-end media key negotiation. [0003] For the IMS media plane security solution based on the key management system, such as figure 1 The schematic diagram of the system network architecture is shown. After networking, the IMS media security solution based on the Key Management System (KMS), the implementation process of establishing a secure media channel between user A and user B includes the following processing (Step S101-Step S110): [0004] Step S101: User A and User B respectively adopt a general authentication mechanism (General Bootstrapping Architecture, referred to as GBA) to establish a secure connection with KMS. [0005] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/04H04W12/10H04L29/06H04W12/0431H04W12/106
Inventor 朱允文田甜韦银星高峰
Owner ZTE CORP