Check patentability & draft patents in minutes with Patsnap Eureka AI!

Access control method and device

An access control and message technology, applied in the field of communication, can solve problems such as inability to respond to service requests in a timely manner, low security of network communication, and damage to the integrity of bills, etc., to reduce the probability of denial of service attacks, improve security, and reduce the number of Effect

Inactive Publication Date: 2011-05-11
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In the process of realizing the above, if an attacker intercepts the ticket of user A, tampers the intercepted ticket, destroys the integrity of the ticket, and sends a large number of tampered tickets to user B, the user B will send The large number of tampered bills are sent to KMS, which makes KMS unable to respond to the service request of user B in time, and suffers a denial of service attack, resulting in low security of network communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and device
  • Access control method and device
  • Access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] In this embodiment, one master key is used to generate note data encryption key information and note integrity encryption key information. For ease of description, the master key in this embodiment is called TPK, and the two key information generated by the above-mentioned TPK are called Ke and Ka.

[0075] The generation process of MIKEY-TICKET is as follows:

[0076] Check the integrity of the entire MIKEY-TICKET according to MPK, Ka and RAND to get the MAC;

[0077] Using Ka to encrypt the MPK;

[0078] Use Ke to encrypt information other than the MPK in the KEMAC field.

[0079] The initiator sends the MIKEY-TICKET, and when the network signaling node in the network receives the MIKEY-TICKET, its processing flow is as follows, as follows: Figure 4 Shown:

[0080] Step 401, according to the configured corresponding relationship between the MIKEY-TICKET key identifier and TPK, obtain the master key corresponding to the MIKEY-TICKET.

[0081] The MIKEY-TICKET key...

Embodiment 2

[0097] In this embodiment, two master keys are used to generate the ticket data encryption key information and the ticket integrity encryption key information respectively, wherein the two master keys are independent of each other. For ease of description, the above two key information are referred to as TPKe and TPKa.

[0098] The generation process of MIKEY-TICKET is as follows:

[0099] Check the integrity of the entire MIKEY-TICKET according to MPK, Ka and RAND to get the MAC;

[0100] Using TKa to encrypt the MPK;

[0101] Use TKe to encrypt other information in the KEMAC field except MPK.

[0102] The initiator sends the MIKEY-TICKET, and when the network signaling node in the network receives the MIKEY-TICKET, its processing flow is as follows, as follows: Figure 5 Shown:

[0103] Step 501, according to the corresponding relationship between the configured MIKEY-TICKET key identifier and TPKa, obtain the decrypted MPK from the MIKEY-TICKET;

[0104] Step 502: Perf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method and an access control device, and relates to the field of communication. The method and the device can reduce transmission of incomplete bills through a network. The access control method comprises that: a network signaling node receives an MICKEY message sent by a first user to a second user for establishing communication connection; the network signaling node verifies if the MICKEY message is complete; and if the MICKEY message is complete, the network signaling node allows the first user to access the second user.

Description

technical field [0001] The present invention relates to the communication field, in particular to an access control method and device. Background technique [0002] In the IP Multimedia Subsystem (IP Multimedia Subsystem, IMS), in order to protect the secure transmission of media streams between end-to-end, a Key Management System (Key Management System, KMS) is configured in the IMS system, and the KMS is responsible for providing User authentication, key generation and other functions. Take KMS as an example to protect the communication connection between user A and user B in the IMS system, wherein the user A and the user B respectively establish a secure channel with the KMS using a GBA (Generic bootstrapping architecture) mechanism, such as figure 1 Shown: [0003] Step 1. The user A applies to the KMS for a first media key and an encrypted ticket for communicating with the user B, and the encrypted ticket includes a second media key and user B's information, wherein ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 朱允文田甜韦银星高峰
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More