Check patentability & draft patents in minutes with Patsnap Eureka AI!

A secure communication negotiation method and device

A secure communication and security technology, applied in the field of communication, can solve the problems of reducing user satisfaction, unfair and unreasonable users, adverse communication security, etc., and achieve the effect of improving user satisfaction

Active Publication Date: 2015-09-16
ZTE CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Obviously, the above-mentioned processing method is obviously inappropriate, especially when both parties or any party in the communication support the security encryption capability of the media plane and pay for encrypted communication, and the called party does not support the e2ae security capability due to its network reasons , the communication established between the calling party and the called party does not have any media plane protection, and both the calling party and the called party may not know it, which is unfair and unreasonable to the user, and it is not Conducive to communication security, will significantly reduce user satisfaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure communication negotiation method and device
  • A secure communication negotiation method and device
  • A secure communication negotiation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] figure 2 with image 3 In the e2ae security scenario, the peer terminal does not support any media plane security capabilities from the end to the access gateway. in figure 2 For the call process, the specific steps are:

[0043] Step 201: UE A sends an SDP request (SDP offer) to P_CSCF, and the SDP offer includes SDES key attribute, and the key attribute includes key K11. The SDP Offer indicates that users need the security capabilities of e2ae.

[0044] Step 202: The P_CSCF interacts with the IMS access gateway on the media plane to allocate required resources.

[0045] Step 203: P-CSCF changes the received SDP Offer, changes the transmission method from Secure Real-time Transport Protocol (SRTP) to Real-time Transport Protocol (RTP), and deletes the security attribute of SDES, and then sends the changed SDP Offer to S -CSCF.

[0046] Step 204: The S-CSCF forwards the received SDP Offer to the called party network.

[0047] Step 205: The S-CSCF receives an SD...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a method and device for security communication negotiation. When a called user device or its own network does not support security capability of end to access edge, a calling user device and the called user device process media plane security negotiation and communicate according to a negotiated key. The media plane security negotiation is usually processed in the security scenario of end to access edge. The media plane security negotiation includes the steps as follows: the calling user device carries a security capability parameter in the conversation initiating request, wherein the security capability parameter indicates a required security capability of the calling user device; the called user device or its own network returns a conversation response message which carries a security capability parameter, wherein the security capability parameter indicates the security capability supported by the called user device or its own network. The negotiation method and device for security communication mode of the present invention can realize the negotiation of security communication mode among the communication participators and improve the user satisfaction.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for secure communication negotiation. Background technique [0002] At present, from a security point of view, IMS (IP Multimedia System) media plane security is divided into end-to-end (e2e) security and end-to-access edge (end to access edge, e2ae) security. The deeper the media security endpoint goes into the network, the better, that is, the e2e security level is higher than the e2ae security level. [0003] figure 1 It is a typical case of end-to-access edge, that is, the network architecture diagram from end (user equipment) to IMS media access gateway; figure 1 In , the solid line is the media flow path, and the dotted line is the signaling path. The UE is the sender of the media information; P-CSCF (Proxy-Call Session Control Function) and S-CSCF (Serving-Call Session Control Function) are IMS network elements. [0004] 3GPP TS 33.328v9.0.0 uses the SDES ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L65/1069H04L63/20H04L65/1016H04L65/1046H04L65/1045
Inventor 田甜朱允文韦银星
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More