Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for implementing end-to-end secure call transfer

A call transfer and secure call technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as session leaks and key leak threats, and achieve strong compatibility and easy implementation

Active Publication Date: 2017-02-08
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of this, the main purpose of the present invention is to provide a method and system for realizing end-to-end secure call transfer, so as to solve the problem of key leakage threat and session leakage threat in the existing end-to-end security technology in the call transfer scenario

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for implementing end-to-end secure call transfer
  • A method and system for implementing end-to-end secure call transfer
  • A method and system for implementing end-to-end secure call transfer

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] This embodiment describes in detail the implementation process of end-to-end secure call transfer in a single call transfer. UE-A as the calling party calls UE-B as the called party, and UE-B subscribes to the call transfer service , UE-C is preset as the transferred party. During the call establishment process, the call transfer service signed by UE-B is triggered. At this time, the specific process of realizing end-to-end secure call transfer is as follows: Figure 4 As shown, the following steps may be included:

[0081] Step 401: UE-A generates a key K1;

[0082] Step 402: UE-A sends a call request message (INVITE message) to UE-B to the intermediate network element of the IMS network, and the call request message carries the key K1 in it;

[0083] Step 403: The intermediate network element of the IMS network receives the INVITE message and forwards it to the call forwarding application server (AS) to which UE-B belongs;

[0084] Step 404: AS receives the INVITE m...

Embodiment 2

[0100] This embodiment describes in detail the specific implementation process of implementing end-to-end secure call transfer in multiple call transfers.

[0101] In this embodiment, UE-A as the calling party calls UE-B as the called party, UE-B subscribes to the call forwarding service, and the call is transferred to UE-C by default, and UE-C also subscribes to the call forwarding service service, transfer the call to UE-D, and in the session where UE-A calls UE-B, both UE-B and UE-C trigger the contracted call professional service, and the final session is transferred to UE-D. At this time, The specific process of implementing end-to-end secure call transfer is as follows: Figure 5 As shown, the following steps may be included:

[0102] Steps 501-507: Same as steps 401-407, wherein, step 507 is also optional, and is related to the call forwarding service subscribed by the user. If it is an unconditional forwarding service, step 507 can be omitted.

[0103] Step 508: The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing end-to-end safety call forwarding. The method comprises the following steps of: generating a call forwarding secret key by a call forwarding application server, and transferring the generated call forwarding secret key to a call-forwarded party; receiving a called secret key returned by the call-forwarded party, and then, sending the call forwarding secret key and the received called secret key to a calling party by the call forwarding application server; and performing encryption media stream communication between the calling party and the call-forwarded party through the call forwarding secret key and the called secret key. The invention also discloses a system for realizing the end-to-end safety call forwarding, therefore, the secrete key adopted by the encryption media stream communication between the calling party and the call-forwarded party is only known by the calling party and the call-forwarded party, secret key exposure threat or a session disclosure threat does not exist under the call forwarding scene, and the end-to-end safety call forwarding is realized in an IP multimedia subsystem (IMS).

Description

technical field [0001] The invention relates to the network communication security technology of IP Multimedia Subsystem (IMS, IP Multimedia Subsystem), in particular to a method and system for realizing end-to-end safe call transfer. Background technique [0002] In the Session Initiation Protocol (SIP, Session Initiation Protocol) system, call diversion (communication diversion) is a commonly used and practical service. The call server of the called party transfers the call to the user equipment of the transferred party set in advance by the called party, thereby improving the flexibility and configurability of the call. [0003] Call forwarding includes the following service types: Call Forwarding Busy (CFB, Communication ForwardingBusy), Call Forwarding No Response (CFNR, Communication Forwarding NoReply), Call Forwarding Unconditional (CFU, Communication Forwarding Unconditional), Paging Unreachable Forwarding (CFNRc, Communication Forwarding on Subscriber NotReachable...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/18H04L9/08H04M3/54
Inventor 田甜
Owner ZTE CORP