Unlock instant, AI-driven research and patent intelligence for your innovation.
A method and system for implementing end-to-end secure call transfer
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A call transfer and secure call technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as session leaks and key leak threats, and achieve strong compatibility and easy implementation
Active Publication Date: 2017-02-08
ZTE CORP
View PDF3 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0009] In view of this, the main purpose of the present invention is to provide a method and system for realizing end-to-end secure call transfer, so as to solve the problem of key leakage threat and session leakage threat in the existing end-to-end security technology in the call transfer scenario
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0080] This embodiment describes in detail the implementation process of end-to-end secure call transfer in a single call transfer. UE-A as the calling party calls UE-B as the called party, and UE-B subscribes to the call transfer service , UE-C is preset as the transferred party. During the call establishment process, the call transfer service signed by UE-B is triggered. At this time, the specific process of realizing end-to-end secure call transfer is as follows: Figure 4 As shown, the following steps may be included:
[0081] Step 401: UE-A generates a key K1;
[0082] Step 402: UE-A sends a call request message (INVITE message) to UE-B to the intermediate network element of the IMS network, and the call request message carries the key K1 in it;
[0083] Step 403: The intermediate network element of the IMS network receives the INVITE message and forwards it to the call forwarding application server (AS) to which UE-B belongs;
[0084] Step 404: AS receives the INVITE m...
Embodiment 2
[0100] This embodiment describes in detail the specific implementation process of implementing end-to-end secure call transfer in multiple call transfers.
[0101] In this embodiment, UE-A as the calling party calls UE-B as the called party, UE-B subscribes to the call forwarding service, and the call is transferred to UE-C by default, and UE-C also subscribes to the call forwarding service service, transfer the call to UE-D, and in the session where UE-A calls UE-B, both UE-B and UE-C trigger the contracted call professional service, and the final session is transferred to UE-D. At this time, The specific process of implementing end-to-end secure call transfer is as follows: Figure 5 As shown, the following steps may be included:
[0102] Steps 501-507: Same as steps 401-407, wherein, step 507 is also optional, and is related to the call forwarding service subscribed by the user. If it is an unconditional forwarding service, step 507 can be omitted.
[0103] Step 508: The ...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a method for realizing end-to-end safety call forwarding. The method comprises the following steps of: generating a call forwarding secret key by a call forwarding application server, and transferring the generated call forwarding secret key to a call-forwarded party; receiving a called secret key returned by the call-forwarded party, and then, sending the call forwarding secret key and the received called secret key to a calling party by the call forwarding application server; and performing encryption media stream communication between the calling party and the call-forwarded party through the call forwarding secret key and the called secret key. The invention also discloses a system for realizing the end-to-end safety call forwarding, therefore, the secrete key adopted by the encryption media stream communication between the calling party and the call-forwarded party is only known by the calling party and the call-forwarded party, secret key exposure threat or a session disclosure threat does not exist under the call forwarding scene, and the end-to-end safety call forwarding is realized in an IP multimedia subsystem (IMS).
Description
technical field [0001] The invention relates to the network communication security technology of IP Multimedia Subsystem (IMS, IP Multimedia Subsystem), in particular to a method and system for realizing end-to-end safe call transfer. Background technique [0002] In the Session Initiation Protocol (SIP, Session Initiation Protocol) system, call diversion (communication diversion) is a commonly used and practical service. The call server of the called party transfers the call to the user equipment of the transferred party set in advance by the called party, thereby improving the flexibility and configurability of the call. [0003] Call forwarding includes the following service types: Call Forwarding Busy (CFB, Communication ForwardingBusy), Call Forwarding No Response (CFNR, Communication Forwarding NoReply), Call Forwarding Unconditional (CFU, Communication Forwarding Unconditional), Paging Unreachable Forwarding (CFNRc, Communication Forwarding on Subscriber NotReachable...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.