Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for secure communication

A secure communication and security technology, applied in the information field, can solve the problem of low security

Active Publication Date: 2016-08-03
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the user equipment and the P-CSCF generate an IPsecSA group through CK and IK, and perform secure communication through the IPsecSA group, since the user equipment and the P-CSCF obtain a set of shared keys CK and IK, an IPsecSA group is generated, and the user The device and the P-CSCF can only securely encrypt the information exchanged between the user equipment and the P-CSCF through this IPsecSA group, resulting in low security for encrypting the information exchanged between the user equipment and the P-CSCF. Resulting in less secure communication between the UE and the P-CSCF

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for secure communication
  • Method and device for secure communication
  • Method and device for secure communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] An embodiment of the present invention provides a secure communication method, which is applied to a secure communication system, such as figure 1 As shown, the secure communication system includes: user equipment, proxy call session control function (English full name: Proxy-CallSessionControlFuntion, English abbreviation: P-CSCF), inquiry call session control function (English full name: Interrogating-CallSessionControlFuntion, English abbreviation: I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for secure communication, and relates to the technical field of information .The security of encryption of mutual information between a user device and a P-CSCF can be improved, and therefore the security of communication between the user device and P-CSCF can be improved .The method comprises the following steps that a service-call session control function (S-CSCF) sends requesting information of obtaining an authentication vector to a home subscriber server (HSS); the HSS determines a root key corresponding to impi according to impi, multiple sets of shared keys are generated according to the root keys, the multiple sets of shared keys are sent to a proxy-call session control function (P-CSCF), and the P-CSCF generates multiple internet protocol security security association (IPsec SA) sets according to the multiple sets of shared keys; the P-CSCF sends the multiple generated IPsec SA sets to the user device, so that different IPsecSAs are adopted for communication between the user device and the P-CSCF .The method and device for secure communication are applicable to secure communication between the user device and the P-CSCF according to the different IPsec SA sets.

Description

technical field [0001] The present invention relates to the field of information technology, in particular to a method and device for secure communication. Background technique [0002] Users need to perform IMS-Authentication and Key Agreement (English full name: AuthenticationandKeyAgreement, English abbreviation: AKA) before providing services through the Internet Protocol Multimedia Subsystem (English full name: Internet Protocol Multimedia Subsystem, English abbreviation: IMS) network. Registration to implement security authentication of the user equipment to the network and the network to the user equipment. Among them, the IMS-AKA registration includes: initial registration and authentication registration, the initial registration is for the user equipment to perform security authentication on the network, and the authentication registration is for the network to perform security authentication on the user equipment, after the authentication is successful, the connect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/08H04L63/164H04L65/1016
Inventor 张子敬
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD