Transport layer security TLS chain building method, user equipment, server and system

A technology for transport layer security and user equipment, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems that affect the competitiveness of cloud servers and poor equipment performance, and achieve the effect of reducing the number of authentications and improving performance

Active Publication Date: 2020-07-24
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the context of Network Function Virtualization (NFV), the encryption performance of the media plane directly affects the competitiveness of cloud servers, and redundant authentication exists during RCS sessions, resulting in poor device performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Transport layer security TLS chain building method, user equipment, server and system
  • Transport layer security TLS chain building method, user equipment, server and system
  • Transport layer security TLS chain building method, user equipment, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The method, client, server, and system for establishing a secure TLS link at the transport layer provided by the embodiments of the present invention can be applied to the RCS session of the rich communication suite. When both the signaling plane and the media plane are carried by TLS, the signaling plane needs to be completed first. The TLS link is established, and the two-way identity authentication between the user equipment (User Equipment, UE) and the server is completed during the link establishment process, and the Session Initiation Protocol (Session Initiation Protocol, SIP) is completed on the TLS link of the link establishment; When establishing a TLS link on the media plane, the authentication result during TLS link establishment on the signaling plane can be used to save the two-way identity authentication process between the client and server during TLS link establishment on the media plane, thus greatly improving device performance.

[0070] The following ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a method for building a secure TLS link at the transport layer. The method includes: generating authentication mode information when the signaling negotiation is completed, and using the anonymous key exchange algorithm when the authentication mode information is used to indicate the medium transport layer secure TLS link building ; When building a secure TLS link at the media transport layer, determine the first message according to the authentication method information, and send the first message to the server, so that the server returns the second message according to the first message, wherein the first message The message is a request message for establishing handshake communication with the server; the second message is a response message returned by the server; the second message is received, and the media transport layer security TLS link is established according to the second message. Based on the embodiment of the present invention, by using the result of TLS link building on the signaling plane to instruct the media plane to use an anonymous algorithm in the process of TLS link building, the number of authentications between the user equipment and the server is reduced, and the performance of the system is improved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a method and a system for reducing the number of Transport Layer Security (TLS) authentications through session protocol (Session Initiation Protocol, SIP) negotiation. Background technique [0002] Rich Communication Suite (Rich Communication Suite, RCS) is a core service set that is commercially available, implementable and interoperable, and based on IP Multimedia Subsystem (IP Multimedia Subsystem, IMS) communication, jointly advocated by nearly a hundred operators and manufacturers in the GSMA standard organization. Meet the needs of operators to quickly provide converged communication and social services in the Internet era. Based on the MSRP protocol, related services such as picture sharing, file transfer and chatting are realized. [0003] During RCS service processing, the user equipment (User Equipment, UE) and network equipment are usually carried by Transport Layer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/08
CPCH04L9/0869H04L63/0421H04L63/061H04L63/0876H04L69/326H04L2463/061H04L65/1104
Inventor 张晋李珲
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products