Safety grade arranging method

A technology of security level and algorithm, applied in the field of communication and information security, which can solve the problem of indeterminate algorithm, etc.

Active Publication Date: 2006-04-26
ZTE CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Different algorithms can achieve the same security strength. Therefore, in the third step of SIP negotiation, the two parties may encounter more than on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety grade arranging method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] Such as figure 1 As shown in the method flow of the present invention, it is assumed that entities A and B carry out security level negotiation, A is the calling party, and B is the called party, and the negotiation process specifically includes the following five steps:

[0016] In the first step, A sends the list of security levels it supports to B;

[0017] In the second step, B compares the list sent by A, and B selects the highest security level and its algorithm parameters among the security levels supported by both parties and sends it to A;

[0018] In the third step, A checks whether the received choice of B is in its own list, and if it is correct, A establishes a secure communication channel between the two parties; otherwise, the negotiation fails;

[0019] In the fourth step, A uses the opened secure channel to send back the received choice of B to B;

[0020] In the fifth step, B verifies the choice of B sent by A. If it is confirmed that it is the origi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a negotiation method for security level, which comprises: sending self-selected clear security level to opposite party in second-step information of SIP by improving prior art; in the third step, creating security communication channel according to the level; fourth step, the transmitter echoes received opposite selected security level; in fifth step, the receiver checks and affirms opposite response. This invention eliminates the probable ambiguity problem, and fit to both equal and asymmetric negotiations.

Description

technical field [0001] The invention is applicable to the fields of communication and information security, and specifically relates to a method for security negotiation. Background technique [0002] Security information negotiation is the basis for establishing a security channel and providing security services. Before the communication starts, it is often necessary to negotiate the security mechanism and algorithm that can be adopted between the communicating objects. In the value-added security service system, the terminal uses the value-added security service through the security level, and the security level needs to be negotiated between the terminal and the policy server / terminal to confirm the security protocols and algorithms jointly supported by the system and the terminal. [0003] In the SIP protocol, a security negotiation method is proposed, which consists of five steps to achieve the purpose of security parameter negotiation between client and server. In th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00
Inventor 张峰陈剑勇陈璟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products