Method for selecting safety mechanism of IP multimedia subsystem acess field

A technology of multimedia subsystem and security mechanism, applied in the field of communication, can solve the problems of poor scalability and flexibility of security mechanism, and achieve the effect of satisfying security requirements and strong scalability

Inactive Publication Date: 2006-11-29
INVT SPE LLC
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The present invention provides a method for selecting an IP Multimedia Subsystem (IMS) access domain security mechanism to solve the problem that the existing technology can only support two IMS access domain security mechanisms, and there is poor scalability and flexibility when adding security mechanisms question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for selecting safety mechanism of IP multimedia subsystem acess field
  • Method for selecting safety mechanism of IP multimedia subsystem acess field
  • Method for selecting safety mechanism of IP multimedia subsystem acess field

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to improve the scalability and flexibility of the IMS access domain security mechanism and meet different security requirements, the present invention configures one or more access domain security mechanisms on the network equipment of the IMS network, and according to the user's request message, Select to determine the access domain security mechanism used.

[0037] The network devices in the IMS network simultaneously support the implementation of multiple access domain security mechanisms, such as Figure 3A shown. The access domain security mechanism includes authentication methods adopted for users (such as Figure 3A Digest AKA, DigestMD5, etc.) and the type of secure channel that needs to be established between the user terminal and the Proxy-Call Session Control Function (P-CSCF) entity in the IMS network (such as Figure 3A IPSec in , TLS, etc.). One or more authentication methods and one or more security channel types can be configured on the HSS f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a unified method for accessing IP Multimedia Subsystem (IMS), which distributes one or more domain access securities for the network access or / and user IDs at network equipments of IMS network; the Network equipments choose one domain access security from the distributed ones based on the above requested information of user terminal, and the network equipments of access security handle referred request information with the chosen security.

Description

technical field [0001] The invention relates to security technology in the field of communication, in particular to a selection method of an IP multimedia subsystem (IMS) access domain security mechanism. Background technique [0002] As the core session control layer of fixed and mobile networks, IP Multimedia Subsystem (IMS) has become the focus of current industry discussions. Many IMS-related specifications are defined in the third generation mobile communication system (3G) and TISPAN standards, including network Architecture, interfaces, protocols and other aspects, among which security is an important aspect considered by 3G and TISPAN. The current specification divides the IMS network into the access domain and the network domain from the perspective of security, and defines the security specifications of the access domain and the network domain respectively. The security model of the IMS network is as follows: figure 1 shown. [0003] The call session control func...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04Q7/38H04W12/06
CPCH04L29/06217H04L63/08H04L63/205H04L63/20H04W12/06H04L65/1016H04W12/069
Inventor 文楷顾炯炯
Owner INVT SPE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products