Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementing system and implementing method for securely sending delay media

A technology for sending delays and implementing systems, which is applied in transmission systems, digital transmission systems, and key distribution, and can solve problems such as unsatisfied, no implementation plans, and no solutions given

Inactive Publication Date: 2010-06-02
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0040] According to the above process, it can be seen that compared with the IMS media security solution based on TBS, the IMS media security solution based on the Otway Rees protocol has a relatively simple logic. KMS contacts to obtain the media key, therefore, there is relatively little signaling interaction with KMS, but a feasible solution based on Otway-Rees delayed media transmission is not given in the technical document of 3GPP's IMS media security
[0041] To sum up, no matter whether the IMS media security solution based on TBS or Otway Rees protocol is used, there is no detailed and complete process for securely sending delayed media in the case of delayed media transmission, so it cannot meet the requirements of the called user terminal when it is not logged in. In the offline state, the calling user terminal sends delayed media data to the security requirements of the called user terminal
At present, there is no effective implementation plan for this security requirement.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementing system and implementing method for securely sending delay media
  • Implementing system and implementing method for securely sending delay media
  • Implementing system and implementing method for securely sending delay media

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The basic idea of ​​the present invention is: the calling user terminal initiates a request to the mailbox server of the called user, and obtains K through the mailbox server of the called user; the mailbox server of the called user receives the request, and obtains only the K that the user terminal can decrypt.

[0091]The implementation of the technical solution will be further described in detail below in conjunction with the accompanying drawings.

[0092] A realization system for safely sending delayed media, the system includes: an existing KMS, a calling user terminal, and a mailbox server of a called user. Wherein, the calling user terminal is used to initiate a request to the mailbox server of the called user, obtain K through the mailbox server of the called user, and realize sending the delayed media data securely. The mailbox server of the called user is used to receive the request, and obtain K through the KMS that only the calling user terminal can decryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementing system for securely sending delay media. In the system, a calling user terminal is used for initiating a request to a mailbox server of a called user, and acquiring a media key (K) through the mailbox server of the called user; and the mailbox server of the called user is used for receiving the request and acquiring the K which can only be decrypted by the calling user terminal through a key management server (KMS). The invention also discloses an implementing method for securely sending the delay media. The method comprises the following steps that: the calling user terminal initiates the request to the mailbox server of the called user, and acquires the K through the mailbox server of the called user; and the mailbox server of the called user receives the request, and acquires the K which can only be decrypted by the calling user terminal through the interaction with the KMS. The system and the method of the invention implement secure sending of delay media data, and can meet the security requirement that the calling user terminal sends the delay media data to a called user terminal in an off-line state when the called user is not logged in.

Description

technical field [0001] The invention relates to network communication security technology, in particular to a system and method for realizing safe transmission of delayed media in an IP Multimedia Subsystem (IMS). Background technique [0002] In the media security technology of IMS, the security requirement of sending delayed media data needs to be solved as soon as possible. This situation generally occurs when user A sends media data to user B, but user B is offline. There are many reasons for user B to be offline, such as user B shutting down, user B not logging in, or user B not in service District etc. Since user B is unreachable, in this scenario, the key agreement mechanism in which both parties are online cannot be used, but a trusted third-party key management server (KMS) must be introduced to realize the sharing between the two parties in an asynchronous manner. key. For this consideration, the existing KMS-based key negotiation and distribution solutions incl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/58H04L9/08
Inventor 朱允文韦银星林兆骥滕志猛
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products