Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

End-to-end session key consultation method and system for supporting lawful interception

A session key and key negotiation technology, applied in the Internet field, can solve the problems of increasing the possibility of man-in-the-middle attacks, reducing the efficiency of key negotiation, and confusion of data encryption and decryption.

Inactive Publication Date: 2014-05-28
ZTE CORP
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. In "Otway-Rees", from UE A to UE B TICKETs passed between each time use the same shared root key K a encryption; if K a is not renegotiated every session, then K a easily broken, once K a is compromised, the subsequent session keys are compromised; if K a Each session is negotiated, because there are more signaling interactions during the GBA establishment process, which will reduce the efficiency of key negotiation
[0011] 2. In "Otway-Rees", the key is generated in KMS, UE A Has no control over what keys are assigned, in a multiparty session or a conference session, if the UE A Need to assign the same key to the peers, which is not possible in "Otway-Rees"
[0012] 3. In "Otway-Rees", the final session key is generated by the UE B Pass to UE A , but there is no integrity verification measure, if the intermediary modifies the encrypted key, due to the lack of integrity verification when passing the key, the UE A It is impossible to know whether the key has been modified, and a wrong key can still be decrypted, resulting in UE A and UE B Each has a different key, so that the subsequent data will be seriously confused when encrypting and decrypting, and it also increases the possibility of man-in-the-middle attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end session key consultation method and system for supporting lawful interception
  • End-to-end session key consultation method and system for supporting lawful interception
  • End-to-end session key consultation method and system for supporting lawful interception

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0118] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0119] figure 1 Shown is a schematic diagram of the system architecture of this embodiment, and the system includes a user terminal (UserEquipment, UE): UE A and UE B ; Access Server (Access Server Node, ASN): ASN1 and ASN2; and Identity Location Register (Identification Location Register, ILR): ILR A and ILR B . Among them, the terminal UE A and UE B The data link between is an insecure link, such as an IP link, so the UE A and UE B The session key cannot be passed in clear text, because the UE A It is possible to communicate with one of hundreds of millions of other users at any time, UE A It is impossible to contain the pre-shared keys of all users, so UE A Cannot use pre-shared key with UE B To establish a secure end-to-end session, it is necessary to design an end-to-end session key negotiation mechanism to solve the security ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and system for end-to-end session key negotiation which support lawful interception are disclosed. The method includes: a first terminal carries out a session root key negotiation with a first Identification Location Register (ILR) to which said first terminal belongs, generates a session root key Kas for the session and saves it; said first terminal then generates a session key according to a first parameter including a first self-generated random number and Kas, and initiates an end-to-end session key request to a second terminal; the key negotiating parameters carried in said request include a first ciphertext containing the first random number information encrypted by Kas and a first identification information of the session. The second terminal sends the received key negotiating parameters to the first ILR; using Kas, said first ILR obtains the first random number from decryption of the first ciphertext, generates the session key in the same way as the first terminal and saves the key, then sends it to the second terminal in ciphertext. The second terminal then decrypts the ciphertext and acquires the session key contained within it. The first terminal then carries out a session with the second terminal by using the session key, said session key including the session encryption key.

Description

technical field [0001] The invention relates to the Internet field, in particular to an end-to-end session key negotiation method and system supporting lawful interception. Background technique [0002] The IP-based Internet is an open network composed of networks of multiple countries and organizations. Therefore, if an end-to-end session is established, it is likely to need to pass through multiple intermediate nodes (such as routers, etc.), because these nodes may not be completely The network belongs to the same country or organization, so for highly confidential conversations, there is a possibility of being intercepted or modified by third-party illegal agencies. [0003] Therefore, in order to prevent confidential information from being stolen or modified, people usually use end-to-end encryption to conduct conversations; however, due to the needs of police information such as anti-terrorism, laws of various countries often stipulate that the business carried out by t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L9/08H04L29/06
CPCH04L63/30H04L9/0844H04L63/061H04L63/306
Inventor 张世伟田甜朱允文
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products