Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implementation method, equipment and system of secure communication service

A technology of secure communication and implementation method, which is applied in the field of information security, can solve the problem of low security of user communication services, achieve the effect of improving security and meeting the needs of communication with different security levels

Active Publication Date: 2015-06-03
CHINA MOBILE COMM GRP CO LTD
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a method, device, and system for implementing a secure communication service to solve the current problem of low security of user communication services caused by the inability to implement secure communication services based on various key management schemes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation method, equipment and system of secure communication service
  • Implementation method, equipment and system of secure communication service
  • Implementation method, equipment and system of secure communication service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0106] Such as Figure 4 As shown, it is a schematic flowchart of the implementation method of the secure communication service in Embodiment 1 of the present invention, and the implementation method of the secure communication service can be applied to image 3 In the confidential communication business system shown. Specifically, the method may include the following steps:

[0107] Step 101: The EAS receives an initial session request message from the calling terminal forwarded by the call session control unit at the network side, and the initial session request message carries confidential communication indication information for indicating that the call is an encrypted call.

[0108] Specifically, the initial session request message may generally be an initial session request message based on the SIP protocol, including an INVITE message and a MESSAGE message, etc., which is not limited in this embodiment of the present invention.

[0109] Further, in the embodiment of t...

Embodiment 2

[0201] Embodiment 2 of the present invention further describes the implementation method of the secure communication service described in Embodiment 1 of the present invention by taking the action execution party as an example of a call session control unit at the network side. Such as Figure 5 As shown in , it is a schematic flowchart of the implementation method of the secure communication service described in Embodiment 2 of the present invention, and the implementation method of the secure communication service can be applied to image 3 In the confidential communication business system shown. Specifically, the method may include the following steps:

[0202] Step 201: The call session control unit at the network side receives the initial session request message initiated by the calling terminal, and the initial session request message carries confidential communication indication information for indicating that this call is an encrypted call.

[0203] Specifically, sim...

Embodiment 3

[0224] The third embodiment of the present invention is based on image 3 The system architecture diagram of the secure communication service shown is taken as an example to further describe the implementation method of the secure communication service described in Embodiment 1 or Embodiment 2 of the present invention. Assume that end user A and end user B have subscribed to the secure communication service and belong to the same user domain, and two KMCs with different security levels are deployed in the user domain, which are used to support the commercial encryption algorithm (KMC1) and the common encryption algorithm ( KMC2) Two confidential communication services with different security levels; and, assuming that in the third embodiment of the present invention, the same INVITE message can be used to simultaneously complete the call establishment between the calling and called terminals and trigger EAS to select the corresponding KMC to Generate keys and other operations....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implementation method, equipment and system of secure communication service. The method comprises the following steps: receiving, by an encryption application server, an initial session request message from a calling terminal forwarded by a network side call session control unit, wherein the initial session request message carries with secure communication instruction information for indicating that the call is an encrypted call; determining user domains to which the calling terminal and a called terminal belong according to the initial session request message, selecting a corresponding key management center from the determined user domains, and triggering the key management center to generate a session key required to be used by the call for the calling terminal and the called terminal. In the scheme, the secure communication instruction information can be carried in the initial session request message to realize the trigger of the secure communication service, so that the purpose that the secure communication service is provided for a user based on an existing IMS (IP Multimedia Subsystem) network to improve the security of user communication service can be achieved.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a method, device and system for realizing a secure communication service. Background technique [0002] In order to be able to perform end-to-end encrypted protection of user service information carried by the IMS (IP Multimedia Subsystem, IP Multimedia Subsystem) media plane, the 3GPP (Third Generation Partnership Project, 3rd Generation Partnership Project) standard organization is in TS33.328 Two relatively independent media plane key management schemes, SDES (Session Description Protocol Security Descriptions for Media Streams, Session Description Protocol Security Description for Media Streams) and KMS (Key Management Service, Key Management Service), are proposed to realize media plane sessions Key negotiation, through the negotiated session key, the system can establish a security association between the calling and called terminals, or between the ter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 田野侯长江刘斐柏洪涛
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products