IMS system based session key negotiating method

A session key and key technology, applied in the field of information security, can solve the problems of difficulty in implementation and popularization, eavesdropping on session keys, and high terminal requirements, and achieve the effects of improving transmission security, reducing performance requirements, and facilitating system upgrades.

Active Publication Date: 2015-06-03
BEIJING DATANG GOHIGH DATA NETWORKS TECH CO LTD
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The IMS system uses the SIP protocol for end-to-end call control. The SIP protocol can be used to negotiate session keys and other media parameters. However, since SIP messages are transmitted in plain text in the IMS system, the negotiated session keys are very Easy to be eavesdropped and cause information leakage
The use of the secure transport layer protocol TLS can guarantee the secure transmission of SIP messages to a certain extent, but TLS has high requirements for terminals, and there are certain difficulties in its implementation and popularization.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IMS system based session key negotiating method
  • IMS system based session key negotiating method
  • IMS system based session key negotiating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0023] figure 2 It is a flow chart of the method of the present invention. As shown in the figure, the session key negotiation method based on the IMS system disclosed by the present invention is as follows: each terminal configures its own symmetric encryption algorithm and corresponding key in the multimedia server; Generate a session key, and use the configured first symmetric encryption algorithm and the corresponding key to encrypt the session key to generate the first ciphertext session key, and the first ciphertext session key is passed through the calling party in a SIP message The affiliated CSCF server transmits it to the multimedia server; the multimedia server receives the SIP message carrying the first ciphertext session key, and uses the first symmetric encryption algorithm configured by the calling party and the corresponding k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses an IMS system based session key negotiating method. A symmetric encryption algorithm and a secret key are configured in a multi-media server at a terminal; a calling party uses a first symmetric encryption algorithm and the secret key to encrypt the session key to generate a first ciphertext session key, and the first ciphertext session key is transmitted to the multi-media server as an SIP message via a CSCF server; and the multi-media server receives the SIP message, uses the first symmetric encryption algorithm and the secret key to decode the first ciphertext session key to obtain the session key, the multi-media server uses a second symmetric encryption algorithm and a secret key configured by a called party to encrypt the session key to generate a second ciphertext session key, the second ciphertext session key is transmitted to the called party as the SIP message via the CSCF server, and the called party receives the SIP message, and uses the second symmetric encryption algorithm and the secret key to decode the second ciphertext session key to obtain the session key. The method of the present invention can increase security for transmitting the session key.

Description

technical field [0001] The invention relates to a session key negotiation method based on an IMS system, and belongs to the technical field of information security. Background technique [0002] With the development of communication and network technology, IP Multimedia System IMs (IP Multimedia Subsystem) has been widely used and developed because it can meet the novel and diverse multimedia service requirements of different end users. figure 1 It is a network topology diagram of the IMS system. As shown in the figure, the IMS system includes a multimedia server, a CSCF (Call Session Control Function: call session control function) server and several IMS terminals, wherein the multimedia server can be an MRF (Media Resource Function: media resource function module) server, AS (Application Server: Application Server) server, HSS (Home Subscriber Server: Home Subscriber Server) server, the SIP message sent by the calling party passes through its CSCF server, multimedia server...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/06H04L65/1016
Inventor 付景林王成金石宇光
Owner BEIJING DATANG GOHIGH DATA NETWORKS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products