Key determination method and device

A technology for determining methods and keys, applied in the field of network communication, can solve problems such as the inability to transmit streaming content to keep the network operator confidential, and the difficulty in meeting the actual needs of users in secret-related industries, and achieve the effect of ensuring confidentiality and security

Pending Publication Date: 2022-07-08
NEW H3C TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the BSF and HSS in the above-mentioned IMS architecture need to be deployed by the network operator, and the solution needs to be implemented based on the SIM card of the user terminal and the shared key preset in the HSS, which cannot keep the content of the transport stream secret from the network operator. Difficult to meet the actual needs of users in confidential industries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key determination method and device
  • Key determination method and device
  • Key determination method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as recited in the appended claims.

[0045] In order for those skilled in the art to better understand the technical solutions provided by the embodiments of the present application, and to make the above-mentioned purposes, features and advantages of the embodiments of the present application more obvious and easy to understand, the following describes the technical solutions in the embodiments of the present application with refere...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key determination method and device. In the application, a KMS server under an IMS architecture directly performs shared key negotiation with a terminal, and then the KMS server generates and issues a root key TGK for the terminal based on the shared key determined by the negotiation, so that the terminals needing to communicate can generate the same encryption key to perform end-to-end IMS service flow confidential transmission; compared with the existing IMS architecture based on the KMS, the technical scheme provided by the embodiment of the invention has the advantages that the KMS server replaces a BSF and an HSS to carry out authentication and shared key negotiation, the defect that monitoring of a network operator cannot be avoided in a traditional key negotiation mode based on a preset shared key of an SIM card and the HSS is overcome, and the confidentiality and security of communication between terminals are guaranteed.

Description

technical field [0001] The present application relates to the field of network communication, and in particular, to a method and device for determining a key. Background technique [0002] The existing KMS (Key Management Service: Key Management Service) based IMS (IP Multimedia Subsystem: IP Multimedia Subsystem) media plane security solution usually adopts such as figure 1 The shown architecture needs to further add network elements BSF (Bootstrapping Server Function: authentication server function), KMS server, and HSS (Home Subscriber Server: Home Subscriber Server) network elements on the basis of the conventional IMS architecture; Use BSF to perform AKA (Authentication and Key Agreement: Authentication and Key Agreement) process with the user terminal under this architecture, and establish a shared key between the network side and the user terminal based on the GBA (Generic Bootstrapping Architecture: General Authentication Architecture) mechanism to The KMS server es...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40H04L65/1016H04L65/1066
CPCH04L9/0838H04L9/0861H04L9/0869H04L9/3213H04L9/3268H04L9/3247H04L63/0807H04L63/0428H04L65/1016H04L65/1066
Inventor 彭艺曹孟
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products