Method for arranging key in IP multimedia service subsystem network

A technology for multimedia services and subsystems, applied in transmission systems, digital transmission systems, and key distribution, can solve the problems of application layer security problems in IMS networks that are not provided, and achieve the effect of high applicability

Inactive Publication Date: 2006-07-12
HUAWEI TECH CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, 3G defines the general authentication and key distribution model of GBA, but it has not been specifically applied to the IMS network, and the network security model and specifications of the IMS have not provided a solution to the application layer security problem in the IMS network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for arranging key in IP multimedia service subsystem network
  • Method for arranging key in IP multimedia service subsystem network
  • Method for arranging key in IP multimedia service subsystem network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to illustrate the technical solution of the present invention more clearly, first, a brief description is given to the flow of the present invention defined in the third generation mobile communication system (3G).

[0024] image 3 Describes how to trigger the startup of the Bootstrapping process. When the UE communicates with the Network Application Function (NAF), if the NAF considers that the UE needs to be authenticated and needs to share the security key of the application layer, the UE is required to start the Bootstrapping process.

[0025] Figure 4 Describes the Bootstrapping process. Through this process, the UE completes the two-way authentication with the BSF / HSS, and at the same time completes the key distribution between the UE and the BSF (Bootstrapping Server Function). The network side key Ks is provided by the user's home server (Home Subscriber Server , HSS) allocation, stored in the BSF, and after the Bootstrapping process is successful, t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for cipher negotiation in IP multimedia service subsystem. Wherein, during the AKA or Digest Authentication (DA) process, generating application layer cipher and B-TID (Bootstrapping procedure Transaction identifier) label, and sending the B-TID to terminal to merge the Bootstrapping and AKA or DA processes; the terminal initiates to build dialogue, and use directly said key for protection during interactive process with NAF (such as AS).

Description

technical field [0001] The present invention relates to the third generation mobile communication network, in particular to a method for negotiating keys in IP Multimedia Subsystem (IMS). Background technique [0002] As the core session control layer of fixed and mobile networks, IP Multimedia Subsystem (IMS) has become the focus of current industry discussions. Many IMS-related specifications are defined in the third generation mobile communication system (3G) and TISPAN standards, including network Architecture, interfaces, protocols and other aspects, among which security is an important aspect considered by 3G and TISPAN. The current specification divides the IMS network into the access domain and the network domain from the perspective of security, and defines the security specifications of the access domain and the network domain respectively. The security model of the IMS network is as follows: figure 1 shown. [0003] from figure 1 It can be seen from the figure ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/12H04L9/32
CPCH04L9/0844H04L9/08H04L2209/56H04L63/06
Inventor 严军
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products