CN101483860A - Negotiation control method based on SIP security policy grade in IMS network - Google Patents
Negotiation control method based on SIP security policy grade in IMS network Download PDFInfo
- Publication number
- CN101483860A CN101483860A CNA2009100778604A CN200910077860A CN101483860A CN 101483860 A CN101483860 A CN 101483860A CN A2009100778604 A CNA2009100778604 A CN A2009100778604A CN 200910077860 A CN200910077860 A CN 200910077860A CN 101483860 A CN101483860 A CN 101483860A
- Authority
- CN
- China
- Prior art keywords
- security
- policy
- protection
- cscf
- domain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
IMS网络中基于SIP安全策略等级的协商控制方法,提供了一种IP多媒体子系统IMS网络中基于会话初始协议SIP的安全策略等级的协商控制机制,属于网络安全保护和访问控制技术领域,其特征在于,包含以下两方面内容:1)根据IMS技术规范,通过不同安全机制的组合来选择由弱到强的安全保护策略,提供了一套完整统一的IMS安全策略组合,为IMS与用户设备UE进行安全协商提供策略选择。2)通过定义新的SIP消息域和协商过程,为终端用户和IMS运营商提供了协商流程和SIP消息字段格式,来实现IMS运营商和终端用户协商和确定业务安全策略的方法,最终实现运营商能够针对不同业务类型、不同用户类型,提供不同安全等级的安全策略,既满足个性化的用户服务质量保障,又降低网络安全所带来的资源开销,从而实现网络安全保护和服务质量保障的最佳选择策略。
The negotiation control method based on the SIP security policy level in the IMS network provides a negotiation control mechanism based on the session initiation protocol SIP security policy level in the IP multimedia subsystem IMS network, which belongs to the technical field of network security protection and access control. That is, it includes the following two aspects: 1) According to the IMS technical specification, through the combination of different security mechanisms to select a security protection strategy from weak to strong, a complete and unified IMS security policy combination is provided, which is for IMS and user equipment UE Conduct security negotiations to provide policy options. 2) By defining a new SIP message domain and negotiation process, the negotiation process and SIP message field format are provided for end users and IMS operators, so as to realize the method for IMS operators and end users to negotiate and determine business security policies, and finally realize the operation Providers can provide security policies with different security levels for different business types and different user types, which not only meet the personalized user service quality assurance, but also reduce the resource overhead brought by network security, so as to realize the combination of network security protection and service quality assurance Optimal selection strategy.
Description
技术领域 technical field
本发明涉及IP多媒体子系统IMS中一种基于SIP信令的用户安全策略划分方法和协商控制方法,属于网络安全和访问控制技术领域。The invention relates to a SIP signaling-based user security policy division method and negotiation control method in an IP multimedia subsystem IMS, and belongs to the technical field of network security and access control.
背景技术 Background technique
SIP信令SIP signaling
会话初始协议(SIP是互联网工程任务组IETF在1999年发表的一个标准,用来解决IP网上的信令控制。第三代合作伙伴计划3GPP选择SIP作为会话控制协议,该协议是IMS体系结构的核心。SIP可以建立音频、视频、多方通话等会话,也可以用来传送即时消息和文件,使得运营商能通过统一的业务平台提供综合业务,以实现网络的融合。在用户与IMS核心网建立IP连接并获取IMS业务的过程中,与SIP信令相关的主要有两个通信过程,IMS注册过程和多媒体会话建立过程。Session Initiation Protocol (SIP is a standard published by the Internet Engineering Task Force IETF in 1999 to solve signaling control on the IP network. The Third Generation Partnership Project 3GPP selects SIP as the session control protocol, which is an IMS architecture Core. SIP can establish audio, video, multi-party calls and other sessions, and can also be used to transmit instant messages and files, so that operators can provide comprehensive services through a unified service platform to achieve network integration. Established between users and IMS core network In the process of IP connection and acquisition of IMS services, there are mainly two communication processes related to SIP signaling, IMS registration process and multimedia session establishment process.
IMS安全需求IMS Security Requirements
根据3GPP技术规范33.102,IMS安全需求可以划分为三类安全:(1)认证和密钥协商AKA,包含用户设备UE和归属用户服务器HSS的相互认证和建立加密和传输密钥对,这部分在3GPP发布的IMS技术规范版本5中定义。(2)IMS接入安全AccessSecurity,包括网络接入安全的特征和机制定义,比如UE和IMS核心网是如何认证的,怎样协商安全机制、算法和密钥。接入安全为UE和代理-呼叫会话控制功能P-CSCF服务器提供安全关联,也负责SIP信令的机密性保护等。这部分在3GPP技术规范33.203中定义标准。(3)网络域安全Network Domain Security,提供整个核心网基于IP消息流的机密性、数据完整性、认证性和防重放攻击保护等,使用互联网安全协议IPSec等加密安全机制和协议,这部分在3GPP技术规范33.210中定义了标准。According to 3GPP technical specification 33.102, IMS security requirements can be divided into three types of security: (1) authentication and key agreement AKA, including mutual authentication between user equipment UE and home user server HSS and establishment of encryption and transmission key pairs, this part is in It is defined in version 5 of the IMS technical specification released by 3GPP. (2) IMS access security AccessSecurity, including network access security features and mechanism definitions, such as how UE and IMS core network are authenticated, how to negotiate security mechanisms, algorithms and keys. Access security provides security association for UE and proxy-call session control function P-CSCF server, and is also responsible for confidentiality protection of SIP signaling. This part defines the standard in 3GPP Technical Specification 33.203. (3) Network Domain Security, which provides the confidentiality, data integrity, authentication, and anti-replay attack protection of the entire core network based on IP message flow, and uses encryption security mechanisms and protocols such as the Internet security protocol IPSec. This part The standard is defined in 3GPP Technical Specification 33.210.
IMS安全机制IMS security mechanism
根据3GPP所定义的IMS安全机制的相关标准,安全机制主要包括5类,分别为认证性、机密性、完整性、可用性和私密性。其中(1)认证性:在IMS安全标准中要求使用AKA认证机制,以实现认证用户设备和归属网络之间的相互认证,为网络设备之间传递的信息提供了数据源认证。(2)机密性:IMS安全标准没有强制要求UE和P-CSCF之间的SIP消息的机密性保护,建议在接入网的链路层提供加密保护。此外,对域内SIP服务器之间SIP信令的机密性保护是可选的;不同域网络设备之间的机密性保护是强制的。(3)完整性:网络流量中通过在每一个数据包中包含一个消息认证码MAC来实现数据的完整性保护,IMS安全标准要求UE和P-CSCF之间使用传输模式的IPSec封装安全负载,IMS核心网络设备间使用隧道模式的IPsec ESP,可使用信息摘要算法MD5或者安全散列算法SHA-1,来提供它们之间SIP信令的数据完整性保护。(4)可用性:IMS安全标准没有明确地消除拒绝服务攻击DoS,但是定义了安全域,它们由安全网关来保护,运营商能够直接实施自己的DoS保护机制。因此,除非运营商采取了相应的措施,IMS体系结构中的各个网络设备以及运营支撑系统中的服务器,都有可能遭到DoS攻击。(5)私密性:运营商通常将网络的细节如:网络设备的数量、性能,网络的容量等视为敏感的商业信息。P-CSCF通过它的代理功能来向终端用户隐藏这类的信息。问询-呼叫会话控制功能I-CSCF服务器用来向其它运营商隐藏网络拓扑信息,如加密发送至外部网络中P-CSCF的SIP信息。从IMS安全框架来看,隐藏机制是可选的。如表1归纳了IMS网络中与各安全属性相关的各层安全机制。According to the relevant standards of the IMS security mechanism defined by 3GPP, the security mechanism mainly includes five categories, namely authentication, confidentiality, integrity, availability and privacy. (1) Authentication: The AKA authentication mechanism is required in the IMS security standard to realize mutual authentication between the authenticated user equipment and the home network, and provide data source authentication for information transmitted between network devices. (2) Confidentiality: The IMS security standard does not mandate the confidentiality protection of SIP messages between UE and P-CSCF, and it is recommended to provide encryption protection at the link layer of the access network. In addition, the confidentiality protection of SIP signaling between SIP servers in a domain is optional; the confidentiality protection between network devices in different domains is mandatory. (3) Integrity: In network traffic, data integrity protection is realized by including a message authentication code MAC in each data packet. The IMS security standard requires the use of IPSec in transport mode to encapsulate security loads between UE and P-CSCF. IPsec ESP in tunnel mode is used between IMS core network devices, and information digest algorithm MD5 or secure hash algorithm SHA-1 can be used to provide data integrity protection for SIP signaling between them. (4) Availability: The IMS security standard does not eliminate denial of service attack DoS explicitly, but defines security domains, which are protected by security gateways, and operators can directly implement their own DoS protection mechanisms. Therefore, unless the operator takes corresponding measures, each network device in the IMS architecture and the server in the operation support system may be attacked by DoS. (5) Privacy: Operators usually regard details of the network such as the quantity and performance of network equipment, and the capacity of the network as sensitive business information. P-CSCF hides such information from end users through its proxy function. Inquiry-call session control function The I-CSCF server is used to hide network topology information from other operators, such as encrypting SIP information sent to the P-CSCF in the external network. From the perspective of the IMS security framework, the concealment mechanism is optional. Table 1 summarizes the various layers of security mechanisms related to each security attribute in the IMS network.
IMS中基于SIP的策略控制Policy Control Based on SIP in IMS
运营商使用IMS网络提供服务最迫切的需求就是能够控制IMS网络中的一切行为,使IMS网络中的实体均按照运营商的规定来运作。这意味着IMS网络需要按照运营商部署的策略来运行,也即是说IMS网络需要进行相应的策略控制。简单的策略控制诸如控制媒体类型,控制编码方式等等,复杂的针对特定业务的策略则更为多样化和特殊化,如针对一个用户请求某个IMS业务提供商的服务,根据下面的一些内容和参数的不同,策略则可能不同:(1)业务类型不同,可能的策略不同,如运营商可能根据同一用户使用多方会议业务和使用无线移动网络对话业务而给出不同的策略,比如不同权限,不同控制流程等等;(2)用户的类型,用户是受限用户,一般用户还是高级用户等等,按照不同的分类方式和用户级别,运营商制订的策略各不相同;(3)不同运营商(或同一运营上在不同情况下如不同时段)也可能在同一种业务的基础上提供不同的策略控制,如对于视频服务或多方会议可能采取不同的控制方式。The most urgent requirement for an operator to use the IMS network to provide services is to be able to control all behaviors in the IMS network, so that entities in the IMS network operate according to the operator's regulations. This means that the IMS network needs to operate according to the strategy deployed by the operator, that is to say, the IMS network needs to implement corresponding policy control. Simple policy control such as controlling media type, controlling encoding method, etc., complex business-specific policies are more diverse and specialized, such as requesting a service from a certain IMS service provider for a user, according to the following content Depending on the parameter, the strategy may be different: (1) Different business types may have different strategies. For example, the operator may give different strategies according to the same user's multi-party conference service and wireless mobile network conversation service, such as different permissions. , different control processes, etc.; (2) the type of user, whether the user is a limited user, a general user or an advanced user, etc., according to different classification methods and user levels, operators formulate different strategies; (3) different Operators (or the same operator in different situations such as different time periods) may also provide different policy controls on the basis of the same service, for example, different control methods may be adopted for video services or multi-party conferences.
IMS中安全等级划分和安全策略控制Security Classification and Security Policy Control in IMS
在现有的SIP规范中,主要是通过SIP安全机制协议Sip-Sec-Agree来保证UE和P-CSCF间可以协商和采用共同的安全机制。这样存在两方面的问题:(1)仅仅协商UE和P-CSCF之间的安全机制是不足的,根据IMS规范以及前面归纳的安全机制,接入安全和网络域安全中有些机制是可选的,这种开放性往往会导致后向兼容性问题,比如不同版本的UE、不同网络域之间安全机制、不同运营商的安全配置不兼容问题,所以IMS提供各类多媒体服务时,不仅需要提供UE与P-CSCF之间的安全机制协商协议,还需要提供内部的网络域安全机制的协商机制,最终形成一套完整统一的由各部分安全机制组成的安全策略来保证IMS安全的兼容性。(2)IMS网络为用户提供多种多媒体服务,用户的服务质量QoS需求和安全需求存在多样性,不同的业务类型和不同的用户应用有不同的安全性需求,而QoS协商机制并没有充分考虑网络安全的需求和协商机制,也没有提供与安全相关的服务级别,来满足用户的安全需求。所以IMS应该在保证QoS资源预留前提下,考虑不同安全策略对网络性能以及提供给用户的端到端QoS指标的影响,并针对不同业务类型、不同用户类型,提供不同安全等级的安全策略,既满足个性化的用户服务质量保障,又降低网络安全所带来的资源开销,从而实现网络安全和QoS保障的最佳选择策略。In the existing SIP specification, the SIP security mechanism protocol Sip-Sec-Agree is mainly used to ensure that the UE and the P-CSCF can negotiate and adopt a common security mechanism. There are two problems in this way: (1) It is not enough to only negotiate the security mechanism between UE and P-CSCF. According to the IMS specification and the security mechanism summarized above, some mechanisms in access security and network domain security are optional , this openness often leads to backward compatibility issues, such as incompatibility between different versions of UEs, security mechanisms between different network domains, and security configurations of different operators. Therefore, when IMS provides various multimedia services, it not only needs to provide The security mechanism negotiation protocol between UE and P-CSCF also needs to provide an internal network domain security mechanism negotiation mechanism, and finally form a complete and unified security policy composed of various security mechanisms to ensure IMS security compatibility. (2) The IMS network provides users with a variety of multimedia services. Users have diverse service quality QoS requirements and security requirements. Different service types and different user applications have different security requirements, and the QoS negotiation mechanism does not fully consider Network security requirements and negotiation mechanisms do not provide security-related service levels to meet users' security needs. Therefore, IMS should consider the impact of different security policies on network performance and the end-to-end QoS indicators provided to users on the premise of ensuring QoS resource reservation, and provide security policies with different security levels for different service types and different user types. It not only meets the guarantee of personalized user service quality, but also reduces the resource overhead brought by network security, so as to realize the best selection strategy of network security and QoS guarantee.
而现有的SIP规范中,没有一个正式的标准来规范基于SIP协议的策略控制和交互流程。特别是缺乏不同安全级别的安全策略定义规范,以及针对用户服务类型、综合考虑服务质量与安全需求的安全策略的协商控制机制,而这两点对于解决上述IMS网络安全问题至关重要,是满足未来IMS网络安全和保障和服务的必要条件。新的方案除了要满足上述分析的条件如框架清晰,简单实用,可扩展性强,安全策略对用户透明等等需求以外,还必须考虑整个方案的安全可信。However, in the existing SIP specification, there is no formal standard to regulate the policy control and interaction process based on the SIP protocol. In particular, there is a lack of security policy definition specifications for different security levels, as well as a negotiation control mechanism for user service types and security policies that comprehensively consider service quality and security requirements. These two points are crucial to solving the above-mentioned IMS network security problems. A must for future IMS network safety and security and services. In addition to meeting the conditions of the above analysis, such as a clear framework, simple and practical, strong scalability, and transparent security policies to users, the new solution must also consider the security and credibility of the entire solution.
发明内容 Contents of the invention
本方案设计和实现了IMS网络中基于SIP的扩展控制方案,其目的是为了在IMS核心网为终端用户提供多媒体服务之前实现统一安全策略的协商和控制方法,最终确定网络安全和QoS保障的最佳配置方案。This scheme designs and implements the SIP-based extended control scheme in the IMS network. Its purpose is to realize the negotiation and control method of unified security policy before the IMS core network provides multimedia services for end users, and finally determine the optimal network security and QoS guarantee. best configuration.
本发明主要解决两方面的技术问题:(1)设计了IMS安全保护等级的划分方案,根据IMS技术规范,通过不同安全机制的组合来选择由弱到强的安全保护策略,提供了一套完整统一的IMS安全策略组合,为IMS与用户进行安全协商提供策略选择,将来还可以根据技术规范进行进一步的扩展,具有良好的兼容性。(2)设计了新的基于SIP的安全策略协商和控制方法,使得运营商能够针对不同业务类型、不同用户类型,提供不同安全等级的安全策略,既满足个性化的用户服务质量保障,又降低网络安全所带来的资源开销,从而实现网络安全和QoS保障的最佳选择策略。具体的方案提供了终端用户和IMS核心网交互协商流程和SIP消息字段,本发明中设计的协商控制机制可以为今后IMS网络安全保障和管理提供技术基础。The present invention mainly solves two technical problems: (1) A division scheme of IMS security protection levels is designed, and according to IMS technical specifications, security protection strategies from weak to strong are selected through a combination of different security mechanisms, providing a complete set of The unified IMS security policy combination provides policy options for IMS and users to conduct security negotiations, and can be further expanded according to technical specifications in the future, with good compatibility. (2) A new SIP-based security policy negotiation and control method is designed, enabling operators to provide security policies with different security levels for different business types and different user types, which not only meets the personalized user service quality assurance, but also reduces The resource overhead brought by network security, so as to realize the optimal selection strategy of network security and QoS guarantee. The specific solution provides the interactive negotiation process and SIP message fields between the terminal user and the IMS core network, and the negotiation control mechanism designed in the present invention can provide a technical basis for future IMS network security guarantee and management.
本发明的特征在于The present invention is characterized in that
其特征在于,是基于第三代合作伙伴计划3GPP所定义的IP多媒体子系统IMS技术规范TS 33.102,TS 33.203和TS 33.210,在作为客户端的用户设备UE和作为服务器端的IMS呼叫会话控制功能CSCF服务器依次按以下步骤实现的:It is characterized in that it is based on the IP multimedia subsystem IMS technical specification TS 33.102, TS 33.203 and TS 33.210 defined by the third generation partnership project 3GPP, in the user equipment UE as the client and the IMS call session control function CSCF server as the server Follow the steps below to achieve:
步骤(1),客户端UE注册IMS归属网络时,客户端UE和服务器端的CSCF服务器依次按照以下步骤执行:Step (1), when the client UE registers with the IMS home network, the client UE and the CSCF server at the server end follow the steps below to execute in sequence:
步骤(1.1),基于已有的会话初始协议SIP的安全机制协议Sip-Sec-Agree,所述客户端UE通过其归属网络域中的代理-呼叫会话控制功能服务器P-CSCF,向其归属网络域中的服务-呼叫会话控制功能服务器S-CSCF提供客户端所支持的第一跳接入安全机制,Step (1.1), based on the security mechanism protocol Sip-Sec-Agree of the existing Session Initiation Protocol SIP, the client UE sends to its home network the agent-call session control function server P-CSCF in its home network domain The service-call session control function server S-CSCF in the domain provides the first-hop access security mechanism supported by the client,
步骤(1.2),所述客户端UE声明支持安全策略协商服务Security-policy-service消息头扩展,并由所述S-CSCF将该用户设备信息标记在本地数据库中,Step (1.2), the client UE declares to support the security policy negotiation service Security-policy-service message header extension, and the user equipment information is marked in the local database by the S-CSCF,
步骤(1.3),所述S-CSCF根据IMS技术规范中所定义的域内和域间的可选或必选的安全机制,以及步骤(1.2)中所述的客户端支持的安全机制组合出在下述安全保护强度由弱到强的总共七个不同等级的安全策略,保护强度通过计算该策略对于认证性、机密性、完整性、可用性、私密性共5个安全属性上的效用值之和来得到,用于所述IMS归属网络域针对所述客户端UE发起业务的整体安全策略,供选择使用,所述七个等级的安全策略为P1~P7如下:In step (1.3), the S-CSCF combines optional or mandatory security mechanisms within and between domains defined in the IMS technical specification, and the security mechanisms supported by the client described in step (1.2) as follows A total of seven security policies with different levels of security protection strength from weak to strong, the protection strength is calculated by calculating the sum of utility values of the policy on the five security attributes of authentication, confidentiality, integrity, availability, and privacy Obtained, the overall security policy for the service initiated by the IMS home network domain for the client UE is available for selection, and the security policies of the seven levels are P1-P7 as follows:
安全策略P1,包含采用认证和密钥协商AKA的相互认证+注册,在认证性的安全保护效用值为2,可用性效用值为1,总体保护强度效用值为3,Security policy P1, including mutual authentication + registration using authentication and key agreement AKA, has a utility value of 2 for security protection in authentication, 1 for availability, and 3 for overall protection strength.
安全策略P2,包含采用认证和密钥协商AKA的相互认证+注册+采用信息摘要算法MD5的第一跳安全保护,在认证性的效用值为3,完整性的效用值为1,可用性的效用值为3,所述总体保护强度效用值为7,Security policy P2 includes mutual authentication using authentication and key agreement AKA + registration + first-hop security protection using message digest algorithm MD5. The utility value of authenticity is 3, the utility value of integrity is 1, and the utility value of availability is 3. The value is 3, and the overall protection strength utility value is 7,
安全策略P3,包含采用认证和密钥协商AKA的相互认证+注册+采用信息摘要算法MD5的第一跳安全保护+同时采用信息摘要算法MD5和加强型数据加密标准3DES的域间安全保护,认证性、机密性、完整性、可用性四种安全属性的效用值分别为3、2、2、4,所述总体保护强度效用值为11,Security policy P3, including mutual authentication using authentication and key agreement AKA + registration + first-hop security protection using information digest algorithm MD5 + inter-domain security protection using both information digest algorithm MD5 and enhanced data encryption standard 3DES, authentication The utility values of the four security attributes of security, confidentiality, integrity, and availability are 3, 2, 2, and 4 respectively, and the utility value of the overall protection strength is 11,
安全策略P4,包含采用认证和密钥协商AKA的相互认证+注册+采用信息摘要算法MD5的第一跳安全保护+同时采用信息摘要算法MD5和加强型数据加密标准3DES的域间安全保护+采用信息摘要算法MD5的域内安全保护,在认证性、机密性、完整性、可用性四种安全属性的效用值分别为3、2、3、4,所述总体保护强度效用值为12,Security policy P4, including mutual authentication using authentication and key agreement AKA + registration + first-hop security protection using information digest algorithm MD5 + inter-domain security protection using both information digest algorithm MD5 and enhanced data encryption standard 3DES + adopting In the domain security protection of the information digest algorithm MD5, the utility values of the four security attributes of authentication, confidentiality, integrity, and availability are 3, 2, 3, and 4 respectively, and the utility value of the overall protection strength is 12,
安全策略P5,包含采用认证和密钥协商AKA的相互认证+注册+采用安全散列算法SHA-1的第一跳安全保护+同时采用安全散列算法SHA-1和加强型数据加密标准3DES的域间安全保护+采用安全散列算法SHA-1的域内安全保护,在认证性、机密性、完整性、可用性四种安全属性的效用值分别为3、2、6、4,所述总体保护强度效用值为15,Security policy P5, including mutual authentication using authentication and key agreement AKA + registration + first-hop security protection using secure hash algorithm SHA-1 + using both secure hash algorithm SHA-1 and enhanced data encryption standard 3DES Inter-domain security protection + intra-domain security protection using the secure hash algorithm SHA-1, the utility values of the four security attributes of authentication, confidentiality, integrity, and availability are 3, 2, 6, and 4 respectively. The overall protection Strength utility value is 15,
安全策略P6,包含采用认证和密钥协商AKA的相互认证+注册+同时采用信息摘要算法MD5和加强型数据加密标准3DES的第一跳安全保护+同时采用信息摘要算法MD5和加强型数据加密标准3DES的域间安全保护+同时采用信息摘要算法MD5和加强型数据加密标准3DES的域内安全保护+网络拓扑隐藏保护,在认证性、机密性、完整性、可用性、私密性五种安全属性的效用值分别为4、4、3、6、1,所述总体保护强度效用值为18,Security policy P6, including mutual authentication + registration using authentication and key agreement AKA + first-hop security protection using both information digest algorithm MD5 and enhanced data encryption standard 3DES + simultaneously using information digest algorithm MD5 and enhanced data encryption standard The inter-domain security protection of 3DES + the intra-domain security protection of MD5 and the enhanced data encryption standard 3DES at the same time + the hidden protection of network topology, the utility of the five security attributes of authentication, confidentiality, integrity, availability, and privacy Values are 4, 4, 3, 6, 1 respectively, and the overall protection strength utility value is 18,
安全策略P7,包含采用认证和密钥协商AKA的相互认证+注册+同时采用安全散列算法SHA-1和加强型数据加密标准3DES的第一跳安全保护+同时采用安全散列算法SHA-1和加强型数据加密标准3DES的域间安全保护+同时采用安全散列算法SHA-1和加强型数据加密标准3DES的域内安全保护+网络拓扑隐藏保护,在认证性、机密性、完整性、可用性、私密性五种安全属性的效用值分别为4、4、6、6、1,所述总体保护强度效用值为21,在所述七个等级的安全策略中,“+”表示不同机制的组合;Security policy P7, including mutual authentication + registration using authentication and key agreement AKA + first-hop security protection using both secure hash algorithm SHA-1 and enhanced data encryption standard 3DES + simultaneously using secure hash algorithm SHA-1 Inter-domain security protection with the enhanced data encryption standard 3DES + both the secure hash algorithm SHA-1 and the enhanced data encryption standard 3DES intra-domain security protection + network topology hidden protection, in terms of authentication, confidentiality, integrity, and availability The utility values of the five security attributes of privacy and privacy are 4, 4, 6, 6, and 1 respectively, and the utility value of the overall protection strength is 21. In the security policies of the seven levels, "+" indicates the combination;
步骤(2),所述客户端UE和所述服务器端的CSCF服务器依次按照以下步骤执行,完成业务请求过程:Step (2), the client UE and the CSCF server at the server end execute in turn according to the following steps to complete the service request process:
步骤(2.1),所述客户端UE在业务请求消息中包含支持安全策略协商服务消息Supported:Security-policy-service,在代理请求Proxy-Require消息头中包含安全策略标签sec-policy,表示该业务需要与所述的S-CSCF服务器协商统一的安全策略,Step (2.1), the client UE includes the service message Supported: Security-policy-service in the service request message, and includes the security policy label sec-policy in the proxy request Proxy-Require message header, indicating that the service It is necessary to negotiate a unified security policy with the S-CSCF server,
步骤(2.2),所述S-CSCF服务器通过在归属网络域中的所述P-CSCF收到步骤(2.1)所述的业务请求消息后,依次执行以下步骤执行基于用户业务类型的安全策略选择方法:Step (2.2), after the S-CSCF server receives the service request message described in step (2.1) through the P-CSCF in the home network domain, it executes the following steps sequentially to perform security policy selection based on user service type method:
步骤(2.2.1),所述S-CSCF根据注册记录和步骤(1.1)和(1.3)中所支持的安全机制,基于用户类型、业务类型和运营商类型,推荐适合该客户端UE的安全策略等级,Step (2.2.1), the S-CSCF recommends the security mechanism suitable for the client UE based on the user type, service type and operator type according to the registration record and the security mechanisms supported in steps (1.1) and (1.3). strategy level,
步骤(2.2.2),所述S-CSCF检查可选安全机制中是否有不匹配、不识别的情况,如果存在,则向客户端UE发送安全机制不可识别消息411SecurityMechanism Undecipherable,否则执行步骤(2.2.3),Step (2.2.2), the S-CSCF checks whether there is a mismatch or an unrecognized situation in the optional security mechanism, and if it exists, it sends a security mechanism unrecognizable message 411 SecurityMechanism Undecipherable to the client UE, otherwise step (2.2 .3),
步骤(2.2.3),所述S-CSCF检查是否存在可供选择的安全策略,若不存在,则向客户端UE发出安全策略协商失败消息422Security Policy AgreementFailed,否则执行步骤(2.2.4),Step (2.2.3), the S-CSCF checks whether there is an alternative security policy, if not, sends a security policy negotiation failure message 422Security Policy AgreementFailed to the client UE, otherwise executes step (2.2.4),
步骤(2.2.4),所述S-CSCF将推荐的安全策略所包含的所有安全机制写入会话应答消息183 Session Progress的安全策略Security-policy消息头,该消息头包含安全策略等级policyid、接入安全机制access-sec、域内安全机制intra-domain-sec和域间安全机制inter-domain-sec标签,将安全机制所采用的具体算法写入消息域中对应的消息头中,发送给所述客户端UE;Step (2.2.4), the S-CSCF writes all security mechanisms included in the recommended security policy into the security policy Security-policy message header of the session response message 183 Session Progress, which contains the security policy level policyid, access Enter security mechanism access-sec, intra-domain security mechanism intra-domain-sec, and inter-domain security mechanism inter-domain-sec tags, write the specific algorithm adopted by the security mechanism into the corresponding message header in the message domain, and send it to the Client UE;
步骤(2.3),所述客户端UE通过所述P-CSCF收到所述S-CSCF根据步骤(2.2)发送来的会话应答消息后,依次执行以下步骤:Step (2.3), after the client UE receives the session response message sent by the S-CSCF according to step (2.2) through the P-CSCF, the following steps are executed in sequence:
步骤(2.3.1),所述客户端UE检查会话应答消息,如果是安全机制不可识别消息411Security Mechanism Undecipherable,表示安全机制不可识别,重新执行步骤(2.1)进行安全策略的协商过程,Step (2.3.1), the client UE checks the session response message, if it is a security mechanism unrecognizable message 411 Security Mechanism Undecipherable, indicating that the security mechanism is unrecognizable, re-execute step (2.1) to carry out the negotiation process of the security policy,
步骤(2.3.2),所述客户端UE检查会话应答消息,如果是安全策略协商失败消息422Security Policy Agreement Failed,表示协商失败,停止协商过程,Step (2.3.2), the client UE checks the session response message, if it is a security policy negotiation failure message 422Security Policy Agreement Failed, it means that the negotiation failed, and the negotiation process is stopped,
步骤(2.3.3),所述客户端UE接收到步骤(2.2.4)中会话应答消息中所述S-CSCF推荐的安全策略消息头,确认接受后,将该消息头内所包含的所有内容复制到请求应答消息INVITE中的安全策略确认Security-policy-verify消息头中,发送给所述的S-CSCF;Step (2.3.3), the client UE receives the security policy message header recommended by the S-CSCF in the session response message in the step (2.2.4), and after confirming the acceptance, all the information included in the message header The content is copied to the security policy confirmation Security-policy-verify message header in the request response message INVITE, and sent to the S-CSCF;
步骤(2.4),所述S-CSCF在收到所述客户端UE发送的安全策略确认Security-policy-verify消息头后,比较确认该UE是否接受步骤(2.2.4)所推荐的安全策略,如果不一致,则重复步骤(2.2),如果完全一致,所述S-CSCF将删除业务请求指令中与安全策略协商服务扩展相关的字段,并转发给对应的应用服务器上,同时针对该UE所请求的业务类型,按照之前协商好的整体安全策略,提供接入保护、域内保护、域间保护的安全机制。In step (2.4), the S-CSCF compares and confirms whether the UE accepts the security policy recommended in step (2.2.4) after receiving the security policy confirmation Security-policy-verify message header sent by the client UE, If they are inconsistent, repeat step (2.2). If they are completely consistent, the S-CSCF will delete the field related to the security policy negotiation service extension in the service request instruction, and forward it to the corresponding application server, and at the same time, the UE requested According to the previously negotiated overall security policy, security mechanisms for access protection, intra-domain protection, and inter-domain protection are provided.
本发明的效果如下:Effect of the present invention is as follows:
(1)本发明在IMS网络中定义了安全保护等级的划分方案,提供了一套完整统一的IMS安全策略组合,为IMS运营商与终端用户进行安全协商提供了策略选择,将来还可以根据技术规范进行扩展。(1) The present invention defines a division scheme of security protection levels in the IMS network, provides a complete and unified combination of IMS security policies, and provides policy options for IMS operators and terminal users to conduct security negotiations. Specifications are extended.
(2)本发明所设计的基于SIP安全策略协商和控制方法,将用于网络运营商针对不同业务类型、不同用户类型提供相应的安全策略,满足个性化的用户服务质量保障,又降低网络安全带来的资源开销,实现网络安全保护和服务质量保障的最佳策略选择。(2) The SIP-based security policy negotiation and control method designed by the present invention will be used for network operators to provide corresponding security policies for different business types and different user types, so as to meet the guarantee of personalized user service quality and reduce network security. The optimal strategy selection for network security protection and service quality assurance.
附图说明 Description of drawings
图1是本发明中终端UE安全策略协商控制流程图。FIG. 1 is a flow chart of terminal UE security policy negotiation control in the present invention.
图2是本发明中S-CSCF安全策略协商控制流程图。Fig. 2 is a flowchart of S-CSCF security policy negotiation control in the present invention.
图3是本发明中IMS初始化时S-CSCF划分安全策略等级的算法。Fig. 3 is an algorithm of the S-CSCF for dividing security policy levels when the IMS is initialized in the present invention.
图4是本发明中S-CSCF选择安全策略流程图。Fig. 4 is a flow chart of S-CSCF selecting a security policy in the present invention.
图5是本发明中请求业务过程中安全策略协商控制流程图。Fig. 5 is a flow chart of security policy negotiation control in the process of requesting business in the present invention.
具体实施方式 Detailed ways
本发明是一种IMS网络中安全策略协商和控制方法,本发明所涉及的交互实体主要是作为客户端的用户设备UE和IMS网络中服务-呼叫会话控制功能S-CSCF之间进行基于SIP消息格式的安全策略协商控制。The present invention is a security policy negotiation and control method in an IMS network. The interactive entity involved in the present invention is mainly based on the SIP message format between the user equipment UE as the client and the service-call session control function S-CSCF in the IMS network. security policy negotiation control.
本发明定义了一个新的SIP扩展消息域:安全策略协商服务Security-policy-service,用于S-CSCF与UE之间安全策略协商流程,在注册过程S-CSCF为UE提供默认的安全策略,并检查UE是否支持本发明的扩展;在业务请求信令中,通过Security policyservice来协商符合该用户请求业务安全需求的安全策略。The present invention defines a new SIP extended message domain: security policy negotiation service Security-policy-service, which is used for the security policy negotiation process between the S-CSCF and the UE. During the registration process, the S-CSCF provides a default security policy for the UE. And check whether the UE supports the extension of the present invention; in the service request signaling, negotiate a security policy that meets the security requirements of the service requested by the user through the Security policy service.
UE的安全策略协商流程图参见图1,UE首先必须在注册IMS网络的过程中声明自己支持Security-policy-service扩展,并将UE所支持的安全机制和算法通过已有的安全机制协议Sip-Sec-Agree提供给S-CSCF,便于S-CSCF提供合适的安全策略。然后UE在业务请求过程中,获得S-CSCF推荐的安全策略,并检查是否符合自身业务的安全需求,以及自己是否支持相关安全机制,如果确认接受,需要在安全策略确认消息域Security-policy-verify中复制确认的安全策略和机制,返回给S-CSCF。Refer to Figure 1 for the UE’s security policy negotiation flow chart. The UE must first declare that it supports the Security-policy-service extension during the process of registering with the IMS network, and pass the security mechanisms and algorithms supported by the UE through the existing security mechanism protocol Sip- The Sec-Agree is provided to the S-CSCF so that the S-CSCF can provide appropriate security policies. Then the UE obtains the security policy recommended by the S-CSCF during the service request process, and checks whether it meets the security requirements of its own service and whether it supports the relevant security mechanism. If it is confirmed to accept, it needs to confirm the message field Security-policy- In verify, replicate and confirm the security policies and mechanisms, and return them to the S-CSCF.
S-CSCF的安全策略协商流程图参见图2,UE注册IMS的归属网络后,S-CSCF将声明支持Security-policy-service消息域扩展的UE用户标记在本地数据库,同时S-CSCF根据IMS技术规范中所定义的域内、域间的可选或必选安全机制,以及UE所支持的接入安全机制,组合出安全保护强度从弱到强的不同等级的安全策略,适用于IMS网络针对该UE用户的整体安全策略选择。然后在UE业务请求过程中,S-CSCF针对该UE业务推荐相应的安全策略和具体的机制,通过183 Session Progress消息中的Security-policy消息域发送给UE,获得Security-policy-verify确认UE接受该安全策略后,S-CSCF将删除业务请求指令中与Security-policy-service扩展相关的字段,并转发给对应的应用服务器上,同时针对UE所请求的业务类型,按照之前协商好的整体安全策略,提供接入保护、域内保护、域间保护的安全机制。Refer to Figure 2 for the security policy negotiation flowchart of the S-CSCF. After the UE registers with the IMS home network, the S-CSCF will mark the UE users that support the extension of the Security-policy-service message field in the local database. At the same time, the S-CSCF will The optional or mandatory security mechanisms within and between domains defined in the specification, as well as the access security mechanisms supported by the UE, combine security policies with different levels of security protection strength from weak to strong, which are suitable for IMS networks for this Overall security policy selection for UE users. Then during the UE service request process, the S-CSCF recommends the corresponding security policy and specific mechanism for the UE service, sends it to the UE through the Security-policy message field in the 183 Session Progress message, and obtains the Security-policy-verify confirmation that the UE accepts After implementing the security policy, the S-CSCF will delete the field related to the Security-policy-service extension in the service request command and forward it to the corresponding application server. At the same time, according to the previously negotiated overall security Policies provide security mechanisms for access protection, intra-domain protection, and inter-domain protection.
本方案中可能存在的协商失败的情况有两种,分别对应了两种响应:421 SecurityPolicy Undecipherable和422 Security Policy Agreement Failed。There are two possible negotiation failure situations in this solution, which correspond to two responses: 421 Security Policy Undecipherable and 422 Security Policy Agreement Failed.
421 Security Policy Undecipherable:安全策略的定义标准和格式不符合规范或无法识别相应的字段,S-CSCF无法识别终端UE发送过来的确认接受的安全策略,这时S-CSCF将返回“421 Security Policy Undecipherable”。421 Security Policy Undecipherable: The definition standard and format of the security policy do not conform to the specifications or cannot recognize the corresponding fields, and the S-CSCF cannot recognize the security policy sent by the terminal UE to confirm acceptance. At this time, the S-CSCF will return "421 Security Policy Undecipherable ".
422 Security Policy Agreement Failed:如果出现S-CSCF推荐的安全策略UE不支持,同时UE发送的安全策略S-CSCF又无法满足的话,S-CSCF将返回“422 Security PolicyAgreement Failed”消息表示无法与终端协商出一致的整体安全策略。422 Security Policy Agreement Failed: If the UE does not support the security policy recommended by the S-CSCF, and the security policy S-CSCF sent by the UE cannot satisfy the S-CSCF, the S-CSCF will return the "422 Security Policy Agreement Failed" message to indicate that it cannot negotiate with the terminal Develop a consistent overall security policy.
本发明在UE和S-CSCF协商安全策略的控制信令自身的安全性主要由UE在注册过程的默认安全策略保护机密性和完整性,主要是注册过程中双向认证建立的安全联盟,并通过3GPP AKA机制获得完整性密钥和加密密钥,具体参考3GPP TS 33.210和3GPP 33.203。In the present invention, the security of the control signaling of UE and S-CSCF negotiating a security policy is mainly protected by the default security policy of the UE in the registration process. The 3GPP AKA mechanism obtains the integrity key and encryption key, refer to 3GPP TS 33.210 and 3GPP 33.203 for details.
本发明在上述实施流程中,涉及两部分技术方案介绍如下:In the above-mentioned implementation process, the present invention involves two parts of technical solutions as follows:
(1)安全保护等级的划分方案(1) Division scheme of security protection level
安全策略在协商之前,首先需要划分等级。本发明定义了一种针对IMS安全机制保护强弱的评价方法和保护等级的划分方案,国际通用标准ISO17799和ISO15408等安全评价标准只是根据密钥长度或者信息敏感度来划分加解密算法的保护强弱,但缺乏针对非加解密算法的划分标准。本发明所采用的划分方案是根据安全机制对于安全属性的影响程度来计算效用值,综合确定安全策略的强弱与等级,具体算法参见图3.Before the security policy is negotiated, it needs to be divided into levels. The present invention defines an evaluation method for the protection strength of the IMS security mechanism and a division scheme of protection levels. The security evaluation standards such as the international general standards ISO17799 and ISO15408 only divide the protection strength of encryption and decryption algorithms according to the key length or information sensitivity. Weak, but lack of classification standards for non-encryption and decryption algorithms. The division scheme adopted in the present invention is to calculate the utility value according to the degree of influence of the security mechanism on the security attribute, and comprehensively determine the strength and level of the security strategy. The specific algorithm is shown in Figure 3.
首先,计算IMS网络中不同安全机制对应认证、机密性、完整性、可用性和私密性五种安全属性的效用值,如表2(具体数值仅供参考)。根据相关安全标准,安全散列算法SHA-1比信息摘要算法MD5保护性更强,在完整性保护上SHA-1的效用为2,而MD5为1,而当同时采取MD5和加强型数据加密标准算法3DES将比只采用加密算法对于机密性更有效。注意到赋予一个安全机制中某种安全属性的权重,只表明了它与其它安全机制相比的相对效用,这些权重并不意味着,与某个安全属性相关的安全效用的绝对量。所以上面的效用表只是示意数值,仅供参考,但必须反应安全机制的保护强弱的差别。First, calculate the utility values of the five security attributes corresponding to authentication, confidentiality, integrity, availability, and privacy for different security mechanisms in the IMS network, as shown in Table 2 (the specific values are for reference only). According to relevant security standards, the secure hash algorithm SHA-1 is more protective than the information digest algorithm MD5. In terms of integrity protection, the utility of SHA-1 is 2, while that of MD5 is 1. When both MD5 and enhanced data encryption are adopted The standard algorithm 3DES will be more effective for confidentiality than just using the encryption algorithm. Note that the weights assigned to a certain security property in a security mechanism only indicate its relative utility compared with other security mechanisms, and these weights do not imply the absolute amount of security utility associated with a certain security property. Therefore, the utility table above is just an indication of the value and is for reference only, but it must reflect the difference in the strength of the protection of the security mechanism.
其次,根据IMS网络接入安全和网络域安全相关规范,以及安全机制的可选情况,通过选择各层可选的安全机制,组合成安全保护强度由弱到强的不同安全策略(可以扩展)。对于安全机制的组合选择必须符合3GPP制定的IMS技术规范所定义的安全标准,涵盖认证性、机密性、完整性、可用性、私密性等5种属性的安全保护,根据各安全机制的累加效用总和来确定安全策略的保护强度。最终本发明根据上述划分方案,提供了一套完整统一的IMS安全策略组合,为IMS与用户进行安全协商提供策略选择,当然IMS安全策略组合并没有唯一标准,本发明只是提供一种评价方案,具有较强的扩展性。Secondly, according to the relevant specifications of IMS network access security and network domain security, as well as the optional situation of security mechanisms, by selecting the optional security mechanisms of each layer, different security strategies (can be extended) with security protection strength from weak to strong are combined. . The combination selection of security mechanisms must comply with the security standards defined by the IMS technical specifications formulated by 3GPP, covering security protection of five attributes such as authentication, confidentiality, integrity, availability, and privacy. According to the cumulative utility sum of each security mechanism To determine the protection strength of the security policy. Finally, the present invention provides a complete and unified set of IMS security policy combinations according to the above-mentioned division scheme, and provides strategy selection for IMS and users to conduct security negotiations. Of course, there is no unique standard for IMS security policy combinations, and the present invention only provides an evaluation scheme. It has strong scalability.
本发明给出的参考划分方案中,具体的安全策略效用值计算如表3所示,共有{P1,P2,…,P7}七种安全策略,如果针对某一用户采取P6策略,说明IMS将针对该用户提供由AKA保护的相互认证注册机制、第一跳安全(UE和P-CSCF之间)同时采取MD5+3DES的保护机制、IMS域间和域内安全都同时采取MD5+3DES的加密保护、以及网络拓扑隐藏机制保护可用性。需要注意的是IMS网络对于不同业务类型、不同用户类型、不同运营商可以采取不同的安全策略标准,但安全策略自身必须兼容,必须采取同一种加解密算法,不能采取相互矛盾的安全机制组合。In the reference division scheme given by the present invention, the specific security policy utility value calculation is shown in Table 3, there are seven security policies {P1, P2, ..., P7}, if a P6 policy is adopted for a certain user, it means that the IMS will A mutual authentication and registration mechanism protected by AKA is provided for this user, the first hop security (between UE and P-CSCF) adopts MD5+3DES protection mechanism at the same time, and both IMS inter-domain and intra-domain security adopt MD5+3DES encryption protection at the same time , and network topology hiding mechanism to protect availability. It should be noted that the IMS network can adopt different security policy standards for different service types, different user types, and different operators, but the security policies themselves must be compatible, and the same encryption and decryption algorithm must be adopted, and contradictory security mechanism combinations cannot be adopted.
(2)安全策略协商和推荐方案(2) Security policy negotiation and recommendation scheme
终端UE用户和S-CSCF协商安全策略和控制方法,涉及注册过程和业务申请两个过程。本发明定义了一个新的SIP标签:Security-policy-service,用于S-CSCF与UE之间安全策略协商流程,在注册过程S-CSCF为终端用户提供默认的安全策略,并检查UE是否支持本发明的扩展;在业务请求信令中,通过Security policy service来协商符合该用户请求业务安全需求的安全策略。The terminal UE user negotiates security policies and control methods with the S-CSCF, involving two processes of registration and service application. The present invention defines a new SIP label: Security-policy-service, which is used for the security policy negotiation process between the S-CSCF and the UE. During the registration process, the S-CSCF provides the terminal user with a default security policy and checks whether the UE supports In the extension of the present invention, in the service request signaling, a security policy meeting the security requirements of the service requested by the user is negotiated through the Security policy service.
在划分了安全策略等级之后,必须提供S-CSCF如何与UE协商并推荐合适的安全策略的方法。具体流程参见图4,获得输入信息包括:UE所支持的安全机制、UE所申请的业务类型、UE用户类型,S-CSCF根据UE所支持的安全机制,如果UE的安全机制无法识别,输出421 Security Mechanism Undecipherable;如果可以识别,根据用户类型和申请的业务类型,在上述选择的安全策略中再选择符合要求的最低策略,如果没有可选策略,仍然输出422 Security Policy Agreement Failed;如果有,则S-CSCF对该UE用户申请业务的推荐安全策略。After the security policy level is divided, the method of how S-CSCF negotiates with UE and recommends an appropriate security policy must be provided. See Figure 4 for the specific process. The input information obtained includes: the security mechanism supported by the UE, the service type applied by the UE, and the user type of the UE. According to the security mechanism supported by the UE, if the security mechanism of the UE cannot be identified by the S-CSCF, output 421 Security Mechanism Undecipherable; if it can be identified, according to the type of user and the type of business applied for, select the minimum policy that meets the requirements among the security policies selected above, if there is no optional policy, still output 422 Security Policy Agreement Failed; if there is, then The security policy recommended by the S-CSCF for the UE user to apply for a service.
本发明中所有的SIP消息只给出与该扩展方案相关的头域,其它无关消息域将省略。同时,在IMS中SIP需要使用压缩形式的消息头域以节约带宽,为了方便阅读,本发明中所有消息域均不使用压缩形式。下面给出安全策略协商控制流程的消息示例:All SIP messages in the present invention only provide header fields related to the extension scheme, and other irrelevant message fields will be omitted. At the same time, in IMS, SIP needs to use compressed form of message header fields to save bandwidth. For the convenience of reading, all message fields in the present invention do not use compressed forms. The following is an example message of the security policy negotiation control process:
注册过程registration process
假设终端设备用户(UE)支持本方案定义的扩展,向自己的归属网络发起注册请求,该请求必须表明本客户端支持安全策略制订和相关的协议,并且能理解扩展对应的头域。客户端UE的注册请求消息如下:Assuming that the terminal equipment user (UE) supports the extension defined in this solution, and initiates a registration request to its home network, the request must indicate that the client supports security policy formulation and related protocols, and can understand the header field corresponding to the extension. The registration request message of the client UE is as follows:
当S-CSCF认证用户UE以后,由Supported:Security-policy-service知道该客户端支持本发明定义的扩展,将该用户标记在本地数据库中,在后续会话建立过程中以便和终端用户协商所需的安全策略。注册完成后IMS对于UE所采取的安全策略,接入安全根据SIP安全机制协定所确定的P-CSCF与UE之间的安全机制(见图1),而网络域安全则采取IMS核心网的默认安全策略。After the S-CSCF authenticates the user UE, the Supported:Security-policy-service knows that the client supports the extension defined in the present invention, marks the user in the local database, and negotiates with the terminal user in the subsequent session establishment process. security policy. After the registration is completed, the security policy adopted by the IMS for the UE, the access security is based on the security mechanism between the P-CSCF and the UE determined by the SIP security mechanism agreement (see Figure 1), and the network domain security adopts the default of the IMS core network security strategy.
IMS服务提供商可以要求用户使用本网络的服务时必须支持Security-policy-service扩展,若不支持则拒绝该用户的注册请求,这可以通过判断注册请求中是否包含Supported:Security-policy-service来实现;IMS服务提供商也可以允许不支持Security-policy-service扩展的用户注册,并标识这些用户,通过一定策略来限制该用户对服务的访问,如只提供个别基本服务;服务提供商还可以通过空中接口将新的扩展下载到用户终端,将不支持Security-policy-service扩展的用户请求通过301响应重定向到更新服务器,在用户安装扩展以后再让其正常接入到IMS网络。The IMS service provider can require the user to support the extension of Security-policy-service when using the service of the network, if not supported, the registration request of the user will be rejected, which can be determined by judging whether the registration request contains Supported:Security-policy-service Implementation; IMS service providers can also allow users who do not support the extension of Security-policy-service to register, identify these users, and restrict the user's access to services through certain policies, such as providing only individual basic services; service providers can also Download the new extension to the user terminal through the air interface, redirect the user request that does not support the Security-policy-service extension to the update server through a 301 response, and allow the user to normally access the IMS network after installing the extension.
业务请求过程business request process
图5描述了UE向SIP应用服务器发起请求呼叫过程中与本发明相关的信令。其中UE是SIP客户端,P-CSCF和S-CSCF是IMS网络中的SIP会话控制服务器,ApplicationServer是IMS网络中的应用服务器。Fig. 5 describes the signaling related to the present invention in the process of UE initiating a call request to a SIP application server. Where UE is a SIP client, P-CSCF and S-CSCF are SIP session control servers in the IMS network, and ApplicationServer is an application server in the IMS network.
下面详细描述该呼叫流程中的各个步骤及SIP消息的相关字段:Each step in the call flow and the relevant fields of the SIP message are described in detail below:
(1)UE请求应用服务器AS的服务,在SIP消息中包含了Supported:Security-policy-service来表明支持本专利的扩展,Proxy-Require消息头包含了选项标签“sec-policy”,指示该请求业务需要与S-CSCF协商统一的安全策略,SIP消息如下(本专利中所有消息只包含必要字段):(1) The UE requests the service of the application server AS. Supported: Security-policy-service is included in the SIP message to indicate support for the extension of this patent, and the Proxy-Require message header includes the option label "sec-policy" to indicate the request The business needs to negotiate a unified security policy with the S-CSCF, and the SIP message is as follows (all messages in this patent only contain necessary fields):
(2)P-CSCF将INVITE请求发往S-CSCF,S-CSCF根据注册时的记录验证该用户支持的扩展。由于用户支持Security-policy-service扩展,表示Alice需要和S-CSCF协商出安全策略以后才能请求建立会话。按照附图5的方法,S-CSCF通过查询HSS服务器后,根据用户请求业务的类型和用户终端类型,确定相应的安全策略,并返回183Session Progress消息,并在该消息中增加Security-policy消息头,消息头内包括policyid、access-sec、intra-domain-sec和inter-domain-sec标签,分别制定安全策略ID、接入安全机制、域内安全机制和域间安全机制。在Security-policy消息头中,policyid是安全策略的ID号,图5所示采取安全策略是P5(相互认证+注册+保护第一跳安全(SA SHA-1)+域间安全(SHA-1 3DES)+域内安全(SHA-1))。SIP消息如下:(2) The P-CSCF sends the INVITE request to the S-CSCF, and the S-CSCF verifies the extension supported by the user according to the registration record. Since the user supports the Security-policy-service extension, it means that Alice needs to negotiate a security policy with the S-CSCF before requesting to establish a session. According to the method in Figure 5, after querying the HSS server, the S-CSCF determines the corresponding security policy according to the type of service requested by the user and the type of the user terminal, and returns a 183 Session Progress message, and adds a Security-policy message header to the message , the message header includes the policyid, access-sec, intra-domain-sec, and inter-domain-sec tags, respectively formulating the security policy ID, access security mechanism, intra-domain security mechanism, and inter-domain security mechanism. In the Security-policy message header, policyid is the ID number of the security policy. The security policy shown in Figure 5 is P5 (mutual authentication + registration + protection of the first hop security (SA SHA-1) + inter-domain security (SHA-1 3DES) + intra-domain security (SHA-1)). The SIP message is as follows:
(3)Alice收到183 Session Progress响应后,检查Security-policy消息头中S-CSCF所建议的安全策略是否支持,是否符合用户的安全需求。如果是的话,则返回Security-policy-verify消息头,将S-CSCF推荐的安全策略再复制发送一遍,表示确认接受安全策略;如果认为该安全策略不能接受,则再次发送“Require:sec-policy;Proxy-Require:sec-policy”消息请求S-CSCF再次推荐合适的安全策略。(3) After receiving the 183 Session Progress response, Alice checks whether the security policy suggested by the S-CSCF in the Security-policy message header is supported and meets the user's security requirements. If so, return the Security-policy-verify message header, copy and send the security policy recommended by the S-CSCF again, and confirm the acceptance of the security policy; if the security policy is considered unacceptable, send "Require:sec-policy" again ; Proxy-Require: sec-policy" message requests the S-CSCF to recommend an appropriate security policy again.
(4)S-CSCF接收到Alice发送的确认安全策略后,检验与自己推荐的策略是否一致,如果是,表示整体安全策略协商已经完成,S-CSCF将Alice发送的业务请求指令中的“Supported:Security-policy-service”的字段删除,并转发给对应的应用服务器上,并针对Alice所在的终端UE以及他所请求的业务类型,按照之前协商好的整体安全策略,提供接入保护、域内保护、域间保护的安全机制,保证Alice该业务控制信令的安全,并提供良好的服务质量保障。(4) After receiving the confirmation security policy sent by Alice, the S-CSCF checks whether it is consistent with the policy recommended by itself. If yes, it means that the overall security policy negotiation has been completed. :Security-policy-service" field is deleted and forwarded to the corresponding application server, and for the terminal UE where Alice is located and the service type requested by him, access protection and intra-domain protection are provided according to the previously negotiated overall security policy , The security mechanism of inter-domain protection ensures the security of Alice's service control signaling and provides a good quality of service guarantee.
下接表1~表3The following table 1 ~ table 3
表1.现有技术下的IMS各层安全机制Table 1. Security mechanisms of various layers of IMS under the existing technology
表2.不同安全机制的相应安全属性的效用表Table 2. Utility table of corresponding security properties for different security mechanisms
表3.不同等级的安全策略对于安全属性的效用值Table 3. Utility values of different levels of security policies for security attributes
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100778604A CN101483860B (en) | 2009-01-23 | 2009-01-23 | Negotiation control method based on SIP security policy grade in IMS network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009100778604A CN101483860B (en) | 2009-01-23 | 2009-01-23 | Negotiation control method based on SIP security policy grade in IMS network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101483860A true CN101483860A (en) | 2009-07-15 |
CN101483860B CN101483860B (en) | 2010-09-01 |
Family
ID=40880748
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2009100778604A Expired - Fee Related CN101483860B (en) | 2009-01-23 | 2009-01-23 | Negotiation control method based on SIP security policy grade in IMS network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101483860B (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010083671A1 (en) * | 2009-01-21 | 2010-07-29 | 中兴通讯股份有限公司 | Network security hypertext transfer protocol negotiation method and correlated devices |
CN102316450A (en) * | 2010-06-29 | 2012-01-11 | 上海贝尔股份有限公司 | Group-based M2M (machine-to-machine) communication authentication method and equipment |
CN103036885A (en) * | 2012-12-18 | 2013-04-10 | 迈普通信技术股份有限公司 | Session initiation protocol (SIP) server overload protective system and method |
CN103095657A (en) * | 2011-11-03 | 2013-05-08 | 中兴通讯股份有限公司 | User access method and access serving router and user access system |
US8565226B1 (en) | 2012-04-23 | 2013-10-22 | Huawei Technologies Co., Ltd. | Data transmission system used between multiple servers, data interface device, and data transmission method |
CN103458046A (en) * | 2013-09-13 | 2013-12-18 | 中国科学院信息工程研究所 | Data secrete sharing system and method based on core network |
CN105247832A (en) * | 2013-04-03 | 2016-01-13 | 赛门铁克公司 | Method and apparatus for integrating security context in network routing decisions |
CN106301947A (en) * | 2016-08-31 | 2017-01-04 | 广州唯品会信息科技有限公司 | Business information processing system and method |
CN103716192B (en) * | 2013-12-31 | 2017-03-22 | 大连环宇移动科技有限公司 | Non-inductive series connection device based on virtual IP |
CN107231332A (en) * | 2016-03-24 | 2017-10-03 | 华为技术有限公司 | Security strategy determines method and device |
CN108055278A (en) * | 2017-12-26 | 2018-05-18 | 杭州迪普科技股份有限公司 | A kind of method and device for searching session information |
CN109314638A (en) * | 2016-07-01 | 2019-02-05 | 华为技术有限公司 | Cipher key configuration and security strategy determine method, apparatus |
CN109450852A (en) * | 2018-10-09 | 2019-03-08 | 中国科学院信息工程研究所 | Network communication encrypting and decrypting method and electronic equipment |
CN111049810A (en) * | 2019-11-28 | 2020-04-21 | 光通天下网络科技股份有限公司 | Network security suite matching method, device, equipment and medium |
JP2020535768A (en) * | 2017-09-29 | 2020-12-03 | 華為技術有限公司Huawei Technologies Co.,Ltd. | Parameter protection method and device, and system |
CN112333288A (en) * | 2021-01-04 | 2021-02-05 | 三盟科技股份有限公司 | Intelligent classroom data safety protection method, system and readable storage medium |
CN112788045A (en) * | 2021-01-21 | 2021-05-11 | 杭州迪普科技股份有限公司 | Safety protection method and device for network camera |
CN113672985A (en) * | 2021-08-25 | 2021-11-19 | 支付宝(杭州)信息技术有限公司 | Machine learning algorithm script compiling method and compiler for privacy protection |
CN115589321A (en) * | 2022-10-11 | 2023-01-10 | 中国电信股份有限公司 | Security context isolation policy negotiation method, device, equipment and storage medium |
-
2009
- 2009-01-23 CN CN2009100778604A patent/CN101483860B/en not_active Expired - Fee Related
Cited By (34)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2010083671A1 (en) * | 2009-01-21 | 2010-07-29 | 中兴通讯股份有限公司 | Network security hypertext transfer protocol negotiation method and correlated devices |
US8701160B2 (en) | 2009-01-21 | 2014-04-15 | Zte Corporation | Network security HTTP negotiation method and related devices |
CN102316450A (en) * | 2010-06-29 | 2012-01-11 | 上海贝尔股份有限公司 | Group-based M2M (machine-to-machine) communication authentication method and equipment |
CN102316450B (en) * | 2010-06-29 | 2014-01-22 | 上海贝尔股份有限公司 | Group-based M2M (machine-to-machine) communication authentication method and equipment |
CN103095657A (en) * | 2011-11-03 | 2013-05-08 | 中兴通讯股份有限公司 | User access method and access serving router and user access system |
WO2013064052A1 (en) * | 2011-11-03 | 2013-05-10 | 中兴通讯股份有限公司 | User access method, access service router, and user access system |
US8565226B1 (en) | 2012-04-23 | 2013-10-22 | Huawei Technologies Co., Ltd. | Data transmission system used between multiple servers, data interface device, and data transmission method |
CN103036885A (en) * | 2012-12-18 | 2013-04-10 | 迈普通信技术股份有限公司 | Session initiation protocol (SIP) server overload protective system and method |
CN103036885B (en) * | 2012-12-18 | 2016-03-23 | 迈普通信技术股份有限公司 | Sip server overload protective device and method |
CN105247832A (en) * | 2013-04-03 | 2016-01-13 | 赛门铁克公司 | Method and apparatus for integrating security context in network routing decisions |
CN105247832B (en) * | 2013-04-03 | 2019-06-14 | 赛门铁克公司 | Safe context is integrated into the method and apparatus in network routing decision |
CN103458046A (en) * | 2013-09-13 | 2013-12-18 | 中国科学院信息工程研究所 | Data secrete sharing system and method based on core network |
CN103458046B (en) * | 2013-09-13 | 2016-09-07 | 中国科学院信息工程研究所 | A kind of data secret shared system based on core network and method |
CN103716192B (en) * | 2013-12-31 | 2017-03-22 | 大连环宇移动科技有限公司 | Non-inductive series connection device based on virtual IP |
CN107231332A (en) * | 2016-03-24 | 2017-10-03 | 华为技术有限公司 | Security strategy determines method and device |
CN109314638A (en) * | 2016-07-01 | 2019-02-05 | 华为技术有限公司 | Cipher key configuration and security strategy determine method, apparatus |
US11057775B2 (en) | 2016-07-01 | 2021-07-06 | Huawei Technologies Co., Ltd. | Key configuration method, security policy determining method, and apparatus |
US11689934B2 (en) | 2016-07-01 | 2023-06-27 | Huawei Technologies Co., Ltd. | Key configuration method, security policy determining method, and apparatus |
CN109560929A (en) * | 2016-07-01 | 2019-04-02 | 华为技术有限公司 | Cipher key configuration and security strategy determine method, apparatus |
CN114285570A (en) * | 2016-07-01 | 2022-04-05 | 华为技术有限公司 | Secret key configuration and security policy determination method and device |
JP2019527498A (en) * | 2016-07-01 | 2019-09-26 | 華為技術有限公司Huawei Technologies Co.,Ltd. | Key configuration method, security policy determination method, and apparatus |
CN109560929B (en) * | 2016-07-01 | 2020-06-16 | 华为技术有限公司 | Key configuration and security policy determination method and device |
CN106301947A (en) * | 2016-08-31 | 2017-01-04 | 广州唯品会信息科技有限公司 | Business information processing system and method |
JP2020535768A (en) * | 2017-09-29 | 2020-12-03 | 華為技術有限公司Huawei Technologies Co.,Ltd. | Parameter protection method and device, and system |
CN108055278B (en) * | 2017-12-26 | 2020-12-29 | 杭州迪普科技股份有限公司 | Method and device for searching session information |
CN108055278A (en) * | 2017-12-26 | 2018-05-18 | 杭州迪普科技股份有限公司 | A kind of method and device for searching session information |
CN109450852B (en) * | 2018-10-09 | 2020-09-29 | 中国科学院信息工程研究所 | Network communication encryption and decryption method and electronic equipment |
CN109450852A (en) * | 2018-10-09 | 2019-03-08 | 中国科学院信息工程研究所 | Network communication encrypting and decrypting method and electronic equipment |
CN111049810A (en) * | 2019-11-28 | 2020-04-21 | 光通天下网络科技股份有限公司 | Network security suite matching method, device, equipment and medium |
CN112333288A (en) * | 2021-01-04 | 2021-02-05 | 三盟科技股份有限公司 | Intelligent classroom data safety protection method, system and readable storage medium |
CN112788045A (en) * | 2021-01-21 | 2021-05-11 | 杭州迪普科技股份有限公司 | Safety protection method and device for network camera |
CN113672985A (en) * | 2021-08-25 | 2021-11-19 | 支付宝(杭州)信息技术有限公司 | Machine learning algorithm script compiling method and compiler for privacy protection |
CN113672985B (en) * | 2021-08-25 | 2023-11-14 | 支付宝(杭州)信息技术有限公司 | Machine learning algorithm script compiling method and compiler for privacy protection |
CN115589321A (en) * | 2022-10-11 | 2023-01-10 | 中国电信股份有限公司 | Security context isolation policy negotiation method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN101483860B (en) | 2010-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101483860B (en) | Negotiation control method based on SIP security policy grade in IMS network | |
CN101379802B (en) | Method and device for the encoded transmission of media data between the media server and the subscriber terminal | |
US9648006B2 (en) | System and method for communicating with a client application | |
EP2495932B1 (en) | Digital rights management using trusted processing techniques | |
US8613058B2 (en) | Systems, methods and computer program products for providing additional authentication beyond user equipment authentication in an IMS network | |
US9854508B2 (en) | Downloadable ISIM | |
JP4806400B2 (en) | Identity processing in trusted domains of IP networks | |
CN100550731C (en) | A kind of security system of accessing fixed network user to IP multimedia subsystem and method | |
CN101188492A (en) | System and method for implementing security services | |
JP4838881B2 (en) | Method, apparatus and computer program product for encoding and decoding media data | |
CN101227272A (en) | A method and system for obtaining media stream protection key | |
CN101141251A (en) | Method, system and device for message encryption signature in communication system | |
CN101222320B (en) | Method, system and device for media stream safety context negotiation | |
CN107251512B (en) | Method, device and system for establishing a secure communication session | |
Arkko et al. | Key Management Extensions for Session Description Protocol (SDP) and Real Time Streaming Protocol (RTSP) | |
CN100571461C (en) | Communication system | |
US20110099097A1 (en) | Charging for services in a communication network | |
CN103414707B (en) | message access processing method and device | |
CN106470186A (en) | A kind of to redirect the method that mode accesses third party's resource | |
KR101287588B1 (en) | Security System of the SIP base VoIP service | |
CN1972290A (en) | Modification method for authentication password based on SIP, subscriber proxy server and subscriber proxy client | |
CN102082769B (en) | Authentication system, device and method for IMS terminal when obtaining non-IMS service | |
Hilt et al. | A Session Initiation Protocol (SIP) Event Package for Session-Specific Policies | |
Brahim et al. | Impact of Security in QoS Signaling in NGN: Registration Study | |
CN119676772A (en) | A strategy negotiation method, device, equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100901 Termination date: 20210123 |