CN104683304B - A kind of processing method of secure traffic, equipment and system - Google Patents
A kind of processing method of secure traffic, equipment and system Download PDFInfo
- Publication number
- CN104683304B CN104683304B CN201310631793.2A CN201310631793A CN104683304B CN 104683304 B CN104683304 B CN 104683304B CN 201310631793 A CN201310631793 A CN 201310631793A CN 104683304 B CN104683304 B CN 104683304B
- Authority
- CN
- China
- Prior art keywords
- terminal device
- session key
- key
- encrypted
- kmc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims description 3
- 238000004891 communication Methods 0.000 claims abstract description 267
- 238000012545 processing Methods 0.000 claims abstract description 68
- 238000000034 method Methods 0.000 claims abstract description 48
- 230000011664 signaling Effects 0.000 claims description 43
- 230000004044 response Effects 0.000 claims description 33
- 230000005540 biological transmission Effects 0.000 claims description 32
- 230000006870 function Effects 0.000 description 17
- 238000010586 diagram Methods 0.000 description 16
- 238000004590 computer program Methods 0.000 description 7
- 238000012790 confirmation Methods 0.000 description 6
- 230000000977 initiatory effect Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000002452 interceptive effect Effects 0.000 description 2
- 235000010627 Phaseolus vulgaris Nutrition 0.000 description 1
- 244000046052 Phaseolus vulgaris Species 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
本发明公开了一种保密通信业务的处理方法、设备和系统,内容包括:在IMS网络中引入加密应用服务器和密钥管理中心,通过加密应用服务器在接收到第一终端设备发送的保密通信业务建立请求消息,并向密钥管理中心发送会话密钥请求消息,并在接收到密钥管理中心返回的加密后的会话密钥时,将该加密后的会话密钥发送给第一终端设备;通过加密应用服务器使得保密通信作为运营商提供给用户的业务,并且加密应用服务器从密钥管理中心获取加密后的会话密钥,下发给终端设备,不仅增加了运营商对保密通信的控制力,提高了系统的处理效率,引入的密钥管理中心实现了用户对密钥全生命周期的管理,增加了用户之间保密通信业务执行的安全性。
The invention discloses a method, device and system for processing confidential communication services. The content includes: introducing an encryption application server and a key management center into an IMS network, and receiving a confidential communication service sent by a first terminal device through the encryption application server. establishing a request message, sending a session key request message to the key management center, and when receiving the encrypted session key returned by the key management center, sending the encrypted session key to the first terminal device; Encrypting the application server makes confidential communication a service provided by the operator to the user, and the encryption application server obtains the encrypted session key from the key management center and issues it to the terminal device, which not only increases the operator's control over the confidential communication , which improves the processing efficiency of the system, and the introduced key management center realizes the management of the entire life cycle of the keys by users, and increases the security of the execution of confidential communication services between users.
Description
技术领域technical field
本发明涉及无线通信技术领域和安全技术领域,尤其涉及一种基于交互式多媒体服务IMS业务系统中保密通信业务的处理方法、设备和系统。The present invention relates to the technical field of wireless communication and the technical field of security, and in particular, to a method, device and system for processing a confidential communication service in an IMS service system based on an interactive multimedia service.
背景技术Background technique
为了能够对IMS(Interactive Multimedia Service,交互式多媒体服务)媒体面承载传输的用户业务信息进行端到端加密保护,3GPP(3rd Generation PartnershipProject,第三代移动通信标准化组织)在TS33.328中提出了两种相对独立的媒体面密钥管理方案,实现媒体面会话密钥的协商,并利用协商得到的会话密钥,通信系统在主被叫终端之间或者终端与IMS网络之间建立安全关联,通过SRTP(Secure Real-time TransportProtocol,安全实时传输协议)或者IP Sec(Internet Protocol Security,IP安全)协议对用户媒体面信息进行保护。In order to perform end-to-end encryption protection for user service information carried and transmitted on the media plane of IMS (Interactive Multimedia Service), 3GPP (3rd Generation Partnership Project, 3rd Generation Mobile Communication Standardization Organization) proposed in TS33.328 Two relatively independent media plane key management schemes, realize the negotiation of the media plane session key, and use the negotiated session key to establish a security association between the calling and called terminals or between the terminal and the IMS network, The user media plane information is protected through the SRTP (Secure Real-time Transport Protocol, Secure Real-time Transport Protocol) or IP Sec (Internet Protocol Security, IP Security) protocol.
其中,3GPP在TS33.328中提出了两种相对独立的媒体面密钥管理方案分别是SDES(Session Description Protocol Security Descriptions for Media Streams,会话描述协议媒体流安全描述)和KMS(Key Management Service,密钥管理服务)。Among them, 3GPP proposed two relatively independent media plane key management schemes in TS33.328, namely SDES (Session Description Protocol Security Descriptions for Media Streams) and KMS (Key Management Service, encryption). key management service).
一、基于SDES的密钥管理方案。First, the key management scheme based on SDES.
具体地,SDES是一种为保护媒体流设计的一种简单的密钥管理协议,是在现有SDP(Session Initiation Protocol,会话描述协议)中新增了密码属性,用于携带终端产生的会话密钥以及参数信息,完成单播流媒体数据的安全参数配置。Specifically, SDES is a simple key management protocol designed to protect media streams. It is a new cipher attribute added to the existing SDP (Session Initiation Protocol, Session Description Protocol), which is used to carry the session generated by the terminal. Key and parameter information to complete the security parameter configuration of unicast streaming media data.
当SDES应用在IMS系统中时,在SIP(Session Initiation Protocol,会话初始协议)建立过程中,交换终端设备A和终端设备B各自产生的用于媒体流加密的会话密钥。When SDES is applied in the IMS system, during the establishment of a SIP (Session Initiation Protocol, session initiation protocol), session keys generated by terminal device A and terminal device B for media stream encryption are exchanged.
如图1所示,为SDES密钥管理的工作流程示意图。一方面,在SIP会话建立时,终端设备A将用于对终端设备A发往终端设备B的媒体流加密的会话密钥K1写入SDP密码属性中,并通过信令面SIP消息承载,发送给终端设备B。As shown in Figure 1, it is a schematic diagram of the workflow of SDES key management. On the one hand, when the SIP session is established, the terminal device A writes the session key K1 used for encrypting the media stream sent from the terminal device A to the terminal device B into the SDP cipher attribute, and sends it through the SIP message on the signaling plane. to terminal device B.
另一方面,终端设备B在接收到终端设备A发送的SIP消息后,存储密钥K1,并将用于对终端设备B发往终端设备A的媒体流加密的会话密钥K2通过SIP响应消息发送给终端设备A。On the other hand, after receiving the SIP message sent by the terminal device A, the terminal device B stores the key K1, and sends the session key K2 used to encrypt the media stream sent by the terminal device B to the terminal device A through the SIP response message sent to terminal device A.
在终端设备A接收并存储密钥K2之后,终端设备A和终端设备B就都获得了会话密钥K1和会话密钥K2。After the terminal device A receives and stores the key K2, both the terminal device A and the terminal device B obtain the session key K1 and the session key K2.
此后,终端设备A和终端设备B分别使用会话密钥K1和会话密钥K2对SRTP协议承载的媒体流进行加解密操作,从而实现对用户数据的保密。After that, the terminal device A and the terminal device B respectively use the session key K1 and the session key K2 to perform encryption and decryption operations on the media stream carried by the SRTP protocol, thereby realizing the confidentiality of user data.
但是,在SDES方案中,会话密钥通过信令面SIP消息传输,其安全性完全依赖于SIP信令的安全。However, in the SDES scheme, the session key is transmitted through SIP messages on the signaling plane, and its security completely depends on the security of SIP signaling.
而SIP信令传输的安全机制常见的有两种:There are two common security mechanisms for SIP signaling transmission:
一种是基于IMS网络域安全机制,即完全依赖IMS网络域的安全来保证SIP信令传输的安全性,但是,IMS网络通常是在终端设备与SBC(Session Border Controller,会话边界控制器)之间采用加密手段,对终端设备接入链路上的SIP信令进行加密保护,而在IMS网络的核心网内部SIP信令则采用明文传输方式,这样就使得攻击者利用明文传输SIP信令的漏洞获取SIP信令中包含了会话密钥,实现对终端设备之间媒体面信息的监听,使得用户之间通话的安全性降低。One is based on the security mechanism of the IMS network domain, that is, the security of the IMS network domain is completely relied on to ensure the security of SIP signaling transmission. Encryption methods are used to encrypt and protect the SIP signaling on the access link of the terminal equipment, while the SIP signaling in the core network of the IMS network is transmitted in plaintext, so that attackers can use plaintext to transmit SIP signaling. The vulnerability obtains that the session key is included in the SIP signaling, which can monitor the media plane information between terminal devices and reduce the security of calls between users.
另一种是基于S/MIME(Secure Multipurpose Internet Mail Extensions,安全多用途网际邮件扩充协议)加密保护,即采用S/MIME协议对SIP信令中承载的SDP(SessionDescription Protocol,会话描述协议)消息内容进行端到端的加密。在终端设备无预设共享密钥的情况下,利用公钥证书系统,终端设备在发送会话密钥之前需要从公钥证书系统中获取对端的公钥,之后利用获取的公钥对SIP信令的内容进行加密后传输。这种方式使得密钥管理与会话管理完全分离,运营商无法控制密钥管理,在安全方面被旁路,无法满足运营商开展保密通信业务的需求,实际应用受到限制。The other is based on S/MIME (Secure Multipurpose Internet Mail Extensions, Secure Multipurpose Internet Mail Extensions) encryption protection, that is, using S/MIME protocol to carry SDP (Session Description Protocol, Session Description Protocol) message content carried in SIP signaling End-to-end encryption. In the case where the terminal device does not have a preset shared key, using the public key certificate system, the terminal device needs to obtain the public key of the opposite end from the public key certificate system before sending the session key, and then uses the obtained public key to verify the SIP signaling The content is encrypted and transmitted. This method completely separates key management and session management, and operators cannot control key management, which is bypassed in terms of security, cannot meet the needs of operators to carry out confidential communication services, and is limited in practical applications.
二、基于KMS的密钥管理方案。2. KMS-based key management scheme.
具体地,KMS实体基于GBA(Generic Bootstrapping Architecture,通用引导架构)机制对主被叫终端鉴权,并将产生的会话密钥通过成功鉴权后建立的安全通道传送给主被叫终端。如图2所示,为KMS密钥管理的流程示意图。Specifically, the KMS entity authenticates the calling and called terminals based on the GBA (Generic Bootstrapping Architecture, general bootstrapping architecture) mechanism, and transmits the generated session key to the calling and called terminals through the secure channel established after successful authentication. As shown in FIG. 2 , it is a schematic flowchart of KMS key management.
基于GBA,KMS能够利用运营商为上层应用业务提供的统一认证能力建立与主被叫终端之间的安全关联,加密传输会话密钥等信息。Based on GBA, KMS can use the unified authentication capability provided by the operator for upper-layer application services to establish a security association with the calling and called terminals, and encrypt and transmit information such as session keys.
但是,由于GBA认证的核心实体BSF(Bean Scripting Framework)由运营商管理维护,负责生成维护KMS与终端设备之间的会话密钥,因此,运营商实际负责密钥安全传输通道的建立,终端设备需要的会话密钥传输的安全性依赖于运营商。这样,KMS密钥管理方案不能满足终端设备对密钥管理的高安全等级需求,更不适于运营商开展保密通信业务。However, since the GBA-certified core entity BSF (Bean Scripting Framework) is managed and maintained by the operator, it is responsible for generating and maintaining the session key between the KMS and the terminal device. Therefore, the operator is actually responsible for the establishment of a secure key transmission channel, and the terminal device The security of the required session key transmission is operator-dependent. In this way, the KMS key management scheme cannot meet the high security level requirements for key management of terminal devices, and is even less suitable for operators to carry out confidential communication services.
由此可见,目前IMS网络中媒体面承载传输的用户业务信息进行端到端加密保护的方式既无法满足用户与运营商各自需求,又存在安全性较低的问题。It can be seen that the current method for end-to-end encryption and protection of user service information carried and transmitted on the media plane in the IMS network cannot meet the respective needs of users and operators, and has the problem of low security.
发明内容SUMMARY OF THE INVENTION
本发明实施例提供了一种保密通信业务的处理方法、设备和系统,用于解决目前IMS网络中媒体面承载传输的用户业务信息进行端到端加密保护的方式存在的既无法满足用户与运营商各自需求,又使得媒体面数据传输安全性较低的问题。Embodiments of the present invention provide a method, device and system for processing confidential communication services, which are used to solve the problem that the current method of performing end-to-end encryption and protection of user service information carried and transmitted on the media plane in the IMS network cannot meet the needs of users and operations. According to the respective needs of the merchants, the security of data transmission on the media plane is relatively low.
一种保密通信业务的处理方法,包括:A method for processing confidential communication services, comprising:
加密应用服务器EAS接收第一终端设备发送的保密通信业务建立请求消息,其中,所述保密通信业务建立请求消息用于表征所述第一终端设备与第二终端设备之间需要建立保密通信业务,所述保密通信业务建立请求消息中包含了用于获取会话密钥的参数信息;The encryption application server EAS receives a secure communication service establishment request message sent by the first terminal device, wherein the secure communication service establishment request message is used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device, The confidential communication service establishment request message includes parameter information for obtaining the session key;
所述EAS将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC,其中,所述会话密钥请求消息用于表征请求所述KMC为所述第一终端设备和所述第二终端设备之间需要建立的保密通信业务产生会话密钥;The EAS carries the parameter information for acquiring the session key in the session key request message and sends it to the key management center KMC to which the first terminal device and the second terminal device belong, wherein the The session key request message is used to represent a request to the KMC to generate a session key for a secure communication service that needs to be established between the first terminal device and the second terminal device;
所述EAS接收所述KMC返回的加密后的会话密钥,并将加密后的所述会话密钥发送给所述第一终端设备,使得所述第一终端设备能够利用所述会话密钥实现与所述第二终端设备之间的保密通信,其中,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的。The EAS receives the encrypted session key returned by the KMC, and sends the encrypted session key to the first terminal device, so that the first terminal device can use the session key to achieve Confidential communication with the second terminal device, wherein the encrypted session key is the session key generated by the KMC according to the parameter information for obtaining the session key. obtained after.
所述用于获取会话密钥的参数信息中包含了所述第一终端设备的标识信息和所述第二终端设备的标识信息;The parameter information for obtaining the session key includes the identification information of the first terminal device and the identification information of the second terminal device;
所述EAS在将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC之前,所述方法还包括:Before the EAS carries the parameter information for acquiring the session key in the session key request message and sends it to the key management center KMC to which the first terminal device and the second terminal device belong, the Methods also include:
所述EAS根据所述第一终端设备的标识信息和所述第二终端设备的标识信息,确定所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC。The EAS determines, according to the identification information of the first terminal device and the identification information of the second terminal device, the key management center KMC to which the first terminal device and the second terminal device belong.
所述方法还包括:The method also includes:
所述EAS将加密后的会话密钥发送给所述第二终端设备,使得所述第二终端设备能够利用所述会话密钥实现与所述第一终端设备之间的保密通信。The EAS sends the encrypted session key to the second terminal device, so that the second terminal device can use the session key to implement secure communication with the first terminal device.
所述EAS将加密后的会话密钥发送给所述第一终端设备和/或者第二终端设备,包括:The EAS sends the encrypted session key to the first terminal device and/or the second terminal device, including:
所述EAS通过IMS网络信令将加密后的会话密钥发送给所述第一终端设备和/或者第二终端设备。The EAS sends the encrypted session key to the first terminal device and/or the second terminal device through IMS network signaling.
所述加密后的会话密钥包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥;The encrypted session key includes a session key encrypted with the first protection key and a session key encrypted with the second protection key;
所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的,包括:The encrypted session key is obtained after the KMC encrypts the generated session key according to the parameter information for obtaining the session key, including:
所述KMC根据所述用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对产生的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及The KMC determines, according to the identification information of the first terminal device included in the parameter information for obtaining the session key, that the first terminal device corresponding to the identification information of the first terminal device is logged into the KMC. generating the first protection key, and using the first protection key to perform an encryption operation on the generated session key to obtain a session key encrypted with the first protection key; and
根据所述用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥,并利用所述第二保护密钥对产生的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥。According to the identification information of the second terminal device included in the parameter information for obtaining the session key, determine the first terminal device generated when the second terminal device corresponding to the identification information of the second terminal device logs in to the KMC. two protection keys, and the generated session key is encrypted by using the second protection key to obtain a session key encrypted by the second protection key.
一种保密通信业务的处理方法,包括:A method for processing confidential communication services, comprising:
第一终端设备向加密应用服务器EAS发送保密通信业务建立请求消息,其中,所述保密通信业务建立请求消息用于表征所述第一终端设备与第二终端设备之间需要建立保密通信业务,所述保密通信业务建立请求消息中包含了用于获取会话密钥的参数信息;The first terminal device sends a secure communication service establishment request message to the encryption application server EAS, wherein the secure communication service establishment request message is used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device, so The secure communication service establishment request message includes parameter information for obtaining the session key;
所述第一终端设备接收所述EAS发送的加密后的会话密钥,其中,所述加密后的会话密钥是所述EAS将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC,由所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的,所述会话密钥请求消息用于表征请求所述KMC为所述第一终端设备和所述第二终端设备之间需要建立的保密通信业务产生会话密钥。The first terminal device receives the encrypted session key sent by the EAS, wherein the encrypted session key is that the EAS carries the parameter information for obtaining the session key in the session key. The request message is sent to the key management center KMC to which the first terminal device and the second terminal device belong, and the KMC encrypts the generated session key according to the parameter information used to obtain the session key Obtained after processing, the session key request message is used to represent a request for the KMC to generate a session key for a secure communication service that needs to be established between the first terminal device and the second terminal device.
所述方法还包括:The method also includes:
所述第一终端设备在接收所述EAS发送的加密后的会话密钥时,将所述加密后的会话密钥发送给所述第二终端设备。When receiving the encrypted session key sent by the EAS, the first terminal device sends the encrypted session key to the second terminal device.
所述第一终端设备将所述加密后的会话密钥发送给所述第二终端设备,包括:The first terminal device sends the encrypted session key to the second terminal device, including:
所述第一终端设备通过IMS网络信令将所述加密后的会话密钥发送给所述第二终端设备;sending, by the first terminal device, the encrypted session key to the second terminal device through IMS network signaling;
或者,or,
所述第一终端设备通过建立的与第二终端设备的媒体面数据传输通道将所述加密后的会话密钥发送给所述第二终端设备。The first terminal device sends the encrypted session key to the second terminal device through the established media plane data transmission channel with the second terminal device.
所述方法还包括:The method also includes:
所述第一终端设备在接收所述EAS发送的加密后的会话密钥时,利用登录所述KMC时产生的第一保护密钥对所述加密后的会话密钥进行解密,得到所述KMC为所述第一终端设备与所述第二终端设备之间进行保密通信业务产生的会话密钥。When receiving the encrypted session key sent by the EAS, the first terminal device decrypts the encrypted session key by using the first protection key generated when logging in to the KMC to obtain the KMC. A session key generated for a secure communication service between the first terminal device and the second terminal device.
一种保密通信业务的处理方法,包括:A method for processing confidential communication services, comprising:
密钥管理中心KMC接收加密应用服务器EAS发送的会话密钥请求消息,其中,所述会话密钥请求消息用于表征请求所述KMC为第一终端设备和第二终端设备之间需要建立的保密通信业务产生会话密钥,所述会话密钥请求消息中包含了用于获取会话密钥的参数信息,所述用于获取会话密钥的参数信息是所述EAS接收到的所述第一终端设备发送的用于表征所述第一终端设备与所述第二终端设备之间需要建立保密通信业务的保密通信业务建立请求消息中携带的;并The key management center KMC receives the session key request message sent by the encryption application server EAS, wherein the session key request message is used to represent the request for the KMC to be a secret that needs to be established between the first terminal device and the second terminal device. The communication service generates a session key, the session key request message includes parameter information for obtaining the session key, and the parameter information for obtaining the session key is the first terminal received by the EAS. carried in a secure communication service establishment request message that is sent by the device and is used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device; and
向所述EAS返回加密后的会话密钥,以便于所述EAS将加密后的所述会话密钥发送给所述第一终端设备,使得所述第一终端设备能够利用所述会话密钥实现与所述第二终端设备之间的保密通信,其中,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的。Return the encrypted session key to the EAS, so that the EAS sends the encrypted session key to the first terminal device, so that the first terminal device can use the session key to realize Confidential communication with the second terminal device, wherein the encrypted session key is the session key generated by the KMC according to the parameter information for obtaining the session key. obtained after.
所述用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息和第二终端设备的标识信息;The identification information of the first terminal device and the identification information of the second terminal device included in the parameter information for obtaining the session key;
所述KMC向所述EAS返回加密后的会话密钥,包括:The KMC returns the encrypted session key to the EAS, including:
所述KMC生成用于为所述第一终端设备与所述第二终端设备之间执行保密通信业务需要的会话密钥;The KMC generates a session key required for performing a secure communication service between the first terminal device and the second terminal device;
所述KMC根据用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对生成的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及According to the identification information of the first terminal device included in the parameter information for obtaining the session key, the KMC determines that the first terminal device corresponding to the identification information of the first terminal device is generated when logging in to the KMC. a first protection key, and perform an encryption operation on the generated session key by using the first protection key to obtain a session key encrypted by using the first protection key; and
根据用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥;并利用所述第二保护密钥对生成的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥;According to the identification information of the second terminal device included in the parameter information for acquiring the session key, determine the second protection generated by the second terminal device corresponding to the identification information of the second terminal device when logging in to the KMC and use the second protection key to encrypt the generated session key to obtain a session key encrypted by the second protection key;
所述KMC将所述利用第一保护密钥加密后的会话密钥和所述利用第二保护密钥加密后的会话密钥作为加密后的会话密钥,通过密钥响应消息发送给所述EAS。The KMC uses the session key encrypted with the first protection key and the session key encrypted with the second protection key as the encrypted session key, and sends it to the KMC through a key response message. EAS.
一种用于保密通信业务的加密应用服务器,包括:An encrypted application server for confidential communication services, comprising:
接收模块,用于接收第一终端设备发送的保密通信业务建立请求消息,其中,所述保密通信业务建立请求消息用于表征所述第一终端设备与第二终端设备之间需要建立保密通信业务,所述保密通信业务建立请求消息中包含了用于获取会话密钥的参数信息;A receiving module, configured to receive a secure communication service establishment request message sent by a first terminal device, wherein the secure communication service establishment request message is used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device , the confidential communication service establishment request message includes parameter information for obtaining the session key;
发送模块,用于将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC,其中,所述会话密钥请求消息用于表征请求所述KMC为所述第一终端设备和所述第二终端设备之间需要建立的保密通信业务产生会话密钥;A sending module, configured to carry the parameter information for obtaining the session key in a session key request message and send it to the key management center KMC to which the first terminal device and the second terminal device belong, wherein, The session key request message is used to represent a request to the KMC to generate a session key for a secure communication service that needs to be established between the first terminal device and the second terminal device;
处理模块,用于接收所述KMC返回的加密后的会话密钥,并将加密后的所述会话密钥发送给所述第一终端设备,使得所述第一终端设备能够利用所述会话密钥实现与所述第二终端设备之间的保密通信,其中,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的。A processing module, configured to receive the encrypted session key returned by the KMC, and send the encrypted session key to the first terminal device, so that the first terminal device can use the session key secret communication with the second terminal device, wherein the encrypted session key is the session key generated by the KMC according to the parameter information for obtaining the session key. obtained after encryption.
所述用于获取会话密钥的参数信息中包含了所述第一终端设备的标识信息和所述第二终端设备的标识信息;The parameter information for obtaining the session key includes the identification information of the first terminal device and the identification information of the second terminal device;
所述加密应用服务器还包括:The encrypted application server also includes:
确定模块,用于在将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC之前,根据所述第一终端设备的标识信息和所述第二终端设备的标识信息,确定所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC。A determining module, configured to carry the parameter information for obtaining the session key in the session key request message and send it to the key management center KMC to which the first terminal device and the second terminal device belong, The key management center KMC to which the first terminal device and the second terminal device belong is determined according to the identification information of the first terminal device and the identification information of the second terminal device.
所述处理模块,还用于将加密后的会话密钥发送给所述第二终端设备,使得所述第二终端设备能够利用所述会话密钥实现与所述第一终端设备之间的保密通信。The processing module is further configured to send the encrypted session key to the second terminal device, so that the second terminal device can use the session key to achieve confidentiality with the first terminal device communication.
所述处理模块,具体用于通过IMS网络信令将加密后的会话密钥发送给所述第一终端设备和/或者第二终端设备。The processing module is specifically configured to send the encrypted session key to the first terminal device and/or the second terminal device through IMS network signaling.
所述加密后的会话密钥包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥;The encrypted session key includes a session key encrypted with the first protection key and a session key encrypted with the second protection key;
所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的,包括:The encrypted session key is obtained after the KMC encrypts the generated session key according to the parameter information for obtaining the session key, including:
所述KMC根据所述用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对产生的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及The KMC determines, according to the identification information of the first terminal device included in the parameter information for obtaining the session key, that the first terminal device corresponding to the identification information of the first terminal device is logged into the KMC. generating the first protection key, and using the first protection key to perform an encryption operation on the generated session key to obtain a session key encrypted with the first protection key; and
根据所述用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥,并利用所述第二保护密钥对产生的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥。According to the identification information of the second terminal device included in the parameter information for obtaining the session key, determine the first terminal device generated when the second terminal device corresponding to the identification information of the second terminal device logs in to the KMC. two protection keys, and the generated session key is encrypted by using the second protection key to obtain a session key encrypted by the second protection key.
一种执行保密通信业务的终端设备,包括:A terminal device for performing confidential communication services, comprising:
请求消息发送模块,用于向加密应用服务器EAS发送保密通信业务建立请求消息,其中,所述保密通信业务建立请求消息用于表征所述第一终端设备与第二终端设备之间需要建立保密通信业务,所述保密通信业务建立请求消息中包含了用于获取会话密钥的参数信息;A request message sending module, configured to send a secure communication service establishment request message to the encryption application server EAS, wherein the secure communication service establishment request message is used to indicate that secure communication needs to be established between the first terminal device and the second terminal device service, the confidential communication service establishment request message includes parameter information for obtaining the session key;
会话密钥接收模块,用于接收所述EAS发送的加密后的会话密钥,其中,所述加密后的会话密钥是所述EAS将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC,由所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的,所述会话密钥请求消息用于表征请求所述KMC为所述第一终端设备和所述第二终端设备之间需要建立的保密通信业务产生会话密钥。The session key receiving module is configured to receive the encrypted session key sent by the EAS, wherein the encrypted session key is the parameter information that the EAS carries in the session key for obtaining the session key. The key request message is sent to the key management center KMC to which the first terminal device and the second terminal device belong, and the KMC pairs the generated session key according to the parameter information used to obtain the session key. Obtained after performing encryption processing, the session key request message is used to represent a request for the KMC to generate a session key for a secure communication service that needs to be established between the first terminal device and the second terminal device.
所述终端设备还包括:The terminal equipment also includes:
处理模块,用于在接收所述EAS发送的加密后的会话密钥时,将所述加密后的会话密钥发送给所述第二终端设备。The processing module is configured to send the encrypted session key to the second terminal device when receiving the encrypted session key sent by the EAS.
所述处理模块,具体用于通过IMS网络信令将所述加密后的会话密钥发送给所述第二终端设备;The processing module is specifically configured to send the encrypted session key to the second terminal device through IMS network signaling;
或者,or,
通过建立的与所述第二终端设备之间的媒体面数据传输通道将所述加密后的会话密钥发送给所述第二终端设备。The encrypted session key is sent to the second terminal device through the established media plane data transmission channel with the second terminal device.
所述终端设备还包括:The terminal equipment also includes:
解密模块,用于在接收所述EAS发送的加密后的会话密钥时,利用登录所述KMC时产生的第一保护密钥对所述加密后的会话密钥进行解密,得到所述KMC为所述第一终端设备与所述第二终端设备之间进行保密通信业务产生的会话密钥。The decryption module is configured to decrypt the encrypted session key using the first protection key generated when logging in to the KMC when receiving the encrypted session key sent by the EAS, and obtain the KMC as: The session key generated by the secure communication service between the first terminal device and the second terminal device.
一种用于保密通信业务的密钥管理中心,包括:A key management center for confidential communication services, comprising:
密钥请求接收模块,用于接收加密应用服务器EAS发送的会话密钥请求消息,其中,所述会话密钥请求消息用于表征请求所述KMC为第一终端设备和第二终端设备之间需要建立的保密通信业务产生会话密钥,所述会话密钥请求消息中包含了用于获取会话密钥的参数信息,所述用于获取会话密钥的参数信息是所述EAS接收到的所述第一终端设备发送的用于表征所述第一终端设备与所述第二终端设备之间需要建立保密通信业务的保密通信业务建立请求消息中携带的;并The key request receiving module is configured to receive the session key request message sent by the encryption application server EAS, wherein the session key request message is used to represent that the KMC is requested to be required between the first terminal device and the second terminal device The established confidential communication service generates a session key, and the session key request message includes parameter information for obtaining the session key, and the parameter information for obtaining the session key is the parameter information received by the EAS. carried in a secure communication service establishment request message sent by the first terminal device and used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device; and
密钥发送模块,用于向所述EAS返回加密后的会话密钥,以便于所述EAS将加密后的所述会话密钥发送给所述第一终端设备,使得所述第一终端设备能够利用所述会话密钥实现与所述第二终端设备之间的保密通信,其中,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的。A key sending module, configured to return the encrypted session key to the EAS, so that the EAS sends the encrypted session key to the first terminal device, so that the first terminal device can Use the session key to implement secure communication with the second terminal device, wherein the encrypted session key is generated by the KMC according to the pair of parameter information used to obtain the session key obtained after encrypting the session key.
所述用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息和第二终端设备的标识信息;The identification information of the first terminal device and the identification information of the second terminal device included in the parameter information for obtaining the session key;
所述密钥发送模块,具体用于生成用于为所述第一终端设备与所述第二终端设备之间执行保密通信业务需要的会话密钥,根据用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对生成的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及The key sending module is specifically configured to generate a session key required for performing a confidential communication service between the first terminal device and the second terminal device, according to the parameter information used to obtain the session key. Include the identification information of the first terminal device, determine the first protection key generated by the first terminal device corresponding to the identification information of the first terminal device when logging in the KMC, and use the first protection key. encrypting the generated session key with the key to obtain a session key encrypted with the first protection key; and
根据用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥;并利用所述第二保护密钥对生成的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥;According to the identification information of the second terminal device included in the parameter information for acquiring the session key, determine the second protection generated by the second terminal device corresponding to the identification information of the second terminal device when logging in to the KMC and use the second protection key to encrypt the generated session key to obtain a session key encrypted by the second protection key;
将所述利用第一保护密钥加密后的会话密钥和所述利用第二保护密钥加密后的会话密钥作为加密后的会话密钥,通过密钥响应消息发送给所述EAS。The session key encrypted with the first protection key and the session key encrypted with the second protection key are used as the encrypted session key, and sent to the EAS through a key response message.
一种保密通信业务的处理系统,所述系统包括:上述的加密应用服务器、上述的终端设备以及上述的密钥管理中心。A processing system for confidential communication services, the system includes: the above-mentioned encryption application server, the above-mentioned terminal equipment, and the above-mentioned key management center.
本发明有益效果如下:The beneficial effects of the present invention are as follows:
本发明实施例在IMS网络中引入加密应用服务器和密钥管理中心,通过加密应用服务器在接收到第一终端设备发送的用于表征第一终端设备与第二终端设备之间需要建立保密通信业务的保密通信业务建立请求消息,将保密通信业务建立请求消息中包含的用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给第一终端设备和第二终端设备所属的密钥管理中心,请求密钥管理中心为第一终端设备和第二终端设备之间需要建立的保密通信业务产生会话密钥,并在接收到密钥管理中心返回的加密后的会话密钥时,将该加密后的会话密钥发送给第一终端设备,使得第一终端设备能够利用该会话密钥实现与第二终端设备之间的保密通信。这样,通过加密应用服务器使得保密通信作为运营商提供给用户的一种业务实现,并且加密应用服务器从密钥管理中心获取加密后的会话密钥,下发给终端设备,不仅增加了运营商对保密通信的控制力,还提高了系统的处理效率,同时引入的密钥管理中心实现了用户对密钥全生命周期的管理,增加了用户之间保密通信业务执行的安全性。In this embodiment of the present invention, an encryption application server and a key management center are introduced into the IMS network, and the encryption application server receives a message sent by the first terminal device to indicate that a confidential communication service needs to be established between the first terminal device and the second terminal device. The secure communication service establishment request message, the parameter information for obtaining the session key contained in the secure communication service establishment request message is carried in the session key request message and sent to the keys belonging to the first terminal device and the second terminal device. The management center, requesting the key management center to generate a session key for the confidential communication service that needs to be established between the first terminal device and the second terminal device, and when receiving the encrypted session key returned by the key management center, The encrypted session key is sent to the first terminal device, so that the first terminal device can use the session key to implement secure communication with the second terminal device. In this way, the encrypted application server enables secure communication as a service provided by the operator to the user, and the encrypted application server obtains the encrypted session key from the key management center and issues it to the terminal device, which not only increases the operator's confidence in The control power of confidential communication also improves the processing efficiency of the system. At the same time, the introduced key management center realizes the management of the whole life cycle of keys by users, and increases the security of the execution of confidential communication services between users.
附图说明Description of drawings
图1为SDES密钥管理的工作流程示意图;Fig. 1 is the workflow schematic diagram of SDES key management;
图2为KMS密钥管理的流程示意图;Fig. 2 is the schematic flow chart of KMS key management;
图3为本发明实施例一提供的一种保密通信业务的处理方法的流程示意图;3 is a schematic flowchart of a method for processing a confidential communication service according to Embodiment 1 of the present invention;
图4为本发明实施例二提供的一种保密通信业务的处理方法的流程示意图;4 is a schematic flowchart of a method for processing a confidential communication service according to Embodiment 2 of the present invention;
图5为本发明实施例三提供的一种保密通信业务的处理方法的流程示意图;5 is a schematic flowchart of a method for processing a confidential communication service according to Embodiment 3 of the present invention;
图6为本发明实施例四提供的一种保密通信业务的处理方法的流程示意图;6 is a schematic flowchart of a method for processing a confidential communication service according to Embodiment 4 of the present invention;
图7为本发明实施例五提供的一种用于保密通信业务的加密应用服务器的结构示意图;FIG. 7 is a schematic structural diagram of an encryption application server used for a secure communication service according to Embodiment 5 of the present invention;
图8为本发明实施例六提供的一种执行保密通信业务的终端设备的结构示意图;FIG. 8 is a schematic structural diagram of a terminal device for executing a confidential communication service according to Embodiment 6 of the present invention;
图9为本发明实施例七提供的一种用于保密通信业务的密钥管理中心的结构示意图;9 is a schematic structural diagram of a key management center for a secure communication service according to Embodiment 7 of the present invention;
图10为本发明实施例八提供的一种保密通信业务的处理系统的结构示意图。FIG. 10 is a schematic structural diagram of a system for processing a secure communication service according to Embodiment 8 of the present invention.
具体实施方式Detailed ways
为了实现本发明的目的,本发明实施例提供了一种保密通信业务的处理方法、设备和系统,在IMS网络中引入加密应用服务器和密钥管理中心,通过加密应用服务器在接收到第一终端设备发送的用于表征第一终端设备与第二终端设备之间需要建立保密通信业务的保密通信业务建立请求消息,将保密通信业务建立请求消息中包含的用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给第一终端设备和第二终端设备所属的密钥管理中心,请求密钥管理中心为第一终端设备和第二终端设备之间需要建立的保密通信业务产生会话密钥,并在接收到密钥管理中心返回的加密后的会话密钥时,将该加密后的会话密钥发送给第一终端设备,使得第一终端设备能够利用该会话密钥实现与第二终端设备之间的保密通信。In order to achieve the purpose of the present invention, the embodiments of the present invention provide a method, device and system for processing a confidential communication service. An encryption application server and a key management center are introduced into the IMS network. A secure communication service establishment request message sent by the device to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device, and the confidential communication service establishment request message to carry the parameter information for obtaining the session key that is included in the secure communication service establishment request message. The session key request message is sent to the key management center to which the first terminal device and the second terminal device belong, and requests the key management center to generate a session for the secure communication service that needs to be established between the first terminal device and the second terminal device key, and when receiving the encrypted session key returned by the key management center, send the encrypted session key to the first terminal device, so that the first terminal device can use the session key to communicate with the first terminal device. Secure communication between two terminal devices.
这样,通过加密应用服务器使得保密通信作为运营商提供给用户的一种业务实现,并且加密应用服务器从密钥管理中心获取加密后的会话密钥,下发给终端设备,不仅增加了运营商对保密通信的控制力,还提高了系统的处理效率,同时引入的密钥管理中心实现了用户对密钥全生命周期的管理,增加了用户之间保密通信业务执行的安全性。In this way, the encrypted application server enables secure communication as a service provided by the operator to the user, and the encrypted application server obtains the encrypted session key from the key management center and issues it to the terminal device, which not only increases the operator's confidence in The control power of confidential communication also improves the processing efficiency of the system. At the same time, the introduced key management center realizes the management of the whole life cycle of keys by users, and increases the security of the execution of confidential communication services between users.
需要说明的是,本发明实施例应用的系统架构包括但不限于IMS核心网络(例如:包含了SBC(Session Border Controller,会话边界控制器)、P-CSCF(Proxy Call SessionControl Function,代理呼叫会话控制功能)、S-CSCF(Serving Call Session ControlFunction,服务呼叫会话控制功能)、HSS(Home Subscriber Server,归属用户服务器)、MGCF(Media Gateway Control Function,媒体网关控制功能)、MGW(Media Gateway,媒体网关)等网元设备;此外,当系统构架中包含了SIP(Session Initiation Protocol,会话初始协议)服务器时,也可以使用本发明实施例提供的技术方案,实现由SIP系统为用户提供保密通信业务,这里不做具体限定。It should be noted that the system architecture applied in the embodiment of the present invention includes but is not limited to the IMS core network (for example, including SBC (Session Border Controller, session border controller), P-CSCF (Proxy Call Session Control Function, proxy call session control function) Function), S-CSCF (Serving Call Session Control Function, Serving Call Session Control Function), HSS (Home Subscriber Server, Home Subscriber Server), MGCF (Media Gateway Control Function, Media Gateway Control Function), MGW (Media Gateway, Media Gateway) ) and other network element equipment; in addition, when a SIP (Session Initiation Protocol, session initiation protocol) server is included in the system architecture, the technical solutions provided by the embodiments of the present invention can also be used to realize that the SIP system provides users with confidential communication services, There is no specific limitation here.
本发明各个实施例中涉及的加密应用服务器(EAS,Encryption ApplicationServer),用于为终端设备提供保密通信业务(其中,保密通信业务包括但不限于加密语音通话业务、加密视频通话业务、加密会议通话业务、加密短信业务、加密文件传输业务、加密邮件业务等)。EAS具备的功能包括:一方面,EAS兼容有IMS网络系统中AS(ApplicationServer,应用服务器)会话业务逻辑出发功能,能够从IMS网络的核心实体S-CSCF中接收终端设备发起的业务请求消息,触发保密通信业务以及负责各种控制面呼叫处理和连接控制,并对执行的业务进行计费;另一方面,EAS通过设置的安全接口与密钥管理中心(KMC,Key Management Center)进行通信,能够根据业务处理逻辑完成终端设备在KMC上的注册、身份鉴权、密钥管理等方面信息的传输,支持终端设备与KMC之间的信令交互。The encryption application server (EAS, Encryption Application Server) involved in various embodiments of the present invention is used to provide a confidential communication service for terminal devices (wherein the confidential communication service includes but is not limited to encrypted voice call service, encrypted video call service, encrypted conference call business, encrypted SMS business, encrypted file transfer business, encrypted mail business, etc.). The functions of EAS include: On the one hand, EAS is compatible with the function of starting the session business logic of AS (Application Server, application server) in the IMS network system, and can receive service request messages initiated by terminal equipment from the core entity S-CSCF of the IMS network, triggering Secrecy communication services and responsible for various control plane call processing and connection control, and charging for the executed services; on the other hand, EAS communicates with the Key Management Center (KMC, Key Management Center) through the set security interface, which can According to the business processing logic, the registration of the terminal equipment on the KMC, identity authentication, key management and other aspects of information transmission are completed, and the signaling interaction between the terminal equipment and the KMC is supported.
本发明各个实施例中涉及的密钥管理中心(KMC),用于对保密通信业务需要的密钥进行管理,具体包括但不限于:生成密钥、注入密钥、分发密钥、存储密钥、归档密钥、导出密钥、更新密钥以及销毁密钥等在内的全生命周期的密钥管理。KMC通过安全接口与EAS进行通信,能够通过EAS接收来自终端设备的密码请求消息,完成终端设备的注册、身份鉴权、密钥分发等操作,还能够通过EAS向终端设备中的密码模块下发控制指令,实现对终端设备中的密码模块的远程控制,例如:KMC实现对终端设备中包含了密码模块的管理,能够远程销毁终端设备中的密码模块。The key management center (KMC) involved in the various embodiments of the present invention is used to manage the keys required by the confidential communication service, including but not limited to: generating keys, injecting keys, distributing keys, storing keys , archiving keys, exporting keys, updating keys, and destroying keys, including full-life-cycle key management. The KMC communicates with the EAS through the secure interface, and can receive the password request message from the terminal device through the EAS, complete the registration, identity authentication, key distribution and other operations of the terminal device, and can also issue the password module in the terminal device through the EAS The control command realizes the remote control of the cryptographic module in the terminal device, for example: KMC realizes the management of the cryptographic module included in the terminal device, and can remotely destroy the cryptographic module in the terminal device.
此外,为了提升用户对运营商保密业务服务的信任度,实现用户对KMC的自行部署。In addition, in order to improve the user's trust in the operator's confidential business service, the user's self-deployment of KMC is realized.
本发明各个实施例中涉及的终端设备,该终端设备包含了IP通信模块和密码通信模块。其中,IP通信模块支持SIP通信协议,具有IMS通信能力,支持终端在IMS系统的登录/注销、身份认证、呼叫控制与处理等功能;密码模块负责终端密钥管理并执行加解密算法,在控制面,实现与KMC进行信令交互获得会话密钥,在媒体面,利用获取的会话密钥建立与对端设备的安全关联,实现通信业务的保密传输。In the terminal device involved in each embodiment of the present invention, the terminal device includes an IP communication module and a cryptographic communication module. Among them, the IP communication module supports the SIP communication protocol, has IMS communication capabilities, and supports functions such as terminal login/logout, identity authentication, call control and processing in the IMS system; the cryptographic module is responsible for terminal key management and executes encryption and decryption algorithms. On the side, it implements signaling interaction with the KMC to obtain the session key. On the media side, the acquired session key is used to establish a security association with the peer device, so as to realize the secure transmission of communication services.
下面结合说明书附图对本发明各个实施例进行详细描述。The various embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
实施例一:Example 1:
如图3所示,为本发明实施例一提供的一种保密通信业务的处理方法的流程示意图,所述方法可以如下所述。As shown in FIG. 3 , it is a schematic flowchart of a method for processing a secure communication service according to Embodiment 1 of the present invention, and the method may be as follows.
步骤101:EAS接收第一终端设备发送的保密通信业务建立请求消息。Step 101: The EAS receives a secure communication service establishment request message sent by the first terminal device.
其中,所述保密通信业务建立请求消息用于表征所述第一终端设备与第二终端设备之间需要建立保密通信业务,所述保密通信业务建立请求消息中包含了用于获取会话密钥的参数信息。The secure communication service establishment request message is used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device, and the secure communication service establishment request message includes a session key for obtaining a session key. Parameter information.
在步骤101中,第一终端设备在呼叫第二终端设备时,向IMS网络发送保密通信业务建立请求消息,并由IMS网络核心网将该保密通信业务请求消息转发给EAS,告知EAS第一终端设备将与第二终端设备之间建立保密通信业务。In step 101, when calling the second terminal device, the first terminal device sends a secure communication service establishment request message to the IMS network, and the IMS network core network forwards the secure communication service request message to the EAS to inform the EAS first terminal The device will establish a secure communication service with the second terminal device.
需要说明的是,此时第一终端设备发送的保密通信业务建立请求消息可以通过第一终端设备发起的呼叫建立请求消息实现,也就是说,在第一终端设备发起呼叫第二终端设备之时,向IMS网络发送呼叫建立消息,此时该呼叫建立消息具备两个功能:1、请求与第二终端设备之间建立呼叫连接;2、建立呼叫连接的同时触发保密通信业务。It should be noted that, at this time, the confidential communication service establishment request message sent by the first terminal device may be implemented through a call establishment request message initiated by the first terminal device, that is, when the first terminal device initiates a call to the second terminal device. , and send a call setup message to the IMS network. At this time, the call setup message has two functions: 1. Request to establish a call connection with the second terminal device; 2. Trigger a secure communication service while establishing the call connection.
或者,此时第一终端发送的保密通信业务建立请求消息是在第一终端设备发起呼叫建立请求消息之后随机触发的。Or, at this time, the secure communication service establishment request message sent by the first terminal is randomly triggered after the first terminal device initiates the call establishment request message.
例如,第一终端设备在与第二终端设备成功建立呼叫链路之后,并在呼叫业务处理的过程中,向IMS网络发送保密通信业务建立请求消息,并由IMS网络核心网将该保密通信业务请求消息转发给EAS,告知EAS第一终端设备需要与第二终端设备之间进行保密通信业务。For example, after the first terminal device successfully establishes a call link with the second terminal device, and during the process of call service processing, it sends a request message for establishing a confidential communication service to the IMS network, and the IMS network core network sends the confidential communication service establishment request message to the IMS network. The request message is forwarded to the EAS to inform the EAS that the first terminal device needs to perform a secure communication service with the second terminal device.
也就是说,终端设备之间的呼叫连接建立与保密通信业务触发可以是同时执行的,也可以是不同时执行的,先触发保密通信业务,再建立呼叫连接,或者先建立呼叫连接,再触发保密通信业务都可以。That is to say, the establishment of the call connection between the terminal devices and the triggering of the secure communication service may be executed at the same time, or may not be executed at the same time, the secure communication service is triggered first, and then the call connection is established, or the call connection is established first, and then the Confidential communication services are available.
加密应用服务器在接收到第一终端设备发送的保密通信业务建立请求消息时,启动后续保密通信业务处理流程。When receiving the secure communication service establishment request message sent by the first terminal device, the encryption application server starts the subsequent secure communication service processing flow.
步骤102:所述EAS将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC。Step 102: The EAS carries the parameter information for acquiring the session key in a session key request message and sends it to the key management center KMC to which the first terminal device and the second terminal device belong.
其中,所述会话密钥请求消息用于表征请求所述KMC为所述第一终端设备和所述第二终端设备之间需要建立的保密通信业务产生会话密钥。The session key request message is used to represent a request for the KMC to generate a session key for a secure communication service that needs to be established between the first terminal device and the second terminal device.
所述用于获取会话密钥的参数信息中包含了所述第一终端设备的标识信息和所述第二终端设备的标识信息。The parameter information for acquiring the session key includes the identification information of the first terminal device and the identification information of the second terminal device.
需要说明的是,用于获取会话密钥的参数信息中至少包含了第一终端设备的标识信息、第二终端设备的标识信息、随机数等。It should be noted that the parameter information used to obtain the session key at least includes the identification information of the first terminal device, the identification information of the second terminal device, a random number, and the like.
在步骤102中,EAS根据所述第一终端设备的标识信息和所述第二终端设备的标识信息,确定第一终端设备和第二终端设备所属的密钥管理中心KMC。In step 102, the EAS determines the key management center KMC to which the first terminal device and the second terminal device belong according to the identification information of the first terminal device and the identification information of the second terminal device.
需要说明的是,本次呼叫建立的主被叫终端设备所属的密钥管理中心是同一个密钥管理中心,即第一终端设备和第二终端设备注册登录同一个密钥管理中心。It should be noted that the key management center to which the calling and called terminal devices of this call are established belong to the same key management center, that is, the first terminal device and the second terminal device register and log in to the same key management center.
这里,同一个集团用户群的主被叫终端设备组合成一个用户域,同一用户域内包含了至少一个密钥管理中心。Here, the calling and called terminal devices of the same group user group are combined into one user domain, and the same user domain includes at least one key management center.
也就是说,EAS根据第一终端设备的标识信息和第二终端设备的标识信息,确定第一终端设备和第二终端设备所属的用户域,并从该用户域内包含的至少一个密钥管理中心中选择一个密钥管理中心。That is to say, the EAS determines the user domain to which the first terminal device and the second terminal device belong according to the identification information of the first terminal device and the identification information of the second terminal device, and obtains information from at least one key management center included in the user domain. Select a key management center in .
EAS将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给确定的密钥管理中心KMC。The EAS carries the parameter information for acquiring the session key in the session key request message and sends it to the determined key management center KMC.
具体地,EAS通过安全接口向确定的KMC发送会话密钥请求消息,请求确定的密钥管理中心为第一终端设备和第二终端设备之间需要建立的保密通信业务产生会话密钥。Specifically, the EAS sends a session key request message to the determined KMC through the security interface, requesting the determined key management center to generate a session key for the secure communication service that needs to be established between the first terminal device and the second terminal device.
步骤103:所述EAS接收所述KMC返回的加密后的会话密钥,并将加密后的所述会话密钥发送给所述第一终端设备。Step 103: The EAS receives the encrypted session key returned by the KMC, and sends the encrypted session key to the first terminal device.
使得所述第一终端设备能够利用所述会话密钥实现与所述第二终端设备之间的保密通信。The first terminal device is enabled to implement secure communication with the second terminal device by using the session key.
其中,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的。The encrypted session key is obtained after the KMC encrypts the generated session key according to the parameter information for obtaining the session key.
在步骤103中,所述EAS将加密后的会话密钥发送给所述第一终端设备的方式,包括:In step 103, the manner in which the EAS sends the encrypted session key to the first terminal device includes:
所述EAS通过IMS网络信令将加密后的会话密钥发送给所述第一终端设备。The EAS sends the encrypted session key to the first terminal device through IMS network signaling.
具体地,所述EAS通过IMS网络中的SIP信令将加密后的会话密钥发送给所述第一终端设备。Specifically, the EAS sends the encrypted session key to the first terminal device through SIP signaling in the IMS network.
例如:SIP信令包含但不限于:MESSAGE消息、OPTIONS、INFO等。For example: SIP signaling includes but is not limited to: MESSAGE message, OPTIONS, INFO, etc.
或者,所述EAS通过IMS网络中的呼叫处理消息将加密后的会话密钥发送给所述第一终端设备。Alternatively, the EAS sends the encrypted session key to the first terminal device through a call processing message in the IMS network.
例如:呼叫建立响应消息、会话处理消息等。For example: call establishment response message, session processing message, etc.
具体地,第一终端设备与第二终端设备之间的呼叫建立与保密通信业务建立同步实施时,EAS在向KMC发送会话密钥请求消息之后,即可将第一终端设备发起的呼叫第二终端设备的呼叫建立请求消息转发给第二终端设备,试图与第二终端设备建立呼叫连接。Specifically, when the call establishment between the first terminal device and the second terminal device and the establishment of the confidential communication service are implemented synchronously, after the EAS sends the session key request message to the KMC, the call initiated by the first terminal device can be sent to the second terminal device to the second terminal device. The call establishment request message of the terminal device is forwarded to the second terminal device to attempt to establish a call connection with the second terminal device.
同时,EAS在接收到KMC发送的加密的会话密钥时,确定是否接收到第二终端设备的呼叫建立响应消息,并在接收到第二终端设备的呼叫建立响应消息时,利用接收到的呼叫建立响应消息将加密后的会话密钥发送给所述第一终端设备。At the same time, when receiving the encrypted session key sent by the KMC, the EAS determines whether to receive a call setup response message from the second terminal device, and uses the received call setup response message when receiving the call setup response message from the second terminal device. The establishment response message sends the encrypted session key to the first terminal device.
需要说明的是,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的,具体实施方式包括但不限于:It should be noted that the encrypted session key is obtained after the KMC encrypts the generated session key according to the parameter information used to obtain the session key. Limited to:
首先,KMC在接收到EAS发送的会话密钥请求消息之后,生成针对第一终端设备与第二终端设备之间建立保密通信业务的会话密钥。First, after receiving the session key request message sent by the EAS, the KMC generates a session key for establishing a secure communication service between the first terminal device and the second terminal device.
需要说明的是,KMC在接收到EAS发送的会话密钥请求消息之后,生成的会话密钥可以是随机产生的,也可以是根据该会话密钥请求消息中携带的用于获取会话密钥的参数信息确定的,例如:利用用于获取会话密钥的参数信息中的随机数信息生成的会话密钥等等,这里不做限定。It should be noted that, after the KMC receives the session key request message sent by the EAS, the generated session key may be randomly generated, or it may be based on the information carried in the session key request message and used to obtain the session key. The parameter information is determined, for example, the session key is generated by using the random number information in the parameter information for obtaining the session key, etc., which is not limited here.
其次,为了保证会话密钥在通信链路中传输的安全性,KMC对生成的会话密钥进行加密处理。Secondly, in order to ensure the security of the session key transmission in the communication link, KMC encrypts the generated session key.
由于KMC是用户部署的,那么用户所使用的终端设备在进行通信时,可以先注册登录KMC,并在登录时,KMC为该终端设备生成一个保护密钥,KMC在本地存储终端设备的标识信息和该保护密钥的对应关系,那么后续终端设备发起保密通信业务时,KMC就能够利用该保护密钥对生成的会话密钥进行加密处理,既能够保证会话密钥在通信链路传输过程中的安全性,还能够使得终端接收到加密后的会话密钥时,准确解密,获取真正的会话密钥,提高了保密通信业务的效率,保障了通信的安全。Since the KMC is deployed by the user, the terminal device used by the user can first register and log in to the KMC when communicating, and when logging in, the KMC generates a protection key for the terminal device, and the KMC stores the identification information of the terminal device locally. The corresponding relationship with the protection key, then when the subsequent terminal device initiates a confidential communication service, the KMC can use the protection key to encrypt the generated session key, which can ensure that the session key is in the communication link transmission process. It also enables the terminal to accurately decrypt the encrypted session key to obtain the real session key when receiving the encrypted session key, which improves the efficiency of confidential communication services and ensures the security of communication.
此时,所述KMC根据所述用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对产生的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及根据所述用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥,并利用所述第二保护密钥对产生的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥。At this time, the KMC determines, according to the identification information of the first terminal device included in the parameter information for acquiring the session key, that the first terminal device corresponding to the identification information of the first terminal device is logging in to the The first protection key generated during the KMC, and the generated session key is encrypted with the first protection key to obtain a session key encrypted by the first protection key; and according to the The identification information of the second terminal device included in the parameter information for obtaining the session key is determined, and the second protection key generated by the second terminal device corresponding to the identification information of the second terminal device when logging in to the KMC is determined. and encrypting the generated session key by using the second protection key to obtain a session key encrypted by using the second protection key.
最后,将包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥的加密后的会话密钥发送给EAS。Finally, the encrypted session key including the session key encrypted with the first protection key and the session key encrypted with the second protection key is sent to the EAS.
具体地,KMC通过会话密钥响应消息将加密后的会话密钥发送给EAS。Specifically, the KMC sends the encrypted session key to the EAS through a session key response message.
其中,所述会话密钥响应消息中可以包含了加密后的会话密钥(即加密后的会话密钥是一个数据包,只是该会话密钥分为两部分,一部分内容利用第一保护密钥加密生成的会话密钥得到,另一部分利用第二保护密钥加密生成的会话密钥得到),也可以包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥,这里不做限定。The session key response message may include the encrypted session key (that is, the encrypted session key is a data packet, but the session key is divided into two parts, and a part of the content uses the first protection key The session key generated by encryption is obtained, and the other part is obtained by encrypting the session key generated by using the second protection key), or the session key encrypted by using the first protection key and the session key encrypted by using the second protection key The session key is not limited here.
具体地,当KMC通过会话密钥响应消息将利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥发送给EAS时,说明KMC发送给EAS的是两个不同数据包,一个数据包是利用第一保护密钥加密后的会话密钥,另一个数据包是利用第二保护密钥加密后的会话密钥。Specifically, when the KMC sends the session key encrypted with the first protection key and the session key encrypted with the second protection key to the EAS through the session key response message, it means that the KMC sends the EAS two There are different data packets, one data packet is the session key encrypted with the first protection key, and the other data packet is the session key encrypted with the second protection key.
可选地,KMC在得到利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥时,建立第一保护密钥对应的第一终端设备标识与利用第一保护密钥加密后的会话密钥的对应关系,以及建立第二保护密钥对应的第二终端设备标识与利用第二保护密钥加密后的会话密钥的对应关系,并在发送利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥给EAS的同时,将建立的对应关系也发送给EAS,这样使得EAS将加密后的会话密钥转发给第一终端设备之后,利用该对应关系,快速确定与自身的标识信息对应的加密后的会话密钥,这样加快了系统业务处理的速度,提高系统作业的效率。Optionally, when the KMC obtains the session key encrypted with the first protection key and the session key encrypted with the second protection key, establishes the first terminal device identifier corresponding to the first protection key and uses the A corresponding relationship between the session key encrypted by the protection key, and the corresponding relationship between the second terminal device identifier corresponding to the second protection key and the session key encrypted with the second protection key, and the corresponding relationship between the session key encrypted by the second protection key and the second protection key. The session key encrypted with the first protection key and the session key encrypted with the second protection key are sent to the EAS, and the established corresponding relationship is also sent to the EAS, so that the EAS forwards the encrypted session key to the EAS. After the first terminal device, the corresponding relationship is used to quickly determine the encrypted session key corresponding to its own identification information, which speeds up system service processing and improves system operation efficiency.
在本发明的另一个实施例中,所述EAS将加密后的会话密钥发送给所述第二终端设备,使得所述第二终端设备能够利用所述会话密钥实现与所述第一终端设备之间的保密通信。In another embodiment of the present invention, the EAS sends the encrypted session key to the second terminal device, so that the second terminal device can use the session key to communicate with the first terminal Confidential communication between devices.
也就是说,EAS在接收到KMC发送的加密后的会话密钥之后,同时向第一终端设备和第二终端设备发送所述加密后的会话密钥。That is, after receiving the encrypted session key sent by the KMC, the EAS simultaneously sends the encrypted session key to the first terminal device and the second terminal device.
例如,第一终端设备与第二终端设备之间的呼叫建立与保密通信业务建立同步实施时,EAS在向KMC发送会话密钥请求消息之后,即可将第一终端设备发起的呼叫第二终端设备的呼叫建立请求消息转发给第二终端设备,试图与第二终端设备建立呼叫连接。For example, when the call establishment between the first terminal device and the second terminal device and the establishment of the secure communication service are implemented synchronously, after the EAS sends a session key request message to the KMC, the call initiated by the first terminal device can be called to the second terminal. The call establishment request message of the device is forwarded to the second terminal device to attempt to establish a call connection with the second terminal device.
同时,EAS在接收到KMC发送的加密后的会话密钥时,确定是否接收到第二终端设备的呼叫建立响应消息,并在接收到第二终端设备的呼叫建立响应消息时,同时向第一终端设备和第二终端设备发送加密后的会话密钥。At the same time, when receiving the encrypted session key sent by the KMC, the EAS determines whether it has received the call setup response message from the second terminal device, and when receiving the call setup response message from the second The terminal device and the second terminal device send the encrypted session key.
在第一终端设备和第二终端设备接收到EAS发送的加密后的会话密钥之后,分别利用自身登录KMC生成的保护密钥对加密后的会话密钥进行解密,得到KMC产生的会话密钥,并在第一终端设备和第二终端设备之间的媒体面传输通道建立后,在建立的媒体面传输通道中利用会话密钥传输通信业务。After the first terminal device and the second terminal device receive the encrypted session key sent by the EAS, they respectively use the protection key generated by logging in to the KMC to decrypt the encrypted session key, and obtain the session key generated by the KMC. , and after the media plane transmission channel between the first terminal device and the second terminal device is established, use the session key to transmit the communication service in the established media plane transmission channel.
需要说明的是,在EAS获取了KMC为第一终端设备和第二终端设备之间执行保密通信业务的加密后的会话密钥之后,向第一终端设备发送加密后的会话密钥的次数不限于一次,可以重复多次,以保证传输的正确性。It should be noted that, after the EAS obtains the encrypted session key for the KMC to perform the confidential communication service between the first terminal device and the second terminal device, the number of times that the encrypted session key is sent to the first terminal device is not equal. It is limited to one time and can be repeated many times to ensure the correctness of transmission.
需要说明的是,假设EAS接收到的KMC返回的加密后的会话密钥属于一个数据包时,EAS将包含一个数据包的加密后的会话密钥分别发送给第一终端设备和第二终端设备;假设EAS接收到的KMC返回的加密后的会话密钥属于两个数据包,即一个数据包是利用第一保护密钥进行加密的会话密钥,另一个数据包是利用第二保护密钥进行加密的会话密钥时,EAS可以将包含了两个数据包的加密后的会话密钥分别发送给第一终端设备和第二终端设备;EAS还可以分别确定不同数据包对应的终端设备,将包含了利用第一保护密钥进行加密的会话密钥的数据包发送给第一终端设备,将包含了利用第二保护密钥进行加密的会话密钥的数据包发送给第二终端设备,这里不做具体限定。It should be noted that, assuming that the encrypted session key returned by the KMC received by the EAS belongs to a data packet, the EAS sends the encrypted session key containing a data packet to the first terminal device and the second terminal device respectively. ; Assume that the encrypted session key returned by the KMC that EAS receives belongs to two data packets, that is, one data packet is the session key encrypted by the first protection key, and the other data packet is the use of the second protection key. When performing the encrypted session key, the EAS can send the encrypted session key containing the two data packets to the first terminal device and the second terminal device respectively; the EAS can also determine the terminal devices corresponding to different data packets respectively, sending the data packet containing the session key encrypted by using the first protection key to the first terminal device, and sending the data packet containing the session key encrypted by using the second protection key to the second terminal device, There is no specific limitation here.
通过本发明实施例一的方案,在IMS网络中引入加密应用服务器和密钥管理中心,通过加密应用服务器在接收到第一终端设备发送的用于表征第一终端设备与第二终端设备之间需要建立保密通信业务的保密通信业务建立请求消息,将保密通信业务建立请求消息中包含的用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给第一终端设备和第二终端设备所属的密钥管理中心,请求密钥管理中心为第一终端设备和第二终端设备之间需要建立的保密通信业务产生会话密钥,并在接收到密钥管理中心返回的加密后的会话密钥时,将该加密后的会话密钥发送给第一终端设备,使得第一终端设备能够利用该会话密钥实现与第二终端设备之间的保密通信。Through the solution of Embodiment 1 of the present invention, an encryption application server and a key management center are introduced into the IMS network, and the encryption application server receives a message sent by the first terminal device to characterize the relationship between the first terminal device and the second terminal device through the encryption application server. A secure communication service establishment request message that needs to establish a secure communication service, the parameter information for obtaining the session key contained in the secure communication service establishment request message is carried in the session key request message and sent to the first terminal device and the second terminal The key management center to which the device belongs, requests the key management center to generate a session key for the confidential communication service that needs to be established between the first terminal device and the second terminal device, and receives the encrypted session returned by the key management center When the encrypted session key is obtained, the encrypted session key is sent to the first terminal device, so that the first terminal device can use the session key to implement secure communication with the second terminal device.
这样,通过加密应用服务器使得保密通信作为运营商提供给用户的一种业务实现,并且加密应用服务器从密钥管理中心获取加密后的会话密钥,下发给终端设备,不仅增加了运营商对保密通信的控制力,还提高了系统的处理效率,同时引入的密钥管理中心实现了用户对密钥全生命周期的管理,增加了用户之间保密通信业务执行的安全性。In this way, the encrypted application server enables secure communication as a service provided by the operator to the user, and the encrypted application server obtains the encrypted session key from the key management center and issues it to the terminal device, which not only increases the operator's confidence in The control power of confidential communication also improves the processing efficiency of the system. At the same time, the introduced key management center realizes the management of the whole life cycle of keys by users, and increases the security of the execution of confidential communication services between users.
实施例二:Embodiment 2:
如图4所示,为本发明实施例二提供的一种保密通信业务的处理方法的流程示意图,本发明实施例二是与本发明实施例一在同一发明构思下的发明,本发明实施例二是站在终端设备角度对本发明涉及的保密通信业务的处理方法的详细描述。所述方法可以如下所述。As shown in FIG. 4 , it is a schematic flowchart of a method for processing a confidential communication service provided by Embodiment 2 of the present invention. Embodiment 2 of the present invention is an invention under the same inventive concept as Embodiment 1 of the present invention. The second is a detailed description of the processing method of the confidential communication service involved in the present invention from the perspective of the terminal device. The method can be as follows.
步骤201:第一终端设备向加密应用服务器EAS发送保密通信业务建立请求消息。Step 201: The first terminal device sends an encrypted communication service establishment request message to the encrypted application server EAS.
其中,所述保密通信业务建立请求消息用于表征所述第一终端设备与第二终端设备之间需要建立保密通信业务,所述保密通信业务建立请求消息中包含了用于获取会话密钥的参数信息。The secure communication service establishment request message is used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device, and the secure communication service establishment request message includes a session key for obtaining a session key. Parameter information.
在步骤201中,第一终端设备在呼叫第二终端设备时,向IMS网络发送保密通信业务建立请求消息,并由IMS网络核心网将该保密通信业务请求消息转发给EAS,告知EAS第一终端设备将与第二终端设备之间建立保密通信业务。In step 201, when calling the second terminal device, the first terminal device sends a secure communication service establishment request message to the IMS network, and the IMS network core network forwards the secure communication service request message to the EAS to inform the EAS first terminal The device will establish a secure communication service with the second terminal device.
需要说明的是,此时第一终端设备发送的保密通信业务建立请求消息可以通过第一终端设备发起的呼叫建立请求消息实现,也就是说,在第一终端设备发起呼叫第二终端设备之时,向IMS网络发送呼叫建立消息,此时该呼叫建立消息具备两个功能:1、请求与第二终端设备之间建立呼叫连接;2、建立呼叫连接的同时触发保密通信业务。It should be noted that, at this time, the confidential communication service establishment request message sent by the first terminal device may be implemented through a call establishment request message initiated by the first terminal device, that is, when the first terminal device initiates a call to the second terminal device. , and send a call setup message to the IMS network. At this time, the call setup message has two functions: 1. Request to establish a call connection with the second terminal device; 2. Trigger a secure communication service while establishing the call connection.
或者,此时第一终端发送的保密通信业务建立请求消息是在第一终端设备发起呼叫建立请求消息之后随机触发的。Or, at this time, the secure communication service establishment request message sent by the first terminal is randomly triggered after the first terminal device initiates the call establishment request message.
例如,第一终端设备在与第二终端设备成功建立呼叫链路之后,并在呼叫业务处理的过程中,向网络侧的EAS发送保密通信业务建立请求消息,告知EAS第一终端设备需要与第二终端设备之间进行保密通信。For example, after the first terminal device successfully establishes a call link with the second terminal device, and during the process of call service processing, it sends a secure communication service establishment request message to the EAS on the network side, informing the EAS that the first terminal device needs to communicate with the second terminal device. Secure communication between the two terminal devices.
也就是说,终端设备之间的呼叫建立连接与保密通信业务触发可以是同时执行的,也可以是不同时执行的,先触发保密通信业务,再建立呼叫连接,或者先建立呼叫连接,再触发保密通信业务都可以,这里不做具体限定。That is to say, the connection establishment of the call and the triggering of the secure communication service between the terminal devices may be executed simultaneously or not simultaneously, the secure communication service is triggered first, and then the call connection is established, or the call connection is established first, and then the Confidential communication services are acceptable, and no specific limitation is made here.
使得加密应用服务器在接收到第一终端设备发送的保密通信业务建立请求消息时,启动后续保密通信业务处理流程。This enables the encryption application server to start the subsequent confidential communication service processing flow when receiving the confidential communication service establishment request message sent by the first terminal device.
步骤202:所述第一终端设备接收所述EAS发送的加密后的会话密钥。Step 202: The first terminal device receives the encrypted session key sent by the EAS.
其中,所述加密后的会话密钥是所述EAS将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC,由所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的,所述会话密钥请求消息用于表征请求所述KMC为所述第一终端设备和所述第二终端设备之间需要建立的保密通信业务产生会话密钥。The encrypted session key is that the EAS carries the parameter information for acquiring the session key in a session key request message and sends it to the first terminal device and the second terminal device to which the second terminal device belongs. The key management center KMC, obtained by the KMC encrypting the generated session key according to the parameter information for obtaining the session key, and the session key request message is used to represent the request for the KMC A session key is generated for the secure communication service that needs to be established between the first terminal device and the second terminal device.
在步骤202中,加密应用服务器如何获取加密后的会话密钥的,在本发明实施例一中做了详细描述,这里不做赘述。In step 202, how the encryption application server obtains the encrypted session key is described in detail in Embodiment 1 of the present invention, and will not be repeated here.
步骤203:所述第一终端设备在接收所述EAS发送的加密后的会话密钥时,利用登录所述KMC时产生的第一保护密钥对所述加密后的会话密钥进行解密,得到所述KMC为所述第一终端设备与所述第二终端设备之间进行保密通信业务产生的会话密钥。Step 203: When receiving the encrypted session key sent by the EAS, the first terminal device decrypts the encrypted session key using the first protection key generated when logging in to the KMC, and obtains: The KMC is a session key generated for a secure communication service between the first terminal device and the second terminal device.
其中,所述加密后的会话密钥包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥。The encrypted session key includes a session key encrypted with the first protection key and a session key encrypted with the second protection key.
在步骤203中,由于所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的,具体实施方式包括但不限于:In step 203, since the encrypted session key is obtained after the KMC encrypts the generated session key according to the parameter information used to obtain the session key, the specific implementation method includes: not limited to:
首先,KMC在接收到EAS发送的会话密钥请求消息之后,生成针对第一终端设备与第二终端设备之间建立保密通信业务的会话密钥。First, after receiving the session key request message sent by the EAS, the KMC generates a session key for establishing a secure communication service between the first terminal device and the second terminal device.
需要说明的是,KMC在接收到EAS发送的会话密钥请求消息之后,生成的会话密钥可以是随机产生的,也可以是根据该会话密钥请求消息中携带的用于获取会话密钥的参数信息确定的,例如:利用用于获取会话密钥的参数信息中的随机数信息生成的会话密钥等等,这里不做限定。It should be noted that, after the KMC receives the session key request message sent by the EAS, the generated session key may be randomly generated, or it may be based on the information carried in the session key request message and used to obtain the session key. The parameter information is determined, for example, the session key is generated by using the random number information in the parameter information for obtaining the session key, etc., which is not limited here.
其次,为了保证会话密钥在通信链路中传输的安全性,KMC对生成的会话密钥进行加密处理。Secondly, in order to ensure the security of the session key transmission in the communication link, KMC encrypts the generated session key.
由于KMC是用户部署的,那么用户所使用的终端设备在进行通信时,可以先注册登录KMC,并在登录时,KMC为该终端设备生成一个保护密钥,KMC在本地存储终端设备的标识信息和该保护密钥的对应关系,那么后续终端设备发起保密通信业务时,KMC就能够利用该保护密钥对生成的会话密钥进行加密处理,既能够保证会话密钥在通信链路传输过程中的安全性,还能够使得终端接收到加密后的会话密钥时,准确解密,获取真正的会话密钥,提高了保密通信业务的效率,保障了通信的安全。Since the KMC is deployed by the user, the terminal device used by the user can first register and log in to the KMC when communicating, and when logging in, the KMC generates a protection key for the terminal device, and the KMC stores the identification information of the terminal device locally. The corresponding relationship with the protection key, then when the subsequent terminal device initiates a confidential communication service, the KMC can use the protection key to encrypt the generated session key, which can ensure that the session key is in the communication link transmission process. It also enables the terminal to accurately decrypt the encrypted session key to obtain the real session key when receiving the encrypted session key, which improves the efficiency of confidential communication services and ensures the security of communication.
此时,所述KMC根据所述用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对产生的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及根据所述用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥,并利用所述第二保护密钥对产生的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥。At this time, the KMC determines, according to the identification information of the first terminal device included in the parameter information for acquiring the session key, that the first terminal device corresponding to the identification information of the first terminal device is logging in to the The first protection key generated during the KMC, and the generated session key is encrypted with the first protection key to obtain a session key encrypted by the first protection key; and according to the The identification information of the second terminal device included in the parameter information for obtaining the session key is determined, and the second protection key generated by the second terminal device corresponding to the identification information of the second terminal device when logging in to the KMC is determined. and encrypting the generated session key by using the second protection key to obtain a session key encrypted by using the second protection key.
最后,将包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥的加密后的会话密钥发送给EAS。Finally, the encrypted session key including the session key encrypted with the first protection key and the session key encrypted with the second protection key is sent to the EAS.
其中,所述会话密钥响应消息中可以包含了加密后的会话密钥(即加密后的会话密钥是一个数据包,只是该会话密钥分为两部分,一部分内容利用第一保护密钥加密生成的会话密钥得到,另一部分利用第二保护密钥加密生成的会话密钥得到),也可以包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥,这里不做限定。The session key response message may include the encrypted session key (that is, the encrypted session key is a data packet, but the session key is divided into two parts, and a part of the content uses the first protection key The session key generated by encryption is obtained, and the other part is obtained by encrypting the session key generated by using the second protection key), or the session key encrypted by using the first protection key and the session key encrypted by using the second protection key The session key is not limited here.
具体地,当KMC通过会话密钥响应消息将利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥发送给EAS时,说明KMC发送给EAS的是两个不同数据包,一个数据包是利用第一保护密钥加密后的会话密钥,另一个数据包是利用第二保护密钥加密后的会话密钥。Specifically, when the KMC sends the session key encrypted with the first protection key and the session key encrypted with the second protection key to the EAS through the session key response message, it means that the KMC sends the EAS two There are different data packets, one data packet is the session key encrypted with the first protection key, and the other data packet is the session key encrypted with the second protection key.
可选地,KMC在得到利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥时,建立第一保护密钥对应的第一终端设备标识与利用第一保护密钥加密后的会话密钥的对应关系,以及建立第二保护密钥对应的第二终端设备标识与利用第二保护密钥加密后的会话密钥的对应关系,并在发送利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥给EAS的同时,将建立的对应关系也发送给EAS,这样使得EAS将加密后的会话密钥转发给第一终端设备之后,利用该对应关系,快速确定与自身的标识信息对应的加密后的会话密钥,这样加快了系统业务处理的速度,提高系统作业的效率。Optionally, when the KMC obtains the session key encrypted with the first protection key and the session key encrypted with the second protection key, establishes the first terminal device identifier corresponding to the first protection key and uses the A corresponding relationship between the session key encrypted by the protection key, and the corresponding relationship between the second terminal device identifier corresponding to the second protection key and the session key encrypted with the second protection key, and the corresponding relationship between the session key encrypted by the second protection key and the second protection key. The session key encrypted with the first protection key and the session key encrypted with the second protection key are sent to the EAS, and the established corresponding relationship is also sent to the EAS, so that the EAS forwards the encrypted session key to the EAS. After the first terminal device, the corresponding relationship is used to quickly determine the encrypted session key corresponding to its own identification information, which speeds up system service processing and improves system operation efficiency.
因此,当第一终端设备接收到的加密后的会话密钥属于一个数据包时,第一终端设备利用登录所述KMC时产生的第一保护密钥对所述加密后的会话密钥进行解密,得到所述KMC为所述第一终端设备与所述第二终端设备之间进行保密通信业务产生的会话密钥。Therefore, when the encrypted session key received by the first terminal device belongs to a data packet, the first terminal device uses the first protection key generated when logging in to the KMC to decrypt the encrypted session key to obtain the session key generated by the KMC for the secure communication service between the first terminal device and the second terminal device.
当第一终端设备接收到的加密后的会话密钥包含了两个数据包时,即接收到的加密后的会话密钥包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥,此时,第一终端设备只能通过第一保护密钥对利用第一保护密钥加密后的会话密钥进行解密,得到所述KMC为所述第一终端设备与所述第二终端设备之间进行保密通信业务产生的会话密钥,为后续与第二终端设备进行保密通信做准备。When the encrypted session key received by the first terminal device includes two data packets, that is, the received encrypted session key includes the session key encrypted by the first protection key and the session key encrypted by the second protection key. The session key encrypted by the protection key, at this time, the first terminal device can only decrypt the session key encrypted by the first protection key through the first protection key, and obtains that the KMC is the first protection key. The session key generated by the secure communication service between the terminal device and the second terminal device is used to prepare for the subsequent secure communication with the second terminal device.
可选地,当第一终端设备接收到的加密后的会话密钥包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥时,还可以根据KMC建立的终端设备的标识信息与加密后的会话密钥之间的对应关系,确定第一终端设备标识对应的利用第一保护密钥加密后的会话密钥,并利用第一保护密钥对利用第一保护密钥加密后的会话密钥进行解密,得到所述KMC为所述第一终端设备与所述第二终端设备之间进行保密通信业务产生的会话密钥。Optionally, when the encrypted session key received by the first terminal device includes the session key encrypted with the first protection key and the session key encrypted with the second protection key, it can also be The corresponding relationship between the identification information of the terminal device and the encrypted session key established by the KMC, determine the session key encrypted with the first protection key corresponding to the first terminal device identification, and use the first protection key to pair Decrypt the session key encrypted by the first protection key to obtain the session key generated by the KMC for the secure communication service between the first terminal device and the second terminal device.
步骤204:所述第一终端设备在接收所述EAS发送的加密后的会话密钥时,将所述加密后的会话密钥发送给所述第二终端设备。Step 204: When receiving the encrypted session key sent by the EAS, the first terminal device sends the encrypted session key to the second terminal device.
在步骤204中,所述第一终端设备将所述加密后的会话密钥发送给所述第二终端设备的方式包括但不限于:In step 204, the manner in which the first terminal device sends the encrypted session key to the second terminal device includes but is not limited to:
第一种方式:The first way:
所述第一终端设备通过IMS网络信令将所述加密后的会话密钥发送给所述第二终端设备。The first terminal device sends the encrypted session key to the second terminal device through IMS network signaling.
具体地,不管在第一终端设备与第二终端设备之间的媒体面数据传输通道是否建立完成,第一终端在接收到EAS发送的会话密钥时,利用IMS网络信令将所述加密后的会话密钥发送给所述第二终端设备。Specifically, regardless of whether the media plane data transmission channel between the first terminal device and the second terminal device is established, when the first terminal receives the session key sent by the EAS, it uses IMS network signaling to encrypt the encrypted The session key is sent to the second terminal device.
需要说明的是,IMS网络信令包含但不限于SIP信令、呼叫处理消息等。It should be noted that the IMS network signaling includes, but is not limited to, SIP signaling, call processing messages, and the like.
所述第一终端设备通过SIP信令将所述加密后的会话密钥发送给所述第二终端设备。The first terminal device sends the encrypted session key to the second terminal device through SIP signaling.
例如:SIP信令包含但不限于:MESSAGE消息、OPTIONS、INFO等。For example: SIP signaling includes but is not limited to: MESSAGE message, OPTIONS, INFO, etc.
所述第一终端设备通过临时响应确认消息PRACK将所述加密后的会话密钥发送给所述第二终端设备。The first terminal device sends the encrypted session key to the second terminal device through a temporary response confirmation message PRACK.
具体地,为了节省系统信令开销,可以采用信令捎带传输的方式,即所述第一终端设备在接收到EAS通过第二终端设备发送的呼叫建立响应消息传输的加密后的会话密钥时,在对呼叫建立响应消息进行正确处理后,向第二终端设备返回临时确认消息PRACK时,将所述加密后的会话密钥携带在临时确认消息PRACK中发送给所述第二终端设备。Specifically, in order to save the system signaling overhead, a signaling piggyback transmission method can be adopted, that is, when the first terminal device receives the encrypted session key transmitted by the call setup response message sent by the EAS through the second terminal device , after the call setup response message is correctly processed, and the temporary confirmation message PRACK is returned to the second terminal device, the encrypted session key is carried in the temporary confirmation message PRACK and sent to the second terminal device.
第二种方式:The second way:
所述第一终端设备通过建立的与第二终端设备的媒体面数据传输通道将所述加密后的会话密钥发送给所述第二终端设备。The first terminal device sends the encrypted session key to the second terminal device through the established media plane data transmission channel with the second terminal device.
具体地,所述第一终端设备在接收到EAS发送的会话密钥时,并确定与第二终端设备之间的媒体面传输通道建立完成后,利用建立的媒体面传输通道将所述加密后的会话密钥发送给所述第二终端设备。Specifically, when the first terminal device receives the session key sent by the EAS and determines that the establishment of the media plane transmission channel with the second terminal device is completed, the encrypted The session key is sent to the second terminal device.
具体地,当第一终端设备接收到的加密后的会话密钥属于一个数据包时,第一终端设备将包含一个数据包的加密后的会话密钥发送给第二终端设备;当第一终端设备接收到的加密后的会话密钥属于两个数据包时,即一个数据包是利用第一保护密钥进行加密的会话密钥,另一个数据包是利用第二保护密钥进行加密的会话密钥时,第一终端设备可以将包含了两个数据包的加密后的会话密钥同时发送给第二终端设备;第一终端设备EAS可以分别确定不同数据包对应的终端设备,将包含了利用第二保护密钥进行加密的会话密钥的数据包发送给第二终端设备,这里不做具体限定。Specifically, when the encrypted session key received by the first terminal device belongs to a data packet, the first terminal device sends the encrypted session key containing one data packet to the second terminal device; when the first terminal device sends the encrypted session key containing one data packet to the second terminal device; When the encrypted session key received by the device belongs to two data packets, that is, one data packet is the session key encrypted by the first protection key, and the other data packet is the session key encrypted by the second protection key. When the key is used, the first terminal device can send the encrypted session key containing two data packets to the second terminal device at the same time; the first terminal device EAS can respectively determine the terminal devices corresponding to different data packets, and send the encrypted session key containing the two data packets to the second terminal device; The data packet of the session key encrypted by using the second protection key is sent to the second terminal device, which is not specifically limited here.
需要说明的是,本发明实施例二中步骤203和步骤204没有执行先后顺序的区分,可以按照本发明实施例所述的顺序实施,还可以先执行步骤204,再执行步骤203,也可以是步骤203和步骤204同时实施。It should be noted that, in the second embodiment of the present invention, step 203 and step 204 are not distinguished in the order of execution. Step 203 and step 204 are implemented simultaneously.
实施例三:Embodiment three:
如图5所示,本发明实施例三提供的一种保密通信业务的处理方法的流程示意图。本发明实施例三是与本发明实施例一~实施例二属于同一发明构思下的发明,本发明实施例三是站在密钥管理中心侧对本发明实施例一中各个步骤的详细描述。所述方法可以如下所述。As shown in FIG. 5 , a schematic flowchart of a method for processing a confidential communication service provided by Embodiment 3 of the present invention. Embodiment 3 of the present invention is an invention under the same inventive concept as Embodiments 1 to 2 of the present invention. Embodiment 3 of the present invention is a detailed description of each step in Embodiment 1 of the present invention from the side of the key management center. The method can be as follows.
步骤301:密钥管理中心KMC接收加密应用服务器EAS发送的会话密钥请求消息。Step 301: The key management center KMC receives the session key request message sent by the encryption application server EAS.
其中,所述会话密钥请求消息用于表征请求所述KMC为第一终端设备和第二终端设备之间需要建立的保密通信业务产生会话密钥。The session key request message is used to represent a request for the KMC to generate a session key for a secure communication service that needs to be established between the first terminal device and the second terminal device.
所述会话密钥请求消息中包含了用于获取会话密钥的参数信息。The session key request message includes parameter information for acquiring the session key.
所述用于获取会话密钥的参数信息是所述EAS接收到的所述第一终端设备发送的用于表征所述第一终端设备与所述第二终端设备之间需要建立保密通信业务的保密通信业务建立请求消息中携带的。The parameter information for obtaining the session key is the parameter information received by the EAS and sent by the first terminal device to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device. It is carried in the secure communication service establishment request message.
步骤302:KMC向所述EAS返回加密后的会话密钥。Step 302: The KMC returns the encrypted session key to the EAS.
以便于所述EAS将加密后的所述会话密钥发送给所述第一终端设备,使得所述第一终端设备能够利用所述会话密钥实现与所述第二终端设备之间的保密通信。So that the EAS sends the encrypted session key to the first terminal device, so that the first terminal device can use the session key to implement secure communication with the second terminal device .
其中,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的。The encrypted session key is obtained after the KMC encrypts the generated session key according to the parameter information for obtaining the session key.
所述用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息和第二终端设备的标识信息。The identification information of the first terminal device and the identification information of the second terminal device included in the parameter information for obtaining the session key.
在步骤302中,所述KMC向所述EAS返回加密后的会话密钥的方式包括但不限于:In step 302, the manner in which the KMC returns the encrypted session key to the EAS includes but is not limited to:
首先,所述KMC生成用于为所述第一终端设备与所述第二终端设备之间执行保密通信业务需要的会话密钥。First, the KMC generates a session key required for performing a secure communication service between the first terminal device and the second terminal device.
需要说明的是,KMC在接收到EAS发送的会话密钥请求消息之后,生成的会话密钥可以是随机产生的,也可以是根据该会话密钥请求消息中携带的用于获取会话密钥的参数信息确定的,例如:利用用于获取会话密钥的参数信息中的随机数信息生成的会话密钥等等,这里不做限定。It should be noted that, after the KMC receives the session key request message sent by the EAS, the generated session key may be randomly generated, or it may be based on the information carried in the session key request message and used to obtain the session key. The parameter information is determined, for example, the session key is generated by using the random number information in the parameter information for obtaining the session key, etc., which is not limited here.
其次,为了保证会话密钥在通信链路中传输的安全性,KMC对生成的会话密钥进行加密处理。Secondly, in order to ensure the security of the session key transmission in the communication link, KMC encrypts the generated session key.
由于KMC是用户部署的,那么用户所使用的终端设备在进行通信时,可以先注册登录KMC,并在登录时,KMC为该终端设备生成一个保护密钥,KMC在本地存储终端设备的标识信息和该保护密钥的对应关系,那么后续终端设备发起保密通信业务时,KMC就能够利用该保护密钥对生成的会话密钥进行加密处理,既能够保证会话密钥在通信链路传输过程中的安全性,还能够使得终端接收到加密后的会话密钥时,准确解密,获取真正的会话密钥,提高了保密通信业务的效率,保障了通信的安全。Since the KMC is deployed by the user, the terminal device used by the user can first register and log in to the KMC when communicating, and when logging in, the KMC generates a protection key for the terminal device, and the KMC stores the identification information of the terminal device locally. The corresponding relationship with the protection key, then when the subsequent terminal device initiates a confidential communication service, the KMC can use the protection key to encrypt the generated session key, which can ensure that the session key is in the communication link transmission process. It also enables the terminal to accurately decrypt the encrypted session key to obtain the real session key when receiving the encrypted session key, which improves the efficiency of confidential communication services and ensures the security of communication.
此时,所述KMC根据用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对生成的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及根据用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥;并利用所述第二保护密钥对生成的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥。At this time, the KMC determines, according to the identification information of the first terminal device included in the parameter information for acquiring the session key, that the first terminal device corresponding to the identification information of the first terminal device is logging into the KMC The first protection key generated when the first protection key is generated, and the generated session key is encrypted by using the first protection key to obtain a session key encrypted by the first protection key; The identification information of the second terminal device included in the parameter information of the key, to determine the second protection key generated by the second terminal device corresponding to the identification information of the second terminal device when logging in to the KMC; and using The second protection key performs an encryption operation on the generated session key to obtain a session key encrypted with the second protection key.
最后,所述KMC将所述利用第一保护密钥加密后的会话密钥和所述利用第二保护密钥加密后的会话密钥作为加密后的会话密钥,通过密钥响应消息发送给所述EAS。Finally, the KMC uses the session key encrypted with the first protection key and the session key encrypted with the second protection key as the encrypted session key, and sends the key response message to the encrypted session key. the EAS.
实施例四:Embodiment 4:
如图6所示,本发明实施例四提供的一种保密通信业务的处理方法的流程示意图。本发明实施例四是与本发明实施例一~本发明实施例三在同一发明构思下的发明,本发明实施例四以终端设备A和终端设备B需要执行保密通信业务为例对本发明所述的技术方案进行详细描述。所述方法可以如下所述。As shown in FIG. 6 , a schematic flowchart of a method for processing a secure communication service provided by Embodiment 4 of the present invention. Embodiment 4 of the present invention is an invention under the same inventive concept as Embodiment 1 to Embodiment 3 of the present invention. Embodiment 4 of the present invention takes the example that terminal device A and terminal device B need to perform secure communication services to describe the present invention. The technical solution is described in detail. The method can be as follows.
需要说明的是,终端设备A和终端设备B需要执行保密通信业务的时间可以是在终端设备A和终端设备B呼叫建立时,也可以是在终端设备A和终端设备B呼叫建立之后,这里不做限定。It should be noted that the time when the terminal device A and the terminal device B need to perform the confidential communication service may be when the call between the terminal device A and the terminal device B is established, or after the call between the terminal device A and the terminal device B is established. Do limit.
步骤1:当用户通过终端设备A向终端设备B发起保密通信呼叫时,向IMS网络发起呼叫建立请求消息。Step 1: When the user initiates a secure communication call to the terminal device B through the terminal device A, a call establishment request message is initiated to the IMS network.
其中,所述呼叫建立请求消息可以是INVITE消息,用于告知IMS核心网需要与终端设备B建立加密会话连接。The call establishment request message may be an INVITE message, which is used to inform the IMS core network that an encrypted session connection needs to be established with the terminal device B.
所述呼叫建立请求消息中包含了终端设备A的标识信息(或者电话号码信息)和终端设备B的标识信息(或者电话号码信息)。The call establishment request message includes identification information (or phone number information) of terminal device A and identification information (or phone number information) of terminal device B.
此时,所述呼叫建立请求消息中还携带了会话密钥请求消息。At this time, the call establishment request message also carries a session key request message.
在本发明的另一个实施例中,终端设备A发送的与终端设备B之间的呼叫建立请求消息,还可以只是用于告知IMS核心网需要与终端设备B建立会话连接;同时,终端设备A通过IMS信令(例如:MESSAGE消息)发送会话密钥请求消息,所述会话密钥请求消息用于告知IMS网络终端设备A与终端设备B之间需要建立加密会话连接。In another embodiment of the present invention, the call establishment request message sent by terminal device A with terminal device B can also be only used to inform the IMS core network that a session connection needs to be established with terminal device B; at the same time, terminal device A A session key request message is sent through IMS signaling (eg, a MESSAGE message), and the session key request message is used to inform the IMS network that an encrypted session connection needs to be established between terminal device A and terminal device B.
步骤2:EAS在接收到呼叫建立请求消息时,根据终端设备A的标识信息和终端设备B的标识信息,确定终端设备A和终端设备B所属的用户域,并向该用户域内的一个密钥管理中心发送会话密钥请求消息。Step 2: When the EAS receives the call establishment request message, it determines the user domain to which the terminal device A and the terminal device B belong according to the identification information of the terminal device A and the identification information of the terminal device B, and sends a key in the user domain to a key in the user domain. The management center sends a session key request message.
步骤3:KMC为终端设备A和终端设备B产生一个会话密钥,并向EAS发送密钥响应消息。Step 3: KMC generates a session key for terminal device A and terminal device B, and sends a key response message to EAS.
其中,所述密钥响应消息中包含了加密后的会话密钥。Wherein, the key response message includes the encrypted session key.
为了保证会话密钥在传输过程中不被泄露,KMC分别利用终端设备A和终端设备B登录KMC时产生的保护密钥对会话密钥进行加密保护。In order to ensure that the session key is not leaked during the transmission process, the KMC encrypts and protects the session key using the protection keys generated when terminal device A and terminal device B log in to the KMC respectively.
步骤4:EAS向KMC发送会话密钥请求消息后,立即向终端设备B转发呼叫建立请求消息。Step 4: After the EAS sends the session key request message to the KMC, it immediately forwards the call establishment request message to the terminal device B.
这样在会话密钥请求的同时,并行进行呼叫接续,以提高处理效率。In this way, when the session key is requested, the call connection is performed in parallel, so as to improve the processing efficiency.
在本发明的另一个实施例中,EAS向KMC发送会话密钥请求消息后,等待KMC返回响应消息。In another embodiment of the present invention, after the EAS sends the session key request message to the KMC, it waits for the KMC to return a response message.
在接收到KMC发送的会话密钥响应消息之后,再向终端设备B转发呼叫建立请求消息,继续呼叫接续。After receiving the session key response message sent by the KMC, the call setup request message is forwarded to the terminal device B to continue the call connection.
步骤5:EAS接收终端设备B返回的会话处理消息。Step 5: The EAS receives the session processing message returned by the terminal device B.
所述会话处理消息是终端设备B对接收到呼叫建立请求消息进行处理后返回的。The session processing message is returned by the terminal device B after processing the received call establishment request message.
在本发明的另一个实施例中,若EAS在收到会话处理消息时,尚未接收到KMC发送的会话密钥响应消息,此时EAS需要等待KMC的反馈。In another embodiment of the present invention, if the EAS has not received the session key response message sent by the KMC when receiving the session processing message, the EAS needs to wait for the feedback from the KMC.
步骤6:EAS将接收到KMC反馈的密钥响应消息中的加密的会话密钥携带在会话处理消息中发送给终端设备A。Step 6: The EAS carries the encrypted session key in the key response message fed back by the KMC in the session processing message and sends it to the terminal device A.
此时,在本发明的另一个实施例中,EAS将接收到KMC反馈的会话密钥响应消息中的保密通信密钥利用IMS信令发送给终端设备A和终端设备B。At this time, in another embodiment of the present invention, the EAS sends the secret communication key in the session key response message fed back by the KMC to the terminal device A and the terminal device B by using IMS signaling.
步骤7:终端设备A在接收到加密后的会话密钥后,利用登录KMC时产生的第一保护密钥进行解密,得到KMC为本次通话产生的会话密钥。Step 7: After receiving the encrypted session key, the terminal device A uses the first protection key generated when logging in to the KMC to decrypt to obtain the session key generated by the KMC for this call.
在本发明的另一个实施例中,终端设备A通过以下几种方式将接收到的加密后的会话密钥发送给终端设备B:In another embodiment of the present invention, terminal device A sends the received encrypted session key to terminal device B in the following ways:
第一种方式:The first way:
所述第一终端设备通过IMS网络信令将所述加密后的会话密钥发送给所述第二终端设备。The first terminal device sends the encrypted session key to the second terminal device through IMS network signaling.
具体地,不管在第一终端设备与第二终端设备之间的媒体面数据传输通道是否建立完成,第一终端在接收到EAS发送的会话密钥时,利用IMS网络信令将所述加密后的会话密钥发送给所述第二终端设备。Specifically, regardless of whether the media plane data transmission channel between the first terminal device and the second terminal device is established, when the first terminal receives the session key sent by the EAS, it uses IMS network signaling to encrypt the encrypted The session key is sent to the second terminal device.
或者,所述第一终端设备通过临时响应确认消息PRACK183将所述加密后的会话密钥发送给所述第二终端设备。Alternatively, the first terminal device sends the encrypted session key to the second terminal device through a temporary response confirmation message PRACK183.
例如,为了节省系统信令开销,可以采用信令捎带传输的方式,即所述第一终端设备在接收到EAS通过第二终端设备发送的呼叫建立响应消息传输的加密后的会话密钥时,在对呼叫建立响应消息进行正确处理后,向第二终端设备返回临时确认消息PRACK时,将所述加密后的会话密钥携带在临时确认消息PRACK中发送给所述第二终端设备。For example, in order to save system signaling overhead, a signaling piggyback transmission method may be adopted, that is, when the first terminal device receives the encrypted session key transmitted by the call setup response message sent by the EAS through the second terminal device, After correct processing of the call setup response message, when a temporary confirmation message PRACK is returned to the second terminal device, the encrypted session key is carried in the temporary confirmation message PRACK and sent to the second terminal device.
第二种方式:The second way:
所述第一终端设备通过建立的与所述第二终端设备之间的媒体面数据传输通道将所述加密后的会话密钥发送给所述第二终端设备。The first terminal device sends the encrypted session key to the second terminal device through the established media plane data transmission channel with the second terminal device.
具体地,所述第一终端设备在接收到EAS发送的会话密钥时,并确定与第二终端设备之间的媒体面传输通道建立完成后,利用建立的媒体面传输通道将所述加密后的会话密钥发送给所述第二终端设备。Specifically, when the first terminal device receives the session key sent by the EAS and determines that the establishment of the media plane transmission channel with the second terminal device is completed, the encrypted The session key is sent to the second terminal device.
步骤8:终端设备B在接收到加密后的会话密钥后,利用登录KMC时产生的第二保护密钥进行解密,得到KMC为本次通话产生的会话密钥。Step 8: After receiving the encrypted session key, the terminal device B uses the second protection key generated when logging in to the KMC to decrypt to obtain the session key generated by the KMC for this call.
步骤9:终端设备A和终端设备B在呼叫链路建立完成时,利用得到的会话密钥对通话数据进行加密,实现终端设备A和终端设备B之间的加密呼叫。Step 9: When the call link is established, the terminal equipment A and the terminal equipment B encrypt the call data by using the obtained session key, so as to realize the encrypted call between the terminal equipment A and the terminal equipment B.
需要说明的是,本发明实施例四是对保密通信业务处理流程的粗略描述,涉及到的技术细节,可以采用本发明实施例一~实施三中描述所述的技术方案,这里不再详细描述。It should be noted that the fourth embodiment of the present invention is a rough description of the processing flow of the confidential communication service, and the technical details involved may adopt the technical solutions described in the first to third embodiments of the present invention, which will not be described in detail here. .
实施例五:Embodiment 5:
如图7所示,为本发明实施例五提供的一种用于保密通信业务的加密应用服务器的结构示意图。本发明实施例五是与本发明实施例一~实施例四属于同一发明构思下的发明,所述加密应用服务器包括:接收模块11、发送模块12和处理模块13,其中:As shown in FIG. 7 , it is a schematic structural diagram of an encryption application server used for a secure communication service according to Embodiment 5 of the present invention. The fifth embodiment of the present invention is an invention under the same inventive concept as the first to fourth embodiments of the present invention. The encryption application server includes: a receiving module 11, a sending module 12, and a processing module 13, wherein:
接收模块11,用于接收第一终端设备发送的保密通信业务建立请求消息,其中,所述保密通信业务建立请求消息用于表征所述第一终端设备与第二终端设备之间需要建立保密通信业务,所述保密通信业务建立请求消息中包含了用于获取会话密钥的参数信息;A receiving module 11, configured to receive a secure communication service establishment request message sent by a first terminal device, wherein the secure communication service establishment request message is used to indicate that secure communication needs to be established between the first terminal device and the second terminal device service, the confidential communication service establishment request message includes parameter information for obtaining the session key;
发送模块12,用于将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC,其中,所述会话密钥请求消息用于表征请求所述KMC为所述第一终端设备和所述第二终端设备之间需要建立的保密通信业务产生会话密钥;The sending module 12 is configured to carry the parameter information for obtaining the session key in the session key request message and send it to the key management center KMC to which the first terminal device and the second terminal device belong, wherein , the session key request message is used to represent a request for the KMC to generate a session key for a secure communication service that needs to be established between the first terminal device and the second terminal device;
处理模块13,用于接收所述KMC返回的加密后的会话密钥,并将加密后的所述会话密钥发送给所述第一终端设备,使得所述第一终端设备能够利用所述会话密钥实现与所述第二终端设备之间的保密通信,其中,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的。A processing module 13, configured to receive the encrypted session key returned by the KMC, and send the encrypted session key to the first terminal device, so that the first terminal device can use the session key secret communication between the key implementation and the second terminal device, wherein the encrypted session key is the session key generated by the KMC according to the pair of parameter information used to obtain the session key obtained after encryption.
具体地,所述用于获取会话密钥的参数信息中包含了所述第一终端设备的标识信息和所述第二终端设备的标识信息。Specifically, the parameter information for acquiring the session key includes the identification information of the first terminal device and the identification information of the second terminal device.
所述加密应用服务器还包括:确定模块14,其中:The encrypted application server further includes: a determination module 14, wherein:
确定模块14,用于在将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC之前,根据所述第一终端设备的标识信息和所述第二终端设备的标识信息,确定所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC。The determining module 14 is used to carry the parameter information for obtaining the session key in the session key request message and send it to the key management center KMC to which the first terminal device and the second terminal device belong. , according to the identification information of the first terminal device and the identification information of the second terminal device, determine the key management center KMC to which the first terminal device and the second terminal device belong.
具体地,所述处理模块13,还用于将加密后的会话密钥发送给所述第二终端设备,使得所述第二终端设备能够利用所述会话密钥实现与所述第一终端设备之间的保密通信。Specifically, the processing module 13 is further configured to send the encrypted session key to the second terminal device, so that the second terminal device can use the session key to communicate with the first terminal device confidential communications between them.
所述处理模块13,具体用于通过IMS网络信令将加密后的会话密钥发送给所述第一终端设备和/或者第二终端设备。The processing module 13 is specifically configured to send the encrypted session key to the first terminal device and/or the second terminal device through IMS network signaling.
具体地,所述加密后的会话密钥包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥;Specifically, the encrypted session key includes a session key encrypted with the first protection key and a session key encrypted with the second protection key;
所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的,包括:The encrypted session key is obtained after the KMC encrypts the generated session key according to the parameter information for obtaining the session key, including:
所述KMC根据所述用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对产生的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及The KMC determines, according to the identification information of the first terminal device included in the parameter information for obtaining the session key, that the first terminal device corresponding to the identification information of the first terminal device is logged into the KMC. generating the first protection key, and using the first protection key to perform an encryption operation on the generated session key to obtain a session key encrypted with the first protection key; and
根据所述用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥,并利用所述第二保护密钥对产生的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥。According to the identification information of the second terminal device included in the parameter information for obtaining the session key, determine the first terminal device generated when the second terminal device corresponding to the identification information of the second terminal device logs in to the KMC. two protection keys, and the generated session key is encrypted by using the second protection key to obtain a session key encrypted by the second protection key.
需要说明的是,本发明实施例五所述的加密应用服务器可以是硬件实现的物理实体单元,也可以是软件实现的逻辑部件,这里不做具体限定。It should be noted that, the encryption application server described in Embodiment 5 of the present invention may be a physical entity unit implemented by hardware, or may be a logical component implemented by software, which is not specifically limited here.
实施例六:Embodiment 6:
如图8所示,为本发明实施例六提供的一种执行保密通信业务的终端设备的结构示意图。本发明实施例六是与本发明实施例一至本发明实施例四在同一发明构思下的发明,所述终端设备包括:请求消息发送模块21和会话密钥接收模块22,其中:As shown in FIG. 8 , it is a schematic structural diagram of a terminal device for executing a secure communication service according to Embodiment 6 of the present invention. Embodiment 6 of the present invention is an invention under the same inventive concept as Embodiment 1 to Embodiment 4 of the present invention. The terminal device includes: a request message sending module 21 and a session key receiving module 22, wherein:
请求消息发送模块21,用于向加密应用服务器EAS发送保密通信业务建立请求消息,其中,所述保密通信业务建立请求消息用于表征所述第一终端设备与第二终端设备之间需要建立保密通信业务,所述保密通信业务建立请求消息中包含了用于获取会话密钥的参数信息;The request message sending module 21 is configured to send a secure communication service establishment request message to the encryption application server EAS, wherein the secure communication service establishment request message is used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device A communication service, wherein the confidential communication service establishment request message includes parameter information for obtaining a session key;
会话密钥接收模块22,用于接收所述EAS发送的加密后的会话密钥,其中,所述加密后的会话密钥是所述EAS将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC,由所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的,所述会话密钥请求消息用于表征请求所述KMC为所述第一终端设备和所述第二终端设备之间需要建立的保密通信业务产生会话密钥。The session key receiving module 22 is configured to receive the encrypted session key sent by the EAS, wherein the encrypted session key is the parameter information that the EAS carries in the parameter information for obtaining the session key. The session key request message is sent to the key management center KMC to which the first terminal device and the second terminal device belong, and the KMC encrypts the generated session key according to the parameter information for obtaining the session key. The session key request message is obtained by encrypting the key, and the session key request message is used to represent a request for the KMC to generate a session key for the secure communication service that needs to be established between the first terminal device and the second terminal device.
可选地,所述终端设备还包括:处理模块23,其中:Optionally, the terminal device further includes: a processing module 23, wherein:
处理模块23,用于在接收所述EAS发送的加密后的会话密钥时,将所述加密后的会话密钥发送给所述第二终端设备。The processing module 23 is configured to send the encrypted session key to the second terminal device when receiving the encrypted session key sent by the EAS.
所述处理模块23,具体用于通过IMS网络信令将所述加密后的会话密钥发送给所述第二终端设备;The processing module 23 is specifically configured to send the encrypted session key to the second terminal device through IMS network signaling;
或者,or,
通过建立的与所述第二终端设备之间的媒体面数据传输通道将所述加密后的会话密钥发送给所述第二终端设备。The encrypted session key is sent to the second terminal device through the established media plane data transmission channel with the second terminal device.
所述终端设备还包括:解密模块24,其中:The terminal device also includes: a decryption module 24, wherein:
解密模块24,用于在接收所述EAS发送的加密后的会话密钥时,利用登录所述KMC时产生的第一保护密钥对所述加密后的会话密钥进行解密,得到所述KMC为所述第一终端设备与所述第二终端设备之间进行保密通信业务产生的会话密钥。The decryption module 24 is used to decrypt the encrypted session key using the first protection key generated when logging in to the KMC when receiving the encrypted session key sent by the EAS to obtain the KMC A session key generated for a secure communication service between the first terminal device and the second terminal device.
需要说明的是,本发明实施例六所述的终端设备可以是硬件实现的物理实体单元,也可以是软件实现的逻辑部件,这里不做具体限定。It should be noted that the terminal device described in Embodiment 6 of the present invention may be a physical entity unit implemented by hardware, or may be a logical component implemented by software, which is not specifically limited here.
此外,本发明实施例六还包含了IP通信模块和密码通信模块。In addition, the sixth embodiment of the present invention further includes an IP communication module and a cryptographic communication module.
其中,IP通信模块支持SIP通信协议,具有IMS通信能力,支持终端在IMS系统的登录/注销、身份认证、呼叫控制与处理等功能;密码模块负责终端密钥管理并执行加解密算法,在控制面,实现与KMC进行信令交互获得会话密钥,在媒体面,利用获取的会话密钥建立与对端设备的安全关联,实现通信业务的保密传输。Among them, the IP communication module supports the SIP communication protocol, has IMS communication capabilities, and supports functions such as terminal login/logout, identity authentication, call control and processing in the IMS system; the cryptographic module is responsible for terminal key management and executes encryption and decryption algorithms. On the side, it implements signaling interaction with the KMC to obtain the session key. On the media side, the acquired session key is used to establish a security association with the peer device, so as to realize the secure transmission of communication services.
实施例七:Embodiment 7:
如图9所示,为本发明实施例七提供的一种用于保密通信业务的密钥管理中心的结构示意图。本发明实施例七是与本发明实施例一至实施例四属于同一发明构思下的发明,所述密钥管理中心包括:密钥请求接收模块31和密钥发送模块32,其中:As shown in FIG. 9 , it is a schematic structural diagram of a key management center for a secure communication service according to Embodiment 7 of the present invention. Embodiment 7 of the present invention is an invention under the same inventive concept as Embodiment 1 to Embodiment 4 of the present invention. The key management center includes: a key request receiving module 31 and a key sending module 32, wherein:
密钥请求接收模块31,用于接收加密应用服务器EAS发送的会话密钥请求消息,其中,所述会话密钥请求消息用于表征请求所述KMC为第一终端设备和第二终端设备之间需要建立的保密通信业务产生会话密钥,所述会话密钥请求消息中包含了用于获取会话密钥的参数信息,所述用于获取会话密钥的参数信息是所述EAS接收到的所述第一终端设备发送的用于表征所述第一终端设备与所述第二终端设备之间需要建立保密通信业务的保密通信业务建立请求消息中携带的;并The key request receiving module 31 is configured to receive a session key request message sent by the encryption application server EAS, wherein the session key request message is used to represent the request for the KMC to be between the first terminal device and the second terminal device. The confidential communication service that needs to be established generates a session key, and the session key request message includes parameter information for obtaining the session key, and the parameter information for obtaining the session key is all received by the EAS. carried in a secure communication service establishment request message sent by the first terminal device and used to indicate that a secure communication service needs to be established between the first terminal device and the second terminal device; and
密钥发送模块32,用于向所述EAS返回加密后的会话密钥,以便于所述EAS将加密后的所述会话密钥发送给所述第一终端设备,使得所述第一终端设备能够利用所述会话密钥实现与所述第二终端设备之间的保密通信,其中,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的。A key sending module 32, configured to return the encrypted session key to the EAS, so that the EAS sends the encrypted session key to the first terminal device, so that the first terminal device The confidential communication with the second terminal device can be realized by using the session key, wherein the encrypted session key is a pair of the KMC according to the parameter information used to obtain the session key. The generated session key is obtained after encryption processing.
具体地,所述用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息和第二终端设备的标识信息;Specifically, the identification information of the first terminal device and the identification information of the second terminal device included in the parameter information for obtaining the session key;
所述密钥发送模块32,具体用于生成用于为所述第一终端设备与所述第二终端设备之间执行保密通信业务需要的会话密钥,根据用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对生成的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及The key sending module 32 is specifically configured to generate a session key required for performing a secure communication service between the first terminal device and the second terminal device, according to the parameter information used to obtain the session key. The identification information of the first terminal device contained in the identification information of the first terminal device, determine the first protection key generated by the first terminal device corresponding to the identification information of the first terminal device when logging in the KMC, and use the first protection key encrypting the generated session key with the key to obtain a session key encrypted with the first protection key; and
根据用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥;并利用所述第二保护密钥对生成的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥;According to the identification information of the second terminal device included in the parameter information for acquiring the session key, determine the second protection generated by the second terminal device corresponding to the identification information of the second terminal device when logging in to the KMC and use the second protection key to encrypt the generated session key to obtain a session key encrypted by the second protection key;
将所述利用第一保护密钥加密后的会话密钥和所述利用第二保护密钥加密后的会话密钥作为加密后的会话密钥,通过密钥响应消息发送给所述EAS。The session key encrypted with the first protection key and the session key encrypted with the second protection key are used as the encrypted session key, and sent to the EAS through a key response message.
需要说明的是,本发明实施例七所述的密钥管理中心可以是硬件实现的物理实体单元,也可以是软件实现的逻辑部件,这里不做具体限定。It should be noted that the key management center described in Embodiment 7 of the present invention may be a physical entity unit implemented by hardware or a logical component implemented by software, which is not specifically limited here.
实施例八:Embodiment 8:
如图10所示,为本发明实施例八提供的一种保密通信业务的处理系统的结构示意图,所述系统包括:加密应用服务器41、密钥管理中心42、第一终端设备43和第二终端设备44,其中:As shown in FIG. 10 , it is a schematic structural diagram of a system for processing a confidential communication service according to Embodiment 8 of the present invention. The system includes: an encryption application server 41 , a key management center 42 , a first terminal device 43 and a second Terminal equipment 44, wherein:
所述第一终端设备43,用于向加密应用服务器EAS发送保密通信业务建立请求消息,并接收所述EAS发送的加密后的会话密钥,其中,所述保密通信业务建立请求消息用于表征所述第一终端设备与第二终端设备之间需要建立保密通信业务,所述保密通信业务建立请求消息中包含了用于获取会话密钥的参数信息。The first terminal device 43 is configured to send a secure communication service establishment request message to the encrypted application server EAS, and receive the encrypted session key sent by the EAS, wherein the secure communication service establishment request message is used to represent the A secure communication service needs to be established between the first terminal device and the second terminal device, and the secure communication service establishment request message includes parameter information for acquiring a session key.
所述加密应用服务器41,用于接收第一终端设备发送的保密通信业务建立请求消息,将用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC,并接收所述KMC返回的加密后的会话密钥,并将加密后的所述会话密钥发送给所述第一终端设备,其中,所述会话密钥请求消息用于表征请求所述KMC为所述第一终端设备和所述第二终端设备之间需要建立的保密通信业务产生会话密钥。The encryption application server 41 is configured to receive a secure communication service establishment request message sent by the first terminal device, and carry the parameter information used to obtain the session key in the session key request message and send it to the first terminal device and the user. The key management center KMC to which the second terminal device belongs, receives the encrypted session key returned by the KMC, and sends the encrypted session key to the first terminal device, wherein the encrypted session key is sent to the first terminal device. The session key request message is used to represent a request for the KMC to generate a session key for a secure communication service that needs to be established between the first terminal device and the second terminal device.
所述密钥管理中心42,用于接收加密应用服务器EAS发送的会话密钥请求消息,并向所述EAS返回加密后的会话密钥,其中,所述加密后的所述会话密钥是所述KMC根据所述用于获取会话密钥的参数信息对产生的会话密钥进行加密处理后得到的。The key management center 42 is configured to receive the session key request message sent by the encrypted application server EAS, and return the encrypted session key to the EAS, wherein the encrypted session key is the The KMC is obtained by encrypting the generated session key according to the parameter information used to obtain the session key.
具体地,所述用于获取会话密钥的参数信息中包含了所述第一终端设备的标识信息和所述第二终端设备的标识信息;Specifically, the parameter information for obtaining the session key includes the identification information of the first terminal device and the identification information of the second terminal device;
所述加密应用服务器41,用于在将所述用于获取会话密钥的参数信息携带在会话密钥请求消息中发送给所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC之前,根据所述第一终端设备的标识信息和所述第二终端设备的标识信息,确定所述第一终端设备和所述第二终端设备所属的密钥管理中心KMC。The encryption application server 41 is configured to carry the parameter information for obtaining the session key in the session key request message and send it to the key management system to which the first terminal device and the second terminal device belong. Before the center KMC, according to the identification information of the first terminal device and the identification information of the second terminal device, determine the key management center KMC to which the first terminal device and the second terminal device belong.
所述加密应用服务器41,还用于将加密后的会话密钥发送给所述第二终端设备,使得所述第二终端设备能够利用所述会话密钥实现与所述第一终端设备之间的保密通信。The encryption application server 41 is further configured to send the encrypted session key to the second terminal device, so that the second terminal device can use the session key to implement communication with the first terminal device. confidential communications.
所述加密应用服务器41,具体用于通过IMS网络信令将加密后的会话密钥发送给所述第一终端设备和/或者第二终端设备。The encryption application server 41 is specifically configured to send the encrypted session key to the first terminal device and/or the second terminal device through IMS network signaling.
所述第一终端设备43,用于在接收所述EAS发送的加密后的会话密钥时,将所述加密后的会话密钥发送给所述第二终端设备。The first terminal device 43 is configured to send the encrypted session key to the second terminal device when receiving the encrypted session key sent by the EAS.
所述第一终端设备43,具体用于通过IMS网络信令将所述加密后的会话密钥发送给所述第二终端设备;The first terminal device 43 is specifically configured to send the encrypted session key to the second terminal device through IMS network signaling;
或者,or,
通过建立的与所述第二终端设备之间的媒体面数据传输通道将所述加密后的会话密钥发送给所述第二终端设备。The encrypted session key is sent to the second terminal device through the established media plane data transmission channel with the second terminal device.
所述加密后的会话密钥包含了利用第一保护密钥加密后的会话密钥和利用第二保护密钥加密后的会话密钥;The encrypted session key includes a session key encrypted with the first protection key and a session key encrypted with the second protection key;
所述第一终端设备43,用于在接收所述EAS发送的加密后的会话密钥时,利用登录所述KMC时产生的第一保护密钥对所述加密后的会话密钥进行解密,得到所述KMC为所述第一终端设备与所述第二终端设备之间进行保密通信业务产生的会话密钥。The first terminal device 43 is configured to decrypt the encrypted session key using the first protection key generated when logging in to the KMC when receiving the encrypted session key sent by the EAS, The session key generated by the KMC for the secure communication service between the first terminal device and the second terminal device is obtained.
所述密钥管理中心42,具体用于生成用于为所述第一终端设备与所述第二终端设备之间执行保密通信业务需要的会话密钥,根据用于获取会话密钥的参数信息中包含的所述第一终端设备的标识信息,确定所述第一终端设备的标识信息对应的第一终端设备在登录所述KMC时产生的第一保护密钥,并利用所述第一保护密钥对生成的所述会话密钥进行加密运算,得到利用第一保护密钥加密后的会话密钥;以及The key management center 42 is specifically configured to generate a session key required for performing a secure communication service between the first terminal device and the second terminal device, according to the parameter information used to obtain the session key. The identification information of the first terminal device contained in the identification information of the first terminal device, determine the first protection key generated by the first terminal device corresponding to the identification information of the first terminal device when logging in the KMC, and use the first protection key encrypting the generated session key with the key to obtain a session key encrypted with the first protection key; and
根据用于获取会话密钥的参数信息中包含的所述第二终端设备的标识信息,确定所述第二终端设备的标识信息对应的第二终端设备在登录所述KMC时产生的第二保护密钥;并利用所述第二保护密钥对生成的所述会话密钥进行加密运算,得到利用第二保护密钥加密后的会话密钥;According to the identification information of the second terminal device included in the parameter information for acquiring the session key, determine the second protection generated by the second terminal device corresponding to the identification information of the second terminal device when logging in to the KMC and use the second protection key to encrypt the generated session key to obtain a session key encrypted by the second protection key;
将所述利用第一保护密钥加密后的会话密钥和所述利用第二保护密钥加密后的会话密钥作为加密后的会话密钥,通过密钥响应消息发送给所述EAS。The session key encrypted with the first protection key and the session key encrypted with the second protection key are used as the encrypted session key, and sent to the EAS through a key response message.
本领域的技术人员应明白,本发明的实施例可提供为方法、装置(设备)、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。As will be appreciated by those skilled in the art, embodiments of the present invention may be provided as a method, an apparatus (apparatus), or a computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
本发明是参照根据本发明实施例的方法、装置(设备)和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (apparatus) and computer program products according to embodiments of the invention. It will be understood that each process and/or block in the flowchart illustrations and/or block diagrams, and combinations of processes and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded on a computer or other programmable data processing device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer-implemented process such that The instructions provide steps for implementing the functions specified in the flow or blocks of the flowcharts and/or the block or blocks of the block diagrams.
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。Although preferred embodiments of the present invention have been described, additional changes and modifications to these embodiments may occur to those skilled in the art once the basic inventive concepts are known. Therefore, the appended claims are intended to be construed to include the preferred embodiment and all changes and modifications that fall within the scope of the present invention.
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。It will be apparent to those skilled in the art that various modifications and variations can be made in the present invention without departing from the spirit and scope of the invention. Thus, provided that these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include these modifications and variations.
Claims (19)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310631793.2A CN104683304B (en) | 2013-11-29 | 2013-11-29 | A kind of processing method of secure traffic, equipment and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310631793.2A CN104683304B (en) | 2013-11-29 | 2013-11-29 | A kind of processing method of secure traffic, equipment and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104683304A CN104683304A (en) | 2015-06-03 |
CN104683304B true CN104683304B (en) | 2019-01-01 |
Family
ID=53317907
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310631793.2A Active CN104683304B (en) | 2013-11-29 | 2013-11-29 | A kind of processing method of secure traffic, equipment and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104683304B (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103987037A (en) | 2014-05-28 | 2014-08-13 | 大唐移动通信设备有限公司 | Secret communication implementation method and device |
CN106487501B (en) | 2015-08-27 | 2020-12-08 | 华为技术有限公司 | Key distribution and reception method, key management center, first and second network elements |
CN106534044A (en) * | 2015-09-09 | 2017-03-22 | 中兴通讯股份有限公司 | Method and device for encrypting voice call |
CN106714153B (en) * | 2015-11-13 | 2022-06-10 | 华为技术有限公司 | Key distribution, generation and reception method and related device |
CN106714152B (en) | 2015-11-13 | 2021-04-09 | 华为技术有限公司 | Key distribution and reception method, first key management center and first network element |
CN106936570B (en) | 2015-12-31 | 2021-08-20 | 华为技术有限公司 | A key configuration method, key management center, and network element |
CN107623912B (en) * | 2016-07-15 | 2020-12-11 | 中兴通讯股份有限公司 | Method and device for safety communication between internet of vehicles terminals |
CN106535184A (en) * | 2016-10-18 | 2017-03-22 | 深圳市金立通信设备有限公司 | Key management method and system |
CN107979836A (en) * | 2016-10-21 | 2018-05-01 | 中国移动通信有限公司研究院 | A kind of encryption call method and device applied to VoLTE |
CN108155991B (en) * | 2018-03-22 | 2022-01-04 | 北京可信华泰科技有限公司 | Generation system of trusted key |
CN108449347B (en) * | 2018-03-22 | 2021-08-13 | 北京可信华泰信息技术有限公司 | Key generation server |
CN109344848A (en) * | 2018-07-13 | 2019-02-15 | 电子科技大学 | Adaboost-based mobile intelligent terminal security level classification method |
CN111404671B (en) * | 2019-01-02 | 2023-07-25 | 中国移动通信有限公司研究院 | Mobile quantum secure communication method, gateway, mobile terminal and server |
CN112702734B (en) * | 2019-10-23 | 2023-04-28 | 中移物联网有限公司 | Key distribution system and method |
WO2021155540A1 (en) * | 2020-02-06 | 2021-08-12 | 华为技术有限公司 | Key management method and communication apparatus |
CN115334504B (en) * | 2021-05-10 | 2025-07-11 | 大唐移动通信设备有限公司 | Key transmission method, device, terminal and network side equipment of temporary group |
CN115549956B (en) * | 2022-08-17 | 2024-12-20 | 青岛海尔科技有限公司 | Session establishment method, device, storage medium and electronic device |
CN117675235A (en) * | 2022-08-22 | 2024-03-08 | 中国移动通信有限公司研究院 | A secure communication processing method, first terminal and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100789668B1 (en) * | 2005-01-27 | 2007-12-31 | 정명식 | Wireless communication terminal having both normal communication mode and non-flash service mode |
CN101442742A (en) * | 2008-12-12 | 2009-05-27 | 华为技术有限公司 | Method, system and equipment for implementing end-to-end encipher of mobile cluster set call |
CN101536399A (en) * | 2006-09-28 | 2009-09-16 | 西门子公司 | Method for providing a symmetric key for protecting a key management protocol |
CN101572694A (en) * | 2008-04-29 | 2009-11-04 | 华为技术有限公司 | Method for acquiring media stream key, session equipment and key management function entity |
-
2013
- 2013-11-29 CN CN201310631793.2A patent/CN104683304B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100789668B1 (en) * | 2005-01-27 | 2007-12-31 | 정명식 | Wireless communication terminal having both normal communication mode and non-flash service mode |
CN101536399A (en) * | 2006-09-28 | 2009-09-16 | 西门子公司 | Method for providing a symmetric key for protecting a key management protocol |
CN101572694A (en) * | 2008-04-29 | 2009-11-04 | 华为技术有限公司 | Method for acquiring media stream key, session equipment and key management function entity |
CN101442742A (en) * | 2008-12-12 | 2009-05-27 | 华为技术有限公司 | Method, system and equipment for implementing end-to-end encipher of mobile cluster set call |
Also Published As
Publication number | Publication date |
---|---|
CN104683304A (en) | 2015-06-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104683304B (en) | A kind of processing method of secure traffic, equipment and system | |
CN107317789B (en) | Key distribution, authentication method, device and system | |
US9167422B2 (en) | Method for ensuring media stream security in IP multimedia sub-system | |
EP1946479B1 (en) | Communication securiy | |
CN100592731C (en) | Lawful Interception of End-to-End Encrypted Data Telecommunications | |
JP5106682B2 (en) | Method and apparatus for machine-to-machine communication | |
CN113228721B (en) | Communication method and related product | |
WO2015180654A1 (en) | Method and apparatus for achieving secret communications | |
CN102045210B (en) | End-to-end session key consultation method and system for supporting lawful interception | |
KR20080089500A (en) | Methods, systems, and authentication centers for authentication in end-to-end communications based on mobile networks | |
CN104168267A (en) | Identity authentication method for accessing SIP security video monitoring system | |
CN1658547B (en) | Crytographic keys distribution method | |
CN104683098B (en) | A kind of implementation method of secure traffic, equipment and system | |
CN106936788A (en) | A kind of cryptographic key distribution method suitable for VOIP voice encryptions | |
CN104683103B (en) | A kind of method and apparatus of terminal device logs certification | |
CN114928491A (en) | Internet of things security authentication method, device and system based on identification cryptographic algorithm | |
WO2017197968A1 (en) | Data transmission method and device | |
CN114726520B (en) | A method and device for determining a key | |
CN103973543A (en) | Method and device for instant messaging | |
CN100544247C (en) | Security Capability Negotiation Method | |
CN101572694B (en) | Method for acquiring media stream key, session equipment and key management function entity | |
CN105591748B (en) | A kind of authentication method and device | |
JP5746774B2 (en) | Key management for secure communication | |
WO2020037958A1 (en) | Gba-based client registration and key sharing method, device, and system | |
WO2015133951A1 (en) | Method, communication device, and computer program for improving communication privacy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |