CN1239009C - Quick abstract identification method for IP multimedia domain user's call - Google Patents
Quick abstract identification method for IP multimedia domain user's call Download PDFInfo
- Publication number
- CN1239009C CN1239009C CN 02125985 CN02125985A CN1239009C CN 1239009 C CN1239009 C CN 1239009C CN 02125985 CN02125985 CN 02125985 CN 02125985 A CN02125985 A CN 02125985A CN 1239009 C CN1239009 C CN 1239009C
- Authority
- CN
- China
- Prior art keywords
- user
- value
- verifier
- user terminal
- multimedia domain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000004044 response Effects 0.000 claims abstract description 36
- 238000012795 verification Methods 0.000 claims abstract description 8
- 230000001360 synchronised effect Effects 0.000 claims description 3
- 230000003111 delayed effect Effects 0.000 abstract 1
- 230000007246 mechanism Effects 0.000 description 30
- 230000008569 process Effects 0.000 description 14
- 238000013475 authorization Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000005315 distribution function Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000004846 x-ray emission Methods 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
技术领域technical field
本发明涉及保密和安全通信领域技术,具体地说,涉及第三代移动通讯网络(3G)中IP多媒体域(IM)的接入安全机制领域。The invention relates to the technology in the field of confidentiality and safety communication, in particular to the field of access security mechanism of IP multimedia domain (IM) in the third generation mobile communication network (3G).
背景技术Background technique
3G网络中,IM接入安全机制主要包括:用户身份的保密,采用IM公开身份,IM空中保护;注册或重新注册时的用户认证,采用SIP认证与密钥协议(SIP AKA:SIP Authentication and key agreement)机制;会话初始化协议(SIP:Session Initiated Protocol)信令的保护,提供数据机密性和完整性保护,依赖于密码消息语法(CMS:Cryptography Message Syntax)机制和网络区域安全/IP(NDS/IP)机制等。In the 3G network, the IM access security mechanism mainly includes: the confidentiality of the user identity, the use of IM to disclose the identity, and the protection of the IM over the air; the user authentication when registering or re-registering, using the SIP Authentication and Key Agreement (SIP AKA: SIP Authentication and key agreement). Agreement) mechanism; Session Initiation Protocol (SIP: Session Initiated Protocol) signaling protection, providing data confidentiality and integrity protection, relying on the password message syntax (CMS: Cryptography Message Syntax) mechanism and network area security/IP (NDS/ IP) mechanism, etc.
参见图1所示,图1为3G网络中IP多媒体域接入的安全机制。呼叫状态控制功能(CSCF:Call State Control Function)的功能形式有:代理呼叫状态控制功能(P-CSCF:Proxy CSCF)102、询问呼叫状态控制功能(I-CSCF:Interrogating CSCF)103、服务呼叫状态控制功能(S-CSCF:ServingCSCF)104。Referring to Fig. 1, Fig. 1 is a security mechanism for IP multimedia domain access in a 3G network. The functional forms of the call state control function (CSCF: Call State Control Function) are: proxy call state control function (P-CSCF: Proxy CSCF) 102, inquiry call state control function (I-CSCF: Interrogating CSCF) 103, service call state Control function (S-CSCF: ServingCSCF) 104 .
其中,P-CSCF 102是用户终端(UE)101在IM子系统中的第一个接入点,其地址是由UE在上下文激活后获得的,P-CSCF 102的功能如同代理,负责传送UE101至I-CSCF 103的SIP请求,承载资源的授权和QoS的管理,安全问题,拜访网络紧急呼叫的支持以及漫游用户呼叫监视和日志;S-CSCF104完成对端点的会话控制功能,根据业务的需要维持会话的状态;I-CSCF103主要是运营商网内的用户的所有连接的接入点,在一个运营商网络区域中,可以有多个I-CSCF,基本功能有:分配一个S-CSCF给执行注册的用户;将来自另一个网络的SIP请求路由到S-CSCF;从归属位置服务器(HSS)获得S-CSCF的地址;前传SIP请求/响应。Among them, the P-CSCF 102 is the first access point of the user terminal (UE) 101 in the IM subsystem, and its address is obtained by the UE after context activation. The function of the P-CSCF 102 is like a proxy, responsible for transmitting the SIP request to I-CSCF 103, authorization of bearer resources and QoS management, security issues, support of emergency calls in the visited network, call monitoring and logging of roaming users; S-CSCF 104 completes the session control function for endpoints, according to business needs Maintain the state of the session; I-CSCF103 is mainly the access point for all connections of users in the operator network. In an operator network area, there can be multiple I-CSCFs. The basic functions are: assign an S-CSCF to User performing registration; routing SIP request from another network to S-CSCF; obtaining address of S-CSCF from Home Location Server (HSS); forwarding SIP request/response.
用户终端设备(UE)101和P-CSCF 102之间的保护机制按照3GPP标准规范采用CMS机制,实现IM空中保护;在P-CSCF 102、I-CSCF 103和S-CSCF 104之间采用NDS/IP机制,即IP SEC ESP机制;在UE 101和S-CSCF104之间、IM用户注册或重新注册时的用户认证机制采用SIP AKA机制,提供用户认证和密钥分发功能。The protection mechanism between the user terminal equipment (UE) 101 and the P-CSCF 102 adopts the CMS mechanism according to the 3GPP standard specification to realize IM air protection; between the P-CSCF 102, the I-CSCF 103 and the S-CSCF 104, the NDS/ IP mechanism, that is, IP SEC ESP mechanism; between UE 101 and S-CSCF104, the user authentication mechanism when IM user registration or re-registration adopts SIP AKA mechanism to provide user authentication and key distribution functions.
参见图2所示。图2为注册或重新注册的用户认证流程。采用SIP AKA机制,注册或重新注册情形下的用户认证包括用户的认证和P-CSCF使用的密钥的分配。其具体过程如下:See Figure 2. Figure 2 shows the user authentication process for registration or re-registration. Using the SIP AKA mechanism, user authentication in the case of registration or re-registration includes user authentication and distribution of keys used by the P-CSCF. The specific process is as follows:
1.拜访网络下的UE向P-CSCF发出注册请求;1. The UE under the visited network sends a registration request to the P-CSCF;
2.P-CSCF接续该注册请求,并发送至归属网络下的I-CSCF;2. The P-CSCF continues the registration request and sends it to the I-CSCF under the home network;
3.I-CSCF向HSS发送密钥询问消息;3. The I-CSCF sends a key inquiry message to the HSS;
4.HSS向I-CSCF返回密钥询问应答消息;4. The HSS returns a key inquiry response message to the I-CSCF;
5.I-CSCF向HSS发送密钥选择出栈消息;5. The I-CSCF sends a key selection pop-up message to the HSS;
6.HSS向I-CSCF返回密钥选择出栈应答消息;6. The HSS returns a key selection pop-up response message to the I-CSCF;
7.I-CSCF分配一个S-CSCF给执行注册的用户后,向S-CSCF发送注册请求;7. After the I-CSCF assigns an S-CSCF to the registered user, it sends a registration request to the S-CSCF;
8.S-CSCF向HSS发送密钥输入消息;8. The S-CSCF sends a key input message to the HSS;
9.HSS向S-CSCF发送密钥输入应答消息;9. The HSS sends a key input response message to the S-CSCF;
10.S-CSCF向HSS发送密钥认证数据请求;10. The S-CSCF sends a key authentication data request to the HSS;
11.HSS选择认证向量(AV)后,向S-CSCF返回密钥认证数据应答,该应答带有随机数(RAND:Random challenge)、认证标识(AUTN:Authentication Token)、期望应答(XRES:Expected Response)、完整性密钥(IK:Integrity Key)、密钥(CK:Cipher Key)参数;11. After the HSS selects the authentication vector (AV), it returns a key authentication data response to the S-CSCF, which contains a random number (RAND: Random challenge), an authentication identifier (AUTN: Authentication Token), and an expected response (XRES: Expected Response), integrity key (IK: Integrity Key), key (CK: Cipher Key) parameters;
12.若认证不成功,S-CSCF向I-CSCF返回401未授权消息,该消息带有RAND、AUTN、IK、CK参数;12. If the authentication is unsuccessful, the S-CSCF returns a 401 Unauthorized message to the I-CSCF with parameters RAND, AUTN, IK, and CK;
13.I-CSCF将上述401未授权消息返回至P-CSCF;13. The I-CSCF returns the above 401 Unauthorized message to the P-CSCF;
14.P-CSCF向UE返回401未授权消息,该消息带有RAND、AUTN参数;14. The P-CSCF returns a 401 Unauthorized message to the UE, which contains RAND and AUTN parameters;
15.UE向P-CSCF发送重新注册请求,该请求带有应答来源(RES)参数;15. The UE sends a re-registration request to the P-CSCF with a response source (RES) parameter;
16.P-CSCF接续该请求,并将该请求发送给I-CSCF;16. The P-CSCF continues the request and sends the request to the I-CSCF;
17.I-CSCF向HSS发送密钥询问消息;17. The I-CSCF sends a key inquiry message to the HSS;
18.HSS向I-CSCF返回密钥询问应答消息;18. The HSS returns a key inquiry response message to the I-CSCF;
19.I-CSCF向S-CSCF发送注册请求,该请求带有RES参数;19. The I-CSCF sends a registration request to the S-CSCF with a RES parameter;
20.S-CSCF接收该注册请求进行认证后,向HSS发送密钥出栈消息;20. After receiving the registration request for authentication, the S-CSCF sends a key pop message to the HSS;
21.HSS向S-CSCF返回密钥出栈应答;21. The HSS returns the key pop-out response to the S-CSCF;
22.S-CSCF向I-CSCF返回授权成功消息;22. The S-CSCF returns an authorization success message to the I-CSCF;
23.I-CSCF接续该消息,向P-CSCF返回该授权成功消息;23. The I-CSCF continues the message and returns the authorization success message to the P-CSCF;
24.P-CSCF接续该消息,向UE返回该授权成功消息。24. The P-CSCF follows the message and returns the authorization success message to the UE.
从该认证过程可看出,采用SIP AKA机制,注册或重新注册的用户认证复杂,从步骤1至步骤14、步骤15至步骤24的过程中,需要往返两次。It can be seen from the authentication process that using the SIP AKA mechanism, user authentication for registration or re-registration is complicated. In the process from step 1 to step 14 and step 15 to step 24, two round trips are required.
参见图3所示,图3为SIP的呼叫流程。在没有有效的用户认证机制下,可采用SIP信令的保护,依赖于CMS机制和NDS/IP机制,以此来实现部分的认证功能。该方法需要对SIP标准进行扩展,并且由于NDS/IP机制是网络层安全机制,而且是逐段实施,例如,有的网段可能并未提供加密机制,或网络建设初期,部分网段不能提供安全保护,安全性并不可能得到可靠的保证。其具体呼叫流程如下:Referring to Fig. 3, Fig. 3 is a call flow of SIP. In the absence of an effective user authentication mechanism, the protection of SIP signaling can be used, relying on the CMS mechanism and the NDS/IP mechanism to realize part of the authentication function. This method needs to expand the SIP standard, and because the NDS/IP mechanism is a network layer security mechanism, and it is implemented segment by segment, for example, some network segments may not provide encryption mechanisms, or some network segments cannot provide encryption mechanisms at the initial stage of network construction. Security protection, security cannot be reliably guaranteed. The specific call flow is as follows:
1.UE向P-CSCF发送邀请(INVITE)请求;1. The UE sends an INVITE request to the P-CSCF;
2.P-CSCF向S-CSCF发送该请求;2. The P-CSCF sends the request to the S-CSCF;
3.S-CSCF进行业务控制;3. S-CSCF performs service control;
4.S-CSCF向其它网络发送INVITE请求;4. S-CSCF sends an INVITE request to other networks;
5.接收该INVITE请求的网络向S-CSCF返回会话描述协议;5. The network receiving the INVITE request returns the session description protocol to the S-CSCF;
6.S-CSCF接续该会话描述协议,并向P-CSCF返回该会话描述协议;6. The S-CSCF continues the session description protocol, and returns the session description protocol to the P-CSCF;
7.P-CSCF授权服务质量(QOS)资源;7. P-CSCF authorizes quality of service (QOS) resources;
8.P-CSCF向UE返回会话描述协议。8. The P-CSCF returns the session description protocol to the UE.
SIP协议本身带有一些身份认证功能,包括:基本认证机制、摘要认证机制、PGP(Pretty Good Privacy)认证机制。基本认证机制非常简单,采用用户ID号和口令明文传送的方式,因而安全性很低。摘要认证机制是对基本认证机制的一种改进,即对用户号和口令进行密钥处理即用哈希函数处理,然后才进行传输,因而提高了安全性。PGP方案实现安全性更高,实现较复杂。The SIP protocol itself has some identity authentication functions, including: basic authentication mechanism, digest authentication mechanism, and PGP (Pretty Good Privacy) authentication mechanism. The basic authentication mechanism is very simple, and the user ID number and password are transmitted in plain text, so the security is very low. The abstract authentication mechanism is an improvement to the basic authentication mechanism, that is, the key processing of the user number and password is processed with a hash function, and then transmitted, thus improving the security. The PGP scheme is more secure and complex to implement.
在SIP呼叫流程中,步骤1、步骤2包含了摘要认证。参见图4所示,图4为摘要认证机制示意图。该方法需要三步完成对用户的认证,其过程如下:用户首先向验证方发送访问统一资源标识符(URI:Uniform ResourceIdentifier)的请求;验证方产生一个询问,即当前值(Nonce值),并发送给用户;用户反馈一个回答即校验和(CheckSum)给验证方。其中,Nonce是由认证方指定的数据串,每次生成401应答时生成唯一的值,该串是BASE64或16进制数据。Nonce的目的是阻止重放攻击即阻止攻击者重放截获的消息;校验和是使用哈希函数MD5对用户名、口令、给定的Nonce值、超文本传输协议(HTTP:Hyper Text Transfer Protocol)方法和请求的URI进行计算得到的值,MD5为消息摘要(Message Digest 5)算法,是对杂凑压缩信息块按512比特进行处理。In the SIP call process, steps 1 and 2 include digest authentication. Referring to FIG. 4, FIG. 4 is a schematic diagram of a digest authentication mechanism. This method requires three steps to complete the authentication of the user, and the process is as follows: the user first sends a request to the verification party to access the Uniform Resource Identifier (URI: Uniform Resource Identifier); the verification party generates a query, that is, the current value (Nonce value), and Sent to the user; the user feeds back an answer (CheckSum) to the verifier. Among them, Nonce is a data string specified by the authenticator, and a unique value is generated each time a 401 response is generated, and the string is BASE64 or hexadecimal data. The purpose of Nonce is to prevent replay attacks, that is, to prevent attackers from replaying intercepted messages; the checksum is to use the hash function MD5 to check the user name, password, given Nonce value, Hypertext Transfer Protocol (HTTP: Hyper Text Transfer Protocol) ) method and the requested URI. MD5 is the Message Digest 5 algorithm, which processes the hash compressed information block by 512 bits.
从上述摘要认证的步骤可见,由于完成摘要认证需要三步,造成SIP呼叫流程完成认证所花费的时间较长。It can be seen from the above-mentioned steps of digest authentication that since it takes three steps to complete the digest authentication, it takes a long time for the SIP call process to complete the authentication.
发明内容Contents of the invention
本发明目的在于提供一种在IP多媒体域(IM)中实现用户呼叫的快速摘要认证的方法,将原来摘要认证方法的三步变成两步,加快认证的速度。The purpose of the present invention is to provide a method for realizing rapid summary authentication of user calls in the IP multimedia domain (IM), which changes the original three steps of the summary authentication method into two steps, and accelerates the speed of authentication.
本发明通过以下技术方案实现:The present invention is realized through the following technical solutions:
一种IP多媒体域用户呼叫的快速摘要认证方法,其特征在于该方法至少包括以下步骤:A kind of fast summary authentication method that IP multimedia domain user calls, it is characterized in that the method comprises the following steps at least:
A)用户终端向验证方发送携带有用户终端当前值和用户终端应答值参数的呼叫请求,其中,用户终端当前值和用户终端应答值由该用户终端产生,所述用户终端当前值是根据发送时戳、以及使用哈希函数对发送时戳、多媒体域用户公开身份号、和多媒体域用户专用身份号之字符串进行计算所得的值而确定;所述用户终端应答值是使用哈希函数对用户终端当前值、多媒体域用户公开身份号、和统一资源标识符之字符串进行计算得到的值;A) The user terminal sends a call request to the verifier that carries the parameters of the current value of the user terminal and the response value of the user terminal, wherein the current value of the user terminal and the response value of the user terminal are generated by the user terminal, and the current value of the user terminal is based on the parameters sent Timestamp, and use the hash function to send the timestamp, the multimedia domain user public identity number, and the multimedia domain user's private identity number to calculate the value obtained; the user terminal response value is determined by using the hash function to The value obtained by calculating the current value of the user terminal, the public identity number of the user in the multimedia domain, and the character string of the uniform resource identifier;
B)验证方判断该呼叫请求到达验证方的接收时戳与用户终端发送该呼叫请求的发送时戳之间的时间间隔是否超出预定的时延,若超出预定的时延,则执行步骤D,若未超出预定的时延,则执行步骤C;其中,接收时戳、发送时戳取自标准格林成治时间,B) the verifier judges whether the time interval between the receiving time stamp of the call request arriving at the verifier and the sending time stamp of the user terminal sending the call request exceeds a predetermined time delay, and if it exceeds the predetermined time delay, then execute step D, If the predetermined time delay is not exceeded, then perform step C; wherein, the receiving time stamp and sending time stamp are taken from the standard GMT,
C)验证方根据IP多媒体域用户公开身份号查询用户信息,获取多媒体域用户专用身份号后,生成验证方当前值,然后产生验证方应答值,将验证方应答值与接收到的用户终端应答值进行比较,如果相同,呼叫请求的用户身份就通过验证;否则,执行步骤D;其中,所述验证方当前值是根据接收时戳、以及使用哈希函数对接收时戳、多媒体域用户公开身份号、和多媒体域用户专用身份号之字符串进行计算所得的值而确定,所述验证方应答值使用哈希函数对验证方当前值、多媒体域用户公开身份号、和统一资源标识符之字符串进行计算得到的值;C) The verifier queries the user information according to the public identity number of the IP multimedia domain user, and after obtaining the special identity number of the multimedia domain user, generates the current value of the verifier, and then generates the reply value of the verifier, and combines the reply value of the verifier with the received user terminal reply Values are compared, if they are the same, the user identity of the call request is verified; otherwise, step D is performed; wherein, the current value of the verifier is based on the receiving timestamp and uses a hash function to disclose the receiving timestamp and the multimedia domain user identity number, and the string of multimedia domain user-specific identity number to determine the value obtained by calculating, and the authenticator response value uses a hash function to compare the current value of the authenticator, the public identity number of the multimedia domain user, and the Uniform Resource Identifier The calculated value of the string;
D)验证方抛弃该呼叫请求,并向用户返回未授权消息。D) The verifier discards the call request and returns an unauthorized message to the user.
较佳地,所述用户终端当前值为发送时戳与使用哈希函数MD5对发送时戳:多媒体域用户公开身份号:多媒体域用户专用身份号之字符串进行计算所得的值的级联;Preferably, the current value of the user terminal is the concatenation of the sending timestamp and the value calculated using the hash function MD5 on the sending timestamp: the public identity number of the multimedia domain user: the private identity number of the multimedia domain user;
所述验证方当前值为接收时戳与使用哈希函数MD5对发送时戳:多媒体域用户公开身份号:多媒体域用户专用身份号之字符串进行计算所得的值的级联。The current value of the verifier is the concatenation of the receiving time stamp and the value obtained by calculating the string of sending time stamp: multimedia domain user public identity number: multimedia domain user private identity number using the hash function MD5.
所述用户终端当前值、验证方当前值是BASE64编码。The current value of the user terminal and the current value of the verifier are BASE64 coded.
较佳地,所述用户终端应答值所使用的哈希函数为MD5;Preferably, the hash function used by the user terminal response value is MD5;
所述验证方应答值所使用的哈希函数为MD5。The hash function used by the verifier response value is MD5.
所述时延限制在用户与系统同步的时间内。The delay is limited to the time during which the user is synchronized with the system.
所述的认证方为服务呼叫状态控制功能实体。The authenticator is the service call state control function entity.
本发明利用UE产生Nonce值、Response值,并将摘要认证方法的Nonce值的产生改由用户按标准的时间方法进行生成,利用时延的验证方法进行用户认证,将原来摘要认证方法的三步变成两步,并无需进行繁琐的校验和计算,克服了采用SIP AKA机制复杂的呼叫过程,简化了IP多媒体域用户呼叫的摘要认证方法,加快了认证的速度,适合长时间进行用户呼叫的简单认证。The present invention utilizes the UE to generate the Nonce value and the Response value, and changes the generation of the Nonce value of the digest authentication method to the user according to the standard time method, uses the delay verification method to perform user authentication, and replaces the three steps of the original digest authentication method It becomes two steps without complicated checksum calculation, overcomes the complicated call process of using SIP AKA mechanism, simplifies the digest authentication method of IP multimedia domain user calls, speeds up the authentication, and is suitable for long-term user calls simple authentication.
附图说明Description of drawings
图1为3G IP多媒体(IM)接入安全机制示意图;Fig. 1 is a schematic diagram of 3G IP multimedia (IM) access security mechanism;
图2为注册或重新注册的用户认证流程;Figure 2 is the user authentication process for registration or re-registration;
图3为SIP呼叫流程;Fig. 3 is a SIP call flow;
图4为现有技术摘要认证方法示意图;FIG. 4 is a schematic diagram of a prior art abstract authentication method;
图5为本发明快速摘要认证方法的用户呼叫认证流程。FIG. 5 is a user call authentication process of the fast digest authentication method of the present invention.
具体实施方式Detailed ways
为使本发明的目的、技术方案及优点更加清楚明白,以下参照附图并举实施例,对本发明进一步详细说明。In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.
本发明提出的在IP多媒体域(IM)中实现用户呼叫的快速摘要认证的方法,实质是一种简化的摘要认证方法。The method proposed by the present invention to realize the rapid digest authentication of user calls in the IP multimedia domain (IM) is essentially a simplified digest authentication method.
参见图5所示。图5为本发明快速摘要认证方法的用户呼叫认证流程。认证流程描述如下:See Figure 5. FIG. 5 is a user call authentication process of the fast digest authentication method of the present invention. The authentication process is described as follows:
1.UE产生一个呼叫请求(INVITE),并将该请求传递给P-CSCF,该请求所携带的参数中包括UE方的Nonce值、UE方的Response值;其中,参数的计算如下:1. The UE generates a call request (INVITE) and transmits the request to the P-CSCF. The parameters carried in the request include the Nonce value of the UE side and the Response value of the UE side; the calculation of the parameters is as follows:
①Nonce值的产生:Nonce值为BASE64编码。Nonce=时戳‖MD5(时戳“:”IM用户公开身份号“:”IM用户专用身份号),即,Nonce值为时戳与使用MD5对时戳:IM用户公开身份号:IM用户专用身份号的串进行计算所得的值的级联。其中,时戳必须取自标准的格林威治时间,并为UE发送INVITE请求的发送时戳,由此得到UE方的Nonce值。① Generation of Nonce value: Nonce value is BASE64 encoded. Nonce=time stamp ‖ MD5 (time stamp ":" IM user's public identity number ":" IM user's private identity number), that is, the Nonce value is a time stamp and uses MD5 to pair time stamp: IM user's public identity number: IM user's private The string of IDs is concatenated to the computed value. Wherein, the time stamp must be taken from the standard Greenwich Mean Time, and it is the sending time stamp of the INVITE request sent by the UE, so as to obtain the Nonce value of the UE side.
②Response值的产生:Response是使用MD5对IM用户公开身份号(IMPU)、Nonce值和请求的URI进行计算得到的值,即Response=MD5(Nonce“:”IMPU“:”URI)。其中,Nonce为UE方的Nonce值,由此得到UE方的Response值。②Generation of Response value: Response is the value obtained by using MD5 to calculate the IM user public identity number (IMPU), Nonce value and requested URI, that is, Response=MD5(Nonce":"IMPU":"URI). Wherein, the Nonce is the Nonce value of the UE side, and thus the Response value of the UE side is obtained.
2.P-CSCF将该INVITE请求前传给S-CSCF,该请求仍带有UE方的Nonce值、UE方的Response值;2. The P-CSCF forwards the INVITE request to the S-CSCF, and the request still carries the Nonce value of the UE side and the Response value of the UE side;
3.S-CSCF收到INVITE消息后,进行用户认证:如果认证成功,继续步骤4,否则,转移到步骤10;具体认证过程说明如下:3. After receiving the INVITE message, the S-CSCF performs user authentication: if the authentication is successful, proceed to step 4, otherwise, transfer to step 10; the specific authentication process is described as follows:
S-CSCF在收到INVITE请求以后,首先检查该请求的接收时戳与该请求的发送时戳的时间间隔是否超出规定的时延,例如5秒钟。如果超出规定时延,则抛弃该INVITE请求;如果没有超出,S-CSCF则根据UE所传送的IMPU查询用户信息,获取IM用户专用身份号等信息后,按Nonce=时戳‖MD5(时戳“:”IM用户公开身份号“:”IM用户专用身份号)生成验证方Nonce值,其中,时戳为接收时戳,取自标准的格林威治时间,然后根据Response=MD5(Nonce值“:”IMPU“:”URI)产生一个期望的验证方的Response,其中,Nonce值为前述生成的验证方Nonce值,让产生的验证方的Response与接收到的INVITE请求所带的UE方的Response值进行比较。如果相同,INVITE消息的用户身份就通过验证,执行步骤4,否则,INVITE请求就被抛弃,执行步骤10,S-CSCF反馈未授权401消息给P-CSCF,步骤11,P-CSCF将未授权401消息前传给UE,即认证不成功,呼叫失败。After receiving the INVITE request, the S-CSCF first checks whether the time interval between the request's receiving time stamp and the request's sending time stamp exceeds a specified time delay, for example, 5 seconds. If the specified time delay is exceeded, the INVITE request will be discarded; if not, the S-CSCF will query the user information according to the IMPU transmitted by the UE, and after obtaining information such as the IM user's private identity number, press Nonce=time stamp∥MD5(time stamp ":" IM user public identity number":"IM user-specific identity number) to generate the Nonce value of the verifier, where the timestamp is the received timestamp, taken from the standard Greenwich Mean Time, and then according to Response=MD5(Nonce value" :"IMPU":"URI) to generate an expected authenticator's Response, where the Nonce value is the authenticator's Nonce value generated above, so that the generated authenticator's Response and the received INVITE request bring the UE's Response value for comparison. If they are the same, the user identity of the INVITE message is verified, and step 4 is performed; otherwise, the INVITE request is discarded, and step 10 is performed, and the S-CSCF feeds back an Unauthorized 401 message to the P-CSCF, and step 11, the P-CSCF will not authorize The 401 message is forwarded to the UE, that is, the authentication is unsuccessful and the call fails.
4.S-CSCF进行业务控制;4. S-CSCF performs service control;
5.S-CSCF继续将INVITE请求前传给其他网络;5. The S-CSCF continues to forward the INVITE request to other networks;
6.其它网络将SDP消息传递给S-CSCF;6. Other networks pass the SDP message to the S-CSCF;
7.S-CSCF将SDP消息传递给P-CSCF;7. The S-CSCF transmits the SDP message to the P-CSCF;
8.P-CSCF授权QoS资源;8. P-CSCF authorizes QoS resources;
9.P-CSCF将SDP消息前传给UE,即成功完成一次带认证的呼叫;9. The P-CSCF forwards the SDP message to the UE, that is, successfully completes a call with authentication;
由上述可见,本发明的快速摘要认证方法与现有技术的摘要认证方法的基本不同点在于Nonce由不同实体产生,并利用时延的验证方法进行用户认证,因此必须通过时延的控制来保证安全性。若时延为0,它们的安全性是相同的,时延越大,由于消息重发的可能性越大,因而快速摘要认证方案的安全性就越差于摘要认证方案。因此,必须限制接收时戳与发送时戳时延的大小,并使得IM用户和系统的时间同步或一致。As can be seen from the above, the basic difference between the fast digest authentication method of the present invention and the digest authentication method in the prior art is that the Nonce is generated by different entities, and the user authentication is performed using a time-delay verification method, so it must be guaranteed through time-delay control safety. If the delay is 0, their security is the same, and the greater the delay, the greater the possibility of message retransmission, so the security of the fast digest authentication scheme is worse than that of the digest authentication scheme. Therefore, it is necessary to limit the time delay between the receiving time stamp and the sending time stamp, and make the time of the IM user and the system synchronized or consistent.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 02125985 CN1239009C (en) | 2002-08-07 | 2002-08-07 | Quick abstract identification method for IP multimedia domain user's call |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 02125985 CN1239009C (en) | 2002-08-07 | 2002-08-07 | Quick abstract identification method for IP multimedia domain user's call |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1474586A CN1474586A (en) | 2004-02-11 |
CN1239009C true CN1239009C (en) | 2006-01-25 |
Family
ID=34143171
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 02125985 Expired - Fee Related CN1239009C (en) | 2002-08-07 | 2002-08-07 | Quick abstract identification method for IP multimedia domain user's call |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN1239009C (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102355355B (en) * | 2003-06-19 | 2014-07-16 | 日本电信电话株式会社 | Session control server, communication device, communication system and communication method |
JP2006031478A (en) * | 2004-07-16 | 2006-02-02 | Yamaha Corp | Content reproduction terminal and content distribution system |
CN100384120C (en) * | 2004-09-30 | 2008-04-23 | 华为技术有限公司 | Method for carrying out authentication for terminal user identification module in IP multimedia subsystem |
CN100493011C (en) * | 2005-08-16 | 2009-05-27 | 华为技术有限公司 | Method for connecting to IP multimedia subsystem |
CN100461782C (en) * | 2005-09-01 | 2009-02-11 | 华为技术有限公司 | System and method for realizing bridging in IP multi-media subsystem |
RU2490813C2 (en) * | 2008-08-01 | 2013-08-20 | Нокиа Сименс Нетуоркс Ой | Method, apparatus, system and computer program product for supporting p-cscf (proxy call session control function) to indicate to s-cscf (serving call session control function) to skip authentication |
WO2012129985A1 (en) * | 2011-03-29 | 2012-10-04 | 中兴通讯股份有限公司 | Method and system for single sign-on |
CN111770048B (en) * | 2020-05-08 | 2023-04-07 | 厦门亿联网络技术股份有限公司 | Method for preventing SIP equipment from being attacked, calling equipment and called equipment |
-
2002
- 2002-08-07 CN CN 02125985 patent/CN1239009C/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN1474586A (en) | 2004-02-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1214568C (en) | Techniques for performing UMTS (universal mobile telecommunications system) authentication using SIP (session initiation protocol) messages | |
US7610619B2 (en) | Method for registering a communication terminal | |
US9106648B2 (en) | Method and apparatus for data transmission | |
CN101635823B (en) | Method and system of terminal for encrypting videoconference data | |
US8837737B2 (en) | Key management in a communication network | |
CN101030854B (en) | Method and device for mutual authentication of network entities in multimedia subsystem | |
WO2015180654A1 (en) | Method and apparatus for achieving secret communications | |
CN101064695A (en) | P2P(Peer to Peer) safe connection method | |
CN1602611A (en) | Lawful interception of end-to-end encrypted data traffic | |
KR101343039B1 (en) | Authentication system, method and device | |
US8713634B2 (en) | Systems, methods and computer program products supporting provision of web services using IMS | |
CN1957581A (en) | User ID | |
CN1650659A (en) | Method for authenticating communication terminal equipment | |
CN101488945B (en) | An Authentication Method Oriented to Session Initiation Protocol | |
CN111756726A (en) | SIP security authentication method supporting State cipher algorithm | |
JP4384177B2 (en) | Method for protecting data traffic between a mobile radio network and an IMS network | |
CN1239009C (en) | Quick abstract identification method for IP multimedia domain user's call | |
CN1722689A (en) | A protection method for access security of IP multimedia subsystem | |
CN102111379A (en) | Authentication system, method and device | |
CN1671097A (en) | A method and system for end-to-end wireless encryption communication | |
WO2011147258A1 (en) | Card authenticating method, system and user equipment | |
CN107801186B (en) | Non-access stratum abstract authentication method in trunking communication system | |
CN1697368A (en) | Method for protecting access security of IP multimedia subsystem based on TLS | |
CN102594782A (en) | Authentication method and system of IP (Internet Protocol) multi-media subsystem as well as server | |
CN1881869A (en) | Method for realizing encryption communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20060125 Termination date: 20130807 |