CN104683304B - A kind of processing method of secure traffic, equipment and system - Google Patents

A kind of processing method of secure traffic, equipment and system Download PDF

Info

Publication number
CN104683304B
CN104683304B CN201310631793.2A CN201310631793A CN104683304B CN 104683304 B CN104683304 B CN 104683304B CN 201310631793 A CN201310631793 A CN 201310631793A CN 104683304 B CN104683304 B CN 104683304B
Authority
CN
China
Prior art keywords
session key
terminal equipment
key
encrypted
kmc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310631793.2A
Other languages
Chinese (zh)
Other versions
CN104683304A (en
Inventor
杨志强
侯长江
刘斐
田野
柏洪涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201310631793.2A priority Critical patent/CN104683304B/en
Publication of CN104683304A publication Critical patent/CN104683304A/en
Application granted granted Critical
Publication of CN104683304B publication Critical patent/CN104683304B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network

Abstract

The invention discloses a kind of processing method of secure traffic, equipment and systems, content includes: to introduce encryption application server and Key Management Center in the ims network, request message is established in the secure traffic for receiving the transmission of first terminal equipment by encryption application server, and session key request message is sent to Key Management Center, and when receiving the encrypted session key of Key Management Center return, which is sent to first terminal equipment;Make secret communication as operator and be supplied to the business of user by encrypting application server, and it encrypts application server and obtains encrypted session key from Key Management Center, it is handed down to terminal device, operator is not only increased to the control force of secret communication, improve the treatment effeciency of system, the Key Management Center of introducing realizes management of the user to key Life cycle, increases the safety that secure traffic executes between user.

Description

A kind of processing method of secure traffic, equipment and system
Technical field
The present invention relates to wireless communication technology fields and security technology area, more particularly to one kind to be based on interactive multimedia Service processing method, equipment and the system of secure traffic in IMS operation system.
Background technique
In order to IMS(Interactive Multimedia Service, interactive multi-media service) medium surface The user service information of carrying transmission carries out End to End Encryption protection, 3GPP(3rd Generation Partnership Project, 3G (Third Generation) Moblie standardization body) two kinds of relatively independent medium surface key pipes are proposed in TS33.328 Reason scheme realizes the negotiation of medium surface session key, and the session key obtained using negotiation, and communication system is in calling and called terminal Between or terminal and IMS network between establish security association, pass through SRTP(Secure Real-time Transport Protocol, Security Real Time Protocol) or IP Sec(Internet Protocol Security, IP safety) agreement pair User media face information is protected.
Wherein, it is SDES respectively that 3GPP proposes two kinds of relatively independent medium surface key managing projects in TS33.328 (Session Description Protocol Security Descriptions for Media Streams, session are retouched Protocol media stream is stated to describe safely) and KMS(Key Management Service, cipher key management services).
One, based on the key managing project of SDES.
Specifically, SDES is a kind of a kind of simple Key Management Protocol for protection Media Stream design, is in existing SDP Cryptographic properties have been increased newly in (Session Initiation Protocol, Session Description Protocol), have been generated for carried terminal Session key and parameter information complete the security parameter configuration of unicast stream medium data.
When SDES is applied in IMS system, in SIP(Session Initiation Protocol, conversation initial association View) in establishment process, the session key for media stream privacy that exchange termination equipment A and terminal device B are respectively generated.
As shown in Figure 1, being the workflow schematic diagram of SDES key management.On the one hand, in SIP session establishment, terminal Equipment A will be used to be sent to terminal device A in the session key K1 write-in SDP cryptographic properties of the media stream privacy of terminal device B, And carried by signaling plane sip message, it is sent to terminal device B.
On the other hand, terminal device B stores key K1 after the sip message for receiving terminal device A transmission, and will use Terminal is sent to by sip response message in the session key K2 for the media stream privacy for being sent to terminal device B terminal device A to set Standby A.
After terminal device A receives and stores key K2, it is close that terminal device A and terminal device B just obtain session Key K1 and session key K2.
Hereafter, terminal device A and terminal device B uses session key K1 and session key K2 to carry SRTP agreement respectively Media Stream carry out encryption and decryption operation, to realize to the secrecy of user data.
But in SDES scheme, session key is transmitted by signaling plane sip message, safety places one's entire reliance upon SIP The safety of signaling.
And the security mechanism of SIP signalling common are two kinds:
One is IMS network domain security mechanism is based on, that is, the safety in IMS network domain is completely dependent on to guarantee that SIP signaling passes Defeated safety, still, IMS network are usually on terminal device and SBC(Session Border Controller, session side Boundary's controller) between use cryptographic means, the SIP signaling on terminal device access link is encrypted, and in IMS net The core network internal SIP signaling of network then uses plaintext transmission mode, allows for attacker in this way using plaintext transmission SIP signaling Loophole obtains in SIP signaling and contains session key, realizes the monitoring to medium surface information between terminal device so that user it Between the safety conversed reduce.
Another kind is based on S/MIME(Secure Multipurpose Internet Mail Extensions, safety Multi purpose internet mail extensions) encipherment protection, i.e., using S/MIME agreement to the SDP(Session carried in SIP signaling Description Protocol, Session Description Protocol) message content encrypted end to end.In terminal device without default total In the case where enjoying key, using public key certificate system, terminal device is needed before sending session key from public key certificate system The middle public key for obtaining opposite end, is transmitted after being encrypted later using content of the public key of acquisition to SIP signaling.This mode makes Key management is kept completely separate with session management, and operator is unable to control key management, is bypassed in secure context, and fortune is unable to satisfy The demand that quotient carries out secure traffic is sought, practical application is restricted.
Two, based on the key managing project of KMS.
Specifically, KMS entity is based on GBA(Generic Bootstrapping Architecture, universal guiding frame Structure) mechanism sent to calling and called terminal authentication, and by the session key of generation by the exit passageway established after successful authentication Calling and called terminal.As shown in Fig. 2, being the flow diagram of KMS key management.
Based on GBA, KMS can be the foundation of unified certification ability and calling and called that upper layer application business provides using operator Security association between terminal, the information such as encrypted transmission session key.
But due to the kernel entity BSF(Bean Scripting Framework of GBA certification) tieed up by Carrier Management Shield is responsible for generating the session key between maintenance KMS and terminal device, and therefore, it is logical that operator is actually responsible for key safe transmission The safety of the foundation in road, the session key transmission that terminal device needs depends on operator.In this way, KMS key managing project It is not able to satisfy terminal device to the high safety grade demand of key management, is less suitable for operator and carries out secure traffic.
It can be seen that the user service information of medium surface carrying transmission carries out End to End Encryption protection in IMS network at present Mode be not only unable to satisfy user and operator respectively demand, but also there is a problem of that safety is lower.
Summary of the invention
The embodiment of the invention provides a kind of processing method of secure traffic, equipment and systems, for solving at present The user service information of medium surface carrying transmission be both unable to satisfy existing for the mode of End to End Encryption protection in IMS network The respective demand of user and operator, and the problem for making medium surface data transmission security lower.
A kind of processing method of secure traffic, comprising:
Encryption application server EAS receives the secure traffic that first terminal equipment is sent and establishes request message, wherein The secure traffic establishes request message and needs to build between the first terminal equipment and second terminal equipment for characterizing Vertical secure traffic, the secure traffic establish in request message the parameter letter contained for obtaining session key Breath;
The parameter information for being used to obtain session key is carried and is sent in session key request message by the EAS Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, wherein the session key request Message is used to characterize the secrecy for requesting the KMC to need to establish between the first terminal equipment and the second terminal equipment Communication service generates session key;
The EAS receives the encrypted session key that the KMC is returned, and the encrypted session key is sent To the first terminal equipment, the first terminal equipment is realized and the second terminal using the session key Secret communication between equipment, wherein the encrypted session key is that the KMC is used to obtain session according to described What the parameter information of key obtained after the session key of generation is encrypted.
Identification information and the institute of the first terminal equipment are contained in the parameter information for obtaining session key State the identification information of second terminal equipment;
The EAS is sent in session key request message by the parameter information carrying for being used to obtain session key Before Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, the method also includes:
The EAS is according to the identification information of the first terminal equipment and the identification information of the second terminal equipment, really Key Management Center KMC belonging to the fixed first terminal equipment and the second terminal equipment.
The method also includes:
Encrypted session key is sent to the second terminal equipment by the EAS, so that the second terminal equipment The secret communication between the first terminal equipment can be realized using the session key.
Encrypted session key is sent to the first terminal equipment and/or second terminal equipment by the EAS, packet It includes:
The EAS by IMS network signaling by encrypted session key be sent to the first terminal equipment and/or Second terminal equipment.
The encrypted session key contains using the first encrypted session key of protection key and utilizes second Protect the encrypted session key of key;
The encrypted session key is the KMC according to the parameter information pair for being used to obtain session key What the session key of generation obtained after being encrypted, comprising:
The mark for the first terminal equipment that the KMC includes in the parameter information according to for obtaining session key Know information, determines what the corresponding first terminal equipment of the identification information of the first terminal equipment was generated when logging in the KMC First protection key, and cryptographic calculation is carried out using the session key that the first protection key pair generates, it is utilized The first protection encrypted session key of key;And
According to described for obtaining the identification information for the second terminal equipment for including in the parameter information of session key, Determine the second protection that the corresponding second terminal equipment of the identification information of the second terminal equipment is generated when logging in the KMC Key, and cryptographic calculation is carried out using the session key that the second protection key pair generates, it is utilized the second protection The encrypted session key of key.
A kind of processing method of secure traffic, comprising:
First terminal equipment sends secure traffic to encryption application server EAS and establishes request message, wherein described Secure traffic establishes request message and needs to establish guarantor between the first terminal equipment and second terminal equipment for characterizing Close communication service, the secure traffic establish in request message the parameter information contained for obtaining session key;
The first terminal equipment receives the encrypted session key that the EAS is sent, wherein the encrypted meeting Words key is that the parameter information carrying for being used to obtain session key is sent to by the EAS in session key request message Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, is used for according to as the KMC What the parameter information of acquisition session key obtained after the session key of generation is encrypted, the session key request disappears Breath is logical for characterizing the secrecy for requesting the KMC to need to establish between the first terminal equipment and the second terminal equipment Communication service generates session key.
The method also includes:
The first terminal equipment, will be described encrypted when receiving the encrypted session key that the EAS is sent Session key is sent to the second terminal equipment.
The encrypted session key is sent to the second terminal equipment by the first terminal equipment, comprising:
The encrypted session key is sent to described second eventually by IMS network signaling by the first terminal equipment End equipment;
Alternatively,
The first terminal equipment by establish with the medium surface data transmission channel of second terminal equipment will it is described plus Session key after close is sent to the second terminal equipment.
The method also includes:
The first terminal equipment utilizes the login KMC when receiving the encrypted session key that the EAS is sent When generate first protection key pair described in encrypted session key be decrypted, obtain the KMC be the first terminal The session key of secure traffic generation is carried out between equipment and the second terminal equipment.
A kind of processing method of secure traffic, comprising:
Key Management Center KMC receives the session key request message that encryption application server EAS is sent, wherein described Session key request message is used to characterize what the request KMC needed to establish between first terminal equipment and second terminal equipment Secure traffic generates session key, and the parameter letter for obtaining session key is contained in the session key request message Breath, the parameter information for obtaining session key are being used for for the first terminal equipment transmission that the EAS is received Characterize the secure traffic for needing to establish secure traffic between the first terminal equipment and the second terminal equipment It establishes and carries in request message;And
Encrypted session key is returned to the EAS, in order to which the EAS sends the encrypted session key To the first terminal equipment, the first terminal equipment is realized and the second terminal using the session key Secret communication between equipment, wherein the encrypted session key is that the KMC is used to obtain session according to described What the parameter information of key obtained after the session key of generation is encrypted.
The identification information for obtaining the first terminal equipment for including in the parameter information of session key and the The identification information of two terminal devices;
The KMC returns to encrypted session key to the EAS, comprising:
The KMC is generated for executing secret communication industry between the first terminal equipment and the second terminal equipment The session key that business needs;
The KMC believes according to the mark for the first terminal equipment for including in the parameter information for obtaining session key Breath, determines the corresponding first terminal equipment of the identification information of the first terminal equipment is generated when logging in the KMC first Key is protected, and carries out cryptographic calculation using the session key that the first protection key pair generates, is utilized first Protect the encrypted session key of key;And
According to the identification information for the second terminal equipment for including in the parameter information for obtaining session key, determine The second protection that the corresponding second terminal equipment of the identification information of the second terminal equipment is generated when logging in the KMC is close Key;And cryptographic calculation is carried out using the session key that the second protection key pair generates, it is close to be utilized the second protection The encrypted session key of key;
The KMC adds the encrypted session key of the first protection of utilization key and the utilization the second protection key Session key after close is sent to the EAS by key response message as encrypted session key.
A kind of encryption application server for secure traffic, comprising:
Receiving module, the secure traffic for receiving the transmission of first terminal equipment establish request message, wherein described Secure traffic establishes request message and needs to establish guarantor between the first terminal equipment and second terminal equipment for characterizing Close communication service, the secure traffic establish in request message the parameter information contained for obtaining session key;
Sending module, for carrying the parameter information for being used to obtain session key in session key request message It is sent to Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, wherein the session is close Key request message requests the KMC to need to establish between the first terminal equipment and the second terminal equipment for characterizing Secure traffic generate session key;
Processing module, the encrypted session key returned for receiving the KMC, and the encrypted session is close Key is sent to the first terminal equipment, and the first terminal equipment is realized and described the using the session key Secret communication between two terminal devices, wherein the encrypted session key is that the KMC is used to obtain according to described It is obtained after taking the parameter information of session key that the session key of generation is encrypted.
Identification information and the institute of the first terminal equipment are contained in the parameter information for obtaining session key State the identification information of second terminal equipment;
The encryption application server further include:
Determining module, for carrying by the parameter information for being used to obtain session key in session key request message In be sent to before Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, according to described The identification information of the identification information of first terminal equipment and the second terminal equipment determines the first terminal equipment and described Key Management Center KMC belonging to second terminal equipment.
The processing module is also used to for encrypted session key to be sent to the second terminal equipment, so that described Second terminal equipment can realize the secret communication between the first terminal equipment using the session key.
The processing module, specifically for encrypted session key is sent to described first by IMS network signaling Terminal device and/or second terminal equipment.
The encrypted session key contains using the first encrypted session key of protection key and utilizes second Protect the encrypted session key of key;
The encrypted session key is the KMC according to the parameter information pair for being used to obtain session key What the session key of generation obtained after being encrypted, comprising:
The mark for the first terminal equipment that the KMC includes in the parameter information according to for obtaining session key Know information, determines what the corresponding first terminal equipment of the identification information of the first terminal equipment was generated when logging in the KMC First protection key, and cryptographic calculation is carried out using the session key that the first protection key pair generates, it is utilized The first protection encrypted session key of key;And
According to described for obtaining the identification information for the second terminal equipment for including in the parameter information of session key, Determine the second protection that the corresponding second terminal equipment of the identification information of the second terminal equipment is generated when logging in the KMC Key, and cryptographic calculation is carried out using the session key that the second protection key pair generates, it is utilized the second protection The encrypted session key of key.
A kind of terminal device executing secure traffic, comprising:
Request message sending module establishes request message for sending secure traffic to encryption application server EAS, Wherein, the secure traffic is established request message and is needed between the first terminal equipment and second terminal equipment for characterizing Secure traffic is established, the secure traffic establishes in request message the parameter contained for obtaining session key Information;
Session key receiving module, the encrypted session key sent for receiving the EAS, wherein the encryption Session key afterwards is that the EAS carries the parameter information for being used to obtain session key in session key request message It is sent to Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, by the KMC according to institute It states and obtains after the session key of generation is encrypted in the parameter information for obtaining session key, the session key Request message requests to need to establish between the KMC first terminal equipment and the second terminal equipment for characterizing Secure traffic generates session key.
The terminal device further include:
Processing module, for when receiving the encrypted session key that the EAS is sent, by the encrypted session Key is sent to the second terminal equipment.
The processing module, it is described specifically for being sent to the encrypted session key by IMS network signaling Second terminal equipment;
Alternatively,
By the medium surface data transmission channel between the second terminal equipment of foundation by the encrypted meeting Words key is sent to the second terminal equipment.
The terminal device further include:
Deciphering module, for when receiving the encrypted session key that the EAS is sent, when using logging in the KMC Encrypted session key described in the first protection key pair generated is decrypted, and obtaining the KMC is that the first terminal is set The standby session key that secure traffic generation is carried out between the second terminal equipment.
A kind of Key Management Center for secure traffic, comprising:
Key request receiving module, the session key request message sent for receiving encryption application server EAS, In, the session key request message requests the KMC to need between first terminal equipment and second terminal equipment for characterizing The secure traffic to be established generates session key, contains in the session key request message for obtaining session key Parameter information, the parameter information for obtaining session key is the first terminal equipment hair that the EAS is received That send is used to characterize the secrecy for needing to establish secure traffic between the first terminal equipment and the second terminal equipment Communication service, which is established, to be carried in request message;And
Key sending module, for returning to encrypted session key to the EAS, after being encrypted in order to the EAS The session key be sent to the first terminal equipment, enable the first terminal equipment using the session key Realize the secret communication between the second terminal equipment, wherein the encrypted session key is the KMC root It is obtained after the session key of generation is encrypted according to the parameter information for obtaining session key.
The identification information for obtaining the first terminal equipment for including in the parameter information of session key and the The identification information of two terminal devices;
The key sending module is specifically used for generating for being the first terminal equipment and the second terminal equipment Between execute secure traffic need session key, according to including in the parameter information for obtaining session key The identification information of first terminal equipment determines that the corresponding first terminal equipment of the identification information of the first terminal equipment is logging in The the first protection key generated when the KMC, and added using the session key that the first protection key pair generates Close operation is utilized the first encrypted session key of protection key;And
According to the identification information for the second terminal equipment for including in the parameter information for obtaining session key, determine The second protection that the corresponding second terminal equipment of the identification information of the second terminal equipment is generated when logging in the KMC is close Key;And cryptographic calculation is carried out using the session key that the second protection key pair generates, it is close to be utilized the second protection The encrypted session key of key;
It will be described using the encrypted session key of the first protection key and described encrypted using the second protection key Session key is sent to the EAS as encrypted session key, by key response message.
A kind of processing system of secure traffic, the system comprises: above-mentioned encryption application server, above-mentioned end End equipment and above-mentioned Key Management Center.
The present invention has the beneficial effect that:
The embodiment of the present invention introduces encryption application server and Key Management Center in the ims network, is applied by encryption Server needs to build for characterizing receiving first terminal equipment transmission between first terminal equipment and second terminal equipment The secure traffic of vertical secure traffic establishes request message, and secure traffic is established to the use for including in request message First terminal equipment and second terminal are sent in session key request message in the parameter information carrying for obtaining session key Key Management Center belonging to equipment, request Key Management Center need to build between first terminal equipment and second terminal equipment Vertical secure traffic generates session key, and when receiving the encrypted session key of Key Management Center return, The encrypted session key is sent to first terminal equipment, first terminal equipment is realized using the session key With the secret communication between second terminal equipment.In this way, mentioning secret communication as operator by encrypting application server A kind of business realizing of user is supplied, and encrypts application server and obtains encrypted session key from Key Management Center, It is handed down to terminal device, operator is not only increased to the control force of secret communication, also improves the treatment effeciency of system, simultaneously The Key Management Center of introducing realizes management of the user to key Life cycle, increases secure traffic between user The safety of execution.
Detailed description of the invention
Fig. 1 is the workflow schematic diagram of SDES key management;
Fig. 2 is the flow diagram of KMS key management;
Fig. 3 is a kind of flow diagram of the processing method for secure traffic that the embodiment of the present invention one provides;
Fig. 4 is a kind of flow diagram of the processing method of secure traffic provided by Embodiment 2 of the present invention;
Fig. 5 is a kind of flow diagram of the processing method for secure traffic that the embodiment of the present invention three provides;
Fig. 6 is a kind of flow diagram of the processing method for secure traffic that the embodiment of the present invention four provides;
Fig. 7 is that a kind of structure for encryption application server for secure traffic that the embodiment of the present invention five provides is shown It is intended to;
Fig. 8 is a kind of structural schematic diagram of the terminal device for execution secure traffic that the embodiment of the present invention six provides;
Fig. 9 is a kind of structural representation for Key Management Center for secure traffic that the embodiment of the present invention seven provides Figure;
Figure 10 is a kind of structural schematic diagram of the processing system for secure traffic that the embodiment of the present invention eight provides.
Specific embodiment
In order to achieve the object of the present invention, the embodiment of the invention provides a kind of processing method of secure traffic, set Standby and system introduces encryption application server and Key Management Center in the ims network, is being received by encrypting application server It needs to establish secret communication industry between first terminal equipment and second terminal equipment for characterizing to what first terminal equipment was sent The secure traffic of business establishes request message, secure traffic is established include in request message be used to obtain session it is close The parameter information carrying of key is sent to close belonging to first terminal equipment and second terminal equipment in session key request message Key administrative center, the secret communication that request Key Management Center needs to establish between first terminal equipment and second terminal equipment Business generates session key, and when receiving the encrypted session key of Key Management Center return, this is encrypted Session key is sent to first terminal equipment, and first terminal equipment is set using session key realization with second terminal Secret communication between standby.
In this way, real by encrypting a kind of business that application server makes secret communication be supplied to user as operator It is existing, and encrypt application server and obtain encrypted session key from Key Management Center, it is handed down to terminal device, is not only increased Operator is added to the control force of secret communication, has also improved the treatment effeciency of system, while the Key Management Center introduced is real Show management of the user to key Life cycle, increases the safety that secure traffic executes between user.
It should be noted that the embodiment of the present invention application system architecture include but is not limited to IMS core network (such as: Contain SBC(Session Border Controller, Session Border Controller), P-CSCF(Proxy Call Session Control Function, Proxy Call Session Control Function), S-CSCF(Serving Call Session Control Function, service call conversation control function), HSS(Home Subscriber Server, home subscriber server), MGCF(Media Gateway Control Function, Media Gateway Control Function), MGW(Media Gateway, media Gateway) etc. network element devices;In addition, when containing SIP(Session Initiation Protocol in system architecture, at the beginning of session Beginning agreement) server when, also can be used technical solution provided in an embodiment of the present invention, realization is provided by SIP system for user Secure traffic is not specifically limited here.
Encryption application server (EAS, Encryption Application involved in each embodiment of the present invention Server), for providing secure traffic for terminal device, (wherein, secure traffic includes but is not limited to encrypt voice Talk business, encrypted video talk business, encryption conference call service, Encrypted short message business, encryption Record Carrier, encryption Mail service etc.).The function that EAS has includes: that on the one hand, EAS compatibility has AS(Application in IMS network system Server, application server) session service logic sets out function, can receive from the kernel entity S-CSCF of IMS network eventually The business request information that end equipment is initiated triggers secure traffic and is responsible for various control plane call treatments and connection control System, and charging is carried out to the business of execution;On the other hand, EAS by setting safe interface and Key Management Center (KMC, Key Management Center) communicated, can be completed according to business processing logic registration of the terminal device on KMC, The Signalling exchange between terminal device and KMC is supported in the transmission of identification authentication, key management etc. information.
Key Management Center (KMC) involved in each embodiment of the present invention, it is close for being needed to secure traffic Key is managed, and is specifically including but not limited to: generating key, injection key, distribution key, storage key, filing key, export The key management of Life cycle including key, more new key and destruction key etc..KMC by safe interface and EAS into Row communication can receive the password request message from terminal device by EAS, complete the registration of terminal device, identification authentication, The operations such as key distribution, additionally it is possible to control instruction be issued by crypto module of the EAS into terminal device, realized to terminal device In crypto module long-range control, such as: KMC realize to the management of crypto module is contained in terminal device, can be long-range Destroy the crypto module in terminal device.
In addition, realizing user to the voluntarily portion of KMC to promote user to the degree of belief of operator's security service service Administration.
Terminal device involved in each embodiment of the present invention, the terminal device contain IP communication module and cryptographic communication Module.Wherein, IP communication module support SIP communication protocol, have IMS communication capacity, support terminal IMS system login/ The functions such as cancellation, authentication, Call- Control1 and processing;Crypto module is responsible for terminal key management and executes enciphering and deciphering algorithm, In control plane, realize that carrying out Signalling exchange with KMC obtains session key, in medium surface, using acquisition Session key establishment with The security association of opposite equip. realizes the secrecy transmission of communication service.
The each embodiment of the present invention is described in detail with reference to the accompanying drawings of the specification.
Embodiment one:
As shown in figure 3, being a kind of process signal of the processing method for secure traffic that the embodiment of the present invention one provides Figure, the method can be as described below.
Step 101:EAS receives the secure traffic that first terminal equipment is sent and establishes request message.
Wherein, the secure traffic is established request message and is set for characterizing the first terminal equipment with second terminal Need to establish secure traffic between standby, the secure traffic establish in request message contain it is close for obtaining session The parameter information of key.
In a step 101, first terminal equipment sends secret communication industry to IMS network when calling second terminal equipment Request message is established in business, and the secure traffic request message is transmitted to EAS by IMS network core net, informs EAS first Terminal device will establish secure traffic between second terminal equipment.
It should be noted that the secure traffic that first terminal equipment is sent at this time establish request message can be by the The call setup request message that one terminal device is initiated is realized, that is to say, that initiates calling second terminal in first terminal equipment When equipment, call setup message is sent to IMS network, the call setup message has two functions at this time: 1, request and the Calling connection is established between two terminal devices;2, secure traffic is triggered while establishing calling connection.
Alternatively, the secure traffic that first terminal is sent at this time, which establishes request message, is exhaled in the initiation of first terminal equipment It cries and establishes what request message triggered at random later.
For example, first terminal equipment is after being successfully established call link with second terminal equipment, and at call business During reason, secure traffic is sent to IMS network and establishes request message, and is led to the secrecy by IMS network core net Communication service request message is transmitted to EAS, informs that EAS first terminal equipment needs to carry out secret communication between second terminal equipment Business.
It is performed simultaneously that is, the calling connection between terminal device is established to can be with secure traffic triggering , it is also possible to not to be performed simultaneously, first triggers secure traffic, resettle calling connection, or first establish calling connection, Secure traffic is triggered again to be ok.
Encryption application server is opened when the secure traffic for receiving the transmission of first terminal equipment establishes request message Move subsequent secure traffic process flow.
Step 102: the EAS carries the parameter information for being used to obtain session key in session key request message In be sent to Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment.
Wherein, for characterizing, to request the KMC be the first terminal equipment and described to the session key request message The secure traffic for needing to establish between second terminal equipment generates session key.
Identification information and the institute of the first terminal equipment are contained in the parameter information for obtaining session key State the identification information of second terminal equipment.
It should be noted that being used to obtain the mark for having included at least first terminal equipment in the parameter information of session key Information, the identification information of second terminal equipment, random number etc..
In a step 102, EAS is according to the identification information of the first terminal equipment and the mark of the second terminal equipment Information determines Key Management Center KMC belonging to first terminal equipment and second terminal equipment.
It should be noted that Key Management Center belonging to the calling and called terminal device of this call setup is same close Key administrative center, i.e. first terminal equipment and second terminal facility registration log in the same Key Management Center.
Here, the calling and called terminal device of the same group user group is combined into a user domain, packet in same user domain At least one Key Management Center is contained.
That is, EAS determines according to the identification information of first terminal equipment and the identification information of second terminal equipment User domain belonging to one terminal device and second terminal equipment, and at least one Key Management Center for including out of this user domain One Key Management Center of middle selection.
The parameter information for being used to obtain session key is carried and is sent to determination in session key request message by EAS Key Management Center KMC.
Specifically, EAS sends session key request message to determining KMC by safe interface, requests determining key The secure traffic that administrative center needs to establish between first terminal equipment and second terminal equipment generates session key.
Step 103: the EAS receives the encrypted session key that the KMC is returned, and by the encrypted session Key is sent to the first terminal equipment.
The first terminal equipment is realized between the second terminal equipment using the session key Secret communication.
Wherein, the encrypted session key is the KMC according to the parameter for being used to obtain session key What information obtained after the session key of generation is encrypted.
In step 103, encrypted session key is sent to the mode of the first terminal equipment by the EAS, packet It includes:
Encrypted session key is sent to the first terminal equipment by IMS network signaling by the EAS.
Specifically, encrypted session key is sent to described first by the SIP signaling in IMS network by the EAS Terminal device.
Such as: SIP signaling is including but not limited to MESSAGE message, OPTIONS, INFO etc..
Alternatively, encrypted session key is sent to described by the call treatment message in IMS network by the EAS One terminal device.
Such as: call setup response message, session progress message etc..
Specifically, the call setup between first terminal equipment and second terminal equipment is synchronous with secure traffic foundation When implementation, EAS, can be by calling that first terminal equipment is initiated second eventually after sending session key request message to KMC The call setup request message of end equipment is transmitted to second terminal equipment, it is intended to establish calling connection with second terminal equipment.
Meanwhile EAS is when receiving the session key of encryption of KMC transmission, it is determined whether receives second terminal equipment Call setup response message exhaled using what is received and in the call setup response message for receiving second terminal equipment It cries and establishes response message encrypted session key is sent to the first terminal equipment.
It should be noted that the encrypted session key is the KMC according to described close for obtaining session What the parameter information of key obtained after the session key of generation is encrypted, specific embodiment includes but is not limited to:
Firstly, KMC receive EAS transmission session key request message after, generate for first terminal equipment with The session key of secure traffic is established between second terminal equipment.
It should be noted that KMC receive EAS transmission session key request message after, the session key of generation It can be and be randomly generated, be also possible to according to carrying in the session key request message for obtaining the parameter of session key What information determined, such as: the session key etc. generated using the random number information in the parameter information for obtaining session key Deng here without limitation.
Secondly, in order to guarantee safety that session key transmits in a communication link, KMC carries out the session key of generation Encryption.
Since KMC is user's deployment, then terminal device used by a user when being communicated, can be registered first and be stepped on KMC is recorded, and when logging in, KMC is that the terminal device generates a protection key, and KMC is in the mark that terminal device is locally stored The corresponding relationship of information and the protection key, then KMC can be utilized should when subsequent terminal equipment initiates secure traffic The session key that protection key pair generates is encrypted, and can either guarantee session key the communication link during Safety, additionally it is possible to it is accurate to decrypt when so that terminal receiving encrypted session key, real session key is obtained, is mentioned The high efficiency of secure traffic, has ensured the safety of communication.
At this point, the KMC is set according to the first terminal for including in the parameter information for obtaining session key Standby identification information determines the corresponding first terminal equipment of the identification information of the first terminal equipment when logging in the KMC The the first protection key generated, and cryptographic calculation is carried out using the session key that the first protection key pair generates, it obtains The encrypted session key of key is protected to using first;And it is wrapped according in the parameter information for obtaining session key The identification information of the second terminal equipment contained determines that the corresponding second terminal of identification information of the second terminal equipment is set Standby the second protection key generated when logging in the KMC, and it is close using the session that the second protection key pair generates Key carries out cryptographic calculation, is utilized the second encrypted session key of protection key.
Finally, after containing using the encrypted session key of the first protection key and using the second protection key encryption The encrypted session key of session key be sent to EAS.
Specifically, encrypted session key is sent to EAS by session key response message by KMC.
Wherein, (the i.e. encrypted session of encrypted session key has been may include in the session key response message Key is a data packet, and only the session key is divided into two parts, and a part of content is generated using the first protection key encryption Session key obtain, another part using second protection key encryption generate session key obtain), also may include benefit With the encrypted session key of the first protection key and using the second protection encrypted session key of key, do not limit here It is fixed.
Specifically, when KMC by session key response message will using first protection the encrypted session key of key and When being sent to EAS using the second protection encrypted session key of key, illustrate that KMC is sent to EAS is two different data Packet, a data packet are using the first protection encrypted session key of key, another data packet is close using the second protection The encrypted session key of key.
Optionally, KMC is being utilized the encrypted session key of the first protection key and is being added using the second protection key When session key after close, establishes the corresponding first terminal device identification of the first protection key and encrypted using the first protection key The corresponding relationship of session key afterwards, and establish the corresponding second terminal device identification of the second protection key and protected using second The corresponding relationship of the encrypted session key of key is protected, and utilizes the encrypted session key of the first protection key and benefit sending While with the second protection encrypted session key of key to EAS, the corresponding relationship of foundation is also sent to EAS, is made in this way After encrypted session key is transmitted to first terminal equipment by EAS, using the corresponding relationship, quickly determine with itself The corresponding encrypted session key of identification information accelerates the speed of system business processing in this way, improves the effect of system job Rate.
In another embodiment of the present invention, encrypted session key is sent to the second terminal by the EAS Equipment enables the second terminal equipment to realize the secrecy between the first terminal equipment using the session key Communication.
That is, EAS is after the encrypted session key for receiving KMC transmission, while to first terminal equipment The encrypted session key is sent with second terminal equipment.
For example, the call setup and secure traffic between first terminal equipment and second terminal equipment establish synchronous reality Shi Shi, EAS, can be by calling second terminals that first terminal equipment is initiated after sending session key request message to KMC The call setup request message of equipment is transmitted to second terminal equipment, it is intended to establish calling connection with second terminal equipment.
Meanwhile EAS is when receiving the encrypted session key of KMC transmission, it is determined whether receives second terminal and sets Standby call setup response message, and in the call setup response message for receiving second terminal equipment, while eventually to first End equipment and second terminal equipment send encrypted session key.
After the encrypted session key that first terminal equipment and second terminal equipment receive EAS transmission, respectively Session key after being logged in the protection key pair encryption that KMC is generated using itself is decrypted, and the session for obtaining KMC generation is close Key, and after the media plane transmission path foundation between first terminal equipment and second terminal equipment, it is passed in the medium surface of foundation Session key transmission of traffic is utilized in defeated channel.
Lead to it should be noted that obtaining KMC in EAS and executing to maintain secrecy between first terminal equipment and second terminal equipment After the encrypted session key of communication service, the number for sending encrypted session key to first terminal equipment is not limited to one It is secondary, it can be repeated as many times, to guarantee the correctness of transmission.
It should be noted that the encrypted session key for assuming that the KMC that EAS is received is returned belongs to a data packet When, the encrypted session key comprising a data packet is sent respectively to first terminal equipment and second terminal equipment by EAS; Assuming that the encrypted session key that the KMC that EAS is received is returned belongs to two data packets, i.e. a data packet is to utilize first The session key that protection key is encrypted, another data packet are the session keys encrypted using the second protection key When, the encrypted session key for containing two data packets can be sent respectively to first terminal equipment and second eventually by EAS End equipment;EAS can also determine the corresponding terminal device of different data packet respectively, will contain and carried out using the first protection key The data packet of the session key of encryption is sent to first terminal equipment, will contain the meeting encrypted using the second protection key The data packet of words key is sent to second terminal equipment, is not specifically limited here.
One scheme through the embodiment of the present invention introduces encryption application server and Key Management Center in the ims network, Setting for characterizing first terminal equipment with second terminal for first terminal equipment transmission is being received by encryption application server The secure traffic for needing to establish secure traffic between standby establishes request message, and secure traffic is established request and is disappeared The parameter information carrying for obtaining session key for including in breath is sent to first terminal in session key request message and sets Key Management Center belonging to standby and second terminal equipment, request Key Management Center are that first terminal equipment and second terminal are set The secure traffic for needing to establish between standby generates session key, and is receiving the encrypted of Key Management Center return When session key, which is sent to first terminal equipment, first terminal equipment is utilized should Session key realizes the secret communication between second terminal equipment.
In this way, real by encrypting a kind of business that application server makes secret communication be supplied to user as operator It is existing, and encrypt application server and obtain encrypted session key from Key Management Center, it is handed down to terminal device, is not only increased Operator is added to the control force of secret communication, has also improved the treatment effeciency of system, while the Key Management Center introduced is real Show management of the user to key Life cycle, increases the safety that secure traffic executes between user.
Embodiment two:
As shown in figure 4, for a kind of process signal of the processing method of secure traffic provided by Embodiment 2 of the present invention Figure, the embodiment of the present invention is second is that invention with the embodiment of the present invention one under same inventive concept, and the embodiment of the present invention is second is that station In terminal device angle to the detailed description of the processing method of secure traffic of the present invention.The method can be as follows It is described.
Step 201: first terminal equipment sends secure traffic to encryption application server EAS and establishes request message.
Wherein, the secure traffic is established request message and is set for characterizing the first terminal equipment with second terminal Need to establish secure traffic between standby, the secure traffic establish in request message contain it is close for obtaining session The parameter information of key.
In step 201, first terminal equipment sends secret communication industry to IMS network when calling second terminal equipment Request message is established in business, and the secure traffic request message is transmitted to EAS by IMS network core net, informs EAS first Terminal device will establish secure traffic between second terminal equipment.
It should be noted that the secure traffic that first terminal equipment is sent at this time establish request message can be by the The call setup request message that one terminal device is initiated is realized, that is to say, that initiates calling second terminal in first terminal equipment When equipment, call setup message is sent to IMS network, the call setup message has two functions at this time: 1, request and the Calling connection is established between two terminal devices;2, secure traffic is triggered while establishing calling connection.
Alternatively, the secure traffic that first terminal is sent at this time, which establishes request message, is exhaled in the initiation of first terminal equipment It cries and establishes what request message triggered at random later.
For example, first terminal equipment is after being successfully established call link with second terminal equipment, and at call business During reason, secure traffic is sent to the EAS of network side and establishes request message, inform that EAS first terminal equipment needs Secret communication is carried out between second terminal equipment.
That is, the call setup connection between terminal device can be with secure traffic triggering and be performed simultaneously , it is also possible to not to be performed simultaneously, first triggers secure traffic, resettle calling connection, or first establish calling connection, Secure traffic is triggered again to be ok, and is not specifically limited here.
So that encryption application server establishes request message in the secure traffic for receiving the transmission of first terminal equipment When, start subsequent secure traffic process flow.
Step 202: the first terminal equipment receives the encrypted session key that the EAS is sent.
Wherein, the encrypted session key is that the EAS takes the parameter information for being used to obtain session key Band is sent to key management belonging to the first terminal equipment and the second terminal equipment in session key request message Center KMC carries out encryption to the session key of generation according to the parameter information for obtaining session key by the KMC It is obtained after reason, for characterizing, to request the KMC be the first terminal equipment and described the to the session key request message The secure traffic for needing to establish between two terminal devices generates session key.
In step 202, how encryption application server obtains encrypted session key, in the embodiment of the present invention one In be described in detail, be not described herein.
Step 203: the first terminal equipment is when receiving the encrypted session key that the EAS is sent, using stepping on Encrypted session key described in the first protection key pair generated when recording the KMC is decrypted, and it is described for obtaining the KMC The session key of secure traffic generation is carried out between first terminal equipment and the second terminal equipment.
Wherein, the encrypted session key, which contains, utilizes the encrypted session key of the first protection key and utilization The second protection encrypted session key of key.
In step 203, since the encrypted session key is that the KMC is used to obtain session according to What the parameter information of key obtained after the session key of generation is encrypted, specific embodiment includes but is not limited to:
Firstly, KMC receive EAS transmission session key request message after, generate for first terminal equipment with The session key of secure traffic is established between second terminal equipment.
It should be noted that KMC receive EAS transmission session key request message after, the session key of generation It can be and be randomly generated, be also possible to according to carrying in the session key request message for obtaining the parameter of session key What information determined, such as: the session key etc. generated using the random number information in the parameter information for obtaining session key Deng here without limitation.
Secondly, in order to guarantee safety that session key transmits in a communication link, KMC carries out the session key of generation Encryption.
Since KMC is user's deployment, then terminal device used by a user when being communicated, can be registered first and be stepped on KMC is recorded, and when logging in, KMC is that the terminal device generates a protection key, and KMC is in the mark that terminal device is locally stored The corresponding relationship of information and the protection key, then KMC can be utilized should when subsequent terminal equipment initiates secure traffic The session key that protection key pair generates is encrypted, and can either guarantee session key the communication link during Safety, additionally it is possible to it is accurate to decrypt when so that terminal receiving encrypted session key, real session key is obtained, is mentioned The high efficiency of secure traffic, has ensured the safety of communication.
At this point, the KMC is set according to the first terminal for including in the parameter information for obtaining session key Standby identification information determines the corresponding first terminal equipment of the identification information of the first terminal equipment when logging in the KMC The the first protection key generated, and cryptographic calculation is carried out using the session key that the first protection key pair generates, it obtains The encrypted session key of key is protected to using first;And it is wrapped according in the parameter information for obtaining session key The identification information of the second terminal equipment contained determines that the corresponding second terminal of identification information of the second terminal equipment is set Standby the second protection key generated when logging in the KMC, and it is close using the session that the second protection key pair generates Key carries out cryptographic calculation, is utilized the second encrypted session key of protection key.
Finally, after containing using the encrypted session key of the first protection key and using the second protection key encryption The encrypted session key of session key be sent to EAS.
Wherein, (the i.e. encrypted session of encrypted session key has been may include in the session key response message Key is a data packet, and only the session key is divided into two parts, and a part of content is generated using the first protection key encryption Session key obtain, another part using second protection key encryption generate session key obtain), also may include benefit With the encrypted session key of the first protection key and using the second protection encrypted session key of key, do not limit here It is fixed.
Specifically, when KMC by session key response message will using first protection the encrypted session key of key and When being sent to EAS using the second protection encrypted session key of key, illustrate that KMC is sent to EAS is two different data Packet, a data packet are using the first protection encrypted session key of key, another data packet is close using the second protection The encrypted session key of key.
Optionally, KMC is being utilized the encrypted session key of the first protection key and is being added using the second protection key When session key after close, establishes the corresponding first terminal device identification of the first protection key and encrypted using the first protection key The corresponding relationship of session key afterwards, and establish the corresponding second terminal device identification of the second protection key and protected using second The corresponding relationship of the encrypted session key of key is protected, and utilizes the encrypted session key of the first protection key and benefit sending While with the second protection encrypted session key of key to EAS, the corresponding relationship of foundation is also sent to EAS, is made in this way After encrypted session key is transmitted to first terminal equipment by EAS, using the corresponding relationship, quickly determine with itself The corresponding encrypted session key of identification information accelerates the speed of system business processing in this way, improves the effect of system job Rate.
Therefore, when the encrypted session key that first terminal equipment receives belongs to a data packet, first terminal Equipment utilization logs in encrypted session key described in the first protection key pair generated when the KMC and is decrypted, and obtains institute State the session key that KMC carries out secure traffic generation between the first terminal equipment and the second terminal equipment.
When the encrypted session key that first terminal equipment receives contains two data packets, that is, what is received adds After session key after close is contained using the encrypted session key of the first protection key and using the second protection key encryption Session key, at this point, first terminal equipment can only by first protection key pair using first protection the encrypted meeting of key Words key be decrypted, obtain the KMC carried out for the first terminal equipment and the second terminal equipment between secrecy lead to The session key that communication service generates is prepared to be subsequent with the progress secret communication of second terminal equipment.
Optionally, added when the encrypted session key that first terminal equipment receives is contained using the first protection key When session key after close and session key encrypted using the second protection key, it can also be set according to the terminal that KMC is established Corresponding relationship between standby identification information and encrypted session key determines that first terminal device identification is corresponding and utilizes The one protection encrypted session key of key, and it is close using the first protection encrypted session of key using the first protection key pair Key is decrypted, and obtains the KMC and carries out secret communication industry between the first terminal equipment and the second terminal equipment The session key that business generates.
Step 204: the first terminal equipment, will be described when receiving the encrypted session key that the EAS is sent Encrypted session key is sent to the second terminal equipment.
In step 204, the encrypted session key is sent to the second terminal by the first terminal equipment The mode of equipment includes but is not limited to:
First way:
The encrypted session key is sent to described second eventually by IMS network signaling by the first terminal equipment End equipment.
Specifically, regardless of whether the medium surface data transmission channel between first terminal equipment and second terminal equipment is built Vertical to complete, first terminal is when receiving the session key of EAS transmission, using IMS network signaling by the encrypted session Key is sent to the second terminal equipment.
It should be noted that IMS network signaling is including but not limited to SIP signaling, call treatment message etc..
The encrypted session key is sent to the second terminal by SIP signaling and set by the first terminal equipment It is standby.
Such as: SIP signaling is including but not limited to MESSAGE message, OPTIONS, INFO etc..
The encrypted session key is sent to by the first terminal equipment by Temporary Response confirmation message PRACK The second terminal equipment.
Specifically, can be by the way of signaling piggyback in order to save system signaling expense, i.e., the described first terminal Equipment is in the encrypted session key for receiving the call setup response message transmission that EAS is sent by second terminal equipment When, after correctly handle to call setup response message, when returning to provisional confirmation message PRACK to second terminal equipment, The encrypted session key carrying is sent to the second terminal equipment in provisional confirmation message PRACK.
The second way:
The first terminal equipment by establish with the medium surface data transmission channel of second terminal equipment will it is described plus Session key after close is sent to the second terminal equipment.
Specifically, the first terminal equipment is when receiving the session key of EAS transmission, and determination is set with second terminal It is using the media plane transmission path of foundation that the encrypted session is close after the completion of media plane transmission path between standby is established Key is sent to the second terminal equipment.
Specifically, when the encrypted session key that first terminal equipment receives belongs to a data packet, first eventually Encrypted session key comprising a data packet is sent to second terminal equipment by end equipment;When first terminal equipment receives To encrypted session key belong to two data packets when, i.e. a data packet be using first protection key encrypted Session key, when another data packet is the session key encrypted using the second protection key, first terminal equipment can be with The encrypted session key of two data packets will be contained while being sent to second terminal equipment;First terminal equipment EAS can To determine the corresponding terminal device of different data packet respectively, the session key encrypted using the second protection key will be contained Data packet be sent to second terminal equipment, be not specifically limited here.
It should be noted that step 203 and step 204 are not carried out the differentiation of sequencing in the embodiment of the present invention two, It can implement according to the sequence described in the embodiment of the present invention, step 204 can also be first carried out, then execute step 203, be also possible to Step 203 and step 204 are implemented simultaneously.
Embodiment three:
As shown in figure 5, a kind of flow diagram of the processing method for secure traffic that the embodiment of the present invention three provides. The embodiment of the present invention is third is that belong to the invention under same inventive concept with one~embodiment of the embodiment of the present invention two, the present invention is implemented Example is third is that stand in Key Management Center side to the detailed description of each step in the embodiment of the present invention one.The method can be as follows It is described.
Step 301: Key Management Center KMC receives the session key request message that encryption application server EAS is sent.
Wherein, the session key request message requests the KMC for first terminal equipment and second terminal for characterizing The secure traffic for needing to establish between equipment generates session key.
The parameter information for obtaining session key is contained in the session key request message.
It is described for obtain the parameter information of session key to be that the first terminal equipment that the EAS is received is sent Need to establish the secret communication of secure traffic between the first terminal equipment and the second terminal equipment for characterizing Business, which is established, to be carried in request message.
Step 302:KMC returns to encrypted session key to the EAS.
In order to which the encrypted session key is sent to the first terminal equipment by the EAS, so that described One terminal device can realize the secret communication between the second terminal equipment using the session key.
Wherein, the encrypted session key is the KMC according to the parameter for being used to obtain session key What information obtained after the session key of generation is encrypted.
The identification information for obtaining the first terminal equipment for including in the parameter information of session key and the The identification information of two terminal devices.
In step 302, the KMC includes but is not limited to the mode that the EAS returns to encrypted session key:
Firstly, the KMC is generated for executing secrecy between the first terminal equipment and the second terminal equipment The session key that communication service needs.
It should be noted that KMC receive EAS transmission session key request message after, the session key of generation It can be and be randomly generated, be also possible to according to carrying in the session key request message for obtaining the parameter of session key What information determined, such as: the session key etc. generated using the random number information in the parameter information for obtaining session key Deng here without limitation.
Secondly, in order to guarantee safety that session key transmits in a communication link, KMC carries out the session key of generation Encryption.
Since KMC is user's deployment, then terminal device used by a user when being communicated, can be registered first and be stepped on KMC is recorded, and when logging in, KMC is that the terminal device generates a protection key, and KMC is in the mark that terminal device is locally stored The corresponding relationship of information and the protection key, then KMC can be utilized should when subsequent terminal equipment initiates secure traffic The session key that protection key pair generates is encrypted, and can either guarantee session key the communication link during Safety, additionally it is possible to it is accurate to decrypt when so that terminal receiving encrypted session key, real session key is obtained, is mentioned The high efficiency of secure traffic, has ensured the safety of communication.
At this point, the KMC is according to the first terminal equipment for including in the parameter information for obtaining session key Identification information determines the generation when logging in the KMC of the corresponding first terminal equipment of the identification information of the first terminal equipment First protection key, and using it is described first protection key pair generate the session key progress cryptographic calculation, obtain benefit With the first protection encrypted session key of key;And according to including in the parameter information for obtaining session key The identification information of second terminal equipment determines that the corresponding second terminal equipment of the identification information of the second terminal equipment is logging in The the second protection key generated when the KMC;And added using the session key that the second protection key pair generates Close operation is utilized the second encrypted session key of protection key.
Finally, the KMC protects the encrypted session key of the first protection of utilization key and the utilization second The encrypted session key of key is sent to the EAS as encrypted session key, by key response message.
Example IV:
As shown in fig. 6, a kind of flow diagram of the processing method for secure traffic that the embodiment of the present invention four provides. The embodiment of the present invention is fourth is that invention with one~embodiment of the present invention of the embodiment of the present invention three under same inventive concept, the present invention Example IV is by taking terminal device A and terminal device B need to be implemented secure traffic as an example to technical solutions according to the invention It is described in detail.The method can be as described below.
It should be noted that the time that terminal device A and terminal device B need to be implemented secure traffic can be at end End equipment A and when terminal device B call setup, is also possible to after terminal device A and terminal device B call setup, here Without limitation.
Step 1: when user, which initiates secret communication to terminal device B by terminal device A, to be called, being initiated to IMS network Call setup request message.
Wherein, the call setup request message can be INVITE message, for informing IMS core net needs and terminal Equipment B establishes encryption session connection.
Identification information (or telephone number information) and the end of terminal device A are contained in the call setup request message The identification information (or telephone number information) of end equipment B.
At this point, also carrying session key request message in the call setup request message.
In another embodiment of the present invention, the setup requests between terminal device B that terminal device A is sent Message can also be only intended to inform that IMS core net needs to establish session connection with terminal device B;Meanwhile terminal device A is logical It crosses IMS signaling (such as: MESSAGE message) and sends session key request message, the session key request message is for informing It needs to establish encryption session connection between IMS network terminal device A and terminal device B.
Step 2:EAS is when receiving call setup request message, according to the identification information and terminal device of terminal device A The identification information of B determines user domain belonging to terminal device A and terminal device B, and a key management into the user domain Center sends session key request message.
Step 3:KMC is that terminal device A and terminal device B generates a session key, and sends key response to EAS and disappear Breath.
Wherein, encrypted session key is contained in the key response message.
In order to guarantee that session key is not leaked in transmission process, KMC is utilized respectively terminal device A and terminal device B The protection key pair session key generated when logging in KMC encrypts.
After step 4:EAS sends session key request message to KMC, establishes request to terminal device B forwarded call immediately Message.
In this way while session key is requested, call proceeding is carried out, parallel to improve treatment effeciency.
In another embodiment of the present invention, it after EAS sends session key request message to KMC, waits KMC to return and rings Answer message.
Disappear in the session key response message for receiving KMC transmission and then to terminal device B forwarded call foundation request Breath continues call proceeding.
The session progress message that step 5:EAS receiving terminal apparatus B is returned.
The session progress message, which is terminal device B, to be returned to receiving after call setup request message is handled.
In another embodiment of the present invention, if EAS is when receiving session progress message, KMC transmission is not yet received Session key response message, EAS needs to wait the feedback of KMC at this time.
Step 6:EAS carries the session key of the encryption in the key response message for receiving KMC feedback at session Terminal device A is sent in reason message.
At this point, in another embodiment of the present invention, EAS will be in the session key response message that receive KMC feedback Secret communication key be sent to terminal device A and terminal device B using IMS signaling.
Step 7: terminal device A utilizes the first protection generated when logging in KMC after receiving encrypted session key Key is decrypted, and obtaining KMC is the session key that this call generates.
In another embodiment of the present invention, terminal device A is encrypted by what is received by following methods Session key is sent to terminal device B:
First way:
The encrypted session key is sent to described second eventually by IMS network signaling by the first terminal equipment End equipment.
Specifically, regardless of whether the medium surface data transmission channel between first terminal equipment and second terminal equipment is built Vertical to complete, first terminal is when receiving the session key of EAS transmission, using IMS network signaling by the encrypted session Key is sent to the second terminal equipment.
Alternatively, the first terminal equipment is close by the encrypted session by Temporary Response confirmation message PRACK183 Key is sent to the second terminal equipment.
For example, in order to save system signaling expense, it can be by the way of signaling piggyback, i.e., the described first terminal is set It is standby when receiving the encrypted session key that EAS is transmitted by the call setup response message that second terminal equipment is sent, After correctly handle to call setup response message, when returning to provisional confirmation message PRACK to second terminal equipment, by institute It states encrypted session key carrying and is sent to the second terminal equipment in provisional confirmation message PRACK.
The second way:
The medium surface data transmission channel between the second terminal equipment that the first terminal equipment passes through foundation The encrypted session key is sent to the second terminal equipment.
Specifically, the first terminal equipment is when receiving the session key of EAS transmission, and determination is set with second terminal It is using the media plane transmission path of foundation that the encrypted session is close after the completion of media plane transmission path between standby is established Key is sent to the second terminal equipment.
Step 8: terminal device B utilizes the second protection generated when logging in KMC after receiving encrypted session key Key is decrypted, and obtaining KMC is the session key that this call generates.
Step 9: terminal device A and terminal device B is when call link establishes completion, using obtained session key to logical Words data are encrypted, and realize the call encryption between terminal device A and terminal device B.
It should be noted that the embodiment of the present invention is fourth is that rough description to secure traffic process flow, is related to Technical detail, can no longer be retouched in detail here using the technical solution described in describing in the embodiment of the present invention one~implementations three It states.
Embodiment five:
As shown in fig. 7, a kind of encryption application server for secure traffic provided for the embodiment of the present invention five Structural schematic diagram.The embodiment of the present invention is fifth is that belong to the hair under same inventive concept with one~example IV of the embodiment of the present invention Bright, the encryption application server includes: receiving module 11, sending module 12 and processing module 13, in which:
Receiving module 11, the secure traffic for receiving the transmission of first terminal equipment establish request message, wherein institute It states secure traffic and establishes request message and need to establish between the first terminal equipment and second terminal equipment for characterizing Secure traffic, the secure traffic establish in request message the parameter information contained for obtaining session key;
Sending module 12, for carrying the parameter information for being used to obtain session key in session key request message In be sent to Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, wherein the session Secret key request message requests the KMC to need to build between the first terminal equipment and the second terminal equipment for characterizing Vertical secure traffic generates session key;
Processing module 13, the encrypted session key returned for receiving the KMC, and by the encrypted session Key is sent to the first terminal equipment, enable the first terminal equipment using the session key realize with it is described Secret communication between second terminal equipment, wherein the encrypted session key is that the KMC is used for according to What the parameter information of acquisition session key obtained after the session key of generation is encrypted.
Specifically, the mark letter of the first terminal equipment is contained in the parameter information for obtaining session key The identification information of breath and the second terminal equipment.
The encryption application server further include: determining module 14, in which:
Determining module 14, for the parameter information carrying for being used to obtain session key to disappear in session key request It is sent in breath before Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, according to institute The identification information of first terminal equipment and the identification information of the second terminal equipment are stated, determines the first terminal equipment and institute State Key Management Center KMC belonging to second terminal equipment.
Specifically, the processing module 13 is also used to for encrypted session key to be sent to the second terminal equipment, The second terminal equipment is enabled to realize the secret communication between the first terminal equipment using the session key.
The processing module 13, specifically for encrypted session key is sent to described by IMS network signaling One terminal device and/or second terminal equipment.
Specifically, the encrypted session key, which contains, utilizes the encrypted session key of the first protection key and benefit With the second protection encrypted session key of key;
The encrypted session key is the KMC according to the parameter information pair for being used to obtain session key What the session key of generation obtained after being encrypted, comprising:
The mark for the first terminal equipment that the KMC includes in the parameter information according to for obtaining session key Know information, determines what the corresponding first terminal equipment of the identification information of the first terminal equipment was generated when logging in the KMC First protection key, and cryptographic calculation is carried out using the session key that the first protection key pair generates, it is utilized The first protection encrypted session key of key;And
According to described for obtaining the identification information for the second terminal equipment for including in the parameter information of session key, Determine the second protection that the corresponding second terminal equipment of the identification information of the second terminal equipment is generated when logging in the KMC Key, and cryptographic calculation is carried out using the session key that the second protection key pair generates, it is utilized the second protection The encrypted session key of key.
It should be noted that encryption application server described in the embodiment of the present invention five can be hard-wired physics reality Body unit is also possible to the logical block of software realization, is not specifically limited here.
Embodiment six:
As shown in figure 8, being a kind of structure of the terminal device for execution secure traffic that the embodiment of the present invention six provides Schematic diagram.The embodiment of the present invention is sixth is that hair with the embodiment of the present invention one to the embodiment of the present invention four under same inventive concept Bright, the terminal device includes: request message sending module 21 and session key receiving module 22, in which:
Request message sending module 21 disappears for sending secure traffic foundation request to encryption application server EAS Breath, wherein the secure traffic establish request message for characterize the first terminal equipment and second terminal equipment it Between need to establish secure traffic, the secure traffic, which is established in request message, to be contained for obtaining session key Parameter information;
Session key receiving module 22, the encrypted session key sent for receiving the EAS, wherein described to add Session key after close is that the EAS carries the parameter information for being used to obtain session key in session key request message In be sent to Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, by the KMC according to What the parameter information for obtaining session key obtained after the session key of generation is encrypted, the session is close Key request message requests the KMC to need to establish between the first terminal equipment and the second terminal equipment for characterizing Secure traffic generate session key.
Optionally, the terminal device further include: processing module 23, in which:
Processing module 23, for when receiving the encrypted session key that the EAS is sent, by the encrypted meeting Words key is sent to the second terminal equipment.
The processing module 23, specifically for the encrypted session key is sent to institute by IMS network signaling State second terminal equipment;
Alternatively,
By the medium surface data transmission channel between the second terminal equipment of foundation by the encrypted meeting Words key is sent to the second terminal equipment.
The terminal device further include: deciphering module 24, in which:
Deciphering module 24, for utilizing the login KMC when receiving the encrypted session key that the EAS is sent When generate first protection key pair described in encrypted session key be decrypted, obtain the KMC be the first terminal The session key of secure traffic generation is carried out between equipment and the second terminal equipment.
It should be noted that terminal device described in the embodiment of the present invention six can be hard-wired physical entity list Member is also possible to the logical block of software realization, is not specifically limited here.
In addition, the embodiment of the present invention six further comprises IP communication module and crypto communications module.
Wherein, IP communication module supports SIP communication protocol, has IMS communication capacity, supports terminal stepping in IMS system The functions such as record/cancellation, authentication, Call- Control1 and processing;Crypto module is responsible for terminal key management and executes encryption and decryption calculation Method realizes that carrying out Signalling exchange acquisition session key with KMC utilizes the Session key establishment of acquisition in medium surface in control plane With the security association of opposite equip., the secrecy transmission of communication service is realized.
Embodiment seven:
As shown in figure 9, being a kind of Key Management Center for secure traffic that the embodiment of the present invention seven provides Structural schematic diagram.The embodiment of the present invention is seventh is that belong to the hair under same inventive concept with the embodiment of the present invention one to example IV Bright, the Key Management Center includes: key request receiving module 31 and key sending module 32, in which:
Key request receiving module 31, the session key request message sent for receiving encryption application server EAS, In, the session key request message requests the KMC to need between first terminal equipment and second terminal equipment for characterizing The secure traffic to be established generates session key, contains in the session key request message for obtaining session key Parameter information, the parameter information for obtaining session key is the first terminal equipment hair that the EAS is received That send is used to characterize the secrecy for needing to establish secure traffic between the first terminal equipment and the second terminal equipment Communication service, which is established, to be carried in request message;And
Key sending module 32, for returning to encrypted session key to the EAS, in order to which the EAS will be encrypted The session key afterwards is sent to the first terminal equipment, enables the first terminal equipment close using the session Key realizes the secret communication between the second terminal equipment, wherein the encrypted session key is the KMC It is obtained after the session key of generation is encrypted according to the parameter information for obtaining session key.
Specifically, the mark letter for the first terminal equipment for including in the parameter information for obtaining session key The identification information of breath and second terminal equipment;
The key sending module 32, specifically for generating for being set for the first terminal equipment with the second terminal The session key that secure traffic needs is executed between standby, according to the institute for including in the parameter information for obtaining session key The identification information for stating first terminal equipment determines that the corresponding first terminal equipment of the identification information of the first terminal equipment is being stepped on The the first protection key generated when recording the KMC, and carried out using the session key that the first protection key pair generates Cryptographic calculation is utilized the first encrypted session key of protection key;And
According to the identification information for the second terminal equipment for including in the parameter information for obtaining session key, determine The second protection that the corresponding second terminal equipment of the identification information of the second terminal equipment is generated when logging in the KMC is close Key;And cryptographic calculation is carried out using the session key that the second protection key pair generates, it is close to be utilized the second protection The encrypted session key of key;
It will be described using the encrypted session key of the first protection key and described encrypted using the second protection key Session key is sent to the EAS as encrypted session key, by key response message.
It should be noted that Key Management Center described in the embodiment of the present invention seven can be hard-wired physical entity Unit is also possible to the logical block of software realization, is not specifically limited here.
Embodiment eight:
As shown in Figure 10, a kind of structural representation of the processing system of the secure traffic provided for the embodiment of the present invention eight Figure, the system comprises: encryption application server 41, Key Management Center 42, first terminal equipment 43 and second terminal equipment 44, in which:
The first terminal equipment 43 disappears for sending secure traffic foundation request to encryption application server EAS Breath, and receive the encrypted session key that the EAS is sent, wherein the secure traffic is established request message and is used for It characterizes and needs to establish secure traffic between the first terminal equipment and second terminal equipment, the secure traffic is built The parameter information for obtaining session key is contained in vertical request message.
The encryption application server 41, the secure traffic for receiving the transmission of first terminal equipment establish request and disappear The parameter information for being used to obtain session key carrying is sent to the first terminal equipment by breath in session key request message With Key Management Center KMC belonging to the second terminal equipment, and the encrypted session key that the KMC is returned is received, And the encrypted session key is sent to the first terminal equipment, wherein the session key request message is used for The secure traffic that characterization requests the KMC to need to establish between the first terminal equipment and the second terminal equipment Generate session key.
The Key Management Center 42, the session key request message sent for receiving encryption application server EAS, and Encrypted session key is returned to the EAS, wherein the encrypted session key is the KMC according to What the parameter information for obtaining session key obtained after the session key of generation is encrypted.
Specifically, the mark letter of the first terminal equipment is contained in the parameter information for obtaining session key The identification information of breath and the second terminal equipment;
The encryption application server 41, for carrying by the parameter information for being used to obtain session key in session Be sent in secret key request message Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment it Before, according to the identification information of the identification information of the first terminal equipment and the second terminal equipment, determine that described first is whole Key Management Center KMC belonging to end equipment and the second terminal equipment.
The encryption application server 41 is also used to for encrypted session key to be sent to the second terminal equipment, The second terminal equipment is enabled to realize the secret communication between the first terminal equipment using the session key.
The encryption application server 41, specifically for being sent to encrypted session key by IMS network signaling The first terminal equipment and/or second terminal equipment.
The first terminal equipment 43, for that described will add when receiving the encrypted session key that the EAS is sent Session key after close is sent to the second terminal equipment.
The first terminal equipment 43 is specifically used for sending the encrypted session key by IMS network signaling To the second terminal equipment;
Alternatively,
By the medium surface data transmission channel between the second terminal equipment of foundation by the encrypted meeting Words key is sent to the second terminal equipment.
The encrypted session key contains using the first encrypted session key of protection key and utilizes second Protect the encrypted session key of key;
The first terminal equipment 43, for utilizing login when receiving the encrypted session key that the EAS is sent Encrypted session key described in the first protection key pair generated when the KMC is decrypted, and obtaining the KMC is described the The session key of secure traffic generation is carried out between one terminal device and the second terminal equipment.
The Key Management Center 42, specifically for generating for being set for the first terminal equipment with the second terminal The session key that secure traffic needs is executed between standby, according to the institute for including in the parameter information for obtaining session key The identification information for stating first terminal equipment determines that the corresponding first terminal equipment of the identification information of the first terminal equipment is being stepped on The the first protection key generated when recording the KMC, and carried out using the session key that the first protection key pair generates Cryptographic calculation is utilized the first encrypted session key of protection key;And
According to the identification information for the second terminal equipment for including in the parameter information for obtaining session key, determine The second protection that the corresponding second terminal equipment of the identification information of the second terminal equipment is generated when logging in the KMC is close Key;And cryptographic calculation is carried out using the session key that the second protection key pair generates, it is close to be utilized the second protection The encrypted session key of key;
It will be described using the encrypted session key of the first protection key and described encrypted using the second protection key Session key is sent to the EAS as encrypted session key, by key response message.
It will be understood by those skilled in the art that the embodiment of the present invention can provide as method, apparatus (equipment) or computer Program product.Therefore, in terms of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and hardware Embodiment form.Moreover, it wherein includes the meter of computer usable program code that the present invention, which can be used in one or more, The computer journey implemented in calculation machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of sequence product.
The present invention be referring to according to the method for the embodiment of the present invention, the flow chart of device (equipment) and computer program product And/or block diagram describes.It should be understood that each process in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the process and/or box in box and flowchart and/or the block diagram.It can provide these computer programs to refer to Enable the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that the processor of computer or other programmable data processing devices executes generate for realizing The device for the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (19)

1. a kind of processing method of secure traffic characterized by comprising
Encryption application server EAS receives the secure traffic that first terminal equipment is sent and establishes request message, wherein described Secure traffic establishes request message and needs to establish guarantor between the first terminal equipment and second terminal equipment for characterizing Close communication service, the secure traffic establish in request message the parameter information contained for obtaining session key;
The parameter information carrying for being used to obtain session key is sent to described by the EAS in session key request message Key Management Center KMC belonging to first terminal equipment and the second terminal equipment, wherein the session key request message For characterizing the secret communication for requesting the KMC to need to establish between the first terminal equipment and the second terminal equipment Business generates session key;
The EAS receives the encrypted session key that the KMC is returned, and the encrypted session key is sent to institute First terminal equipment is stated, the first terminal equipment is realized and the second terminal equipment using the session key Between secret communication, encrypted session key is sent to the second terminal equipment, so that the second terminal equipment The secret communication between the first terminal equipment can be realized using the session key, wherein the encrypted institute Stating session key is that the KMC encrypts the session key of generation according to the parameter information for obtaining session key It is obtained after processing.
2. the method as described in claim 1, which is characterized in that contained in the parameter information for obtaining session key The identification information of the identification information of the first terminal equipment and the second terminal equipment;
The parameter information carrying for being used to obtain session key is being sent to institute by the EAS in session key request message Before stating Key Management Center KMC belonging to first terminal equipment and the second terminal equipment, the method also includes:
The EAS determines institute according to the identification information of the first terminal equipment and the identification information of the second terminal equipment State Key Management Center KMC belonging to first terminal equipment and the second terminal equipment.
3. the method as described in claim 1, which is characterized in that encrypted session key is sent to described by the EAS One terminal device and/or second terminal equipment, comprising:
Encrypted session key is sent to the first terminal equipment and/or second by IMS network signaling by the EAS Terminal device.
4. the method as described in claim 1~2 is any, which is characterized in that the encrypted session key contains utilization First protects the encrypted session key of key and utilizes the second protection encrypted session key of key;
The encrypted session key is that the KMC is used to obtain the parameter information of session key to generation according to Session key be encrypted after obtain, comprising:
The KMC believes according to the mark for the first terminal equipment for including in the parameter information for obtaining session key Breath, determines the corresponding first terminal equipment of the identification information of the first terminal equipment is generated when logging in the KMC first Key is protected, and carries out cryptographic calculation using the session key that the first protection key pair generates, is utilized first Protect the encrypted session key of key;And
According to the identification information for the second terminal equipment for including in the parameter information for obtaining session key, determine The second protection that the corresponding second terminal equipment of the identification information of the second terminal equipment is generated when logging in the KMC is close Key, and cryptographic calculation is carried out using the session key that the second protection key pair generates, it is close to be utilized the second protection The encrypted session key of key.
5. a kind of processing method of secure traffic characterized by comprising
First terminal equipment sends secure traffic to encryption application server EAS and establishes request message, wherein the secrecy Communication service, which establishes request message and is used to characterize to need to establish between the first terminal equipment and second terminal equipment to maintain secrecy, leads to Communication service, the secure traffic establish in request message the parameter information contained for obtaining session key;
The first terminal equipment receives the encrypted session key that the EAS is sent, and the encrypted session is close Key is sent to the second terminal equipment, wherein the encrypted session key is that the EAS is used to obtain session by described The first terminal equipment is sent in session key request message for the parameter information carrying of key and the second terminal is set Standby affiliated Key Management Center KMC, by the KMC according to described for obtaining meeting of the parameter information to generation of session key What words key obtained after being encrypted, the session key request message is described first for characterizing the request KMC The secure traffic for needing to establish between terminal device and the second terminal equipment generates session key.
6. method as claimed in claim 5, which is characterized in that the first terminal equipment is by the encrypted session key It is sent to the second terminal equipment, comprising:
The encrypted session key is sent to the second terminal by IMS network signaling and set by the first terminal equipment It is standby;
Alternatively,
The first terminal equipment is by the medium surface data transmission channel between the second terminal equipment established by institute It states encrypted session key and is sent to the second terminal equipment.
7. method as claimed in claim 5, which is characterized in that the method also includes:
The first terminal equipment is produced when receiving the encrypted session key that the EAS is sent using when logging in the KMC Encrypted session key described in the first raw protection key pair is decrypted, and obtaining the KMC is the first terminal equipment The session key of secure traffic generation is carried out between the second terminal equipment.
8. a kind of processing method of secure traffic characterized by comprising
Key Management Center KMC receives the session key request message that encryption application server EAS is sent, wherein the session Secret key request message is used to characterize the secrecy for requesting the KMC to need to establish between first terminal equipment and second terminal equipment Communication service generates session key, and the parameter information for obtaining session key is contained in the session key request message, The parameter information for obtaining session key is the first terminal equipment transmission that the EAS is received for characterizing The secure traffic for needing to establish secure traffic between the first terminal equipment and the second terminal equipment is established It is carried in request message;And
Encrypted session key is returned to the EAS, in order to which the encrypted session key is sent to institute by the EAS First terminal equipment is stated, the first terminal equipment is realized and the second terminal equipment using the session key Between secret communication, and encrypted session key is sent to the second terminal equipment, so that the second terminal is set The standby secret communication that can be realized using the session key between the first terminal equipment, wherein described encrypted The session key is that the KMC adds the session key of generation according to the parameter information for obtaining session key It is obtained after close processing.
9. method according to claim 8, which is characterized in that include in the parameter information for obtaining session key The identification information of the first terminal equipment and the identification information of second terminal equipment;
The KMC returns to encrypted session key to the EAS, comprising:
The KMC is generated to be needed for executing secure traffic between the first terminal equipment and the second terminal equipment The session key wanted;
The KMC according to the identification information for obtaining the first terminal equipment for including in the parameter information of session key, Determine the first protection that the corresponding first terminal equipment of the identification information of the first terminal equipment is generated when logging in the KMC Key, and cryptographic calculation is carried out using the session key that the first protection key pair generates, it is utilized the first protection The encrypted session key of key;And
According to the identification information for the second terminal equipment for including in the parameter information for obtaining session key, determine described in The second protection key that the corresponding second terminal equipment of the identification information of second terminal equipment is generated when logging in the KMC;And Cryptographic calculation is carried out using the session key that the second protection key pair generates, is utilized the encryption of the second protection key Session key afterwards;
The KMC by it is described using the first encrypted session key of protection key and it is described using the second protection key encryption after Session key as encrypted session key, the EAS is sent to by key response message.
10. a kind of encryption application server for secure traffic characterized by comprising
Receiving module, the secure traffic for receiving the transmission of first terminal equipment establish request message, wherein the secrecy Communication service, which establishes request message and is used to characterize to need to establish between the first terminal equipment and second terminal equipment to maintain secrecy, leads to Communication service, the secure traffic establish in request message the parameter information contained for obtaining session key;
Sending module is sent in session key request message for carrying the parameter information for being used to obtain session key To Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, wherein the session key is asked Ask message for characterizing the guarantor for requesting the KMC to need to establish between the first terminal equipment and the second terminal equipment Close communication service generates session key;
Processing module, the encrypted session key returned for receiving the KMC, and the encrypted session key is sent out The first terminal equipment is given, the first terminal equipment is realized with described second eventually using the session key Encrypted session key is sent to the second terminal equipment by the secret communication between end equipment, so that described second is whole End equipment can realize the secret communication between the first terminal equipment using the session key, wherein the encryption The session key afterwards be the KMC according to it is described for obtain the parameter information of session key to the session key of generation into It is obtained after row encryption.
11. encryption application server as claimed in claim 10, which is characterized in that described for obtaining the parameter of session key The identification information of the first terminal equipment and the identification information of the second terminal equipment are contained in information;
The encryption application server further include:
Determining module, for being sent out in session key request message by the parameter information carrying for being used to obtain session key Before giving Key Management Center KMC belonging to the first terminal equipment and the second terminal equipment, according to described first The identification information of the identification information of terminal device and the second terminal equipment determines the first terminal equipment and described second Key Management Center KMC belonging to terminal device.
12. encryption application server as claimed in claim 10, which is characterized in that
The processing module, specifically for encrypted session key is sent to the first terminal by IMS network signaling Equipment and/or second terminal equipment.
13. the encryption application server as described in claim 10~11 is any, which is characterized in that the encrypted communication industry Business key contains using the encrypted communication service key of the first protection key and leads to using the second protection key is encrypted Communication service key;
The encrypted session key is that the KMC is used to obtain the parameter information of session key to generation according to Session key be encrypted after obtain, comprising:
The KMC believes according to the mark for the first terminal equipment for including in the parameter information for obtaining session key Breath, determines the corresponding first terminal equipment of the identification information of the first terminal equipment is generated when logging in the KMC first Key is protected, and carries out cryptographic calculation using the session key that the first protection key pair generates, is utilized first Protect the encrypted session key of key;And
According to the identification information for the second terminal equipment for including in the parameter information for obtaining session key, determine The second protection that the corresponding second terminal equipment of the identification information of the second terminal equipment is generated when logging in the KMC is close Key, and cryptographic calculation is carried out using the session key that the second protection key pair generates, it is close to be utilized the second protection The encrypted session key of key.
14. a kind of terminal device for executing secure traffic characterized by comprising
Request message sending module establishes request message for sending secure traffic to encryption application server EAS, In, the secure traffic establishes request message and needs to establish between first terminal equipment and second terminal equipment for characterizing Secure traffic, the secure traffic establish in request message the parameter information contained for obtaining session key;
Session key receiving module, the encrypted session key sent for receiving the EAS, and by the encrypted meeting Words key is sent to the second terminal equipment, wherein the encrypted session key is that the EAS is used to obtain by described The parameter information carrying of session key is sent to the first terminal equipment and described second eventually in session key request message Key Management Center KMC belonging to end equipment, by the KMC according to the parameter information for obtaining session key to generation Session key be encrypted after obtain, to request the KMC be described for characterizing for the session key request message The secure traffic for needing to establish between first terminal equipment and the second terminal equipment generates session key.
15. terminal device as claimed in claim 14, which is characterized in that further include;
Processing module, specifically for the encrypted session key is sent to the second terminal by IMS network signaling Equipment;
Alternatively,
It is by the medium surface data transmission channel between the second terminal equipment of foundation that the encrypted session is close Key is sent to the second terminal equipment.
16. terminal device as claimed in claim 14, which is characterized in that the terminal device further include:
Deciphering module, for being generated using when logging in the KMC when receiving the encrypted session key that the EAS is sent First protection key pair described in encrypted session key be decrypted, obtain the KMC be the first terminal equipment with The session key of secure traffic generation is carried out between the second terminal equipment.
17. a kind of Key Management Center for secure traffic characterized by comprising
Key request receiving module, the session key request message sent for receiving encryption application server EAS, wherein institute State the guarantor that session key request message needs to establish for characterizing request KMC between first terminal equipment and second terminal equipment Close communication service generates session key, and the parameter letter for obtaining session key is contained in the session key request message Breath, the parameter information for obtaining session key are being used for for the first terminal equipment transmission that the EAS is received Characterize the secure traffic for needing to establish secure traffic between the first terminal equipment and the second terminal equipment It establishes and carries in request message;And
Key sending module, for returning to encrypted session key to the EAS, in order to which the EAS is by encrypted institute It states session key and is sent to the first terminal equipment, the first terminal equipment is realized using the session key With the secret communication between the second terminal equipment, and encrypted session key is sent to the second terminal equipment, The second terminal equipment is enabled to realize the secret communication between the first terminal equipment using the session key, Wherein, the encrypted session key is that the KMC is used to obtain the parameter information of session key to production according to What raw session key obtained after being encrypted.
18. Key Management Center as claimed in claim 17, which is characterized in that the parameter letter for obtaining session key The identification information for the first terminal equipment for including in breath and the identification information of second terminal equipment;
The key sending module is specifically used for generating between the first terminal equipment and the second terminal equipment The session key that secure traffic needs is executed, according to include in the parameter information for obtaining session key described first The identification information of terminal device determines the corresponding first terminal equipment of the identification information of the first terminal equipment described in the login The the first protection key generated when KMC, and encryption fortune is carried out using the session key that the first protection key pair generates It calculates, is utilized the first encrypted session key of protection key;And
According to the identification information for the second terminal equipment for including in the parameter information for obtaining session key, determine described in The second protection key that the corresponding second terminal equipment of the identification information of second terminal equipment is generated when logging in the KMC;And Cryptographic calculation is carried out using the session key that the second protection key pair generates, is utilized the encryption of the second protection key Session key afterwards;
By the encrypted session key of the first protection of utilization key and the utilization the second protection encrypted session of key Key is sent to the EAS as encrypted session key, by key response message.
19. a kind of processing system of secure traffic, which is characterized in that the system comprises: such as claim 10~13 times Encryption application server, the terminal device as described in claim 14~16 is any described in one and such as claim 17~18 Any Key Management Center.
CN201310631793.2A 2013-11-29 2013-11-29 A kind of processing method of secure traffic, equipment and system Active CN104683304B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310631793.2A CN104683304B (en) 2013-11-29 2013-11-29 A kind of processing method of secure traffic, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310631793.2A CN104683304B (en) 2013-11-29 2013-11-29 A kind of processing method of secure traffic, equipment and system

Publications (2)

Publication Number Publication Date
CN104683304A CN104683304A (en) 2015-06-03
CN104683304B true CN104683304B (en) 2019-01-01

Family

ID=53317907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310631793.2A Active CN104683304B (en) 2013-11-29 2013-11-29 A kind of processing method of secure traffic, equipment and system

Country Status (1)

Country Link
CN (1) CN104683304B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103987037A (en) 2014-05-28 2014-08-13 大唐移动通信设备有限公司 Secret communication implementation method and device
CN106487501B (en) * 2015-08-27 2020-12-08 华为技术有限公司 Key distribution and reception method, key management center, first network element and second network element
CN106534044A (en) * 2015-09-09 2017-03-22 中兴通讯股份有限公司 Method and device for encrypting voice call
CN106714153B (en) * 2015-11-13 2022-06-10 华为技术有限公司 Key distribution, generation and reception method and related device
CN106714152B (en) 2015-11-13 2021-04-09 华为技术有限公司 Key distribution and receiving method, first key management center and first network element
CN106936570B (en) * 2015-12-31 2021-08-20 华为技术有限公司 Key configuration method, key management center and network element
CN107623912B (en) * 2016-07-15 2020-12-11 中兴通讯股份有限公司 Method and device for safety communication between internet of vehicles terminals
CN106535184A (en) * 2016-10-18 2017-03-22 深圳市金立通信设备有限公司 Key management method and system
CN107979836A (en) * 2016-10-21 2018-05-01 中国移动通信有限公司研究院 A kind of encryption call method and device applied to VoLTE
CN108155991B (en) * 2018-03-22 2022-01-04 北京可信华泰科技有限公司 Generation system of trusted key
CN108449347B (en) * 2018-03-22 2021-08-13 北京可信华泰信息技术有限公司 Key generation server
CN109344848A (en) * 2018-07-13 2019-02-15 电子科技大学 Mobile intelligent terminal security level classification method based on Adaboost
CN111404671B (en) * 2019-01-02 2023-07-25 中国移动通信有限公司研究院 Mobile quantum secret communication method, gateway, mobile terminal and server
CN112702734B (en) * 2019-10-23 2023-04-28 中移物联网有限公司 Key distribution system and method
WO2021155540A1 (en) * 2020-02-06 2021-08-12 华为技术有限公司 Key management method and communication apparatus
CN115549956A (en) * 2022-08-17 2022-12-30 青岛海尔科技有限公司 Session establishing method, device, storage medium and electronic device
CN117675235A (en) * 2022-08-22 2024-03-08 中国移动通信有限公司研究院 Secret communication processing method, first terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100789668B1 (en) * 2005-01-27 2007-12-31 정명식 Mobile communications terminal having both general communication mode and secret communication service mode
CN101442742A (en) * 2008-12-12 2009-05-27 华为技术有限公司 Method, system and equipment for implementing end-to-end encipher of mobile cluster set call
CN101536399A (en) * 2006-09-28 2009-09-16 西门子公司 Method for providing a symmetric key for protecting a key management protocol
CN101572694A (en) * 2008-04-29 2009-11-04 华为技术有限公司 Method for acquiring media stream key, session equipment and key management function entity

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100789668B1 (en) * 2005-01-27 2007-12-31 정명식 Mobile communications terminal having both general communication mode and secret communication service mode
CN101536399A (en) * 2006-09-28 2009-09-16 西门子公司 Method for providing a symmetric key for protecting a key management protocol
CN101572694A (en) * 2008-04-29 2009-11-04 华为技术有限公司 Method for acquiring media stream key, session equipment and key management function entity
CN101442742A (en) * 2008-12-12 2009-05-27 华为技术有限公司 Method, system and equipment for implementing end-to-end encipher of mobile cluster set call

Also Published As

Publication number Publication date
CN104683304A (en) 2015-06-03

Similar Documents

Publication Publication Date Title
CN104683304B (en) A kind of processing method of secure traffic, equipment and system
CN104486077B (en) A kind of end-to-end cryptographic key negotiation method of VoIP real time datas safe transmission
CN104702611B (en) A kind of device and method for protecting Secure Socket Layer session key
CN104168267B (en) A kind of identity identifying method of access SIP security protection video monitoring systems
EP1946479B1 (en) Communication securiy
CN103428221B (en) Safe login method, system and device to Mobile solution
CN105307165B (en) Communication means, server-side and client based on mobile application
CN102045210B (en) End-to-end session key consultation method and system for supporting lawful interception
CN102036238B (en) Method for realizing user and network authentication and key distribution based on public key
CN107800539A (en) Authentication method, authentication device and Verification System
CN104468126B (en) A kind of safe communication system and method
CN109194656A (en) A kind of method of distribution wireless terminal secure accessing
CN104683098B (en) A kind of implementation method of secure traffic, equipment and system
CN1658547B (en) Crytographic keys distribution method
CN102547688A (en) Virtual-dedicated-channel-based establishment method for high-credibility mobile security communication channel
CN104394123A (en) A data encryption transmission system and method based on an HTTP
CN101958907A (en) Method, system and device for transmitting key
CN109151508A (en) A kind of video encryption method
CN105792193A (en) End-to-end voice encryption method of mobile terminal based on iOS operating system
CN111756528B (en) Quantum session key distribution method, device and communication architecture
CN101790160A (en) Method and device for safely consulting session key
CN104683103B (en) A kind of method and apparatus of terminal device logs certification
CN100544247C (en) The negotiating safety capability method
CN102281303A (en) Data exchange method
CN105991277B (en) Cryptographic key distribution method based on SIP communication system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant