CN105979513A - Decryption method and system for SGI of VoLTE network - Google Patents

Decryption method and system for SGI of VoLTE network Download PDF

Info

Publication number
CN105979513A
CN105979513A CN201610573093.6A CN201610573093A CN105979513A CN 105979513 A CN105979513 A CN 105979513A CN 201610573093 A CN201610573093 A CN 201610573093A CN 105979513 A CN105979513 A CN 105979513A
Authority
CN
China
Prior art keywords
key
module
corresponding relation
spi
signaling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610573093.6A
Other languages
Chinese (zh)
Other versions
CN105979513B (en
Inventor
叶春生
雷果
车新奕
刘军徽
冉涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Broid Technology Co.,Ltd.
Original Assignee
SHENZHEN BAOAD TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN BAOAD TECHNOLOGY Co Ltd filed Critical SHENZHEN BAOAD TECHNOLOGY Co Ltd
Priority to CN201610573093.6A priority Critical patent/CN105979513B/en
Publication of CN105979513A publication Critical patent/CN105979513A/en
Application granted granted Critical
Publication of CN105979513B publication Critical patent/CN105979513B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention is applicable to the field of signaling monitoring of communication networks, and provides a decryption method and a decryption system for an SGI of a VoLTE network. By means of the decryption method, the data of the SGI encrypted in an IPSec-ESP transmission mode can be analyzed, thereby greatly providing convenience for an operator to carry out statistics on the KPI of a network and viewing the call trace of a user when monitoring a network communication system, and being beneficial to network optimization and quick positioning of a failure or a problem.

Description

The decryption method of a kind of VoLTE network SGI interface and system
Technical field
The invention belongs to the monitoring signaling field of communication network, particularly relate to a kind of VoLTE network SGI interface Decryption method and system.
Background technology
VoLTE (Voice over Long Term Evolution, audio frequency passes through LTE network transmission) is a kind of IP data transmission technology, it is not necessary to 2G/3G net, whole service bearers on 4G network, can realize data with Speech business unification under consolidated network.In other words, the data industry of two-forty is not only provided under 4G network Business, also provides for high-quality voice and video telephone simultaneously, and the latter just needs VoLTE technology to realize.VoLTE Technology brings 4G user and the most directly experiences that to be just to turn on the waiting time shorter, and more high-quality, more natural Voice and video communication effect.VoLTE with 2G, 3G voice call are essentially different.VoLTE is Framework end-to-end speech scheme under the conditions of full IP on 4G network.VoLTE compares 2G, 3G voice and leads to Words, voice quality can improve about 40%, because it uses high-resolution encoding and decoding technique.VoLTE is for using Lower access delay (waiting time after dialing) is brought at family, drops 50% than 3G, probably at about 2 seconds, And the 2G epoch are in the 6-7 second.Additionally, the drop rate under 2G, 3G happens occasionally, but the drop rate of VoLTE Close to zero.So, the system that a set of ruuning situation to communication network and equipment plays monitoring effect seems outstanding It is important, and VoLTE monitoring system is the monitoring system that the development of monitoring field is the swiftest and the most violent at present.
VoLTE system is that the mode using IP mirror image or light splitting to gather obtains signaling number from signaling link According to, then analytical data, synthesize detailed forms data record, add up detailed forms data record, generate miscellaneous service and refer to Mark KPI (Key Performance Indicator, KPI Key Performance Indicator).So we can profound ground Solve the ruuning situation of communication network, thus optimize network management, user's management, operational control and the rule of network Draw design etc..The call signalling flow of VoLTE is from EPC (Evolved Packet Core, block core evolution) Transparent transmission, accesses IMS network through Sgi interface, and therefore Sgi interface can be regarded as the first of signaling data Initiating point and final receiving station, closest to user side, therefore the signalling analysis of Sgi interface represents user's the most Business service condition.The signaling process of Sgi interface can not be parsed, it is impossible to meet people to communication network Monitoring requirements.Accordingly, it would be desirable to the demand of Sgi portal contents deciphering is studied.
Summary of the invention
The technical problem to be solved is to provide the decryption method of a kind of VoLTE network SGI interface And system, it is intended to solve the problem that the signaling of the SGI interface in existing VoLTE network cannot resolve.
The present invention is achieved in that the decryption method of a kind of VoLTE network SGI interface, including following step Rapid:
Acquisition gateway gathers SGI interface, the signaling data of Mw, and is sent to SE-DD module;
Described signaling data is shunted by described SE-DD module according to shunting rule, connects being distributed to SGI Mouth die block and Mw module;
Register in described Mw resume module SIP signaling and recovery process, obtain deciphering close Key Key-nonce corresponding relation, and it is sent to key management module, described SGI interface modules handle SIP Register in signaling and recovery process, obtain Spi-nonce corresponding relation, and be sent to described key Management module;
Described key management module is according to the described decruption key Key-nonce corresponding relation got and described Spi-nonce corresponding relation, sets up SPI-Key corresponding relation;
Described SGI interface module receives follow-up SIP signaling, and is sent to described key management module, root The Key field returned according to the SPI-Key corresponding relation in described key management module, is carried out encrypted content Deciphering.
Further, the signaling data of described SGI interface is the letter through IPSec-ESP encrypted transmission pattern Make information.
Further, described signaling data is shunted, specifically by described SE-DD module according to shunting rule For:
IP that described SE-DD module is pre-configured with according to SGI interface, Mw and port rule are by institute State signaling data to shunt.
The present invention also provides for the decryption system of a kind of VoLTE network SGI interface, including:
Acquisition gateway, for gathering SGI interface, the signaling data of Mw and being transmitted;
SE-DD module, is used for receiving described signaling data, and according to shunting rule, by described signaling data It is distributed to SGI interface module and Mw module;
Mw module, for processing the Register in SIP signaling and recovery process, obtains deciphering close Key Key-nonce corresponding relation, and it is sent to key management module;
SGI interface module, processes the Register in SIP signaling and recovery process, obtains Spi-nonce Corresponding relation, is sent to key management module;And receive follow-up SIP signaling and be sent to described key pipe Reason module, the Key field returned according to the SPI-Key corresponding relation in described key management module, will add Close content is decrypted;
Key management module, according to the described decruption key Key-nonce corresponding relation got and described Spi-nonce corresponding relation, sets up SPI-Key corresponding relation, and returns Key according to the SIP signaling received Field gives described SGI interface module.
Further, the signaling data of described SGI mouth is the signaling through IPSec-ESP encrypted transmission pattern Information.
Further, described SE-DD module is pre-configured with according to SGI interface, Mw IP and end Described signaling data is shunted by mouth rule.
The present invention compared with prior art, has the beneficial effects that: the solution of described VoLTE network SGI interface Decryption method is by gathering signaling data, shunting, and is processed by the signaling data after shunting, obtains deciphering Key Key-nonce corresponding relation and Spi-nonce corresponding relation, set up SPI-Key according to this corresponding relation Corresponding relation so that key management module can return Key field to SGI interface after receiving SIP signaling Encrypted content is decrypted by module.It is thus possible to by SGI interface by IPSec-ESP encrypted transmission pattern Signaling be decrypted, to facilitate the Network Quality Analysis carrying out next step.This decryption method greatly facilitates Operator's statistics network KPI index and check the calling vestige of user when monitoring network communicating system, Be conducive to the quick location of the network optimization and fault or problem.
Accompanying drawing explanation
Fig. 1 is the flow chart of the decryption method of VoLTE network SGI interface of the present invention;
Fig. 2 is the basic system figure of the decryption method of VoLTE network SGI interface of the present invention;
Fig. 3 is the internal relations logic storage figure of key management module in Fig. 2;
Fig. 4 is the schematic diagram of the related keyword information of signaling data flow chart and decrypting process;
Fig. 5 is IPSec-ESP protocol stack and the schematic diagram of packet description.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing and reality Execute example, the present invention is further elaborated.Only should be appreciated that specific embodiment described herein Only in order to explain the present invention, it is not intended to limit the present invention.
The decryption method of the VoLTE network SGI interface of the present invention can be connect by SGI interface and Mw Mouth association, parses the official information encrypted by IPSec-ESP transmission mode in SGI interface.SGI The application layer protocol that interface is corresponding with Mw is SIP (Session Initiation Protocol, conversation initial Agreement), AES is the pattern of IPSec-ESP, ESP (Extended stack pointer, stack pointer) For transmission mode.
Shown in Fig. 1 and Fig. 2, for the present invention one preferred embodiment, a kind of VoLTE network SGI connects The decryption method of mouth, comprises the following steps:
Step 1, acquisition gateway 202 gather the signaling data 201 of SGI interface, Mw, and are sent to SE-DD module 203.
Signaling data 201 is shunted by step 2, SE-DD module 203 according to shunting rule, and distributes To SGI interface module 206 and Mw module 204.
The signaling data of SGI interface module 206 is the signaling information through IPSec-ESP encrypted transmission pattern.
Signaling data 201 is shunted by SE-DD module 203 according to shunting rule, particularly as follows: SE-DD IP that module 203 is pre-configured with according to SGI interface, Mw and port rule are by signaling data 201 Shunt.
Step 3, Mw module 204 process the Register (registration) in SIP signaling and stream of reply Journey, obtains decruption key Key-nonce corresponding relation, and is sent to key management module 205, SGI interface Module 206 processes the Register in SIP signaling and recovery process, obtains Spi-nonce corresponding relation, And it is sent to key management module 205.
What Mw module 204 processed the Register of Sip 401 replies message, and according in sip message Holding and determine whether IPSec-ESP encryption instruction, if there being encryption instruction, then obtaining key, Nonce field, And corresponding relation is sent to key management module 205.
SGI interface module 206 processes the Register of Sip and corresponding 401 message, now goes back unencryption. The spi-c of UE can be parsed according to sip message content, spi-c, the spi-s of spi-s, PCSCF, and Nonce, AES, encryption mode, cryptographic protocol, key.If cryptographic protocol is ESP, encryption mode For transmission mode, then by the spi-c of UE, spi-c, spi-s, and the Nonce of spi-s, PCSCF, add Close algorithm, key is sent to key management module 205.
Step 4, key management module 205 according to the decruption key Key-nonce corresponding relation got and Spi-nonce corresponding relation, sets up SPI-Key corresponding relation.
The Mw that key management module 205 will receive, Sgi relevant information, associates according to Nonce, sets up UE-SPI-C, UE-SPI-S, PCSCF-SPI-C, PCSCF-SPI-S, AES, key right Should be related to.
Step 5, SGI interface module 206 receive follow-up SIP signaling, and are sent to key management module 205, The Key field returned according to key management module 205, is decrypted encrypted content.
SGI interface module 206 is successfully received sip message, if the upper-layer protocol of IP is designated as SPI, then will SPI is sent to key management module 205, and key management module 205 searches corresponding AES according to SPI And key, return result to SGI interface.SGI interface module 206 according to the key received and algorithm, Parse clear content, make subsequent treatment.
As in figure 2 it is shown, the decryption system of a kind of VoLTE network SGI interface, including: acquisition gateway 202, SE-DD module 203, Mw module 204, SGI interface module 206 and key management module 205.
Acquisition gateway 202 is for gathering SGI mouth, the signaling data 201 of Mw mouth and being transmitted.
SE-DD module 203 is used for receiving signaling data 201, and carry out shunting according to shunting rule and incite somebody to action Signaling data 201 after shunting is distributed to SGI interface module 206 and Mw module 204.
Mw module 204, for processing the Register in SIP signaling and recovery process, obtains deciphering Key Key-nonce corresponding relation, and it is sent to key management module 205.
SGI interface module 206 processes the Register in SIP signaling and recovery process, obtains Spi-nonce Corresponding relation, is sent to key management module 205, and receives follow-up SIP signaling and be sent to key management Module 205, the Key field returned according to key management module 205, encrypted content is decrypted.
Key management module 205 is according to the decruption key Key-nonce corresponding relation got and Spi-nonce Corresponding relation, sets up SPI-Key corresponding relation, and according to the SIP signaling received return Key field to SGI interface module 206.
The signaling data of SGI mouth is the signaling information through IPSec-ESP encrypted transmission pattern.
IP and port rule that SE-DD module 203 is pre-configured with according to SGI interface, Mw will letters Data 201 are made to shunt.
As it is shown on figure 3, be the internal relations logic storage figure of key management module 205.Wherein, Key represents Key, ealg is AES, and Nonce is the authentication parameter of Sip Register message, SGI interface and Mw Interface is by reaching to obtain the purpose of complete deciphering parameter alternately with key management module 205.
The internal relations of key management module 205 and and outside modules between mutual, specific as follows:
Step 101, key management module 205 receive the Nonce-Key correspondence of Mw module 204 and close After system, inside modules is set up it and is hinted obliquely at relation table T1.
Step 102, key management module 205 receive the Nonce-< UE-SPI-C of SGI interface module 206, UE-SPI-S, PCSCF-SPI-C, PCSCF-SPI-S, ealg > after corresponding relation, basis in T1 table Nonce searches, and sets up<UE-SPI-S, PCSCF-SPI-S>-<Key, ealg>according to lookup result and maps pass It is table T2, and deletes the Nonce corresponding content of T1.
Step 103, key management module 205 receive the request message of SGI, search Key, ealg according to SPI. Wherein, according to the sending direction of original signaling, SGI interface module 206 may determine that SPI is belonging to UE-SPI-S Or belong to PCSCF-SPI-S.
Key, the ealg that step 104, key management module 205 find according to SPI, returns to SGI and connects Mouth die block 206, SGI, according to key, algorithm, can complete decryption work.
As shown in Figure 4, for signaling data flow chart and decrypting process related keyword information.This figure is mainly retouched State the Signalling exchange between interface and main contents that signaling message carries.
Message (1), unencryption, Register up for UE asks message, carries Call-ID, SPI-C, SPI-S, wherein Call-ID is for the internal correlation of SGI interface.
Message (2), unencryption, the Register message that PCSCF forwards, mainly carry Call-ID, be used for The internal correlation of Mw.
Message (3), unencryption, carry Call-ID, Nonce, Key (key), Call-ID is used for Mw internal correlation, Nonce is used for and SGI interface conjunctionn, and Key is used for deciphering.
Message (4), unencryption, carry Call-ID, Nonce, PCSCF-SPI-C, PCSCF-SPI-S, Eagle (AES), Mod (encryption mode).Call-ID associates for SGI interface internal, Nonce For associating with Mw, PCSCF-SPI-C, PCSCF-SPI-S, eagle are used for deciphering, and Mod sentences Disconnected encryption mode.
Wherein, belong to the encrypted negotiation stage according to message (1), (2), (3), (4), all do not add Close.Complete deciphering parameter can be set up.
Message (5), message (6) are postorder signaling message, encrypted content.Wherein message (5) is carried SPI is UE-SPI-S, and the SPI that message (6) is carried is PCSCF-SPI-S.
As it is shown in figure 5, be the description of IPSec-ESP protocol stack and packet, transport on IPv4/IPv6 For the transmission mode application of row, ESP head is after IP head.The protocol fields of IP head is copied to In " next head " field of ESP head, remaining field of ESP head is then filled, padding sequence field Be the next value in sequence.Filling data can be inserted into, its value is allocated.That distributes also fills out simultaneously Fill length value.What the protocol fields of IP head obtained is the value of ESP subsequently.
The decryption method of described VoLTE network SGI interface and decryption system by gather signaling data 201, Shunting, and the signaling data 201 after shunting is processed, obtain decruption key Key-nonce corresponding relation With Spi-nonce corresponding relation, set up SPI-Key corresponding relation according to this corresponding relation so that key management Module 205 can return Key field to SGI interface module 206 by encrypted content after receiving SIP signaling It is decrypted.It is thus possible to SGI interface is decrypted by the signaling of IPSec-ESP encrypted transmission pattern, To facilitate the Network Quality Analysis carrying out next step.This decryption method greatly facilitates operator in monitoring net Statistics network KPI index and check the calling vestige of user during network communication system, the beneficially network optimization with And fault or the quick of problem position.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all at this Any amendment, equivalent and the improvement etc. made within bright spirit and principle, should be included in the present invention Protection domain within.

Claims (6)

1. the decryption method of a VoLTE network SGI interface, it is characterised in that comprise the following steps:
Acquisition gateway gathers SGI interface, the signaling data of Mw, and is sent to SE-DD module;
Described signaling data is shunted by described SE-DD module according to shunting rule, connects being distributed to SGI Mouth die block and Mw module;
Register in described Mw resume module SIP signaling and recovery process, obtain deciphering close Key Key-nonce corresponding relation, and it is sent to key management module, described SGI interface modules handle SIP Register in signaling and recovery process, obtain Spi-nonce corresponding relation, and be sent to described key Management module;
Described key management module is according to the described decruption key Key-nonce corresponding relation got and described Spi-nonce corresponding relation, sets up SPI-Key corresponding relation;
Described SGI interface module receives follow-up SIP signaling, and is sent to described key management module, root The Key field returned according to the SPI-Key corresponding relation in described key management module, is carried out encrypted content Deciphering.
Decryption method the most according to claim 1, it is characterised in that the signaling number of described SGI interface According to for the signaling information through IPSec-ESP encrypted transmission pattern.
Decryption method the most according to claim 1, it is characterised in that described SE-DD module is by institute State signaling data to shunt according to shunting rule, particularly as follows:
IP that described SE-DD module is pre-configured with according to SGI interface, Mw and port rule are by institute State signaling data to shunt.
4. the decryption system of a VoLTE network SGI interface, it is characterised in that including:
Acquisition gateway, for gathering SGI interface, the signaling data of Mw and being transmitted;
SE-DD module, is used for receiving described signaling data, and according to shunting rule, by described signaling data It is distributed to SGI interface module and Mw module;
Mw module, for processing the Register in SIP signaling and recovery process, obtains deciphering close Key Key-nonce corresponding relation, and it is sent to key management module;
SGI interface module, processes the Register in SIP signaling and recovery process, obtains Spi-nonce Corresponding relation, is sent to key management module;And receive follow-up SIP signaling and be sent to described key pipe Reason module, the Key field returned according to the SPI-Key corresponding relation in described key management module, will add Close content is decrypted;
Key management module, according to the described decruption key Key-nonce corresponding relation got and described Spi-nonce corresponding relation, sets up SPI-Key corresponding relation, and returns Key according to the SIP signaling received Field gives described SGI interface module.
Decryption system the most according to claim 4, it is characterised in that the signaling data of described SGI mouth For the signaling information through IPSec-ESP encrypted transmission pattern.
Decryption system the most according to claim 4, it is characterised in that described SE-DD module according to Described signaling data is shunted by IP and port rule that SGI interface, Mw are pre-configured with.
CN201610573093.6A 2016-07-20 2016-07-20 A kind of decryption method and system of VoLTE network SGI interface Active CN105979513B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610573093.6A CN105979513B (en) 2016-07-20 2016-07-20 A kind of decryption method and system of VoLTE network SGI interface

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610573093.6A CN105979513B (en) 2016-07-20 2016-07-20 A kind of decryption method and system of VoLTE network SGI interface

Publications (2)

Publication Number Publication Date
CN105979513A true CN105979513A (en) 2016-09-28
CN105979513B CN105979513B (en) 2019-06-25

Family

ID=56951802

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610573093.6A Active CN105979513B (en) 2016-07-20 2016-07-20 A kind of decryption method and system of VoLTE network SGI interface

Country Status (1)

Country Link
CN (1) CN105979513B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108243057A (en) * 2016-12-27 2018-07-03 中国移动通信集团浙江有限公司 A kind of VoLTE conversion ratios analysis method and system
CN109120572A (en) * 2017-06-22 2019-01-01 中兴通讯股份有限公司 SIP signaling decryption method, device, system and computer readable storage medium
CN109714293A (en) * 2017-10-25 2019-05-03 中国移动通信有限公司研究院 VoLTE data traffic filter method, device, gateway, equipment and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101026615A (en) * 2006-02-18 2007-08-29 华为技术有限公司 IMS-based flow media network system
CN101997676A (en) * 2009-08-28 2011-03-30 中国移动通信集团公司 VoIP voice encryption protection method, node and system
CN104168205A (en) * 2014-08-06 2014-11-26 杭州华三通信技术有限公司 Message processing method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101026615A (en) * 2006-02-18 2007-08-29 华为技术有限公司 IMS-based flow media network system
CN101997676A (en) * 2009-08-28 2011-03-30 中国移动通信集团公司 VoIP voice encryption protection method, node and system
CN104168205A (en) * 2014-08-06 2014-11-26 杭州华三通信技术有限公司 Message processing method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108243057A (en) * 2016-12-27 2018-07-03 中国移动通信集团浙江有限公司 A kind of VoLTE conversion ratios analysis method and system
CN108243057B (en) * 2016-12-27 2021-08-13 中国移动通信集团浙江有限公司 VoLTE conversion rate analysis method and system
CN109120572A (en) * 2017-06-22 2019-01-01 中兴通讯股份有限公司 SIP signaling decryption method, device, system and computer readable storage medium
CN109714293A (en) * 2017-10-25 2019-05-03 中国移动通信有限公司研究院 VoLTE data traffic filter method, device, gateway, equipment and medium
CN109714293B (en) * 2017-10-25 2021-08-10 中国移动通信有限公司研究院 VoLTE data traffic filtering method, device, gateway, equipment and medium

Also Published As

Publication number Publication date
CN105979513B (en) 2019-06-25

Similar Documents

Publication Publication Date Title
CN102138313A (en) In-band DPI media reservation modifications to RFC 3313
US9258700B2 (en) Systems and methods for utilizing IMS data security mechanisms in a circuit switched network
US10320851B2 (en) Methods and devices for detecting and correlating data packet flows in a lawful interception system
CN109661800B (en) Method and apparatus for correlating intercept related information with call content
CN105979513A (en) Decryption method and system for SGI of VoLTE network
CN101605342A (en) Monitor method, system and the device of Content of Communication in a kind of IMS network
EP2186286B1 (en) Improvements in or relating to monitoring in an internet protocol (ip) domain
US10764335B2 (en) Lawful interception
CN109714295B (en) Voice encryption and decryption synchronous processing method and device
KR102054169B1 (en) Interception for encrypted, transcoded media
CN112654032A (en) Short number calling method and device and application server
CN1761241B (en) Processing voice data in packet communication network with encryption
US9906366B1 (en) Service provider based security in a wireless network
CN108228575A (en) Voiced translation exchange method and system
CN109788249B (en) Video monitoring control method based on industrial internet operating system
US9894109B2 (en) Lawful intercept in an internet protocol-based telephony system
CN113055535A (en) Method and system for generating 5G end-to-end call ticket
US20120265982A1 (en) Method, authentication server, terminal and system for implementing key mapping
Kim et al. Abnormal VoLTE call setup between UEs
CN109672692B (en) Media data encryption method based on RTP in VoIP communication network
CN102546578B (en) Relevance method and system of protocol flow between IMS (IP multimedia subsystem) and 2G (the 2nd generation telecommunication) /3G (the 3rd generation telecommunication) network
CN107317786A (en) A kind of method, device and the network element of forwarding conversation initiating protocol message
CN109120572A (en) SIP signaling decryption method, device, system and computer readable storage medium
US20220166805A1 (en) Handling of Lawfully Intercepted SIP Messages
CN116827910A (en) Method, equipment and storage medium for acquiring service XDR

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Inventor after: Wang Min

Inventor after: Ye Chunsheng

Inventor after: Lei Guo

Inventor after: Che Xinyi

Inventor after: Cheng Taomu

Inventor after: Liu Junwei

Inventor after: Ran Tao

Inventor before: Ye Chunsheng

Inventor before: Lei Guo

Inventor before: Che Xinyi

Inventor before: Liu Junhui

Inventor before: Ran Tao

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 401120 No.2, 7th floor, Fenghuang a building, No.18, Qingfeng North Road, Yubei District, Chongqing

Patentee after: Broid Technology Co.,Ltd.

Address before: 518057 No.1, area a, 3 / F, B1 building, Gaoxin South 7th road digital technology park, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: SHENZHEN BROADTECH Co.,Ltd.