WO2004036828A1 - Procede d'authentification de securite de reseau - Google Patents

Procede d'authentification de securite de reseau Download PDF

Info

Publication number
WO2004036828A1
WO2004036828A1 PCT/CN2003/000801 CN0300801W WO2004036828A1 WO 2004036828 A1 WO2004036828 A1 WO 2004036828A1 CN 0300801 W CN0300801 W CN 0300801W WO 2004036828 A1 WO2004036828 A1 WO 2004036828A1
Authority
WO
WIPO (PCT)
Prior art keywords
security
mgc
security authentication
authentication
network
Prior art date
Application number
PCT/CN2003/000801
Other languages
English (en)
French (fr)
Inventor
Tao Zhang
Zhong Zhang
Original Assignee
Huawei Technologies Co., Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd filed Critical Huawei Technologies Co., Ltd
Priority to US10/531,569 priority Critical patent/US8195942B2/en
Priority to AU2003271027A priority patent/AU2003271027B2/en
Publication of WO2004036828A1 publication Critical patent/WO2004036828A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Definitions

  • the invention relates to a network security authentication method.
  • next generation network there are many media gateways (MG) based on the Media Gateway Control Protocol (MGCP) and H248 protocol (another media gateway control protocol). These devices are distributed in enterprises or users' homes. Wide area, large volume, based on the characteristics of dynamic IP.
  • MGCP Media Gateway Control Protocol
  • H248 protocol another media gateway control protocol
  • these devices are distributed in enterprises or users' homes. Wide area, large volume, based on the characteristics of dynamic IP.
  • the application layer of the MGCP protocol does not have a security authentication mechanism, the MG using the MGCP protocol has poor security.
  • H248 protocol although there is a security authentication mechanism in the application layer, that is, in each H248 A security header can be added to the protocol transaction request message, and the security authentication result is returned in its transaction response message.
  • An object of the present invention is to provide a method capable of performing effective security certification on an NGN network.
  • a network security authentication method includes: Step 1: The media gateway controller (MGC) configures an authentication key for the media gateway (MG), and sets a network protocol security data packet;
  • Step 2 During the security authentication, the MGC sends the security authentication request data to the MG by using a data package (Package), and the MG uses the authentication key to encrypt and calculate the request data, and feeds the calculation result back to the MGC;
  • Package data package
  • Step 3 The MGC determines whether the authenticated MG is legal based on the authentication result.
  • the network protocol is Media Gateway Control Protocol (MGCP) or H248 protocol.
  • MGCP Media Gateway Control Protocol
  • H248 protocol H248 protocol
  • the data packet includes: a security authentication request signal and a security authentication result event; the security authentication request signal includes a security authentication parameter; and the security authentication result event includes a security result authentication parameter.
  • the step 2 further includes:
  • Step 21 The MGC sends a security authentication request signal in the data packet to the MG;
  • Step 22 The MG receives the security authentication parameters in the security authentication signal, and uses the authentication key to encrypt and calculate the above parameters, and then reports the encrypted calculation results to the MGC through the security result authentication parameters of the security authentication completion event in the data packet.
  • the present invention adopts a media network controller (MGC) to configure an authentication key for the media gateway (MG), and sets a network protocol security data packet for security authentication of the MG, it can prevent illegal and forged device network access; Since the authentication of the MG is performed under the control of the MGC, or when the MGC considers that the security authentication is required, the security authentication is random, and has a high security authentication efficiency.
  • MGC media network controller
  • the method of the present invention is to implement the security management of the MG.
  • the essence is to configure an authentication key for each MG.
  • the MGC When the MGC initiates an authentication request, the MGC will send a random number to the MG.
  • the random number and the authentication key configured by the MG (of course, it can also include other information), implement encryption calculation, and return the encryption result to the MGC.
  • MGC performs the same calculations to determine whether the encryption result is the same as that sent by the MG. If they are not the same, the MG is considered illegal.
  • the present invention can be implemented based on the H248 protocol or the MGCP protocol.
  • an MGCP protocol or H248 protocol security data packet needs to be added.
  • the security data packet is a collection of security authentication signals and events.
  • the security certification package includes a security certification request signal and a security certification completion event.
  • the security authentication request signal includes a security authentication parameter; the security completion event includes a security authentication result parameter.
  • the MGC wants to perform security authentication on the MG, the MGC sends a security authentication request signal to the MG, and at the same time detects the security authentication completion event of the MG.
  • the MG receives the security authentication signal issued by the MGC, it performs encryption calculation according to the authentication key configured on the MG and the parameters in the received MGC security authentication request signal.
  • the MG When the encryption calculation is completed, the MG reports a security authentication completion event to the MGC, and reports the security encryption calculation result in the parameters of the security authentication completion event. After receiving the security authentication completion event reported by the MG, the MGC compares whether the encryption calculation result in the parameters of the security authentication completion event reported by the MG is the same as the encryption result calculated by the MGC itself. If they are not the same, they are considered illegal MGs. The following illustrates the above process.
  • the specific contents of the MGCP protocol security data packet of the present invention implemented by using the MGCP protocol are: Data packet name: Auth; Data packet version: 1;
  • Event Name au t hoc
  • Detection event parameter encoding 32 * 64 (hexadecimal number);
  • the detection event parameter is used to return the authentication result
  • the above security authentication request signal parameter is a random number sent by the MGC to the MG.
  • the random number is a string greater than 16 bits and a string less than 32 bits.
  • Each bit string is ABNF (Extended Backus Normal Form) encoded as 2 hexadecimal numbers.
  • Step 11 The MGC initiates an authentication request to the MG:
  • the MGC issues a request notification command (RQNT) to the MG, allocates a transaction identifier (10G) and a request identifier (123), and requires the MG to detect a security authentication completion event (auth / authoc), and simultaneously issue Send a security authentication request signal (auth / authreq), MGC generates a 16-byte random number (0x78 0x90 Oxab Oxcd Oxef 0x56 0x78 0x900x000x22 0x00 0x22 0x00 0x22 0x00 0x32) Security authentication parameter as a security authentication request signal.
  • RQNT request notification command
  • MGC generates a 16-byte random number (0x78 0x90 Oxab Oxcd Oxef 0x56 0x78 0x900x000x22 0x00 0x22 0x00 0x22 0x00 0x
  • Step ⁇ After receiving the request notification command (RQNT) issued by the MGC, the MG sends back a correct response to this command.
  • the response code is the correct response (200), the transaction identifier (100), and the request notification (RQNT) command issued by the MGC.
  • the transaction IDs are consistent. Prove that the MG has correctly received the request notification command (RQNT) issued by the MGC.
  • Step 13 After receiving the request notification command (RQNT) issued by the MGC, the MG finds a security authentication request signal and starts security authentication calculation.
  • the MG takes out the parameters in the security authentication request signal and the authentication key configured on the MG ( The authentication key is assumed to be: 0x12 0x24 0x56 0x78 0x56 0x32 0x78 0x23 0x24 0x25 0x76 0x32 0x32 0x45 0x45 0x32) for encryption calculation.
  • the encryption calculation result is (0x12 Ox 34 Oxab Oxcd Oxef Oxab Oxef 0x90 0x00 0x22 0x00 0x22 0x67 0x89 0x77 0x88)
  • the MG checks whether the MGC requires reporting of the encryption completion event, and the MG finds that the MGC requires reporting In this event, the MG reports a notification command (NTFY) to the MGC, and detects that the event is a security authentication completion event (auth / authoc), and the event parameter is an encryption result.
  • the request identifier (123) is consistent with the request identifier of the request notification command (RQNT) issued by the MGC, and the transaction identifier (200) is allocated.
  • Step 14 After receiving the notification event reported by the MG, the MGC sends back a correct response of the notification command.
  • the response code is a correct response (200), and the transaction identifier (200) is consistent with the transaction identifier of the notification command (NTFY) reported by the MG. Prove that the MGC has correctly received the notification command (NTFY) reported by the MG.
  • Step 15 When the MGC receives the encryption result reported by the MG, it In comparison, if the encryption result reported by the MG is consistent with the encryption result calculated by the MGC itself. The MG is considered to be a legitimate MG. If the MG is inconsistent or the MG does not provide its own encryption result within the prescribed time, the MG is considered to be an illegal MG.
  • the H248 protocol security data packet implementing the present invention using the H248 protocol is: Data packet name: auth; Data packet version: 1;
  • Detection event parameter name authentication result
  • Parameter value ABNF encoding 32 * 64 (32 to 64 hexadecimal numbers);
  • Parameter value ASN.1 extract symbol representation
  • OCTET STRING SIZE (16..32)
  • the authentication process based on the above data packets and the pseudo code used are Step:
  • the MGC initiates an authentication request to the MG:
  • the MGC issues a request modification command (modify) to the MG, assigns a transaction identifier (1QG) and a request identifier (2223), and requests the MG to detect a security authentication completion event (auth / authoc) and issue it Security authentication request signal (auth / authreq), MGC generates a 16-byte random number (0x78 0x90 Oxab Oxcd Oxef 0x560x780x900x000x220x000x220x000x220x000x220x000x32) as the security authentication parameter of the security authentication request signal.
  • Step 22 After receiving the modify command (modify) issued by the MGC, the MG returns a correct response to this command.
  • the transaction identifier (10001) is the same as the transaction identifier of the modify command (modify) issued by the MGC. Prove that the MG has correctly received the modify command (modify) issued by the MGC.
  • Step 23 After receiving the modify command (modify) issued by the MGC, the MG finds a security authentication request signal and starts security authentication calculation.
  • the MG takes out the parameters in the security authentication request signal and the authentication key configured on the MG (assuming The authentication key is: 0x120x24 0x560x78 0x560x32 0x780x230x240x25 0x760x320x32 0x45 0x45 0x32 for encryption calculation.
  • the encryption calculation result is (0x12 Ox 34 Oxab Oxcd Oxef Oxab Oxef 0x90 0x00 0x22 0x00 0x22 0x67 0x89 0x77 0x88)
  • the MG checks whether the MGC requires an encryption completion event, and the MG finds that the MGC requires reporting In this event, the MG reports a notification command (NTFY) to the MGC, and detects that the event is a security authentication completion event (auth / authoc), and the event parameter is an encryption result.
  • the request identifier (2223) is consistent with the request identifier of the modify command (modify) issued by the MGC, and a transaction identifier (10002) is allocated at the same time.
  • Step 24 After receiving the notification event reported by the MG, the MGC returns the correct notification command.
  • the transaction identifier (10002) is consistent with the transaction identifier of the notification command (NTFY) reported by the MG. Prove that the MGC has correctly received the notification command (NTFY) reported by the MG.
  • Step 25 When the MGC receives the encryption result reported by the MG, compares it with the encryption result calculated by itself. If the encryption result reported by the MG is consistent with the encryption result calculated by the MGC. The MG is considered to be a legitimate MG. If it is inconsistent or the MG does not report its own encryption result within the prescribed time, the MG is considered to be an illegal MG.

Description

一种网络安全认证方法 技术领域
本发明涉及一种网络的安全认证方法。
背景技术
在下一代网络( NG.N )中,存在很多基于媒体网关控制协议( MGCP ) 和 H248协议(另一种媒体网关控制协议)的媒体网关( MG ), 这些设 备分布在企业或用户家中, 具有面广、 量大、 基于动态 IP的特点。 但在目前的 NGN网络中, 由于 MGCP协议的应用层无安全认证机制, 所以使用 MGCP协议的 MG安全性较差; 在 H248协议中, 尽管在应用 层中有安全认证机制, 即在每个 H248协议事务请求消息中可以加入 安全头, 在其事务响应消息中返回安全认证结果, 但是该安全认证机 制要在 MGC和 MG中要交互大量 H248消息, 大约要增加 40%的 H248 消息编解码处理时间, 这使得现有的 H248协议提供的安全认证方案 大大降低了网络系统的效率, 实际应用的可行性较差。 因此, 目前 NGN网络存在的仿冒 MG,对 MGC进行攻击等系统安全问题还没有得到 妥善的解决。
发明内容
本发明的目的在于提供一种能够对 NGN 网络进行有效的安全认 证的方法。
为达到上述目的, 本发明提供的网络安全认证方法, 包括: 步骤 1 : 媒体网关控制器 (MGC ) 为媒体网关 (MG ) 配置鉴权密 钥, 并且设置网络协议安全数据包;
步骤 2: 在进行安全认证时, MGC利用数据包(Package)向 MG下 发安全认证请求数据, MG 利用鉴权密钥对请求数据进行加密计算, 并将计算结果反馈给 MGC;
步骤 3: MGC根据认证结果确定被认证的 MG是否合法。
所述网络协议为媒体网关控制协议 (MGCP )或 H248协议。
所述数据包包括: 安全认证请求信号和安全认证结果事件; 所述 安全认证请求信号中包括安全认证参数;安全认证结果事件中包括安 全结果认证参数。
所述步骤 2进一步包括:
步骤 21 : MGC下发数据包中的安全性认证请求信号给 MG;
步骤 22: MG收到安全认证信号中的安全认证参数, 使用鉴权密 钥对上述参数进行加密计算,然后将加密计算结果通过数据包中的安 全认证完成事件的安全结果认证参数上报给 MGC。
由于本发明采用媒体网络控制器 (MGC ) 为媒体网关 (MG ) 配置 鉴权密钥, 并且设置网络协议安全数据包用于 MG的安全认证, 因此 能够防止非法和伪造设备的网络接入; 另外, 由于对 MG的认证在 MGC 的控制下进行, 或者说在 MGC 认为需要安全认证的时候进行安全认 证, 这样的认证方式具有随机性, 具有较高的安全认证效率。
具体实施方式 下面对本发明作进一步详细的描述。
本发明所述的方法是实现 MG的安全管理, 其实质是, 为每一个 MG配置一个鉴权密钥, 当 MGC发起鉴权请求时, MGC将向 MG发一个 随机数, MG根据 GC发来的随机数和 MG配置的鉴权密钥 (当然还可 以包括其他信息), 实施加密计算, 返回加密结果给 MGC。 MGC实施相 同的计算, 判断是否与 MG发送的加密结果相同。 如果不相同则认为 MG为非法。
本发明可以基于 H248协议或 MGCP协议实现,为此需要增加 MGCP 协议或 H248协议安全数据包, 所述安全性数据包是安全性认证信号 和事件的集合,本发明采用的 H248协议或 MGCP协议的安全性认证包 中包括一个安全性认证请求信号和安全性认证完成事件。安全认证请 求信号中包括一个安全性认证参数;安全性完成事件中包括一个安全 性认证结果参数。 当 MGC要对 MG进行安全性认证时, MGC下发安全 性认证请求信号给 MG, 同时检测 MG 的安全性认证完成事件。 当 MG 收到 MGC下发的安全性认证信号, 根据配置在 MG上的鉴权密钥和收 到的 MGC安全性认证请求信号中的参数进行加密计算。当完成加密计 算, MG向 MGC上报安全性认证完成事件, 在安全性认证完成事件的 参数中上报安全加密计算结果。 MGC收到 MG上报的安全性认证完成 事件后, 比较 MG上报的安全性认证完成事件参数中的加密计算结果 是否与 MGC 本身计算的加密结果相同。 如果不相同则认为是非法的 MG。 下面举例说明上述过程。
采用 MGCP协议实现本发明的 MGCP协议安全数据包具体内容为: 数据包名称: Auth; 数据包版本: 1;
包中包含的事件:
1: 安全认证结果事件
事件名称: au t hoc;
检测事件参数编码: 32*64 (十六进制数);
说明: 检测事件参数用于返回认证结果;
包中包含的信号:
1: 安全认 i正请求信号
信号名编码: authreq;
信号参数编码: 32*64 (十六进制数 32到 64位);
上述安全认证请求信号参数即为 MGC向 MG发出的一个随机数。 本例中, 随机数为大于 16位的字符串小于 32位的字符串。每一位字 符串 ABNF (扩展的巴科斯范式)编码为 2个十六进制数。
基于上述数据包的认证过程及采用的伪代码为:
步骤 11: MGC向 MG发起认证请求: MGC下发请求通知命令( RQNT ) 给 MG, 分配事务标识 ( 10G )和请求标识 ( 123 ), 要求 MG检测安全 认证完成事件 ( auth/authoc ), 同时下发安全认证请求信号 ( auth/authreq ), MGC生成一个 16字节的随机数( 0x78 0x90 Oxab Oxcd Oxef 0x56 0x78 0x900x000x22 0x00 0x22 0x00 0x22 0x00 0x32) 作为安全认证请求信号的安全认证参数。
步骤 Π : MG收到 MGC下发的请求通知命令(RQNT )后回送此命 令的正确响应, 响应码为正确响应 ( 200 ), 事务标识(100 )与 MGC 下发的请求通知 (RQNT )命令的事务标识一致。 证明 MG 已正确收到 MGC下发的请求通知命令( RQNT )。
步骤 13: MG收到 MGC下发的请求通知命令(RQNT )后发现有安 全认证请求信号, 开始进行安全认证计算, MG 取出安全认证请求信 号中的参数和配置在 MG上的鉴权密钥(该鉴权密钥假设为: 0x12 0x24 0x56 0x78 0x56 0x 32 0x78 0x23 0x24 0x25 0x76 0x32 0x32 0x45 0x45 0x32 )进行加密计算。经加密计算,加密计算结果为 ( 0x12 Ox 34 Oxab Oxcd Oxef Oxab Oxef 0x90 0x00 0x22 0x00 0x22 0x67 0x89 0x77 0x88 ), MG产生安全认证完成事件, MG查看是否 MGC要求上报加密完 成事件, MG发现 MGC要求上报该事件, MG上报通知命令( NTFY )给 MGC, 检测到事件为安全认证完成事件 (auth/authoc ), 事件参数为 加密结果。 请求标识(123 ) 与 MGC下发的请求通知命令 ( RQNT ) 的 请求标识一致, 同时分配事务标识( 200 )。
步骤 14 : MGC收到 MG上报的通知事件后, 回送通知命令的正确 响应, 响应码为正确响应( 200 ), 事务标识( 200 )与 MG上报的通知 命令(NTFY ) 的事务标识一致。 证明 MGC 已正确收到 MG上报的通知 命令(NTFY )。
步骤 15 : 当 MGC收到 MG上报的加密结果, 与自己计算的加密结 果比较, 如果 MG上报的加密结果与 MGC 自己计算的加密结果一致。 则认为该 MG为合法的 MG, 如果不一致或者 MG在规定的时间内没有 上 4艮自己的加密结果, 则认为该 MG为非法的 MG。
采用 H248协议实现本发明的 H248协议安全数据包为: 数据包名称: auth; 数据包版本: 1;
数据包中的事件:
1: 安全认证结果事件
事件名称: authoc ( 0x0001 );
检测事件参数名: 认证结果;
参数名称: Res ;
参数值 ABNF编码: 32*64 (32到 64位的 16进制数);
参数值 ASN.1 (抽 象符 号 表 示 法 ) 编 码 : OCTET STRING (SIZE (16..32)) ; ( 16到 32位的 8位位组);
数据包中包含的信号:
1: 安全认证请求信号
信号名标识: authreq
信号参数名: 请求参数
参数名称: parm
参数值 ABNF编码: 32*64 (HEXDIG)
参数值 ASN.1编码: OCTET STRING (SIZE (16..32))
基于上述数据包的认证过程及采用的伪代码为 步骤 : MGC向 MG发起认证请求: MGC下发请求修改命令 ( modify ) 给 MG, 分配事务标识(1QG)和请求标识( 2223 ), 要求 MG检测安全 认证完成事件 ( auth/authoc ), 同时下发安全认证请求信号 ( auth/authreq), MGC生成一个 16字节的随机数( 0x78 0x90 Oxab Oxcd Oxef 0x560x780x900x000x220x000x220x000x220x000x32) 作为安全认证请求信号的安全认证参数。
步骤 22: MG收到 MGC下发的修改命令(modify)后回送此命令 的正确响应, 事务标识 ( 10001 ) 与 MGC 下发的修改命令 (modify) 的事务标识一致。证明 MG已正确收到 MGC 下发的修改命令(modify )。
步骤 23: MG收到 MGC 下发的修改命令 (modify)后发现有安全 认证请求信号, 开始进行安全认证计算, MG 取出安全认证请求信号 中的参数和配置在 MG上的鉴权密钥 (假设该鉴权密钥为: 0x120x24 0x560x78 0x560x32 0x780x230x240x25 0x760x320x32 0x45 0x45 0x32 )进行加密计算。经加密计算,加密计算结果为 ( 0x12 Ox 34 Oxab Oxcd Oxef Oxab Oxef 0x90 0x00 0x22 0x00 0x22 0x67 0x89 0x77 0x88) ,MG产生安全认证完成事件, MG查看是否 MGC要求上报加密完 成事件, MG发现 MGC要求上报该事件, MG上报通知命令( NTFY )给 MGC, 检测到事件为安全认证完成事件(auth/authoc ), 事件参数为 加密结果。 请求标识 ( 2223 )与 MGC下发的修改命令 (modify) 的请 求标识一致, 同时分配事务标识 ( 10002 )。
步骤 24: MGC收到 MG上报的通知事件后, 回送通知命令的正确 响应, 事务标识( 10002 )与 MG上报的通知命令( NTFY )的事务标识 一致。 证明 MGC已正确收到 MG上报的通知命令( NTFY )。
步骤 25: 当 MGC收到 MG上报的加密结果, 与自己计算的加密结 果比较, 如果 MG上报的加密结果与 MGC 自己计算的加密结果一致。 则认为该 MG为合法的 MG, 如果不一致或者 MG在规定的时间内没有 上报自己的加密结果, 则认为该 MG为非法的 MG。

Claims

权 利 要 求
1、 一种网络安全认证方法, 包括下述步骤:
步骤 1 : 媒体网关控制器 (MGC ) 为媒体网关 (MG ) 配置鉴权密 钥, 并且设置网络协议安全数据包;
步骤 2: 在进行安全认证时, MGC利用数据包(Package)向 MG下 发安全认证请求数据, MG 利用鉴权密钥对请求数据进行加密计算, 并将计算结果反馈给 MGC;
步骤 3: MGC根据认证结果确定被认证的 MG是否合法。
2、 根据权利要求 1所述的网络安全认证方法, 其特征在于: 所 述网络协议为媒体网关控制协议(MGCP )。
3、 根据权利要求 1所述的网络安全认证方法, 其特征在于: 所 述网络协议为 H248协议。
4、 根据权利要求 1、 2或 3所述的网络安全认证方法, 其特征在 于, 所述数据包包括: 安全认证请求信号和安全认证结果事件; 所述 安全认证请求信号中包括安全认证参数;安全认证结果 Q事件中包括 安全结果认证参数。
5、 根据权利要求 4所述的网络安全认证方法, 其特征在于, 所 述步骤 2进一步包括:
步骤 21 : MGC下发数据包中的安全性认证请求信号给 MG;
步骤 22 : MG收到安全认证信号中的安全认证参数, 使用鉴权密 钥对上述参数进行加密计算,然后将加密计算结果通过数据包中的安 全认证完成事件的安全结果认证参数上报给 MGC。
PCT/CN2003/000801 2002-10-18 2003-09-22 Procede d'authentification de securite de reseau WO2004036828A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/531,569 US8195942B2 (en) 2002-10-18 2003-09-22 Network security authentication method
AU2003271027A AU2003271027B2 (en) 2002-10-18 2003-09-22 A network security authentication method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN02144191.XA CN1275419C (zh) 2002-10-18 2002-10-18 一种网络安全认证方法
CN02144191.X 2002-10-18

Publications (1)

Publication Number Publication Date
WO2004036828A1 true WO2004036828A1 (fr) 2004-04-29

Family

ID=32098077

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2003/000801 WO2004036828A1 (fr) 2002-10-18 2003-09-22 Procede d'authentification de securite de reseau

Country Status (4)

Country Link
US (1) US8195942B2 (zh)
CN (1) CN1275419C (zh)
AU (1) AU2003271027B2 (zh)
WO (1) WO2004036828A1 (zh)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1275419C (zh) * 2002-10-18 2006-09-13 华为技术有限公司 一种网络安全认证方法
WO2006115372A1 (en) 2005-04-25 2006-11-02 Lg Electronics Inc. Reader control system
CN100542354C (zh) * 2006-11-10 2009-09-16 华为技术有限公司 终端配置方法和终端配置系统
ES2509349T3 (es) 2006-06-26 2014-10-17 Huawei Technologies Co., Ltd. Método y sistema y dispositivo para dar instrucciones a una pasarela de medios para establecer conexiones entre terminales
CN100488305C (zh) 2006-09-23 2009-05-13 西安西电捷通无线网络通信有限公司 一种网络接入鉴别与授权方法以及授权密钥更新方法
CN101246538A (zh) * 2007-02-14 2008-08-20 日电(中国)有限公司 射频识别系统和方法
CN101345646A (zh) * 2007-07-11 2009-01-14 华为技术有限公司 评估网络侧安全状态的方法和安全认证系统
CN101217364B (zh) * 2007-12-28 2012-03-21 中国科学院计算技术研究所 媒体接入控制系统中安全上下文的组织结构和维护方法
CN101471747B (zh) * 2007-12-29 2013-01-02 华为技术有限公司 调整信号速度的方法和媒体网关
ES2583727T3 (es) 2010-02-11 2016-09-21 Huawei Technologies Co., Ltd. Método, equipo y sistema de operación para una clave de transmisión de flujos de medios
US9491784B2 (en) * 2012-07-31 2016-11-08 Apple Inc. Streaming common media content to multiple devices
US9888377B1 (en) * 2016-05-25 2018-02-06 Symantec Corporation Using personal computing device analytics as a knowledge based authentication source

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6353891B1 (en) * 2000-03-20 2002-03-05 3Com Corporation Control channel security for realm specific internet protocol
US20020087858A1 (en) * 2000-12-29 2002-07-04 Oliver Neal C. System and method for providing authentication and verification services in an enhanced media gateway
JP2002247111A (ja) * 2001-02-20 2002-08-30 Mcm Japan Kk 不正アクセス防止方法及びセキュリティ管理装置及びゲートウェイ装置及び端末装置

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW333630B (en) * 1996-05-22 1998-06-11 Matsushita Electric Ind Co Ltd An encryption apparatus for ensuring security in communication between devices
US6987781B1 (en) * 1998-12-04 2006-01-17 Tekelec Methods and systems for routing signaling messages in a communications network using circuit identification code (CIC) information
AU2001265257A1 (en) * 2000-05-26 2001-12-11 Vocaltec Ltd. Communications protocol
US6766377B1 (en) * 2000-08-24 2004-07-20 3Com Corporation Media gateway proxy
US6961857B1 (en) * 2000-09-28 2005-11-01 Cisco Technology, Inc. Authenticating endpoints of a voice over internet protocol call connection
US20020087828A1 (en) * 2000-12-28 2002-07-04 International Business Machines Corporation Symmetric multiprocessing (SMP) system with fully-interconnected heterogenous microprocessors
US7194071B2 (en) * 2000-12-28 2007-03-20 Intel Corporation Enhanced media gateway control protocol
US7110393B1 (en) * 2001-02-28 2006-09-19 3Com Corporation System and method for providing user mobility handling in a network telephony system
WO2003005669A1 (en) * 2001-07-03 2003-01-16 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for handling multiple registration
CN1176544C (zh) * 2001-08-15 2004-11-17 华为技术有限公司 媒体网关控制协议中主叫pc客户端携带主叫号码的方法
GB0201588D0 (en) * 2002-01-24 2002-03-13 Nortel Networks Ltd Call establishment procedure
US20040024902A1 (en) * 2002-06-18 2004-02-05 Olli Mikkola Megaco protocol with user termination
US6889045B2 (en) * 2002-06-26 2005-05-03 Motorola, Inc. Method and apparatus for implementing bi-directional soft handovers between wireless networks via media gateway control
DE10231026A1 (de) * 2002-07-09 2004-02-05 Siemens Ag Vermeidung eines Fehlverhaltens einer Vermittlungseinrichtungs-Steuerung (Media Gateway Controller) oder Vermittlungseinrichtung (Media Gateway) bei einem Wechsel des Nutzlasttyp in bestehenden Verbindungen
CN1275419C (zh) * 2002-10-18 2006-09-13 华为技术有限公司 一种网络安全认证方法
CN1286306C (zh) * 2003-08-05 2006-11-22 中兴通讯股份有限公司 媒体网关鉴权的方法
JP4155920B2 (ja) * 2003-12-25 2008-09-24 株式会社日立コミュニケーションテクノロジー メディアゲートウェイおよび自動電話転送サービスシステム
CN100471208C (zh) * 2005-01-02 2009-03-18 华为技术有限公司 在卡号业务中主叫用户重新发起呼叫的方法
CN1855931B (zh) * 2005-04-20 2010-08-04 华为技术有限公司 下一代网络中媒体网关上报事件处理方法
US20080186952A1 (en) * 2006-08-11 2008-08-07 Huawei Technologies Co., Ltd. Method and system for setting up a multimedia session in multimedia internetworking systems

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6353891B1 (en) * 2000-03-20 2002-03-05 3Com Corporation Control channel security for realm specific internet protocol
US20020087858A1 (en) * 2000-12-29 2002-07-04 Oliver Neal C. System and method for providing authentication and verification services in an enhanced media gateway
JP2002247111A (ja) * 2001-02-20 2002-08-30 Mcm Japan Kk 不正アクセス防止方法及びセキュリティ管理装置及びゲートウェイ装置及び端末装置

Also Published As

Publication number Publication date
AU2003271027A1 (en) 2004-05-04
AU2003271027B2 (en) 2007-08-09
CN1490973A (zh) 2004-04-21
CN1275419C (zh) 2006-09-13
US8195942B2 (en) 2012-06-05
US20050283607A1 (en) 2005-12-22

Similar Documents

Publication Publication Date Title
US7987359B2 (en) Information communication system, information communication apparatus and method, and computer program
US7908480B2 (en) Authenticating an endpoint using a STUN server
TWI362859B (zh)
US7475252B2 (en) System, method and program to filter out login attempts by unauthorized entities
WO2007098660A1 (fr) Procédé et système d'authentification d'entités de réseau dans un sous-système multimédia
US20030163693A1 (en) Detection of duplicate client identities in a communication system
US20080092211A1 (en) UPNP authentication and authorization
CN102868665A (zh) 数据传输的方法及装置
WO2004036828A1 (fr) Procede d'authentification de securite de reseau
WO2011022999A1 (zh) 一种终端对视频会议数据进行加密的方法及系统
CN109743170B (zh) 一种流媒体登录以及数据传输加密的方法和装置
WO2008043292A1 (fr) Procédé d'authentification, dispositif et système destinés à un service de multidiffusion et de radiodiffusion
JP4838881B2 (ja) メディアデータを符号化および復号化するための方法、装置ならびにコンピュータプログラム製品
KR20120098805A (ko) 인증 시스템, 방법 및 장치
KR101488167B1 (ko) 키­관리 프로토콜을 보호하기 위해 대칭 키를 제공하는 방법
CN100403742C (zh) 一种媒体网关与媒体网关控制器之间安全认证的方法
CN113904807A (zh) 一种源地址认证的方法、装置、电子设备及存储介质
WO2007093079A1 (fr) Procédé de mise en oeuvre d'une politique de sécurité en matière de négociation-clé dans un réseau interdomaine de commutation de paquets à plusieurs garde-portes
CN1509006A (zh) 防火墙与入侵检测系统联动的方法
WO2009132551A1 (zh) 媒体流密钥的获取方法、会话设备与密钥管理功能实体
CN1881870A (zh) 一种设备间安全通信的方法
WO2011097821A1 (zh) 一种媒体数据重放统计的方法、装置及系统
CN111770048B (zh) 一种防止sip设备被攻击的方法、主叫设备及被叫设备
CN117528194A (zh) 基于国密sm9算法的视频前端设备认证方法及系统
Gao Security in VoIP-Current situation and necessary development

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2003271027

Country of ref document: AU

Ref document number: 10531569

Country of ref document: US

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP

WWG Wipo information: grant in national office

Ref document number: 2003271027

Country of ref document: AU