WO2005013558A1 - Procede d'authentification pour passerelle de media - Google Patents
Procede d'authentification pour passerelle de media Download PDFInfo
- Publication number
- WO2005013558A1 WO2005013558A1 PCT/CN2003/001069 CN0301069W WO2005013558A1 WO 2005013558 A1 WO2005013558 A1 WO 2005013558A1 CN 0301069 W CN0301069 W CN 0301069W WO 2005013558 A1 WO2005013558 A1 WO 2005013558A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- media gateway
- shared key
- key
- gateway controller
- lifetime
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/102—Gateways
- H04L65/1023—Media gateways
- H04L65/103—Media gateways in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/102—Gateways
- H04L65/1033—Signalling gateways
- H04L65/104—Signalling gateways in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1101—Session protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method for implementing a media gateway authentication using a MEGAC0 / MGCP protocol. Background technique
- the Media Gateway Control (MEGAC0) protocol is the RFC3015 protocol of the Internet Engineering Task Force (IETF).
- FIG. 1 shows the system network diagram of the MEGAC0 protocol.
- the MEGAC0 protocol adopts the concept of a separate gateway, and divides the original signaling and media processing gateway into two parts: a media gateway (Media Gateway, MG for short) and a media gateway controller (Media Gateway Control, MGC).
- the MGC controls the actions of the MG through the MEGACO protocol:
- the MGC sends a ⁇ I command to the MG, the MG executes and returns the result, and the media gateway controller MGC must also handle the events reported by the media gateway MG actively. Please call the logic in the MEGACO protocol
- the relationship is shown through the connection model.
- the two most basic components in the connection model are the association and the termination point.
- the relationship between the termination point and the topology relationship is shown.
- the main commands between the Media Gateway Controller MGC and the Media Gateway MG include
- SERVICECHANGE register
- ADD add
- MODIFY modify
- SUBTRACT delete
- NOTIFY notification
- the media gateway MG is regularly posed with a constant key ⁇ :
- the same key is used for long-term authentication, which is easy for third parties to crack ;
- the method of periodic authentication the third party is easy to filter the authentication message to the real M (to enable successful authentication between the media gateway controller MGC and the media gateway MG, and forge other MG messages to initiate a call
- the gateway controller MGC authenticates the media gateway MG, so the media gateway MG may be called by an illegal media gateway controller MGC to forge messages.
- the purpose of the present invention is to provide a more complete authentication mechanism for media gateways, which solves the problem that the third party in the traditional MG authentication method is easy to forge the media gateway MG to initiate a call, and it is easy to forge the media gateway controller MGC to call the media gateway MG and the key
- the problem that may not be solved for a long time can be solved, each call can be authenticated, and the shared key can be changed regularly to effectively prevent illegal forged messages from calling it.
- the invention is implemented as follows:
- the invention discloses a method for authenticating a media gateway, which includes: setting an initial key for an initial digital signature of both parties, for the media gateway and the media gateway controller; the media gateway and the media gateway The controller performs signaling communication with the initial key to generate a new shared key with a specific lifetime; the media gateway and the media gateway controller use the new shared key to authenticate calls and responses If the lifetime of the new shared key ends, the media gateway and the media gateway controller update the shared key.
- the step of generating the shared key further includes: the media gateway initiates registration signaling to the media gateway controller for registration, and the registration signaling carries parameters for generating the shared key and the The digital signature generated by the initial key; after the media gateway controller verifies that the media gateway is legal with the initial key, generating a shared key and setting a lifetime of the shared key; the media gateway controller Initiating a modification command to the media gateway, where the modification command carries parameters for generating a shared key, a digital signature generated from the initial key, and a lifetime of the shared key; the media gateway uses the initial After the key verifies that the media gateway controller is legitimate, a shared key is generated and a lifetime of the shared key is set.
- the authentication step further includes: the media gateway controller digitally signs each call message to the media gateway with the shared key; and the media gateway uses the shared key to pair the call with each other.
- the digital signature in the message is used for verification. If it is valid, then Return to the media gateway controller a response message digitally signed with the shared key; the media gateway controller uses the shared key to verify the digital signature in the response message, and if it is valid, then Set up the call, otherwise, reject the call.
- the step of updating the shared key further includes: the media gateway sends a notification command to the media gateway controller, requesting the media gateway controller to generate a new shared key, and the notification command carries a
- the media gateway controller uses the initial key to verify that the media gateway is legal, and generates a new shared key and sets the share. Key lifetime; the media gateway controller initiates a modification command to the media gateway, wherein the modification command includes parameters for generating a shared key, a digital signature generated from the initial key, and a shared key
- the media gateway verifies that the media gateway controller is legal with the initial key, generates a shared key and sets a lifetime of the shared key.
- the algorithm used by the media gateway controller and the media gateway to generate a shared key is different from the algorithm used by the media gateway controller and the media gateway to generate a digital signature.
- the transmission of the parameters for generating the shared key and the digital signature can be implemented by extending the fields or packets of the protocol.
- the lifetime of the shared key may be time or the number of times a new shared key is available for authentication.
- the beneficial effect of adopting the technical solution of the present invention is that it can not only change the key regularly, but prevent easy authentication with the same key for a long time; it can authenticate each call of the media gateway MG, and solve the problem of filtering messages by a third party.
- the problem of initiating an illegal call it can also prevent the media gateway MG from completing the call under the control of an illegal media gateway controller MGC.
- Figure 1 shows the schematic diagram of the MEGAC0 protocol system
- FIG. 2 is a schematic flowchart of realizing a media gateway gateway right according to the present invention. detailed description
- the invention discloses a method for media gateway authentication, which includes the following steps:
- the algorithm for generating a shared key by the media gateway controller and the media gateway, and the algorithm for generating a digital signature by the media gateway controller and the media gateway may adopt an appropriate algorithm according to the needs of the security level.
- the present invention There is no limitation on the specific algorithm used.
- the media gateway MG and the media gateway controller MGC are initially provided with a key S for the initial digital signature of the two parties.
- the key S of the media gateway MG and the media gateway controller MGC may be different, as long as the other party's digital The signature is enough; the transmission of the key and parameters can be realized by extending the MEGAC0 field or the packet.
- the media gateway MG first initiates registration signaling registration with the media gateway controller MGC, and carries a ⁇ : and a digital signature for generating a shared key.
- the media gateway controller MGC generates a shared key after it is valid, and sends a modify command to the media gateway MG to generate the shared key parameters, digital signature, and set the shared key lifetime. After receiving the media gateway MG, it verifies that the digital signature is valid and generates Shared key.
- the media gateway controller MGC and the media gateway MG use the shared key to sign and verify each other's legitimacy before making the call. call.
- the media gateway controller MGC> ⁇ some keys are invalid; the media gateway MG needs to immediately request the media gateway controller MGC to use the notification command to generate a new shared key and obtain the survival of the new key. period.
- Figure 2 shows a detailed process of implementing authentication. Set the initial key between MG and MGC to S.
- the media gateway MG initiates a registration message to the media gateway controller MGC.
- the message carries the information M for the media gateway controller MGC to generate a shared key, and it also carries a common key S to the public key.
- the media gateway controller MGC After receiving the message, the media gateway controller MGC uses the key S to verify the digital signature, and if successful, it uses the shared key information M to generate the shared key S ', and responds to the media gateway MG with success;
- the media gateway controller MGC and the body gateway MG send a modification (MODIFY) message, which carries the information N for the media gateway MG to generate the shared key, and carries the information N for the shared key with the key S or the entire message generation Digital signature with new shared key lifetime:
- the lifetime can be a time, or the number of times the new shared key can be used for authentication;
- the media gateway MG After receiving the message, the media gateway MG uses the key S to verify the digital signature. If it succeeds, it uses the shared key information N to generate a shared key, and responds to the media gateway controller MGC.
- the media gateway controller MGC digitally signs with the new shared key S ';
- the media gateway MG After receiving the message, the media gateway MG uses the new shared key to verify the digital signature. If the media gateway controller MGCJ successfully proves to be legal, the response to the media gateway controller MGC is also digitally signed with the new shared key. After receiving the media gateway controller MGC, the call is established with the new shared key S 'and the call is established successfully. Otherwise, the call is rejected by the illegal media gateway MG, and the media gateway controller MGC periodically authenticates the media gateway MG. In the same way
- the media gateway MG reports a notification (N0ITFY) message to the media gateway controller MGC, and the message carries a message for the media gateway controller MGC to generate the shared key.
- Information with a digital signature generated by the key S to the shared key information NT or the entire message;
- the media gateway controller MGC digitally signs the key S after receiving the message, and if successful, generates the shared key S using the shared key information, and responds to the media gateway MG with success;
- the media gateway controller MGC body gateway MG sends a modification (MODIFY) message,
- the message carries the information N ′ used for the media gateway MG to generate the shared key, and carries the shared key information N ′ with the key S or the digital signature generated by the entire message, and also carries the new shared key lifetime.
- the media gateway MG uses the shared key information N 'to generate a new shared key and uses the new shared key to authenticate subsequent calls and periodic authentication;
- the media gateway MG successfully responds to the media gateway controller MGC.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/566,206 US7492899B2 (en) | 2003-08-05 | 2003-12-16 | Authentication method for media gateway |
ES03779653.9T ES2515815T3 (es) | 2003-08-05 | 2003-12-16 | Método de autenticación para pasarela médica |
AU2003289653A AU2003289653A1 (en) | 2003-08-05 | 2003-12-16 | Authentication method for medic gateway |
EP03779653.9A EP1653661B1 (en) | 2003-08-05 | 2003-12-16 | Authentication method for medic gateway |
US11/566,206 US7389408B1 (en) | 2003-08-05 | 2006-12-01 | Microarchitecture for compact storage of embedded constants |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN03149767.5A CN1286306C (zh) | 2003-08-05 | 2003-08-05 | 媒体网关鉴权的方法 |
CN03149767.5 | 2003-08-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005013558A1 true WO2005013558A1 (fr) | 2005-02-10 |
Family
ID=34109573
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2003/001069 WO2005013558A1 (fr) | 2003-08-05 | 2003-12-16 | Procede d'authentification pour passerelle de media |
Country Status (7)
Country | Link |
---|---|
US (1) | US7492899B2 (zh) |
EP (1) | EP1653661B1 (zh) |
CN (1) | CN1286306C (zh) |
AU (1) | AU2003289653A1 (zh) |
ES (1) | ES2515815T3 (zh) |
PT (1) | PT1653661E (zh) |
WO (1) | WO2005013558A1 (zh) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1275419C (zh) * | 2002-10-18 | 2006-09-13 | 华为技术有限公司 | 一种网络安全认证方法 |
CN100384251C (zh) * | 2004-08-02 | 2008-04-23 | 华为技术有限公司 | 用户授权方法及其授权系统 |
CN1992706A (zh) * | 2005-12-26 | 2007-07-04 | 华为技术有限公司 | 媒体网关中统计参数取值调整方法 |
EP2165507B1 (de) * | 2007-06-11 | 2011-09-07 | Fts Computertechnik Gmbh | Verfahren und architektur zur sicherung von echtzeitdaten |
WO2009130931A1 (ja) * | 2008-04-21 | 2009-10-29 | 日本電気株式会社 | Imsシステム、as装置およびmgw装置、imsシステムにおける輻輳規制通知方法 |
EP2487856B1 (en) | 2010-02-11 | 2016-04-20 | Huawei Technologies Co., Ltd. | Media stream transmission key operating method, apparatus and system |
CN102202389B (zh) * | 2010-03-25 | 2016-03-30 | 中兴通讯股份有限公司 | 一种对网关实现管理的方法及系统 |
CN102215560B (zh) * | 2010-04-08 | 2015-06-10 | 中兴通讯股份有限公司 | 一种对m2m终端实现管理的方法及系统 |
US8555332B2 (en) | 2010-08-20 | 2013-10-08 | At&T Intellectual Property I, L.P. | System for establishing communications with a mobile device server |
US8438285B2 (en) | 2010-09-15 | 2013-05-07 | At&T Intellectual Property I, L.P. | System for managing resources accessible to a mobile device server |
US8610546B2 (en) | 2010-10-01 | 2013-12-17 | At&T Intellectual Property I, L.P. | System for selecting resources accessible to a mobile device server |
US8504449B2 (en) | 2010-10-01 | 2013-08-06 | At&T Intellectual Property I, L.P. | Apparatus and method for managing software applications of a mobile device server |
US8478905B2 (en) | 2010-10-01 | 2013-07-02 | At&T Intellectual Property I, Lp | System for synchronizing to a mobile device server |
US8516039B2 (en) | 2010-10-01 | 2013-08-20 | At&T Intellectual Property I, L.P. | Apparatus and method for managing mobile device servers |
US8443420B2 (en) | 2010-10-01 | 2013-05-14 | At&T Intellectual Property I, L.P. | System for communicating with a mobile device server |
US8989055B2 (en) | 2011-07-17 | 2015-03-24 | At&T Intellectual Property I, L.P. | Processing messages with a device server operating in a telephone |
US9392316B2 (en) | 2010-10-28 | 2016-07-12 | At&T Intellectual Property I, L.P. | Messaging abstraction in a mobile device server |
US9066123B2 (en) | 2010-11-30 | 2015-06-23 | At&T Intellectual Property I, L.P. | System for monetizing resources accessible to a mobile device server |
CN103685353A (zh) * | 2012-09-05 | 2014-03-26 | 中兴通讯股份有限公司 | 网关管理终端的方法及装置 |
US9462332B2 (en) | 2012-12-05 | 2016-10-04 | At&T Intellectual Property I, L.P. | Method and apparatus for controlling a media device |
CN103560875B (zh) * | 2013-08-27 | 2016-08-17 | 兴唐通信科技有限公司 | 基于h.248协议的专用通道密钥协商方法及装置 |
JP2015186249A (ja) * | 2014-03-26 | 2015-10-22 | 沖電気工業株式会社 | 通信システム、セッション制御装置及び転送制御装置 |
US11223473B2 (en) * | 2019-02-01 | 2022-01-11 | EMC IP Holding Company LLC | Client-driven shared secret updates for client authentication |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1308472A (zh) * | 2000-02-09 | 2001-08-15 | 朗迅科技公司 | 利用刷新密钥执行密钥刷新的方法和装置 |
WO2002054201A2 (en) * | 2000-12-29 | 2002-07-11 | Intel Corporation | System and method for providing authentication and verification services in an enhanced media gateway |
CN1411224A (zh) * | 2001-09-29 | 2003-04-16 | 华为技术有限公司 | 一种pc客户端的安全认证方法 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7089211B1 (en) * | 2000-01-12 | 2006-08-08 | Cisco Technology, Inc. | Directory enabled secure multicast group communications |
EP1316171A4 (en) * | 2000-08-04 | 2006-05-03 | First Data Corp | PERSONNEL AND CONTOUR DIGITAL SIGNATURE SYSTEM |
EP1318683A1 (de) * | 2001-12-10 | 2003-06-11 | Siemens Aktiengesellschaft | Verfahren zum Übermitteln von Signalisierungsnachrichten, zugehörige Vorrichtung, zugehörige Signalisierungsnachricht und zugehöriges Programm |
US20060274899A1 (en) * | 2005-06-03 | 2006-12-07 | Innomedia Pte Ltd. | System and method for secure messaging with network address translation firewall traversal |
-
2003
- 2003-08-05 CN CN03149767.5A patent/CN1286306C/zh not_active Expired - Lifetime
- 2003-12-16 PT PT37796539T patent/PT1653661E/pt unknown
- 2003-12-16 ES ES03779653.9T patent/ES2515815T3/es not_active Expired - Lifetime
- 2003-12-16 US US10/566,206 patent/US7492899B2/en not_active Expired - Lifetime
- 2003-12-16 AU AU2003289653A patent/AU2003289653A1/en not_active Abandoned
- 2003-12-16 EP EP03779653.9A patent/EP1653661B1/en not_active Expired - Lifetime
- 2003-12-16 WO PCT/CN2003/001069 patent/WO2005013558A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1308472A (zh) * | 2000-02-09 | 2001-08-15 | 朗迅科技公司 | 利用刷新密钥执行密钥刷新的方法和装置 |
WO2002054201A2 (en) * | 2000-12-29 | 2002-07-11 | Intel Corporation | System and method for providing authentication and verification services in an enhanced media gateway |
CN1411224A (zh) * | 2001-09-29 | 2003-04-16 | 华为技术有限公司 | 一种pc客户端的安全认证方法 |
Non-Patent Citations (1)
Title |
---|
See also references of EP1653661A4 * |
Also Published As
Publication number | Publication date |
---|---|
ES2515815T3 (es) | 2014-10-30 |
EP1653661A1 (en) | 2006-05-03 |
US20060236101A1 (en) | 2006-10-19 |
US7492899B2 (en) | 2009-02-17 |
CN1286306C (zh) | 2006-11-22 |
CN1581858A (zh) | 2005-02-16 |
EP1653661A4 (en) | 2012-01-04 |
AU2003289653A1 (en) | 2005-02-15 |
PT1653661E (pt) | 2014-10-22 |
EP1653661B1 (en) | 2014-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005013558A1 (fr) | Procede d'authentification pour passerelle de media | |
US7813509B2 (en) | Key distribution method | |
JP2010086529A (ja) | 連続する再認証を必要としないsipシグナリング | |
JP3936362B2 (ja) | セキュリティアソシエーションの寿命を制御するための方法及び通信システム | |
US6892308B1 (en) | Internet protocol telephony security architecture | |
WO2006000144A1 (fr) | Procede d'identification de protocole initial de session | |
WO2007009343A1 (fr) | Systeme d'autorisation d'acces d'un reseau de communication et son procede | |
US8923279B2 (en) | Prevention of voice over IP spam | |
JP2007006154A (ja) | 通信システム及びセッション確立方法 | |
US20070211867A1 (en) | Method and apparatus for token distribution in session for future polling or subscription | |
JP2013512594A (ja) | 認証システム、方法および設備 | |
WO2007076720A1 (fr) | Procédé et dispositif de régulation de ressources média | |
CN110572819B (zh) | 基于区块链的多域无线Mesh网络跨域认证方法及系统 | |
US7591013B2 (en) | System and method for client initiated authentication in a session initiation protocol environment | |
JP4778282B2 (ja) | 通信接続方法及びシステム並びにプログラム | |
US20040043756A1 (en) | Method and system for authentication in IP multimedia core network system (IMS) | |
EP2809042A1 (en) | Method for authenticate a user associated to a user agent implemented over SIP protocol | |
WO2012003689A9 (zh) | 分布式动态密钥管理方法及装置 | |
JP2012519997A (ja) | 通信ネットワークにおける個人情報の一時共有によって強化された通信のための方法およびノード | |
DE60300912D1 (de) | Verfahren zur Verwaltung von der Sicherheit von Border-Gateway-Protocol-Nachrichten | |
CN1881870A (zh) | 一种设备间安全通信的方法 | |
WO2010115322A1 (zh) | 预定义加入群组会话的加入实现方法和系统 | |
CA2461418C (en) | Method and device for implementing a firewall application for communication data | |
CN100382484C (zh) | 一种直接路由模式下跨关守管理范围的会话密钥分配方法 | |
CN103200200A (zh) | 一种sip终端的防盗打方法及一种sip服务器 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2003779653 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2003779653 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006236101 Country of ref document: US Ref document number: 10566206 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 10566206 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: JP |