WO2007122046A1 - Verfahren, vorrichtungen und computerprogrammprodukt zum ver- und entschlüsseln von mediendaten - Google Patents
Verfahren, vorrichtungen und computerprogrammprodukt zum ver- und entschlüsseln von mediendaten Download PDFInfo
- Publication number
- WO2007122046A1 WO2007122046A1 PCT/EP2007/052683 EP2007052683W WO2007122046A1 WO 2007122046 A1 WO2007122046 A1 WO 2007122046A1 EP 2007052683 W EP2007052683 W EP 2007052683W WO 2007122046 A1 WO2007122046 A1 WO 2007122046A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- media
- data
- control
- server
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
Definitions
- the invention relates to methods for encrypting and decrypting media data in a communication system.
- the invention also relates to a subscriber device and a control server as parts of a communication system and a computer program product, with which the method is feasible.
- IMS IP Multimedia Subsystem
- IP Internet Protocol
- Wertdien ⁇ te such as video-on-demand
- a standard for the secure transmission of media data between two devices is known be ⁇ example, the Secure Real-time Transport Protocol (SRTP 3711, according to RFC).
- SRTP 3711 the Secure Real-time Transport Protocol
- RFC Secure Real-time Transport Protocol
- a data transmission according to the SRTP standard can not be used, especially in heterogeneous networks, since there are some network limitations, for example when moving from the Internet to public telephone networks, to technical problems in the implementation of encrypted data streams.
- the invention features a method for encrypting and decrypting media data comprising the following steps: A request is transmitted from a subscriber device via a control network to a control server for setting a set of encryption parameters for control data. It includes the
- the con ⁇ troll server then creates the set of encryption parameters for the control data determined, comprising a random ⁇ figure, a control data key and an integrity key, the control data key and the Integri ⁇ are tuschs slaughterl depending on the random number and the identification data. Thereafter, a media key is generated dependent on the control data key and the integrity key. is generated by the control server and transmitted via a core network to a media server. Subsequently, unencrypted media data is encrypted by the media server using the media key for sending via a data network to the subscriber device and / or decrypted over the data network, sent by a user device encrypted media data using the Me ⁇ dien Whyls decrypted by the media server.
- the encryption to be used are averaging algorithm concerning additionally transmitted from the control server via the core network to the media server.
- the further encryption parameters are either previously determined by the subscriber device and transmitted to the control server or negotiated between the subscriber device and the control server. Characterized that troll server or media server, suitable Ver Thuslungspa- parameters for both sides, subscriber device and Kon ⁇ , eg, a suitable, both sides of a known encryption algorithm that is used is achieved.
- the object is also achieved according to a second aspect by a method in which, analogously to the first aspect, a request is transmitted from a subscriber device via a control network to a control server for specifying a set of encryption parameters for control data. From the subsequently generated set of encryption parameters, a random number is sent back to the subscriber device .
- the subscriber unit generates approximate data on the basis of iden ⁇ and the random number a control data key and an integrity key. Thereafter, a stipulateschlüs ⁇ sel is generated in response to the control data key and In ⁇ tegrticians ensurels by the subscriber device.
- the media key is formed either by an exclusive OR operation (XOR) or by means of a one-way hash function from the control data key and the integrity key. Both are functions that are easy to implement and offer the advantageous security aspect that it is not possible to deduce the control data key and the integrity key from the media key.
- XOR exclusive OR operation
- the third key can not be determined even if the media key and one of the two other keys are known.
- the media key is either used directly for encryption and decryption ⁇ ⁇ or depending on the media key another key is determined, which is used for encryption and decryption.
- a control server of a communication system having a first interface to a control network and a second interface to a core network.
- the control server can be connected to a subscriber device via the first interface and the control network and to a media server via the second interface and the core network.
- the control server is configured to receive identification data from the user equipment and to set a set of encryption parameters for control data.
- the encryption parameters comprise a random number and, depending on the random number and the identification data, a control data key and an integrity key.
- the controller server is further adapted to a media key in response to the con- troll data key and the integrity key to gen erzeu ⁇ and to be transmitted through the core network to the media server.
- the object is achieved according to a fourth aspect by a subscriber device for use in a communication ⁇ system with a first interface to a control network and a second interface to a media network.
- the user equipment is put over the first section ⁇ and the control network for exchanging control data with a control server and via the second interface of the ⁇ le and the media network for exchanging media data to the media server connectable.
- the user equipment is adapted to generate identification data to the control server to send, receive in response a random number and a control data key and an integrity key depen ⁇ gig of the random number and the identification data, the control data key and the integrity key of the encryption and decryption serve the control data.
- the subscriber device is further adapted ⁇ NEN media key ei in dependence of Kontroll Schemeschlüs- sels and generate the integrity key, wherein the metal key for the encryption and decryption of the media data.
- the object is a computer-program product by having program code for executing a computer program Com ⁇ dissolved in one or more computers of a communi ⁇ nikationssystems, said program codes for the execution of the Pro ⁇ one of the methods specified is executed.
- Figure 1 shows a communication system with a subscriber device, a control server and a media server
- Figure 2 shows an embodiment of a control server
- Figure 3 is a sequence diagram of a connection setup and subsequent transmission of encrypted media data from a media server to a subscriber device.
- FIG. 1 shows a communication system, comprising a subscriber device 1 with identification data ID, which is connected to a control server 3 via a control network 2.
- the control server 3 has encryption parameters K which comprise a control data key CK, an integrity key IK and the random number R.
- the control server 3 is connected via a core network 4, via which a media key MD is transmitted, to a media server 5 having unencrypted media data MD.
- the media server 5 is in turn connected to the subscriber device 1 via a data network 6, via which encrypted media data CMD is transmitted.
- Control server 3, core network 4 and media server 5 form one or are part of an exchange 7.
- Control network 2 and data network 6 together form one
- the user equipment 1 and the control server 3 have a media key generator 9.
- FIG. 1 represents an excerpt from a communication system.
- only one subscriber device 1 is shown; a plurality of subscriber devices are usually present, each of which is connected to the switching center 7 via an access network.
- a plurality of exchanges can be provided in a communication network, wherein a first group of
- Subscriber devices are connected to a first exchange and a second group of subscriber equipment to a second exchange.
- Represent the individual placement ⁇ are in such a case typically both its control server, also connected as via their media server.
- each with its own control servers is a common media server use.
- the connection between different exchanges can take place via a network corresponding to the core network 4.
- the core network 4 may be extended across and between multiple junctions.
- a communication system of the type described is suitable for transmitting data and / or telephone calls (coded as data) between two subscriber devices, eg the subscriber device 1 shown and a further subscriber device, not shown, via the media server 5 and possibly further media servers. It is also possible that the subscriber device 1 receives without the participation of another subscriber device data from the media server 5 or exchanged with this. Such a case occurs, for example, when services such as video-on-demand are used.
- the access network 8 is, for example, a wireline public telephone network such as an analog telephone network or an ISDN telephone network (Integrated Services Digital Network).
- Networks with further access ⁇ it can, for example, wireless mobile ⁇ radio networks, such as GSM (Global System for Mobile Communi- cation) - or UMTS networks act.
- GSM Global System for Mobile Communi- cation
- UMTS Universal Mobile Telephone Service
- the core network 4 is, for example, a data network according to the Internet protocol that uses a provider of communication services ⁇ in or between switching centers for data transmission.
- control data is transmitted via the control network 2 and user data via the media network 6.
- the control network 2 and the media network 6 may be physically separate networks, or else logically separate networks of one and the same physical network. Only logically separate networks exist, for example, when control and payload data are exchanged via different protocol levels on a single transmission channel between the switching center 7 and the subscriber device 1. However, they can also be separate transmission channels, such as a so-called ISDN control channel D and a so-called ISDN data channel B.
- the encryption and decryption units 10 in the subscriber device 1 and in the media server 5 are known from the prior art.
- the encoding and decoding units 10 user data can, for example, the media data MD is encrypted on the media server 5, and then the slave device as the encrypted media data CMD to the part ⁇ 1 is transmitted over the media network. 6
- the received encrypted media data CMD can be decrypted for use again.
- the encoding and decoding units 10 is of the generators 9 Justice Whylgene- facedge for this purpose the media key MK is ⁇ .
- the inventive method can also in an access network that uses an encrypted transmitting network protocol angewen ⁇ be det.
- the task of the control server 3 is the initiation, control and monitoring of the connection setup between the user equipment 1 and the exchange 7.
- the control server 3 comprises a plurality of functional components adapted to handle various tasks of the control server 3, namely, a contact server 3a, a session server 3b and a subscriber server 3c.
- the media key generator 9 is provided within the contact server 3a. From the contact ⁇ server 3a and the connections to the subscriber device 1 and the media server 7 go out.
- control server 3 Usually, all three components of the control server 3 are software implemented, wherein the components can be executed both on ei ⁇ ner common hardware unit, as well as on separate hardware units. Separate hardware units can also be spatially separated, wherein a network similar to the core network 4 can be used for data exchange.
- the contact server 3a as a Proxy Call Session Control Function (P-CSCF), the session server 3b called the Serving Call Session Control Function (S-CSCF) and the part ⁇ slave server 3c as Home Subscriber Server (HSS).
- P-CSCF Proxy Call Session Control Function
- S-CSCF Serving Call Session Control Function
- HSS Home Subscriber Server
- FIG. 3 shows a sequence diagram of a connection setup and a subsequent transmission of encrypted media data CMD between the media server 5 and the subscriber device 1.
- the connection setup involves the contact server 3a, the session server 3b and the subscriber server 3c.
- a first step Sl represents the subscriber unit 1 a request for call setup, also called "sub-Registration" Anfra ⁇ ge called 3rd to the contact server 3a of the control server in an IMS according to the 3GPP standard, wherein the contact server as a Proxy Call Session Control Function (P-CSCF) is referred to, can, for example, as a session initiation protocol, the so-called session initiation protocol (SIP, ⁇ accordingly RFC 3261 and RFC 2543 entspre) in connection with the session Description protocol (SDP, according to RFC 2327) are used.
- SIP session initiation protocol
- SDP session Description protocol
- identification data ID are stored in mobile phones, for example on the so-called SIM (Subscriber Identity Module) - card.
- SIM Subscriber Identity Module
- the identification data ID are required for determining the set of encryption parameters K which are used to encrypt the further exchange of control data between the subscriber device 1 and the control server 3. be set.
- the Multimedia Internet KEYing (MIKEY, according to RFC 3830) protocol can be used within the SIP protocol.
- the transmission could take place in accordance with the Security Descriptions (SDES, according to a draft of the IETF Internet Engineering Task Force).
- the session server 3b (in a 3GPP system, the S-CSCF, possibly with the assistance of a so-called Interrogating Call Session Control Function I-CSCF) is used to secure session data, e.g. for accounting purposes, and is only of marginal importance in the context described here.
- the subscriber server 3c has (or has access to) a database in which the identification data ID of subscriber devices is stored.
- the subscriber server 3c (Home Subscriber Server in a 3GPP system) determines the random number R and, based on the random number R, determines the control data key CK and the integrity key IK depending on the identification data ID.
- the identification data ID is not used directly to determine the keys, but rather a number or character sequence assigned to the identification data ID in the database. Applicable methods and algorithms for key generation are known from corresponding specifications of the 3GPP system. Random number R, the control data key CK and the integrity key IK form the set of encryption parameters K.
- This set of encryption parameters K is again sent from the subscriber server 3c to the contact server 3a via the session server 3b in a step S3.
- the control data key CK and the integrity key IK are thus now available to the contact server 3a for the encryption of control data that is exchanged with the subscriber device 1.
- the control data key CK becomes the actual encryption used with a symmetric encryption algorithm. Sent additional data troll with the con ⁇ , ver with the integrity key IK ⁇ encrypted sequences allow it to verify the integrity of the control data and to detect any tampering. According to 3GPP, both keys have a length of 128 bits.
- a step S4 the random number R of the set of encryption parameters K (unencrypted) is sent to the subscriber device 1.
- the keys CK and IK will not be transferred from Si ⁇ cherheitshuntn, but as described later generated by the subscriber device 1 itself.
- the contact server 3a determines the medium key MK from the control data key CK and the integrity key IK.
- the media ⁇ key MK, the two keys CK and IK are calculated via an exclusive OR operation (XOR). This is particularly useful in 3GPP because the two keys CK and IK have the same length.
- XOR exclusive OR operation
- Such a mapping is also referred to as a one-way hash function.
- Applicable one-way hash functions are ⁇ example as known as messenger digest (MD4, MD5) or Secure Hash Algorithm (SHA).
- One-way hash functions have the advantage that no conclusions about the underlying keys CK and IK are possible from a known media key MK. In principle, however, any other function from which a key sequence from one or both of the keys CK and IK can be calculated is also suitable for calculating the media key MK.
- the re ⁇ sultierende media key MK does not have to match in length with the keys used CK and IK. May continue over the keys CK and IK, additional Para ⁇ meter included in the determination of the media key MK.
- the prerequisite here is that both the participant device 1 and the contact server 3a have these parameters.
- the random number R or the identification data ID are examples of such parameters.
- the user equipment 1 After the user equipment 1 has received the random number transmitted in step S4, the user equipment determines the control data key CK and the integrity key IK from the random number R in response to the identification data ID in a step S6. This is the same manner as in the subscriber server 3c carried out so that identical keys IK and CK in the control server 3 and advises the dentalge ⁇ present. 1
- the number or character sequence used for security reasons to determine the keys instead of the identification data ID itself is usually stored in the subscriber device in the SIM card.
- step S5 the media key MK is now generated in the subscriber device 1 in a step S7 from the keys CK and IK.
- a second request is sent as a next stage of the Verbin ⁇ -making structure, for example, via the Session Initiation Protocol (SIP) to the contact server 3a with the in a step S8.
- SIP Session Initiation Protocol
- step S9 Zung server at the sit ⁇ 3b, which registers the Authentactusant ⁇ word of the subscriber device 1 checks and the session opened as a successful case of a positive result and a confirmation sequence sends back to the contact server 3a in a step S.
- HTTP Hypertext Transport Protocol
- a status message "200 OK" is also used as a positive acknowledgment in the SIP
- the acknowledgment sequence is forwarded to the subscriber device 1.
- the connection and session establishment is closed to ⁇ and the transmission of user data can be initiated.
- the determination of the media key MK in steps S5 and S7 both in the contact server 3a and in the subscriber device 1 is also concluded at this point.
- the user equipment 1 is a Anfra ⁇ ge for transmitting the requested media data to the contactless server 3a.
- Session Initiation Protocol SIP
- the "Invite" sequence is provided for such a request, with which media data MD can be retrieved from the media server 5, wherein the data may already be present on the media server 5, or may be call data, to be exchanged via the media server 5 with another user terminal.
- the SIP protocol is provided that the request an encryption context of the game, in ⁇ indicating to-use encryption algorithm may be sent.
- the encryption context environmentally not summarizes the media key MK, even if this would be possible in accordance with the SIP protocol, as the media key MK in ⁇ it is present inventive method to control server.
- a step S13 the "Invite" request, but without encryption context, ⁇ forwarded from the contact server 3a to Sit wetting server 3b.
- the session server 3b logs the request and determines whether the request is allowed, ie for example, whether the subscriber device 1 for access is entitled to the requested media data MD o- does not. If the request is admissible, the sit ⁇ the status message "200 OK" sends Zung server 3b in a step S16 as a positive acknowledgment to the contact server 3a.
- the session server 3b contacts after step S13 to ⁇ next in a step S14 a corresponding session server 3b *, which is responsible for the further subscriber device.
- the session server 3b receives from the counterpart a status message in response, which is subsequently forwarded in step S16.
- the contact server 3 a After the contact server 3 a has received feedback from the session server 3 b, it sends the received status message to the user equipment 1 in a step S 18.
- the contact server 3a transmits both the encryption context and the media key MK to the media server 5 in a step S18.
- further information indicating the media data MD to be transmitted is transmitted. Since this transfer takes place via the core network 4, which is generally not public, here, in principle, no further security measures for the protection of the media key MK are required. If desired an additional Siche ⁇ approximate measure or if the core network 4 but should be fully or partially be public, the transfer can also be encrypted of course.
- the media server 5 encrypts the media data MD with the media key MK in the requested encryption ⁇ context, that is, for example, using the given encryption algorithm.
- Media data CMD are sent to the user equipment 1 in a final step S19.
- the media network 6 Since the media network 6 is usually packet-switching, it makes sense not to first encrypt the media data MD as a whole and then to transmit it in packets, but to encrypt the individual packets in each case.
- received encrypted media data CMD can be decrypted because the subscriber device 1 (calculated at step S7) (by himself predetermined) encryption context and the required media key MK is ⁇ before.
- control data can serve, for example, to check the correct handling of the transmission or else concern further inquiries. This can lead to the negotiation of new keys CK and IK.
- a packet encrypted by the media server 5 with a subscriber device 1 not present media key MK ⁇ would be classified by the user equipment 1 as corrupt and either discarded (in call data) or requested again by the user equipment 1 from the control server 3a.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
- Compression, Expansion, Code Conversion, And Decoders (AREA)
- Devices For Executing Special Programs (AREA)
Abstract
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/297,993 US8284935B2 (en) | 2006-04-21 | 2007-03-21 | Method, devices and computer program product for encoding and decoding media data |
DE502007005955T DE502007005955D1 (de) | 2006-04-21 | 2007-03-21 | Verfahren, vorrichtungen und computerprogrammprodukt zum ver- und entschlüsseln von mediendaten |
CA2649402A CA2649402C (en) | 2006-04-21 | 2007-03-21 | Method, devices and computer program product for encoding and decoding media data |
AT07727160T ATE492087T1 (de) | 2006-04-21 | 2007-03-21 | Verfahren, vorrichtungen und computerprogrammprodukt zum ver- und entschlüsseln von mediendaten |
KR1020087028558A KR101369793B1 (ko) | 2006-04-21 | 2007-03-21 | 미디어 데이터를 인코딩 및 디코딩하기 위한 방법, 장치들 및 컴퓨터 프로그램 제품 |
JP2009505816A JP4838881B2 (ja) | 2006-04-21 | 2007-03-21 | メディアデータを符号化および復号化するための方法、装置ならびにコンピュータプログラム製品 |
EP07727160A EP2014010B1 (de) | 2006-04-21 | 2007-03-21 | Verfahren, vorrichtungen und computerprogrammprodukt zum ver- und entschlüsseln von mediendaten |
CN2007800142566A CN101449510B (zh) | 2006-04-21 | 2007-03-21 | 加密和解密媒体数据的方法、装置 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102006018645.1 | 2006-04-21 | ||
DE102006018645A DE102006018645B4 (de) | 2006-04-21 | 2006-04-21 | Verfahren, Vorrichtungen und Computerprogrammprodukt zum Ver- und Entschlüsseln von Mediendaten |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007122046A1 true WO2007122046A1 (de) | 2007-11-01 |
Family
ID=38110716
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP2007/052683 WO2007122046A1 (de) | 2006-04-21 | 2007-03-21 | Verfahren, vorrichtungen und computerprogrammprodukt zum ver- und entschlüsseln von mediendaten |
Country Status (10)
Country | Link |
---|---|
US (1) | US8284935B2 (de) |
EP (1) | EP2014010B1 (de) |
JP (1) | JP4838881B2 (de) |
KR (1) | KR101369793B1 (de) |
CN (1) | CN101449510B (de) |
AT (1) | ATE492087T1 (de) |
CA (1) | CA2649402C (de) |
DE (2) | DE102006018645B4 (de) |
ES (1) | ES2358055T3 (de) |
WO (1) | WO2007122046A1 (de) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090036335A (ko) * | 2007-10-09 | 2009-04-14 | 삼성전자주식회사 | 휴대 방송 시스템에서 효율적인 키 제공 방법 및 그에 따른시스템 |
US8196214B2 (en) | 2007-12-14 | 2012-06-05 | Apple Inc. | Method and apparatus for securing content using encryption with embedded key in content |
US8903791B2 (en) * | 2010-04-23 | 2014-12-02 | Ntt Docomo, Inc. | Statistical information generation system and statistical information generation method |
CN102523087B (zh) * | 2011-12-14 | 2015-02-11 | 百度在线网络技术(北京)有限公司 | 一种用于对自执行网络信息进行加密处理的方法及设备 |
CN105072113B (zh) * | 2015-08-10 | 2018-07-24 | 南京邮电大学 | 一种基于数据包动态加密的无线传感器网络安全保护方法 |
CN107426521A (zh) * | 2016-05-24 | 2017-12-01 | 中兴通讯股份有限公司 | 一种视频通话方法及终端 |
WO2018231109A1 (en) * | 2017-06-16 | 2018-12-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Media protection within the core network of an ims network |
CN107276754B (zh) * | 2017-07-10 | 2020-05-05 | 北京云知科技有限公司 | 一种基于区块链大量生成私钥的方法及装置 |
CN110266498B (zh) * | 2019-06-28 | 2022-04-08 | 恒宝股份有限公司 | 一种不停车汽车安全支付系统及方法 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030039361A1 (en) * | 2001-08-20 | 2003-02-27 | Hawkes Philip Michael | Method and apparatus for security in a data processing system |
US20030088769A1 (en) * | 2001-11-05 | 2003-05-08 | Quick Roy Franklin | Method and apparatus for message integrity in a CDMA communication system |
US20050232429A1 (en) * | 2004-04-14 | 2005-10-20 | Kuntal Chowdhury | Securing home agent to mobile node communication with HA-MN key |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07295800A (ja) | 1994-04-22 | 1995-11-10 | Advance Co Ltd | ソフトウエアプロテクト方式 |
JP4206529B2 (ja) * | 1998-09-17 | 2009-01-14 | ソニー株式会社 | コンテンツ管理方法及びコンテンツ記憶システム |
KR100484209B1 (ko) * | 1998-09-24 | 2005-09-30 | 삼성전자주식회사 | 디지털컨텐트암호화/해독화장치및그방법 |
FI114953B (fi) * | 2001-09-28 | 2005-01-31 | Nokia Corp | Menetelmä käyttäjän tunnistamiseksi päätelaitteessa, tunnistusjärjestelmä, päätelaite ja käyttöoikeuksien varmistuslaite |
JP3965126B2 (ja) * | 2002-03-20 | 2007-08-29 | 松下電器産業株式会社 | コンテンツを再生する再生装置 |
DE10307403B4 (de) * | 2003-02-20 | 2008-01-24 | Siemens Ag | Verfahren zum Bilden und Verteilen kryptographischer Schlüssel in einem Mobilfunksystem und Mobilfunksystem |
US7426637B2 (en) * | 2003-05-21 | 2008-09-16 | Music Public Broadcasting, Inc. | Method and system for controlled media sharing in a network |
ES2384634T7 (es) * | 2003-09-26 | 2018-10-11 | Telefonaktiebolaget Lm Ericsson (Publ) | Diseño de seguridad mejorado para criptografía en sistemas de comunicaciones de móviles |
JP4028853B2 (ja) * | 2004-03-30 | 2007-12-26 | 株式会社日立製作所 | 情報サービス通信ネットワークシステムおよびセッション管理サーバ |
JP4748774B2 (ja) * | 2004-06-02 | 2011-08-17 | キヤノン株式会社 | 暗号化通信方式及びシステム |
US20060143132A1 (en) * | 2004-11-30 | 2006-06-29 | Valenti William L | Method and apparatus to enable a market in used digital content |
JP4537882B2 (ja) * | 2005-04-18 | 2010-09-08 | 株式会社東芝 | 情報端末装置 |
WO2007010779A1 (ja) * | 2005-07-15 | 2007-01-25 | Matsushita Electric Industrial Co., Ltd. | パケット送信装置 |
CN101243686A (zh) * | 2005-08-08 | 2008-08-13 | 松下电器产业株式会社 | 加密内容及提供解密密钥的系统 |
JP2007060066A (ja) * | 2005-08-23 | 2007-03-08 | Toshiba Corp | コンテンツデータ配信方法、並びにコンテンツデータ配信システム及びこれに用いられる携帯端末。 |
-
2006
- 2006-04-21 DE DE102006018645A patent/DE102006018645B4/de not_active Withdrawn - After Issue
-
2007
- 2007-03-21 US US12/297,993 patent/US8284935B2/en not_active Expired - Fee Related
- 2007-03-21 EP EP07727160A patent/EP2014010B1/de not_active Not-in-force
- 2007-03-21 ES ES07727160T patent/ES2358055T3/es active Active
- 2007-03-21 WO PCT/EP2007/052683 patent/WO2007122046A1/de active Application Filing
- 2007-03-21 AT AT07727160T patent/ATE492087T1/de active
- 2007-03-21 DE DE502007005955T patent/DE502007005955D1/de active Active
- 2007-03-21 KR KR1020087028558A patent/KR101369793B1/ko active IP Right Grant
- 2007-03-21 JP JP2009505816A patent/JP4838881B2/ja not_active Expired - Fee Related
- 2007-03-21 CA CA2649402A patent/CA2649402C/en not_active Expired - Fee Related
- 2007-03-21 CN CN2007800142566A patent/CN101449510B/zh not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030039361A1 (en) * | 2001-08-20 | 2003-02-27 | Hawkes Philip Michael | Method and apparatus for security in a data processing system |
US20030088769A1 (en) * | 2001-11-05 | 2003-05-08 | Quick Roy Franklin | Method and apparatus for message integrity in a CDMA communication system |
US20050232429A1 (en) * | 2004-04-14 | 2005-10-20 | Kuntal Chowdhury | Securing home agent to mobile node communication with HA-MN key |
Non-Patent Citations (1)
Title |
---|
"Digital cellular telecommunications system (Phase 2+)", December 2005, ETSI STANDARDS, EUROPEAN TELECOMMUNICATIONS STANDARDS INSTITUTE, SOPHIA-ANTIPO, FR, ISSN: 0000-0001, XP014032881 * |
Also Published As
Publication number | Publication date |
---|---|
DE102006018645B4 (de) | 2008-07-24 |
CN101449510A (zh) | 2009-06-03 |
CA2649402A1 (en) | 2007-11-01 |
EP2014010A1 (de) | 2009-01-14 |
JP2009534883A (ja) | 2009-09-24 |
ES2358055T3 (es) | 2011-05-05 |
KR20090006210A (ko) | 2009-01-14 |
US20090319770A1 (en) | 2009-12-24 |
JP4838881B2 (ja) | 2011-12-14 |
CA2649402C (en) | 2012-12-11 |
DE502007005955D1 (de) | 2011-01-27 |
CN101449510B (zh) | 2012-01-11 |
ATE492087T1 (de) | 2011-01-15 |
KR101369793B1 (ko) | 2014-03-06 |
DE102006018645A1 (de) | 2007-10-25 |
EP2014010B1 (de) | 2010-12-15 |
US8284935B2 (en) | 2012-10-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2014010B1 (de) | Verfahren, vorrichtungen und computerprogrammprodukt zum ver- und entschlüsseln von mediendaten | |
DE10307403B4 (de) | Verfahren zum Bilden und Verteilen kryptographischer Schlüssel in einem Mobilfunksystem und Mobilfunksystem | |
EP1982494B1 (de) | Verfahren, vorrichtung und computerprogrammprodukt zum verschlüsselten übertragen von mediendaten zwischen dem medienserver und dem teilnehmergerät | |
US6895439B2 (en) | Authentication and protection for IP application protocols based on 3GPP IMS procedures | |
DE102009041805A1 (de) | SIP-Signalisierung ohne ständige Neu-Authentifizierung | |
WO2009086845A1 (de) | Verfahren zum authentisieren einer schlüsselinformation zwischen endpunkten einer kommunikationsbeziehung | |
EP1289227A2 (de) | Verfahren, System und Rechner zum Aushandeln einer Sicherheitsbeziehung auf der Anwendungsschicht | |
DE102006046017B4 (de) | Verfahren zum Bereitstellen eines symmetrischen Schlüssels zum Sichern eines Schlüssel-Management-Protokolls | |
EP1982495A1 (de) | Verfahren zum sichern der authentizität von nachrichten, die gemäss einem mobile internet protokoll ausgetauscht werden | |
EP3799379B1 (de) | Verfahren und ip-basiertes kommunikationssystem zum wechseln von verbindungs-steuerungsinstanzen ohne neuregistrierung von endteilnehmern | |
EP3759958B1 (de) | Verfahren, vorrichtung und computerprogrammprodukt zur überwachung einer verschlüsselten verbindung in einem netzwerk | |
EP1597861B1 (de) | Verfahren zur übertragung von daten in einem wlan-netz | |
EP1468520B1 (de) | Verfahren zur datenverkehrssicherung in einer mobilen netzumgebung | |
WO2007113073A1 (de) | Verfahren zum wiederherstellen einer mit ipsec kryptographisch gesicherten verbindung zwischen p-cscf und anwendereinheit | |
EP2186285B1 (de) | Verfahren und einrichtung zur authentisierung übertragener nutzdaten | |
EP1560393B1 (de) | Vorrichtungen und Verfahren zum Überprüfen einer Anfrage-Nachricht auf Authentizität und Autorisierung | |
DE102006047650A1 (de) | Kryptographische Berechnungen für VoIP-Verbindung | |
EP2101468B1 (de) | Einbeziehung von Signalisierungsinformationen in ein Schlüsselmanagementprotokoll für den sicheren Medientransport | |
DE102006047648A1 (de) | Initialisierung einer VoIP-Verbindung | |
DE10356091A1 (de) | Verfahren zur Sicherung des Datenverkehrs zwischen einem Mobilfunknetz und einem IMS-Netz | |
DE10102368A1 (de) | Verfahren, Zentrale Instanz, Programm und Anordnung zur gesicherten Informationsübermittlung in einem Kommunikationsnetz |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200780014256.6 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07727160 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007727160 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2649402 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009505816 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020087028558 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12297993 Country of ref document: US |