CN108712410A - P-CSCF servers, conversational system and the method that secret key can match - Google Patents
P-CSCF servers, conversational system and the method that secret key can match Download PDFInfo
- Publication number
- CN108712410A CN108712410A CN201810447343.0A CN201810447343A CN108712410A CN 108712410 A CN108712410 A CN 108712410A CN 201810447343 A CN201810447343 A CN 201810447343A CN 108712410 A CN108712410 A CN 108712410A
- Authority
- CN
- China
- Prior art keywords
- secret key
- user
- servers
- cscf
- match
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/10—Architectures or entities
- H04L65/1016—IP multimedia subsystem [IMS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/1066—Session management
- H04L65/1073—Registration or de-registration
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses P-CSCF servers, conversational system and methods that secret key can match, belong to IMS network field, technical problems to be solved are how to ensure that the safety of data storage and the flexible of secret key are matched simultaneously, upper in P-CSCF servers to be configured with user data module, TPM modules, secret key configuration module and data-interface, TPM modules are connect with data memory module and secret key configuration module respectively.The conversational system that secret key can match, including user terminal and IMS network, IMS network include HSS servers and the P-CSCF servers that secret key can match.Session method is in executing user's registration flow, after P-CSCF servers receive registration user data, registers user data by secret key pair and is encrypted;In executing user's call flow, P-CSCF servers obtain secret key, and the decryption interface of the IMPU of user is called according to secret key, to registration user data decryption.
Description
Technical field
The present invention relates to IMS network field, P-CSCF servers, conversational system and the side that specifically secret key can match
Method.
Background technology
IMS(Full name in English is IP Multimedia Subsystem, and translator of Chinese is IP multimedia subsystem)It is a kind of
Completely new multimedia service form, it disclosure satisfy that the demand of more novel, the more diversified multimedia service of present terminal client.
In the ims network, P-CSCF is access side core network element, and with after user initiates to register, P-CSCF is according to IMPU
UDR message requests are sent to HSS and download user data, and user data is stored to local, when a user initiates a call, directly
It reads the user data being locally stored and carries out call business processing, data storage cannot get safeguard protection, be easy to be tampered.
Wherein, CSCF(Full name in English is Call Session Control Function, and translator of Chinese is call session
Control function)It is IP multimedia subsystem(IMS:IP Multimedia Subsystem)Internal functional entity, is entire
The core of IMS network.The signaling control being mainly responsible for during processing multimedia call session.It manages the user of IMS network
Authentication, the control of IMS loading ends QoS and the cooperation progress SIP sessions of other network entities and service negotiation and resource allocation
Deng.CSCF is divided into proxy CSCF according to function(P-CSCF:Proxy CSCF ), inquire CSCF(I-CSCF:Interrogating
CSCF), serving CSCF(S-CSCF:Serving CSCF), urgent CSCF(E-CSCF: Emergency CSCF), substantially it
Be all sip server, handle SIP signalings.P-CSCF is the unified entrance of IMS visited network.It is all to originate from IMS terminal
It will pass through P-CSCF with the conversation message for terminating at IMS terminal.P-CSCF is responsible for and access net as a SIP Proxy
The relevant subscription authentication of network is managed with IPSec, network anti-attack and safeguard protection, and SIP letters are carried out to save wireless network resource
Compression and decompression, the Roaming control of user is enabled to pass through PDF(Policy Decision Function)Carry out the NAT of loading end
With the functions such as QoS etc..Major function includes:The SIP registration that forwarding UE is sent is asked to I-CSCF, and the domain name provided by UE determines
I-CSCF;The sip message that forwarding UE is sent determines S-CSCF to S-CSCF, by P-CSCF when UE initiates register flow path.S-
CSCF in IMS network session control be in core status, it receive from visited network by P-CSCF forwardings come registration
Request coordinates with HSS and carries out subscription authentication.And the business datum of user's signing is downloaded from HSS.
The safety and the flexible of secret key for how ensureing data storage simultaneously are matched, and are the technical issues that need to address.
Invention content
The technical assignment of the present invention is to provide MMTel application servers based on Heterogeneous Computing, session for above insufficient
System and method, come solve the problems, such as how and meanwhile ensure data storage safety and secret key it is flexible with.
The technical assignment of the present invention is realized in the following manner:
The P-CSCF servers that secret key can match, it is upper in P-CSCF servers to match configured with user data module, TPM modules, secret key
Module and data-interface are set, TPM modules are connect with data memory module and secret key configuration module respectively, user data module and number
It is connected according to interface, user data module can store registration user data, and TPM modules can dynamically generate secret key, secret key configuration
Module can set the value range of secret key handle, and registration user data can be encrypted in above-mentioned secret key.
The P-CSCF servers can receive the Registe message for carrying out user terminal, and obtains registration from HSS servers and use
User data, and the secret key pair registration user data that the value range of the secret key handle based on setting and dynamic generate is added
It is close, and encrypted registration user data can be decrypted according to the call request for carrying out user terminal.
Further, TPM(Full name in English is Trusted Platform Module, and translator of Chinese is reliable platform mould
Block)Module is mainly made of TPM chips and corresponding trusted software protocol stack TSS.
Further, the data-interface includes SH interfaces.
Carried out data transmission by SH interfaces and HSS servers.
The conversational system that secret key can match, including user terminal and IMS network, IMS network include HSS servers and P-
CSCF servers, P-CSCF servers are the P-CSCF servers that can match of secret key as described in any one of the above embodiments, user terminal with
P-CSCF servers connect, and P-CSCF servers are connect by data-interface with HSS servers, above-mentioned user terminal, P-CSCF
Server and the cooperation of HSS servers can complete the encryption and decryption of registration user data.
The conversational system can be produced in user's registration flow by the value range and dynamic of the secret key handle of setting
The registration user data that raw secret key pair obtains is encrypted, and can be after user initiates call request, to encrypted registration
User data is decrypted.
The session method that secret key can match, the conversational system for selecting above-mentioned secret key that can match, in executing user's registration flow, P-
After CSCF servers receive registration user data, cipher key configuration module and the cooperation of TPM modules generate secret key, and are noted by secret key pair
Volume user data is encrypted;In executing user's call flow, P-CSCF servers are according to the IMPU's for carrying user
Invite message obtains secret key, and the decryption interface of the IMPU of user is called according to secret key, to registration user data decryption.
Further, user's registration flow is executed, is included the following steps:
After S1, user terminal initiate Registe message to IMS network, P-CSCF servers carry useful to the transmission of HSS servers
The UDR/PUR request messages of the IMPU at family;
S2, HSS server return to UDA/PUA response messages to P-CSCF servers, and P-CSCF servers obtain registration number of users
According to;
S3, P-CSCF server set the value range of secret key handle by secret key configuration module, are generated by TPM module dynamics
Secret key, the secret key pair that value range and dynamic based on secret key handle generate register ciphering user data, realize P-CSCF clothes
User's registration flow on business device.
Further, in step S1, user terminal initiates registration request, P/S-CSCF servers to IMS network server
After receiving Registe message, UDR/PUR request messages are locally being constructed, and UDR/PUR request messages are passed by SH interfaces
Enter HSS servers;The Registe message carries the registion time of user, and the UDR/PUR request messages carry user
IMPU.
Further, in step S2, HSS servers will register user by UDA/PUA response messages entirety or segmentation
Data are sent in P-CSCF servers, and after P-CSCF servers receive UDA/PUA response messages, Registe message is taken
The registion time of the user of band is updated to local.
Further, in step S3, include the following steps:
The value range of secret key handle is set according to the IMPU of user;
Encryption Algorithm is pre-selected, by calling TPM command interface to create and loading secret key;
The handle and public key and private key that secret key is obtained and loaded in the value range of the secret key handle of setting, to registering number of users
200 OK response messages are replied according to being encrypted, and to user terminal.
P-CSCF servers, conversational system and the method that the secret key of the present invention can match have the following advantages:By in P-
TPM modules are configured on CSCF servers, and reliable running environment is provided to access side network session in IMS domain;In P-CSCF
Secret key configuration module sets the value range of secret key handle according to user information, ensures that secret key handle generates flexible with property;
The secret key pair registration user data generated using TPM dynamics is encrypted, and ensure that registration user data is stored in local peace
Quan Xing improves the reliability of entire P-CSCF Proxy Call Session Control Function server.
Description of the drawings
The following further describes the present invention with reference to the drawings.
Attached drawing 1 is the structure diagram for the P-CSCF servers that 1 secret key of embodiment can match;
Attached drawing 2 is the structure diagram that 2 secret key of embodiment can match conversational system;
Attached drawing 3 is the operation principle block diagram that 3 secret key of embodiment can match session method.
Specific implementation mode
The secret key of the present invention can be matched with reference to Figure of description and specific embodiment P-CSCF servers, conversational system and
Method is done explained in detail below.
Embodiment 1:
As shown in Fig. 1, the P-CSCF servers that secret key of the invention can match, it is upper in P-CSCF servers to be configured with user data
Module, TPM modules, secret key configuration module and data-interface, TPM modules connect with data memory module and secret key configuration module respectively
It connects, data interface module includes SH interfaces, and user data module is connect with SH interfaces, and user data module can store registration user
Data, TPM modules can dynamically generate secret key, and secret key configuration module can set the value range of secret key handle.In secret key handle
Under the cooperation for the secret key that value range and dynamic generate, registration user data can be encrypted, and can be asked according to user,
Encrypted registration user data is decrypted.
The P-CSCF servers can receive the Registe message and Invite message of user terminal initiation, P-CSCF
After server receives Registe message, in locally construction UDR/PUR request messages and UDR/PUR request messages can be sent out
It send to HSS servers, and the registration user data from HSS servers can be received.The P-CSCF servers pass through number of users
Above-mentioned registration user data is stored according to module, which sets the value model of secret key handle by private key configuration module
It encloses, which generates secret key by TPM module dynamics, can obtain and add in the value range of the secret key handle of setting
The handle and public key and private key information of load secret key, are encrypted user data.
The P-CSCF servers that the secret key of the present invention can match can be applied in IMS network, and user terminal is initiated to IMS network
When registration request, the registration user data downloaded in HSS servers is storable in the P-CSCF servers, and is produced by dynamic
Raw secret key pair is encrypted with registration user data;
User terminal receives to the P-CSCF servers that when IMS network initiation call request, which can match and carries user
IMPU Invite message after, according to the IMPU of user, obtain the secret key of user, according to secret key call user IPMU solution
Touch mouth, completes the decryption of user data.
Embodiment 2:
The conversational system that the secret key of the present invention can match, including user terminal and IMS network, IMS network include P/S-CSCF modules
With HSS servers, HSS servers and P-CSCF servers, P-CSCF servers are the P- that secret key can match disclosed in embodiment 1
CSCF servers, user terminal are connect with P-CSCF servers, and P-CSCF servers are connected by data-interface and HSS servers
It connects, above-mentioned user terminal, P-CSCF servers and the cooperation of HSS servers can complete the encryption and decryption of registration user data.
Wherein, in user's registration, user terminal initiates registration request, and P-CSCF servers can be received from user
The Registe message of terminal constructs local UDR/UDA message and UDR/UDA message is sent to HSS servers, and can
The registration user data from HSS servers is received, and registration user data is stored by user data module, is matched by secret key
The value range for setting module setting secret key handle generates secret key, in the value model of the secret key handle of setting by TPM module dynamics
The interior handle for obtaining and loading secret key and public key and private key are enclosed, registration user data is encrypted.
In user calls, user terminal initiates call request, and P-CSCF modules, which can receive, carrys out user terminal
Invite message, P-CSCF servers obtain secret key, are called according to secret key according to the Invite message for the IMPU for carrying user
The decryption interface of the IMPU of user, to registration user data decryption.
The conversational system that the secret key of the present invention can match can realize the registration and calling of user, in user's registration, to user
Storage is encrypted in data, is decrypted to encrypted user data when user calls.
Embodiment 3:
The session method that the secret key of the present invention can match selects the conversational system that secret key can match disclosed in embodiment 2, is executing user
In register flow path, after P-CSCF servers receive registration user data, cipher key configuration module and the cooperation of TPM modules generate secret key,
And user data is registered by secret key pair and is encrypted;In executing user's call flow, P-CSCF servers are according to carrying
The Invite message of the IMPU of user obtains secret key, and the decryption interface of the IMPU of user is called according to secret key, to registering number of users
According to decryption.
Wherein, user's registration flow includes the following steps:
(1), P-CSCF module of the user terminal into IMS network send Registe message, Registe message carries user
Registion time;
(2), P-CSCF servers locally construct UDR request messages, and by SH interfaces by UDR request messages be passed to HSS clothes
Business device, UDR request messages carry the IMPU of user;
(4), HSS servers it is whole or registration user data is sent to P-CSCF servers by segmentation by UDA response messages
In;
(5), after P-CSCF servers receive UDA response messages, the registion time for the user that Registe message is carried updates
To local;
(6), P-CSCF servers according to the IMPU of user set secret key handle value range, Encryption Algorithm is pre-selected, and
By calling TPM command interface to create and load secret key, is obtained in the value range of the secret key handle of setting and load secret key
Handle and public key and private key, registration user data is encrypted, and 200 OK response messages are replied to user terminal.
User's call flow includes:
(1), P-CSCF server of the user terminal into IMS network send Invite message, Invite message carries user
IMPU;
(2), P-CSCF servers according to the IMPU of user, obtain secret key, the decryption interface of the IPMU of user called according to secret key,
Complete the decryption of user data.
In the present embodiment, in user's registration flow, step(2)In, P-CSCF servers disappear in locally construction UDR requests
Breath, corresponding, step(3)User data is sent to calling control by middle HSS servers by UDA response messages entirety or segmentation
In control server.In practical applications, step(3)In, P-CSCF servers are locally constructing PUR request messages, corresponding, step
Suddenly(3)User data is sent in call control server by middle HSS servers by PUA response messages entirety or segmentation.
The technical personnel in the technical field can readily realize the present invention with the above specific embodiments,.But it answers
Work as understanding, the present invention is not limited to specific implementation modes disclosed above.On the basis of the disclosed embodiments, the technology
The technical staff in field can arbitrarily combine different technical features, to realize different technical solutions.Described in specification
It is the known technology of those skilled in the art outside technical characteristic.
Claims (9)
1. the P-CSCF servers that secret key can match, it is characterised in that upper configured with user data module, TPM in P-CSCF servers
Module, secret key configuration module and data-interface, TPM modules are connect with data memory module and secret key configuration module respectively, user
Data module is connect with data-interface, and user data module can store registration user data, and TPM modules can dynamically generate secret
Key, secret key configuration module can set the value range of secret key handle.
2. the P-CSCF servers that key according to claim 1 can match, it is characterised in that TPM modules are mainly by TPM cores
Piece and corresponding trusted software protocol stack TSS compositions.
3. the P-CSCF servers that secret key according to claim 1 or claim 2 can match, it is characterised in that the data-interface includes SH
Interface.
4. the conversational system that secret key can match, including user terminal and IMS network, IMS network includes HSS servers and P-CSCF clothes
Business device, it is characterised in that P-CSCF servers are the P-CSCF servers that secret key as described in any one of claims 1-3 can match,
User terminal is connect with P-CSCF servers, and P-CSCF servers are connect by data-interface with HSS servers, and above-mentioned user is whole
End, P-CSCF servers and the cooperation of HSS servers can complete the encryption and decryption of registration user data.
5. the session method that secret key can match, it is characterised in that the conversational system for selecting secret key as claimed in claim 4 that can match,
It executes in user's registration flow, after P-CSCF servers receive registration user data, cipher key configuration module and the cooperation production of TPM modules
Raw secret key, and user data is registered by secret key pair and is encrypted;In executing user's call flow, P-CSCF servers according to
The INVITE message of the IMPU of user is carried, secret key is obtained, the decryption interface of the IMPU of user is called according to secret key, to registration
User data is decrypted.
6. the session method that secret key according to claim 5 can match, it is characterised in that execute user's registration flow, including such as
Lower step:
After S1, user terminal initiate Registe message to IMS network, P-CSCF servers carry useful to the transmission of HSS servers
The UDR/PUR request messages of the IMPU at family;
S2, HSS server return to UDA/PUA response messages to P-CSCF servers, and P-CSCF servers obtain registration number of users
According to;
S3, P-CSCF server set the value range of secret key handle by secret key configuration module, are generated by TPM module dynamics
Secret key, the secret key pair that value range and dynamic based on secret key handle generate register ciphering user data, realize P-CSCF clothes
User's registration flow on business device.
7. the session method that secret key according to claim 6 can match, it is characterised in that in step S1, user terminal is to IMS
Network server initiates registration request, after P/S-CSCF servers receive Registe message, is asked in locally construction UDR/PUR
Message is sought, and UDR/PUR request messages are passed to by HSS servers by SH interfaces;The Registe message carries user's
Registion time, the UDR/PUR request messages carry the IMPU of user.
8. the session method that secret key according to claim 7 can match, it is characterised in that in step S2, HSS servers pass through
UDA/PUA response messages are whole or registration user data is sent in P-CSCF servers by segmentation, and P-CSCF servers connect
After receiving UDA/PUA response messages, the registion time for the user that Registe message carries is updated to local.
9. the session method that secret key according to claim 6 can match, it is characterised in that in step S3, include the following steps:
The value range of secret key handle is set according to the IMPU of user;
Encryption Algorithm is pre-selected, by calling TPM command interface to create and loading secret key;
The handle and public key and private key that secret key is obtained and loaded in the value range of the secret key handle of setting, to registering number of users
200 OK response messages are replied according to being encrypted, and to user terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810447343.0A CN108712410A (en) | 2018-05-11 | 2018-05-11 | P-CSCF servers, conversational system and the method that secret key can match |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810447343.0A CN108712410A (en) | 2018-05-11 | 2018-05-11 | P-CSCF servers, conversational system and the method that secret key can match |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108712410A true CN108712410A (en) | 2018-10-26 |
Family
ID=63867988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810447343.0A Pending CN108712410A (en) | 2018-05-11 | 2018-05-11 | P-CSCF servers, conversational system and the method that secret key can match |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108712410A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1722689A (en) * | 2005-06-21 | 2006-01-18 | 中兴通讯股份有限公司 | A protection method for access security of IP multimedia subsystem |
CN104486352A (en) * | 2014-12-24 | 2015-04-01 | 大唐移动通信设备有限公司 | Security algorithm sending method, security authorization method and security authorization device |
CN105827661A (en) * | 2016-05-31 | 2016-08-03 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for secure communication |
US20170118026A1 (en) * | 2014-05-28 | 2017-04-27 | Datang Mobile Communications Equipment Co., Ltd. | Encrypted communication method and apparatus |
CN107124417A (en) * | 2017-05-03 | 2017-09-01 | 济南浪潮高新科技投资发展有限公司 | MMTel application servers, conversational system and method based on Heterogeneous Computing |
CN206461658U (en) * | 2017-02-21 | 2017-09-01 | 济南浪潮高新科技投资发展有限公司 | A kind of MMtel application servers that can be matched somebody with somebody based on TPM keys |
CN107172099A (en) * | 2017-07-12 | 2017-09-15 | 济南浪潮高新科技投资发展有限公司 | Key can configure system and method in a kind of MMtel application servers |
-
2018
- 2018-05-11 CN CN201810447343.0A patent/CN108712410A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1722689A (en) * | 2005-06-21 | 2006-01-18 | 中兴通讯股份有限公司 | A protection method for access security of IP multimedia subsystem |
US20170118026A1 (en) * | 2014-05-28 | 2017-04-27 | Datang Mobile Communications Equipment Co., Ltd. | Encrypted communication method and apparatus |
CN104486352A (en) * | 2014-12-24 | 2015-04-01 | 大唐移动通信设备有限公司 | Security algorithm sending method, security authorization method and security authorization device |
CN105827661A (en) * | 2016-05-31 | 2016-08-03 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for secure communication |
CN206461658U (en) * | 2017-02-21 | 2017-09-01 | 济南浪潮高新科技投资发展有限公司 | A kind of MMtel application servers that can be matched somebody with somebody based on TPM keys |
CN107124417A (en) * | 2017-05-03 | 2017-09-01 | 济南浪潮高新科技投资发展有限公司 | MMTel application servers, conversational system and method based on Heterogeneous Computing |
CN107172099A (en) * | 2017-07-12 | 2017-09-15 | 济南浪潮高新科技投资发展有限公司 | Key can configure system and method in a kind of MMtel application servers |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2521304B1 (en) | Authentication method, system and apparatus | |
CN101091374B (en) | IP multimedia subsystem access method and apparatus | |
CN106233704B (en) | Method and apparatus by Relay mode network address translation hole punching voucher are provided | |
EP2291971B1 (en) | Method and apparatus for machine-to-machine communication | |
US8613058B2 (en) | Systems, methods and computer program products for providing additional authentication beyond user equipment authentication in an IMS network | |
CN101635823B (en) | Method and system of terminal for encrypting videoconference data | |
WO2015180654A1 (en) | Method and apparatus for achieving secret communications | |
CN107124417B (en) | MMTel application server, session system and method based on heterogeneous computing | |
WO2007009343A1 (en) | Access authorization system of communication network and method thereof | |
CN107172099B (en) | Secret key configurable system and method in MMtel application server | |
CN106790055B (en) | Registration method and device of IMS (IP multimedia subsystem) | |
EP3682609B1 (en) | Signal plane protection within a communications network | |
CN108712410A (en) | P-CSCF servers, conversational system and the method that secret key can match | |
US8683034B2 (en) | Systems, methods and computer program products for coordinated session termination in an IMS network | |
Deebak et al. | How to exploit 5G networks for IoT e-health security and privacy challenges | |
WO2017008513A1 (en) | Method and system for registering ims network | |
WO2023051679A1 (en) | Call processing method, and related device and storage medium | |
WO2022147693A1 (en) | Call processing method, related device and communication system | |
CN109120572A (en) | SIP signaling decryption method, device, system and computer readable storage medium | |
Radier et al. | A vehicle gateway to manage IP multimedia subsystem autonomous mobility | |
CN112953718A (en) | Authentication method and device for IMS network user and call session control function entity | |
CN108632260A (en) | Home signature user server based on Heterogeneous Computing and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181026 |
|
RJ01 | Rejection of invention patent application after publication |