Patent application number | Description | Published |
20110123064 | Method for monitoring a picture or multimedia video pictures in a communication system - A method for monitoring a picture or multimedia video pictures in a communication system is provided. The method includes following steps: a monitoring node extracts a picture or multimedia video pictures from communication data; a preprocessing system divides the picture or multimedia video pictures into multiple parts, and executes hash calculation respectively to obtain hash value of each part; the preprocessing system processes multiple hash values to construct a single ID; a primary monitoring system searches a template base for the ID, the template base includes multiple items, and each item includes an ID and hash values of which the ID in the item is composed; if the ID is not found, the primary monitoring system searches the template base for each hash value respectively; and the primary monitoring system informs the search result to the preprocessing system and the monitoring node. The present invention improves the efficiency of monitoring a picture or multimedia video pictures in communications. | 05-26-2011 |
20120002816 | Method and system for realizing secure forking call session in IP multimedia subsystem - The present invention relates to a method for realizing a secure forking call session, which comprises: performing authentication between a calling party and a KMS or between each called party and the KMS, and acquiring a shared key between the calling party and the KMS or a shared key between each called party and the KMS; generating a random number by the calling party and calling each called party through an IMS; generating a random number by each called party and acquiring a media root key from the KMS; generating a media key, which is shared with the calling party, by each called party according to the media root key and the random number generated by the called party; sending the media root key and the generated random number by a called response party in the called parties, who responds the call, to the calling party through the IMS network; generating a media key identical to that of the called response party by the calling party according to the media root key and the random number generated by the called response party; and performing a secure media session between the calling party and the called response party with the identical media key. | 01-05-2012 |
20120011368 | METHOD AND SYSTEM FOR TRANSMITTING DELAY MEDIA INFORMATION IN IP MULTIMEDIA SUBSYSTEM - The present invention provides a method and a system for transmitting delay media information in an IP multimedia subsystem, the system includes: a sending party of media information, a receiving party of the media information, a KMS and a mailbox server of the receiving party of the media information. The method and system of the present invention establishes an end-to-end security association between the sending party and the receiving party of the media information to encrypt the media information between them, without any need for the KMS to store the media key; at the same time, the security association is also established between the sending party and the mailbox server of the receiving party, and between the mailbox server of the receiving party and the receiving party, to perform an integrity protection and a mutual authentication between them, thus the security transmission of the IMS delay media information can be realized. | 01-12-2012 |
20120207297 | Method, System and Apparatus for Implementing Secure Call Forwarding - A method, system and apparatus for implementing secure call forwarding are provided in the present invention. The method includes: a calling party calling a called party, the called party triggering the subscribed call forwarding service; a key management server (KMS) obtaining information of a legal call-forwarded party of the called party through an application server; the call-forwarded party obtaining a media key from the KMS; and the calling party establishing a call connection with the call-forwarded party. | 08-16-2012 |
20120265982 | METHOD, AUTHENTICATION SERVER, TERMINAL AND SYSTEM FOR IMPLEMENTING KEY MAPPING - The disclosure discloses a method for implementing key mapping applied to a Next Generation Network (NGN), which mainly includes: when a handoff of a terminal from an original network to a destination network is performed, an authentication server receiving a key material mapping request from the terminal, mapping an original key material in the original network to obtain a destination key material in the destination network, and setting up communication security between the terminal and the destination network. In addition, the disclosure further discloses an authentication server, a terminal and a system for implementing key mapping. By applying the solution of the disclosure, when the handoff of the terminal between different NGNs is performed, it is possible to improve the efficiency of session key generation and to reduce the time delay of the handoff of the terminal between the networks, and it is advantageous to reduce authentication signaling interaction and the load of the authentication server. | 10-18-2012 |
20120272054 | Method and system for protecting security of the third layer mobility user plane data in NGN - The disclosure discloses a method for protecting security of layer-3 mobility user plane data in Next Generation Network (NGN), includes: performing authentication by a terminal with an authentication server; after the authentication is passed, obtaining a shared key material by both the terminal and the authentication server; generating, by the terminal and the authentication server, a mobility data security key according to the shared key material; transmitting, by the authentication server, the generated mobility data security key to a mobility data transmission module; protecting security of the layer-3 mobility user plane data, by the terminal and the mobility data transmission module, by using the mobility data security key. The disclosure also discloses a system for protecting security of layer-3 mobility user plane data in NGN. By using the method and the system provided by the disclosure, the protection for security of user plane data between the NGN user and the NGN network side is realized, and the security of user plane data of the terminal in layer-3 mobility session is enhanced. | 10-25-2012 |
20120311330 | METHOD AND SYSTEM FOR SINGLE SIGN-ON - A method and a system for single sign-on are provided by the present invention, wherein the method comprises: a terminal sending an authentication request carrying a user identity identification to an RP and the RP redirecting the authentication request to an authentication center; the authentication center authenticating the terminal by means of SIP Digest and redirecting the authentication result to the RP via the terminal; and the RP providing services for the terminal according to an authentication result. By the present invention, the resources required by the operators to deploy GBAs are reduced, at the same time the requirement of non-UICC terminals accessing IMS network can be met, and the relevant application services of the IMS network can be accessed by means of SSO. | 12-06-2012 |
20130047220 | Method and system for multi-access authentication in next generation network - The disclosure provides a method for multi-access authentication in Next Generation Network (NGN), which includes: a network side authentication center generates an authentication vector after receiving user terminal information from a user terminal, wherein the user terminal information includes subscription information and multi-access information of the user terminal; the user terminal performs authentication on the network side after receiving an authentication request from the network side authentication center, and generates keying material and network side authentication information upon successful authentication, and sends the network side authentication information to the network side authentication center, wherein the authentication request includes authentication information; the network side authentication center performs authentication on the network side authentication information using the authentication vector, generates keying material according to the multi-access information of the user terminal upon successful authentication, and inform an access forwarding functional module of the keying material; the access forwarding functional module encrypts and decrypts access service information of the user terminal according to the keying material. The disclosure also provides a system of the method. The disclosure enhances the efficiency with which the user terminal accesses the network. | 02-21-2013 |