The invention relates to a method for transmitting media data via an access network. The invention also relates to a network and a computer program which are suitable for implementing the method.
Various methods, devices and systems are known for transmitting media data to or from a subscriber device via an access network. For example, the so-called H. standards (e.g. H.320, H.323, H.324) provide compression and control mechanisms for realtime transmission of audio and video data, in particular for video telephony.
Given the increasingly widespread use of broadband mobile radio networks, the Third Generation Partnership Project (3GPP) has developed a range of standards for integrating voice and Internet services under the name of IP Multimedia Subsystem (IMS). The IMS standards are intended to assist the amalgamation of packet-switching and line-switching networks, particularly in the field of mobile communications. However, IMS systems are also suitable for transmitting media data in fixed networks, e.g. via public telephone networks or the Internet.
When using mobile radio networks in accordance with the 3GPP UMTS Terrestrial Radio Access Network (UTRAN) standard, data is encrypted at the level of the security layer of the network protocol. As a result of this, the IMS Access Security (3GPP TS 33.203) and Network Domain Security (3GPP TS 33.210) standards do not provide for separate encryption of media data. However, such encryption of transmitted data does not take place in fixed networks.
However, encryption of media data is often desired. Firstly because IP-based networks in particular are notoriously insecure, and therefore e.g. video-telephone calls which are routed at least partially via IP networks can be eavesdropped relatively easily. Secondly media data is often offered in the form of so-called value-added services, e.g. video-on-demand, in which case the recipient must pay for transmitted data. In this context, it is again necessary to ensure that the transmitted media data is only used by the legitimate recipient.
The standard ETSI TS 133 246 V6.5.0 Release 6 (“Security of Multimedia Broadcast/Multicast Service (MBMS)”) discloses a method for transmitting encrypted media data from a Broadcast-Multicast Service Center to a subscriber device. A standard for the secure transmission of media data between two subscribers is known from the Secure Realtime Transport Protocol (SRTP as per RFC 3711). However, data transmission as per the SRTP standard cannot be utilized in heterogeneous networks in particular. This is partly because technical problems relating to the conversion of encrypted data streams can occur at network boundaries, e.g. at the transition from the Internet to public telephone networks. Secondly, statutory regulations must be observed, e.g. governing State surveillance of telephone calls. Furthermore, a direct exchange of keys between two subscribers is often problematic if there is no relationship of trust between them.
One potential object is therefore to describe a method and a network which allow encryption of media data in an access network. In this case, the intention is to protect in particular a transmission between an exchange in a line-based network and a subscriber in the line-based network.
The inventors propose a method for transmitting media data, wherein said method comprises the following steps:
According to the method, a set of encryption parameters is initially transmitted or negotiated via a control channel from the subscriber device to an application function. This operation can be executed e.g. when a connection from the subscriber device is set up. On the basis of the transmitted set of encryption parameters, the application function generates an encryption context which is suitable for encrypting media data. In a further step, this encryption context is transmitted via a control interface of a core network to a media server, such that the media server can encrypt media data which it sends to the subscriber device in a further step. For this purpose, the media server and the subscriber device do not need to negotiate an individual key for encrypting the media data.
Likewise a decryption of encrypted media data is carried out by the media server using the encryption context.
In this way, media data which is transmitted via the access network in the opposite direction is also protected by encryption, without a direct exchange of keys between the media server and the subscriber device being required for this purpose.
According to an advantageous embodiment, the set of encryption parameters is generated by the subscriber device using a first key and is checked by the application function using a second key.
As a result of encryption parameters being generated depending on the first key of the subscriber device, the subscriber device can also be authenticated by the second key at the same time as the encryption context is generated.
According to a further advantageous embodiment, the subscriber device and the application function are configured for implementing a session initiation protocol, and the set of encryption parameters is determined by exchanging messages in accordance with the session initiation protocol.
A subscriber device and an application function which are configured for implementing session initiation protocols, these being used e.g. to authenticate a subscriber device in relation to an exchange, can also use such protocols for the purpose of determining the set of encryption parameters.
According to a further advantageous embodiment, the method additionally comprises the steps of checking an authentication of the subscriber device by the application function and transmitting authentication data from the application function to the media server via the control interface.
As a result of authentication data being checked and transmitted by the application function, it is possible to ascertain whether a subscriber device is authorized to receive media data.
These and other objects and advantages of the present invention will become more apparent and more readily appreciated from the following description of the preferred embodiments, taken in conjunction with the accompanying drawings of which:
Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout.
The first subscriber device 2 is connected to the exchange 5 via a first access network 4. The second subscriber device 3 is likewise connected to the exchange 5 via a second access network 6.
The exchange 5 is situated in a core network 7 and comprises an application function 8, a decision function 9 and a media server 10.
The application function 8 has two first interfaces 11A and 11B to the first subscriber device 2 or the second subscriber device 3 respectively. The application function 8 also has a key unit 12. The key unit 12 is used inter alia for generating, negotiating or checking session keys.
The media server 10 has two second interfaces 13A and 13B, via which the media server 10 is connected to the first subscriber device 2 or the second subscriber device 3 respectively. The media server 10 also has a second encryption unit 14 which is suitable for encrypting or decrypting media data.
The application function 8 is connected to the decision function 9 via a third interface 15. The decision function 9 is connected to the media server 10 via a fourth interface 16. The third interface 15, the decision function 9 and the fourth interface 16 together form a control interface 17, via which the media server 10 can be controlled by the application function 8.
In the case of IMS, the application function 8 does not provide any applications itself, but controls the resources which are required for an application. For example, during a connection setup phase, the application function 8 and the decision function 9 can together reserve transmission capacities in the core network 7, which are used by the media server 10 for the transmission of media data during a subsequent transmission phase.
The first access network 4 comprises a control channel 18A between the first subscriber device 2 and the first interface 11A of the application function 8, and a data channel 19A between the second interface 13A of the media server 10 and the first subscriber device 2. The second access network 6 likewise comprises a control channel 18B between the second subscriber device 3 and the first interface 11B, and a data channel 19B between the second interface 13B and the second subscriber device 3.
Both the control channels 18 and the data channels 19 are suitable for bidirectional communication in the exemplary embodiment shown. In principle, however, it is also feasible for communication to be possible in one direction only, or for communication for different data flow directions to run on different transmission channels 18 or 19.
The control channel 18 and the data channel 19 can be e.g. data connections on different protocol levels on a single transmission channel between the exchange 5 and the subscriber devices 2 or 3, or separate transmission channels such as e.g. a so-called ISDN control channel D and a so-called ISDN data channel B.
For the sake of simplicity,
The first access network 4 is e.g. a line-based public telephone network such as an analog telephone network or a digital ISDN telephone network, for example. The second access network 6 is e.g. a wireless mobile radio network such as a GSM or UMTS network, for example. The core network 7 is e.g. a data network as per the Internet protocol (IP), which is used by a communication services provider for internal data transmission.
In the described exemplary embodiment, a connection is to be created between the first subscriber device 2 and the second subscriber device 3 via the exchange 5. In this case, media data such as e.g. a combined audio and video stream is to be exchanged in real time between the first subscriber device 2 and the second subscriber device 3.
Because the first access network 4 is a line-based telephone network, the media data which is transmitted from the media server 10 via the data channel 19A to the first subscriber device 2 is to be encrypted. The media data which is transmitted from the second subscriber device 3 to the media server 10 via the data channel 19B need not be encrypted in the present example, because the second access network 6 is a radio network in which encryption is already utilized on the security level of the network protocol. However, an equivalent method for encrypted data transmission can also be applied in the second access network 6.
In an IMS, a so-called Proxy Call Session Control Function (P-CSCF) which represents the first contact point of the first subscriber device 2 in the core network 7 assumes the functionality of a first application function 8A for the first subscriber device 2. A separate P-CSCF is assigned to the second subscriber device 3 and acts as a second application function 8B for this second subscriber device 3. Monitoring functions 20A and 20B which are known as Serving Call Session Control Functions (S-CSCF) are also arranged therebetween and monitor the services for the first subscriber device 2 or the second subscriber device 3.
The exemplary data transmission according to
In a step 31, a set of encryption parameters k which specifies an encryption that must be used is determined between the first subscriber device 2 and the first application function 8A.
For example, the first subscriber device 2 can generate a session key on the basis of a private key of the first subscriber device 2 and transmit this to the first application function 8A. In principle, a multiplicity of different methods for generating encryption parameters k for symmetrical or asymmetrical communication, said methods being known to a person skilled in the art, can be used in connection with the described method 30 for transmitting media data.
In the step 31, further encryption parameters, which e.g. determine a length of a key that is to be used, can also be specified by the first subscriber device 2 or negotiated between the first subscriber device 2 and the first application function 8A with the aid of a session initiation protocol. As a session initiation protocol, it is possible to utilize e.g. the so-called Session Initiation Protocol (SIP, corresponding to RFC 3261 and RFC 2543) in conjunction with the Session Description Protocol (SDP, corresponding to RFC 2327). It is also possible for some or all encryption parameters to be determined by the first application function 8A and transmitted to the first subscriber device 2.
In accordance with the SIP protocol, a message exchange which serves to register the subscriber device takes place between the subscriber device 2 and the first application function 8A first, but is not shown in the
It can be seen in
Further parts of the request 21, which do not relate to the encryption, are forwarded to the first monitoring function 20A in the form of a modified request 22. According to the IMS protocol, the core network 7 comprises an S-CSCF for the first subscriber 2 and the second subscriber 3 respectively, which forwards the modified request 22 from the first application function 8A to the second application function 8B in order to set up a connection with the second subscriber device 3.
If the second subscriber device 3 is ready to answer the modified request 22, the second subscriber device 3 sends a response 23 which is transmitted back in the opposite direction to the first application function 8A. In the context of the SIP protocol, said response in this case comprises e.g. the reply code “200 OK” and other messages which, however, are not shown in the
In a further step 32, the first application function 8A generates an encryption context CC which is based on the set of encryption parameters k that was determined in the step 31. The encryption context CC comprises e.g. an encryption algorithm that is to be used, a key that is to be used for the encryption, and further parameters that are required for carrying out an encryption correctly.
The generated encryption context CC is transmitted from the first application function 8A to the media server 10 in the step 33.
In the arrangement which is illustrated in
The Diameter protocol is suitable for transmitting so-called attribute-value-pairs. The first application function 8A must therefore encode the encryption context CC in a set of attribute-value-pairs as a first encoded encryption context 24. In this case, either existing attributes can be used for the purpose of transmitting the encryption context CC, or new attributes can be introduced by the first application function 8A.
The decision function 9, which is called the Service Based Policy Decision Function (SPDF or PDF) in the TISPAN or 3GPP standard, decodes the transmitted first encoded encryption context 24 and transmits the information which is contained therein as a second encoded encryption context 25 via the fourth interface 16 to the media server 10. In the exemplary embodiment, the fourth interface 16 according to the TISPAN standard is a so-called Ia interface as per the H.248 protocol.
After the transmission of the encryption context CC from the first application function 8A to the media server 10, the first application function 8A forwards the response 23 to the first subscriber device 2. In accordance with the 3GPP protocol TS24.229, the first subscriber device 2 confirms to the first application function 8A that the connection has been set up, this being done by a confirmation message 26 which is also forwarded to the second subscriber device 3.
In a further step 34, the first subscriber device 2 transmits encrypted media data 27 to the media server 10 or the media server 10 transmits encrypted media data 27 to the first subscriber device 2.
Using the set of encryption parameters k, the first subscriber device 2 can generate an encryption context CC which is equivalent to that which was transmitted to the media server 10 in the step 33. As a result, both the first subscriber device 2 and the media server 10 are in a position to encrypt or decrypt media data. Particularly in the case of substantial data streams, such as those arising in the context of videotelephony, for example, symmetrical encryption methods are suitable for this purpose. A data stream can be associated with a sufficiently long key by an XOR function, for example.
In the data flow diagram illustrated in
The unencrypted media data 28 is transmitted from the media server 10 to the second subscriber device 3 in a step 36.
As shown in
In the case of bidirectional communication applications such as videotelephony, both of the above described variants are often used in parallel, such that outgoing encrypted media data 27 from the first subscriber device 2 is decrypted by the media server in the step 35, and unencrypted media data 28 destined for the first subscriber device 2 is simultaneously encrypted by the media server 10 in the step 38.
Other application possibilities include e.g. the transmission of predefined media data in one direction only, e.g. from the media server 10 to the first subscriber device 2. For example, a video-on-demand platform which is present in the core network 7 but is not shown in the
Instead of the exchange 5, provision can also be made for a so-called communication gateway which e.g. transmits media data from a line-switching access network 4 to a packet-switching network such as e.g. the core network 7 or the second access network 6. In particular, this allows switching between hardware telephones and software telephones or telephone applications. In this case, both the data formats and protocols of the control channel 18A and 18B or the data channel 19A and 19B can differ, such that conversion of the different protocols by the application function 8 or the media server 10 is required. Particularly in such application scenarios, it is advantageous if encryption is only to be utilized on one of the access networks 4 or 6.
Encrypted transmission of media data between the second subscriber device 3 and the media server 10 is also possible. In this case, the second subscriber device 3 itself transmits an encryption parameter k to the second application function 8B which is assigned to it. In this way, exclusively encrypted media data 27 is exchanged via the data channels 19A and 19B, without a relationship of trust between the first subscriber device 2 and the second subscriber device 3 being required for this.
The invention has been described in detail with particular reference to preferred embodiments thereof and examples, but it will be understood that variations and modifications can be effected within the spirit and scope of the invention covered by the claims which may include the phrase “at least one of A, B and C” as an alternative expression that means one or more of A, B and C may be used, contrary to the holding in Superguide v. DIRECTV, 69 USPQ2d 1865 (Fed. Cir. 2004).
Number | Date | Country | Kind |
---|---|---|---|
10 2006 006 071.7 | Feb 2006 | DE | national |
This application is based on and hereby claims priority to German Application No. 10 2006 006 071.7 filed on Feb. 9, 2006 and PCT Application No. PCT/EP2007/050792 filed on Jan. 26, 2007, the contents of which are hereby incorporated by reference.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2007/050792 | 1/26/2007 | WO | 00 | 10/28/2008 |