欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T X 1122-2004 Guideline for implementing secure mobile systems based on PKI SERIES X DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS Telecommunication security《基于PKI的安全移动系统的执行指南 X.pdf

    • 资源ID:804508       资源大小:655.37KB        全文页数:36页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T X 1122-2004 Guideline for implementing secure mobile systems based on PKI SERIES X DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS Telecommunication security《基于PKI的安全移动系统的执行指南 X.pdf

    1、 INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.1122TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2004) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS Telecommunication security Guideline for implementing secure mobile systems based on PKI ITU-T Recommendation X.1122 ITU-T X-SERIES RECO

    2、MMENDATIONS DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS PUBLIC DATA NETWORKS Services and facilities X.1X.19 Interfaces X.20X.49 Transmission, signalling and switching X.50X.89 Network aspects X.90X.149 Maintenance X.150X.179 Administrative arrangements X.180X.199 OPEN SYSTEMS INTERCONNECTION Model

    3、 and notation X.200X.209 Service definitions X.210X.219 Connection-mode protocol specifications X.220X.229 Connectionless-mode protocol specifications X.230X.239 PICS proformas X.240X.259 Protocol Identification X.260X.269 Security Protocols X.270X.279 Layer Managed Objects X.280X.289 Conformance te

    4、sting X.290X.299 INTERWORKING BETWEEN NETWORKS General X.300X.349 Satellite data transmission systems X.350X.369 IP-based networks X.370X.399 MESSAGE HANDLING SYSTEMS X.400X.499 DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS Networking X.600X.629 Efficiency X.630X.639 Quality of service X.64

    5、0X.649 Naming, Addressing and Registration X.650X.679 Abstract Syntax Notation One (ASN.1) X.680X.699 OSI MANAGEMENT Systems Management framework and architecture X.700X.709 Management Communication Service and Protocol X.710X.719 Structure of Management Information X.720X.729 Management functions a

    6、nd ODMA functions X.730X.799 SECURITY X.800X.849 OSI APPLICATIONS Commitment, Concurrency and Recovery X.850X.859 Transaction processing X.860X.879 Remote operations X.880X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 TELECOMMUNICATION SECURITY X.1000 For further details, please refer to the list of I

    7、TU-T Recommendations. ITU-T Rec. X.1122 (04/2004) i ITU-T Recommendation X.1122 Guideline for implementing secure mobile systems based on PKI Summary Although public-key infrastructure (PKI) technology is very useful security technology to realize many security functions (encipherment, digital signa

    8、ture, data integrity, and so on) in the mobile end-to-end data communications, the PKI technology should be adapted for mobile end-to-end data communication. However, the method to construct and manage secure mobile systems based on PKI technology has not been established yet. This Recommendation pr

    9、ovides guidelines for constructing secure mobile systems based on PKI technology. Source ITU-T Recommendation X.1122 was approved on 29 April 2004 by ITU-T Study Group 17 (2001-2004) under the ITU-T Recommendation A.8 procedure. ii ITU-T Rec. X.1122 (04/2004) FOREWORD The International Telecommunica

    10、tion Union (ITU) is the United Nations specialized agency in the field of telecommunications. The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a v

    11、iew to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommend

    12、ations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for concis

    13、eness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g. interoperability or applicability) and compliance with the Recommendatio

    14、n is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INT

    15、ELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights,

    16、whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementors ar

    17、e cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database. ITU 2004 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. ITU-T Rec. X.1122 (04

    18、/2004) iii CONTENTS Page 1 Scope 1 2 References. 1 3 Terms and definitions . 2 3.1 Public-key and attribute certificate framework definitions 2 3.2 OSI Reference Model security architecture definitions . 2 3.3 Guidelines for the use and management of trusted third party services definitions. 2 3.4 S

    19、ervice features and operational provisions in IMT-2000 definitions . 2 3.5 Additional definitions. 2 4 Abbreviations 3 5 Categories to which PKI technologies belong 3 6 Models of secure mobile systems based on PKI 4 6.1 General model of secure mobile systems based on PKI. 4 6.2 Gateway model of secu

    20、re mobile systems based on PKI. 5 7 PKI operations for mobile end-to-end data communication. 6 7.1 PKI operations related to the life cycle of the certificate . 6 8 The usage model in telecommunication services . 9 8.1 Functions to be realized in the over-the-session-layer usage model 9 8.2 Usage mo

    21、del on the application level. 13 9 System configuration examples 14 9.1 Configuration examples of a certificate management system 14 9.2 An example of an authentication model based on the certificate. 18 10 Considerations of PKI for mobile end-to-end data communication. 21 10.1 Considerations of int

    22、eroperability with an existing system . 21 10.2 Considerations for the use of PKI in the mobile environment . 21 10.3 Considerations concerning the PKI in general . 23 Appendix I Examples of service models. 24 I.1 Certificate management service models. 24 ITU-T Rec. X.1122 (04/2004) 1 ITU-T Recommen

    23、dation X.1122 Guideline for implementing secure mobile systems based on PKI 1 Scope This Recommendation shows the guideline when constructing secure mobile systems based on PKI technology. The range of applications of this Recommendation shall be as follows: Its subject shall be the control of certi

    24、ficates in the mobile end-to-end data communication in general. However, defining a method of mobile settlement as a settlement model shall be excluded from the area of application of this Recommendation. 2 References The following ITU-T Recommendations and other references contain provisions which,

    25、 through reference in this text, constitute provisions of this Recommendation. At the time of publication, the editions indicated were valid. All Recommendations and other references are subject to revision; users of this Recommendation are therefore encouraged to investigate the possibility of appl

    26、ying the most recent edition of the Recommendations and other references listed below. A list of the currently valid ITU-T Recommendations is regularly published. The reference to a document within this Recommendation does not give it, as a stand-alone document, the status of a Recommendation. ITU-T

    27、 Recommendation F.116 (2000), Service features and operational provisions in IMT-2000. ITU-T Recommendation Q.814 (2000), Specification of an electronic data interchange interactive agent. ITU-T Recommendation Q.1701 (1999), Framework for IMT-2000 networks. ITU-T Recommendation Q.1711 (1999), Networ

    28、k functional model for IMT-2000. ITU-T Recommendation Q.1761 (2004), Principles and requirements for convergence of fixed and existing IMT-2000 systems. ITU-T Recommendation X.509 (2000) | ISO/IEC 9594-8:2001, Information technology Open Systems Interconnection The Directory: Public-key and attribut

    29、e certificate frameworks. ITU-T Recommendation X.800 (1991), Security architecture for Open Systems Interconnection for CCITT applications. ITU-T Recommendation X.842 (2000) | ISO/IEC TR 14516:2002, Information technology Security techniques Guidelines for the use and management of trusted third par

    30、ty services. ITU-T Recommendation X.1121 (2004), Framework of security technologies for mobile end-to-end data communications. 2 ITU-T Rec. X.1122 (04/2004) 3 Terms and definitions 3.1 Public-key and attribute certificate framework definitions The following terms are defined in ITU-T Rec. X.509 | IS

    31、O/IEC 9594-8: a) Attribute Authority; b) Attribute Certificate; c) Certification Authority (CA); d) Certificate Revocation List (CRL); e) Public-key; f) Public-key certificate (Certificate); g) Public Key Infrastructure (PKI). 3.2 OSI Reference Model security architecture definitions The following t

    32、erms are defined in ITU-T Rec. X.800 | ISO/IEC 7498-2: a) authentication information; b) confidentiality; c) cryptography; d) key; e) password. 3.3 Guidelines for the use and management of trusted third party services definitions The following term is defined in ITU-T Rec. X.842 | ISO/IEC TR 14516:

    33、a) Registration Authority. 3.4 Service features and operational provisions in IMT-2000 definitions The following term is defined in ITU-T Rec. F.116: a) User Identity Module. 3.5 Additional definitions This Recommendation defines the following terms: 3.5.1 secure mobile system: A system to realize s

    34、ecure mobile end-to-end data communication between mobile user and ASP or between mobile users. 3.5.2 certificate repository: A database in which the certificates, CRL and other PKI-related information are stored and which is accessible online. 3.5.3 validation authority: An authority that provides

    35、an online service of verification of a certificates validity. It establishes a verification certificate path from a signer to a user who wishes to confirm the validity of the signature of the signer, and confirms whether all the certificates contained in the verification certificate path are reliabl

    36、e or not revoked. It also verifies if a certificate has been revoked. ITU-T Rec. X.1122 (04/2004) 3 4 Abbreviations This Recommendation uses the following abbreviations: AA Attribute Authority ASP Application Service Provider CA Certification Authority CMC Certificate Management over CMS CMP Certifi

    37、cate Management Protocol CRL Certificate Revocation List ID Identifier PIN Personal Identification Number PKI Public-Key Infrastructure POP Proof Of Possession RA Registration Authority RSA RSA public key algorithm TLS Transport Layer Security UIM User Identity Module VA Validation Authority 5 Categ

    38、ories to which PKI technologies belong PKI technology is the security technology that is applied to the relation between a mobile terminal and an application server in the general model of mobile end-to-end data communication between a mobile user and an ASP, or to the relation between a mobile term

    39、inal and a mobile security gateway, and between a mobile security gateway and a server in the gateway model of mobile end-to-end data communication between a mobile user and an ASP. PKI technology is a security technology that is used to realize the following security functions: 1) Encipherment; 2)

    40、Key Exchange; 3) Digital Signature; 4) Access Control; 5) Data Integrity; 6) Authentication Exchange; 7) Notarization. 4 ITU-T Rec. X.1122 (04/2004) Table 1/X.1122 Functions and places to which PKI technology is applied Places to which technologies apply Functions realized by technologies Mobile ter

    41、minal Application server/Mobile security gatewayRelation between mobile user and mobile terminal Relation between mobile terminal and application server or other relations Encipherment X Key Exchange X Digital Signature X Access Control X Data Integrity X Authentication Exchange X Notarization X Alt

    42、hough PKI technology is often used in an open network to realize the above-mentioned security functions, due to characteristics of mobile end-to-end data communication, especially low processing power and small memory size, some adaptations of PKI technologies for mobile end-to-end data communicatio

    43、n are needed. 6 Models of secure mobile systems based on PKI As for other secure mobile systems, models of secure mobile systems based on PKI are classified as follows: a general model of secure mobile systems based on PKI for communication between a mobile user and an ASP, and a gateway model of se

    44、cure mobile systems based on PKI for communication between a mobile user and an ASP. However, for the purpose of PKI operations (for example, life cycle management of certificate), some entities (CA, RA, VA, Repository and so on) are added into the models. 6.1 General model of secure mobile systems

    45、based on PKI A general model of secure mobile systems based on PKI for communication between a mobile user and an ASP is shown in Figure 1. ITU-T Rec. X.1122 (04/2004) 5 MobilenetworkOpennetworkApplicationServerMobileterminalMobileuserASPs side CARepositoryMobileuserVACARepositoryRAMobile users side

    46、 CAASPsVAFigure 1/X.1122 General model of secure mobile systems based on PKI This model contains additional entities to that of the general model of mobile end-to-end data communication between a mobile user and an ASP; i.e., the mobile users side CA (contains RA and repository), mobile users VA, AS

    47、Ps side CA and ASPs VA. Mobile users CA The mobile users side CA issues and manages the mobile users certificate or the mobile terminals certificate. This contains RA that is responsible for the identification and authentication of the mobile user and the repository that stores the mobile users cert

    48、ificate and CRL. Mobile users VA The mobile users VA provides an online service of verification of validity of certificate received by mobile user to mobile user. ASPs side CA An ASPs side CA issues and manages the ASPs certificate or application servers certificate. This also contains RA that is re

    49、sponsible for the identification and authentication of the ASP and the repository that stores the ASPs certificate and CRL. ASPs VA The ASPs VA provides an online service of verification of validity of certificate received by the ASP. 6.2 Gateway model of secure mobile systems based on PKI A gateway model of secure mobile systems, based on PKI for communication between mobile user and an ASP is shown in Figure 2. 6 ITU-T Rec. X.1122 (04/2004) MobilenetworkOpennetworkApplicationserverMo


    注意事项

    本文(ITU-T X 1122-2004 Guideline for implementing secure mobile systems based on PKI SERIES X DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS Telecommunication security《基于PKI的安全移动系统的执行指南 X.pdf)为本站会员(medalangle361)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开