ATIS 0300116-2016 Interoperability Standards between Next Generation Networks (NGN) for Signature-Based Handling of Asserted information Using Tokens (SHAKEN).pdf
《ATIS 0300116-2016 Interoperability Standards between Next Generation Networks (NGN) for Signature-Based Handling of Asserted information Using Tokens (SHAKEN).pdf》由会员分享,可在线阅读,更多相关《ATIS 0300116-2016 Interoperability Standards between Next Generation Networks (NGN) for Signature-Based Handling of Asserted information Using Tokens (SHAKEN).pdf(17页珍藏版)》请在麦多课文档分享上搜索。
1、ATIS-0300116 ATIS Standard on Interoperability Standards between Next Generation Networks (NGN) for Signature-Based Handling of Asserted information Using Tokens (SHAKEN) Alliance for Telecommunications Industry Solutions Approved December 5, 2016 Abstract This document is intended to provide Next G
2、eneration Network (NGN) telephone service providers (SPs) with a framework and guidance for interoperability as calls process through their networks implementing Signature-Based Handling of Asserted Information Using Tokens (SHAKEN) technologies to ensure the validation as well as the completion of
3、legitimate calls and the mitigation of illegitimate spoofing of telephone identities. ATIS-0300116 ii Foreword The Alliance for Telecommunications Industry Solutions (ATIS) serves the public through improved understanding between carriers, customers, and manufacturers. The Next Generation Interconne
4、ction Interoperability Forum (NGIIF) addresses next generation network interconnection and interoperability topics associated with emerging technologies. Specifically, it develops operational procedures that involve the network aspects of architecture, disaster preparedness, installation, maintenanc
5、e, management, reliability, routing, security, and testing between network operators. In addition, the NGIIF addresses issues that impact the interconnection of existing and next generation networks and facilitate the transition to emerging technologies. The mandatory requirements are designated by
6、the word shall and recommendations by the word should. Where both a mandatory requirement and a recommendation are specified for the same criterion, the recommendation represents a goal currently identifiable as having distinct compatibility or performance advantages. The word may denotes an optiona
7、l capability that could augment the standard. The standard is fully functional without the incorporation of this optional capability. Suggestions for improvement of this document are welcome. They should be sent to the Alliance for Telecommunications Industry Solutions, NGIIF, 1200 G Street NW, Suit
8、e 500, Washington, DC 20005. At the time of consensus on this document, NGIIF, which was responsible for its development, had the following leadership: Amy Hindman, Co-Chair (Verizon Wireless) Mary Retka, Co-Chair (CenturyLink) ATIS-0300116 iii Table of Contents 1 Scope and Purpose . 1 1.1 Scope . 1
9、 1.2 Purpose . 1 2 Normative References . 1 3 Definitions, Acronyms, and Abbreviations . 2 3.1 Definitions 2 3.2 Acronyms 3GPP TS 29.165 V11.5.0 (2012-12). 83GPP TS 33.234 V023.0 (2002-11); 3GPP TS 29.165 V11.5.0 (2012-12). ATIS-0300116 3 JSON JavaScript Object Notation NGIIF Next Generation Interco
10、nnection Interoperability Forum NGN Next Generation Network NNI Network-to-Network Interface NS/EP National Security and Emergency Preparedness OCSP Online Certificate Status Protocol PASSporT Persona Assertion Token PBX Private Branch Exchange PSTN Public Switched Telephone Network PKI Public Key I
11、nfrastructure R an originating IMS network hosted by Service Provider A, and a terminating IMS network hosted by Service Provider B.18Figure 4.1 SHAKEN Reference Architecture19This SHAKEN reference architecture includes the following elements: SIP UA The SIP User Agent authenticated by the service p
12、rovider network. When the SIP UA is under direct management control of the telephone service provider, the service provider network can assert the calling party identity in originating SIP INVITE requests initiated by the SIP UA. IMS/Call Session Control Function (CSCF) This component represents the
13、 SIP registrar and routing function. It also has a SIP application server interface. Interconnection Border Control Function (IBCF)/Transition Gateway (TrGW) This function is at the edge of the service provider network and represents the Network-to-Network Interface (NNI) or peering interconnection
14、point between telephone service providers. It is the ingress and egress point for SIP calls between providers. Authentication Service (STI-AS) The SIP application server that performs the function of the authentication service defined in draft-ietf-stir-rfc4474bis. It should either itself be highly
15、secured and contain the Secure Key Store (SKS) of secret private key(s) or have an authenticated, Transport Layer Security (TLS)-encrypted interface to the SKS that stores the secret private key(s) used to create PASSporT signatures. Verification Service (STI-VS) The SIP application server that perf
16、orms the function of the verification service defined in draft-ietf-stir-rfc4474bis. It has an Hypertext Transfer Protocol Secure (HTTPS) interface to the Secure Telephone Identity Certificate Repository that is referenced in the Identity header field to retrieve the provider public key certificate.
17、 Call Validation Treatment (CVT) This is a logical function that could be an application server function or a third party application for applying anti-spoofing mitigation techniques once the signature is positively or negatively verified. The CVT can also provide information in its response that in
18、dicates how the results of the verification should be displayed to the called user. SKS The Secure Key Store is a logical highly secure element that stores secret private key(s) for the authentication service (STI-AS) to access. Certificate Provisioning Service A logical service used to provision ce
19、rtificate(s) used for STI. 18ibid. 19ibid. ATIS-0300116 7 Secure Telephone Identity Certificate Repository (STI-CR) This represents the publically accessible store for public key certificates. This should be an HTTPS web service that can be validated back to the owner of the public key certificate.2
20、04.4 SHAKEN Call Flow Figure 4.2 SHAKEN Reference Call Flow211. The originating SIP UA, which first REGISTERs and is authenticated to the CSCF, creates a SIP INVITE with a telephone number identity. 2. The CSCF of the originating provider adds a P-Asserted-Identity header field asserting the Caller
21、ID of the originating SIP UA. The CSCF then initiates an originating trigger to the STI-AS for the INVITE. NOTE: The STI-AS must be invoked after originating call processing. 3. The STI-AS in the originating SP (i.e., Service Provider A) first determines through service provider-specific means the l
22、egitimacy of the telephone number identity being used in the INVITE. The STI-AS then securely requests its private key from the SKS. 4. The SKS provides the private key in the response, and the STI-AS signs the INVITE and adds an Identity header field per draft-ietf-stir-rfc4474bis using the Caller
23、ID in the P-Asserted-Identity header field. 5. The STI-AS passes the INVITE back to the SP As CSCF. 6. The originating CSCF, through standard resolution, routes the call to the egress IBCF. 7. The INVITE is routed over the NNI through the standard inter-domain routing configuration. 8. The terminati
24、ng SPs (Service Provider B) ingress IBCF receives the INVITE over the NNI. 9. The terminating CSCF initiates a terminating trigger to the STI-VS for the INVITE. NOTE: The STI-VS must be invoked before terminating call processing. 10. The terminating SP STI-VS uses the “info” parameter information in
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ATIS03001162016INTEROPERABILITYSTANDARDSBETWEENNEXTGENERATIONNETWORKSNGNFORSIGNATUREBASEDHANDLINGOFASSERTEDINFORMATIONUSINGTOKENSSHAKENPDF

链接地址:http://www.mydoc123.com/p-541030.html