Method and system for implementing end-to-end media stream cryptographic key negotiation
A technology of key negotiation and media streaming, applied in transmission systems, usage of multiple keys/algorithms, and key distribution, it can solve the problems of inability to meet legal interception, inability to obtain keys, etc. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0104] Method embodiment one
[0105] In this embodiment, the encryption service is a value-added service. Both the calling terminal and the called terminal support encryption capabilities, and both have signed in advance; in this embodiment, the calling service entity is the call session control function of the service. Entity (S-CSCF), the called side call service entity is the called side S-CSCF; the calling side key application server and the called side key application server are both SIP application servers; the call response message sent by the calling terminal The SIP message header in contains precondition negotiation.
[0106] figure 2 It is a schematic diagram of the message flow of this embodiment. Such as figure 2 As shown, the method for implementing end-to-end media stream key negotiation in this embodiment includes the following steps:
[0107] Step 201: The calling terminal sends a call request message to the S-CSCF on the calling side.
[0108] The call reques...
Example Embodiment
[0175] Method embodiment two
[0176] In this embodiment, the encryption service is a value-added service. Both the calling terminal and the called terminal support encryption capabilities, but only the called terminal has signed a contract; in this embodiment, the calling side call service entity is the calling side S- CSCF, the called side calling service entity is the called side S-CSCF; the calling side key application server and the called side key application server are both SIP application servers; the SIP message header in the call response message sent by the calling terminal The precondition negotiation is not included.
[0177] image 3 It is a schematic diagram of the message flow of this embodiment. Such as image 3 As shown, the method for implementing end-to-end media stream key negotiation in this embodiment includes the following steps:
[0178] Steps 301 to 303 are the same as steps 201 to 203 in the first embodiment, and will not be repeated here.
[0179] Step...
Example Embodiment
[0194] Method embodiment three
[0195] In this embodiment, the encryption service is regarded as a basic service, and the key application server obtains encryption capability information from the call response message; in this embodiment, the calling service entity on the calling side is the calling side S-CSCF, and the called side calling service The entity is the called side S-CSCF; the calling side key application server and the called side key application server are both SIP proxy mode units in the S-CSCF; the SIP message header in the call response message sent by the calling terminal is not Contains precondition negotiation.
[0196] Figure 4 It is a schematic diagram of the message flow of this embodiment. Such as Figure 4 As shown, this embodiment includes the following steps:
[0197] Steps 401 to 409: The calling terminal sends a call request message to the called terminal. During the sending process, when the calling service entity receives the call request message,...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap