Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system of terminal for encrypting videoconference data

A technology of video conferencing and encryption algorithm, which is applied in the direction of video conferencing system, digital transmission system, transmission system, etc. It can solve the problems of easy acquisition, encryption, and no guarantee of information security, so as to ensure confidential transmission and prevent eavesdropping Effect

Active Publication Date: 2011-09-21
ZTE CORP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

IMS video conferencing uses SIP on the control plane. The Third Generation Partnership Project (3GPP) and the Internet Engineering Task Force (IETF) stipulate a variety of authentication and security methods for the transmission of SIP signaling, ensuring that the control plane The security and confidentiality of the transmitted information, but the data of the IMS video conference has not been encrypted in the prior art, that is, the security of the transmitted information on the user plane is not guaranteed. For terminals that illegally access the video conference system, the video conference The audio data and video data in the network will be leaked, and because the IMS belongs to the IP network, if a malicious user captures the entire network on the IP network, the data of the video conference can be easily obtained
It can be seen that the security of existing video conferencing data is not guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system of terminal for encrypting videoconference data
  • Method and system of terminal for encrypting videoconference data
  • Method and system of terminal for encrypting videoconference data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The basic idea of ​​the present invention is: the terminal generates a network authentication token (AUTN) during the authentication process with the video conference server. After the authentication is successful, the video conference server carries a random password (RAND) in the media format negotiation request sent to the terminal. , the terminal calculates the encryption key by combining AUTN and RAND, and then negotiates the encryption key and encryption algorithm with the video conference server, and starts the encrypted communication between the two parties after the negotiation is unified.

[0037] Wherein, if the authentication fails, the terminal re-performs the authentication operation with the video conference server.

[0038] Further, if the encryption key negotiation between the terminal and the video conference server is inconsistent, the terminal re-performs the media format negotiation operation with the video conference server.

[0039] The present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method of a terminal for encrypting videoconference data, which comprises the following steps: generating a network authentication token (AUTN) by a terminal in authentication with a videoconference server; carrying random passwords (RAND) by the videoconference server in media format negotiation requests sent to the terminal after the authentication is succeeded; calculating an encryption key by the terminal by combining the AUTN and the RAND; carrying out negotiation of encryption key and encryption calculation with the videoconference server; and carrying out encryption communication between the two parties after the negotiation is unified. The invention also discloses a system of a terminal for encrypting videoconference data. The method and the system can beused for encrypting videoconference data and ensuring the confidential transmission of the videoconference data. Because user names registered in each terminal are different in a videoconference, encryption keys generated by each terminal are different. In the communication between a terminal and a server, the invention can effectively prevent a third party from eavesdropping.

Description

technical field [0001] The invention relates to the video conferencing technology in the communication field, in particular to a method and a system for a terminal to encrypt video conferencing data based on an IP multimedia system (IMS). Background technique [0002] With the development of communication networks, the third-generation digital communication (3G) system is gradually moving closer to the long-term evolution (LTE) system. Therefore, mobile operators need to introduce the framework of the IMS domain to control the existing communication services. IMS-based video Meetings are one of those businesses. [0003] At present, 3G terminals have achieved the ability to access IMS video conferencing, and many operators are also vigorously developing IMS-based video conferencing. IMS video conferencing is a centralized conference, which requires the IMS core network to provide application server support, such as: the service-type call session control function (S-CSCF) en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N7/15H04L9/32
CPCH04L9/32H04L9/3226H04L9/3234
Inventor 周煜申
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products