VoIP voice encryption protection method, node and system

A technology of voice encryption and encryption algorithm, applied in transmission system and key distribution, can solve the problems of inability to meet the characteristics of VoIP calls, inability to ensure the security of user session information, and inability to meet legal monitoring requirements, and achieve the effect of ensuring security.

Inactive Publication Date: 2011-03-30
CHINA MOBILE COMM GRP CO LTD
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although the existing VoIP protocol also provides a corresponding security mechanism, that is, end-to-end algorithm protection or protection between each hop link, the end-to-end algorithm protection makes it impossible to meet the legal interception requirements, and the use of each The encryption protection between hop links will cause the relay node of each hop to obtain the original plaintext information of these call information
If the existing VoIP mechanism is simply used in the DSN network, it cannot meet the VoIP call characteristics in the DSN network, that is, it cannot meet the core network's control requirements for VoIP sessions, and cannot guarantee the security of user session information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VoIP voice encryption protection method, node and system
  • VoIP voice encryption protection method, node and system
  • VoIP voice encryption protection method, node and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The preferred embodiments of the present invention will be described below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0025] figure 1 It is a schematic diagram of an embodiment of a DSN network application scenario for VoIP voice encryption protection according to the present invention. Such as figure 1 shown, where SN-C A 、SN-C B ,...,SN-C HA 、SN-C HB They are all core super nodes (Super Node Core, referred to as SN-C). As a terminal node connected to the core network composed of SN-C, UE periodically reports its own status information to the super node (SN) to realize resource sharing between terminal nodes; some terminals can also implement Network Address Translation (Network Address Translation, referred to as NAT) server function, selected by SN-C to provide traversal s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a VoIP voice encryption protection method, a node and a system, wherein the method comprises the following steps: leading core super-nodes of two parties in communication to respectively generate random numbers; leading one core super-node of the two parties in communication to select an encryption algorithm for common use according to the encryption algorithms respectively used by the two parties in communication; leading the core super-nodes of the two parties in communication to generate a network negotiation key according to the selected encryption algorithm and the generated two random numbers; and leading the two parties in communication to carry out encryption on call data according to the network negotiation key. The invention can improve the safety of calls in a DSN network and solve the technical defect that the prior art utilizes encryption protection in each hop link, and a relay node of each hop can thus obtain original plaintext information of call information, thereby being unsafe.

Description

technical field [0001] The present invention relates to a VoIP (Voice over Internet Protocol, hereinafter referred to as VoIP) technology in a core network in the communication field, and in particular to a VoIP voice encryption protection method, node and system. Background technique [0002] In the prior art, in order to ensure the security of voice calls, the following three methods are generally used: in the 3G network, user data is protected by confidentiality, and security protection measures are adopted for communication between network entities. Instant messaging software, such as "Skype" and "QQ", basically use end-to-end encryption to ensure the confidentiality and security of communication. The traditional VoIP protocol also provides corresponding security mechanisms, such as the H.323 protocol cluster and the SIP protocol provide end-to-end security protection. [0003] Distributed Service Network (DSN) is a new generation of operable and manageable distributed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/08H04M7/00
Inventor 朱红儒齐旻鹏吴琦
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products