Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing trusted transmission of voice over internet phone (VoIP) media stream by expanding MIKEY protocol

A protocol implementation and media streaming technology, applied in the direction of telephone communication, transmission system, electrical components, etc., to achieve the effect of ensuring real connection

Inactive Publication Date: 2011-07-27
BEIJING JIAOTONG UNIV
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] There are currently no research reports or software on integrating remote attestation of trusted computing with the MIKEY protocol to establish a trusted channel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing trusted transmission of voice over internet phone (VoIP) media stream by expanding MIKEY protocol
  • Method for realizing trusted transmission of voice over internet phone (VoIP) media stream by expanding MIKEY protocol
  • Method for realizing trusted transmission of voice over internet phone (VoIP) media stream by expanding MIKEY protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] A method of the present invention to realize trusted transmission of VoIP media streams by extending the MIKEY protocol requires that both communication parties be equipped with a trusted security chip TPM on hardware, and the BIOS of both communication parties support TPM; on software, both communication parties are required to install measurement module. The measurement module determines the entity to be measured, the measurement time and the method of safely maintaining the measurement result. Its main functions include calculating the measurement value of those measured entities, recording the measurement event to the measurement storage log and recording the measurement value into the TPM specified platform configuration register (PCR). Both communication parties have their own AIK public and private keys. The method provided by the present invention makes the following modifications to the standard MIKEY protocol:

[0049] (1) Use the type field (Type) in the ge...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for realizing trusted transmission of a voice over internet phone (VoIP) media stream by expanding a MIKEY protocol. In the method, two communication parts are required to be provided with a reliable safe chip and a measuring module to measure the platform states of the communication parts. In the method, the platform state information of the two communication parts is transmitted through a data structure of a MIKEY key exchange protocol, so that the trusted transmission of the VoIP media stream is realized. By the method, a remote attestation technology of trusted calculation is tightly integrated into the MIKEY key exchange protocol to ensure real connection between the platform state information and a safe channel; and a standard MIKEY protocol is modified to the least and additional round-trip time is not added. At the same time, a system of the method has backward compatibility of a part of functions.

Description

technical field [0001] The invention relates to a method for realizing credible transmission of VoIP media streams by extending the MIKEY protocol, belonging to the field of computer information security. Background technique [0002] The wide application of VoIP (Voice-over-IP) makes the secure transmission of media streams more important. SRTP (Secure Real-time Transport Protocol, RFC 3711) is a secure real-time transport protocol, which not only strengthens the confidentiality of VoIP media streams, provides message authentication and integrity protection, but also can resist replay attacks; but SRTP The protocol does not provide a key exchange mechanism. The IETF organization released the key management protocol MIKEY (Multimedia Internet KEYing, RFC3830) in August 2004, and the communication parties can negotiate session keys and various security parameters required by the SRTP protocol through the MIKEY protocol. [0003] figure 1 It is the operation process of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04M7/00
Inventor 常晓林秦英韩臻刘吉强
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products