Internet protocol (IP) telephone network-based trust model construction method

A technology of IP telephony and trust model, which is applied in the direction of telephone communication, electrical components, transmission systems, etc. It can solve problems such as attacks and servers are vulnerable to attacks, and achieve the effects of ensuring security, avoiding information theft and tampering, and enhancing accessibility

Inactive Publication Date: 2011-09-14
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, VoIP is built on the basis of the Internet, which inherits the inherent disadvantage of IP networks being vulnerable to attacks, and VoIP equipment is based on Web servers, and these servers are as vulnerable to attacks as any other server, such as being attacked by viruses and online hackers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet protocol (IP) telephone network-based trust model construction method
  • Internet protocol (IP) telephone network-based trust model construction method
  • Internet protocol (IP) telephone network-based trust model construction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] 1. System structure:

[0053] The entire trust mechanism is to allow the service server SS to quickly select a suitable user node UE as the voice data forwarding node, and to restrict the VoIP call function of the user node UE that is illegally authorized. The trust process includes data transmission, restricted access, and point calculation. Due to the need to achieve information exchange between two different platforms, several sets of TCP-based socket transmissions have been established. It is mainly used to realize information transmission between UE and SS, and transmission between SS and trust server TN.

[0054] Two, method flow

[0055] The VoIP trust mechanism metrics, trust calculation, and trust update adopt mechanisms similar to those at the entity layer. This section mainly discusses the trust model of VoIP networks from the aspects of trust evaluation criteria, credit calculation and update, and the construction process is as follows :

[0056] 1. Develop trust...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network telephone network-based trust model construction method and relates to a security solution aiming at a voice over internet protocol (VoIP) of peer-to-peer (P2P) architecture. According to the scheme, a latest public key infrastructure (PKI) technology is adopted in the transmission process of voice data and signaling data, and bidirectional encryption during data communication is realized. In order to enhance the accessibility of the voice data in the VoIP network, a Relay Node is introduced. On the problem how to select the relay node, the calculation factors such as hardware capacities (CPU calculation capacity, memory size, disc space size and the like), online time length and forwarded data volume of the node are used in the model and deduced by related mathematical formulas, so that a service server selects a reliable user node as the forwarding node of voice information. On the problem of limiting the VoIP user authority, a trust server is introduced into the model, and the trust server can monitor the call records of the user in real time and switch on or switch off the VoIP call function of the user.

Description

Technical field [0001] The invention is a security solution based on a VoIP (Voice over Internet Protocol, IP phone) network trust mechanism. It is mainly used to optimize the voice traffic in the VoIP network, to help the service server in the VoIP network to select a suitable user as the voice information forwarding node, and to monitor the user's call records. It belongs to the field of distributed computing software security technology. Background technique [0002] With the rapid development of commerce and economy, communication is getting closer and closer to everyone. Therefore, whether it is network operators, enterprises, or individuals, the requirements for communication are getting higher and higher. Many shortcomings of traditional telephones have slowly been exposed, so people began to look for a new alternative communication method. In the 1990s, IP technology was recognized by the International Standards Organization and the majority of manufacturers for its simp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04M7/00
Inventor 王汝传陈龙韩志杰邵星李致远林巧民
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products