Internet protocol (IP) telephone network-based trust model construction method
A technology of IP telephony and trust model, applied in telephone communication, electrical components, transmission systems, etc., can solve the problem that servers are vulnerable to attacks, attacks, etc., to avoid information theft and tampering, ensure security, and reduce data burden.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] 1. System structure:
[0055] The entire trust mechanism is to enable the service server SS to quickly select a suitable user node UE as a voice data forwarding node, and to limit the VoIP call function of the illegally authorized user node UE. The trust process includes data transmission, restricted access, point calculation and other parts. Due to the need to realize information exchange between two different platforms, several sets of TCP-based socket transmissions have been established. It is mainly used to realize the information transmission between UE and SS, and the transmission between SS and trusted server TN.
[0056] 2. Method flow
[0057] The VoIP trust mechanism measurement standard, trust calculation, and trust update adopt a mechanism similar to that of the entity layer. This section mainly discusses the VoIP network trust model from the aspects of trust evaluation standards, credit calculation, and update of the VoIP trust mechanism. The construction...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com