Internet protocol (IP) telephone network-based trust model construction method

A technology of IP telephony and trust model, applied in telephone communication, electrical components, transmission systems, etc., can solve the problem that servers are vulnerable to attacks, attacks, etc., to avoid information theft and tampering, ensure security, and reduce data burden.

Inactive Publication Date: 2013-12-25
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, VoIP is built on the basis of the Internet, which inherits the inherent disadvantage of IP networks being vulnerable to attacks, and VoIP equipment is based on Web servers, and these servers are as vulnerable to attacks as any other server, such as being attacked by viruses and online hackers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Internet protocol (IP) telephone network-based trust model construction method
  • Internet protocol (IP) telephone network-based trust model construction method
  • Internet protocol (IP) telephone network-based trust model construction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] 1. System structure:

[0055] The entire trust mechanism is to enable the service server SS to quickly select a suitable user node UE as a voice data forwarding node, and to limit the VoIP call function of the illegally authorized user node UE. The trust process includes data transmission, restricted access, point calculation and other parts. Due to the need to realize information exchange between two different platforms, several sets of TCP-based socket transmissions have been established. It is mainly used to realize the information transmission between UE and SS, and the transmission between SS and trusted server TN.

[0056] 2. Method flow

[0057] The VoIP trust mechanism measurement standard, trust calculation, and trust update adopt a mechanism similar to that of the entity layer. This section mainly discusses the VoIP network trust model from the aspects of trust evaluation standards, credit calculation, and update of the VoIP trust mechanism. The construction...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network telephone network-based trust model construction method and relates to a security solution aiming at a voice over internet protocol (VoIP) of peer-to-peer (P2P) architecture. According to the scheme, a latest public key infrastructure (PKI) technology is adopted in the transmission process of voice data and signaling data, and bidirectional encryption during data communication is realized. In order to enhance the accessibility of the voice data in the VoIP network, a Relay Node is introduced. On the problem how to select the relay node, the calculation factors such as hardware capacities (CPU calculation capacity, memory size, disc space size and the like), online time length and forwarded data volume of the node are used in the model and deduced by related mathematical formulas, so that a service server selects a reliable user node as the forwarding node of voice information. On the problem of limiting the VoIP user authority, a trust server is introduced into the model, and the trust server can monitor the call records of the user in real time and switch on or switch off the VoIP call function of the user.

Description

technical field [0001] The present invention is a security solution based on VoIP (Voice over Internet Protocol, IP phone) network trust mechanism. It is mainly used to optimize the voice flow in the VoIP network, help the service server in the VoIP network to select a suitable user as a voice information forwarding node, and monitor the user's call records, which belongs to the field of distributed computing software security technology. Background technique [0002] With the rapid development of business and economy, the relationship between communication and everyone is getting closer and closer. Therefore, whether it is a network operator, an enterprise, or an individual, the requirements for communication are getting higher and higher. Many shortcomings of traditional telephones have been gradually exposed, so people began to look for a new alternative communication method. In the 1990s, IP technology was recognized by international standard organizations and manufactu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04M7/00
Inventor 王汝传陈龙韩志杰邵星李致远林巧民
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products