VoIP service security assurance method and system based on scale variable window mechanism

A security guarantee and scale-changing technology, applied in the field of voice encryption technology based on stream ciphers, can solve the problem of inability to provide two-way identity authentication and SIP message integrity check, inability to effectively carry out two-way identity verification between communication entities, VoIP communication system voice Quality damage and other issues, to achieve timely and accurate network emergencies, avoid out-of-sync encryption and decryption, and improve the effect of service quality degradation

Inactive Publication Date: 2013-11-20
WUHAN UNIV
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security threats faced by SIP mainly come from the inability of the SIP system to provide two-way identity authentication between entities and the integrity check of SIP messages.
Registration hijacking and message tampering attacks are due to the fact that SIP messages cannot be detected in time after being illegally tampered with, while fake server attacks and teardown attacks are due to the inability to effectively perform two-way identity verification between communication entities;
[0005] (2) VoIP communication system damages voice quality;
[0007] (3) VoIP communication system may cause loss and delayed arrival of voice packets
[0008] Due to the instability and dynamic changes of the network, the loss and delayed arrival of voice packets may be caused, which seriously affects the communication quality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VoIP service security assurance method and system based on scale variable window mechanism
  • VoIP service security assurance method and system based on scale variable window mechanism
  • VoIP service security assurance method and system based on scale variable window mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be further described below in combination with specific embodiments and accompanying drawings.

[0060] please see figure 1 , the technical solution adopted by the system of the present invention is: a VoIP service security guarantee system based on variable-scale window mechanism, comprising: voice sending end sender, sending end proxy server proxy1, receiving end proxy server proxy2, voice receiving end receiver and Private key generator; the voice sending end sender is equipped with a secure SIP session module SSM and a voice encryption and decryption module VEM, and the voice receiving end receiver is equipped with a secure SIP session module SSM, a voice encryption and decryption module VEM and a voice quality assurance module QEM;

[0061] The secure SIP session module SSM is used to provide the system with an identity-based password-based SIP security scheme, which uses an identity-based password-based signature mechanism to achieve two...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a VoIP service security assurance method and system based on a scale variable window mechanism. The method comprises the following steps: a voice sending end (sender) launches conversation request to a voice receiving end (receiver), and builds safety conversation after bothway verification through an agent end, the sender sends the voice, which is encrypted through the encryption module, to the receiver, the receiver decrypts the encrypted voice and sends the voice to a voice quality assurance module, and the voice display time is adjusted through the caching technology based on the scale variable window, so as to guarantee the display quality of the voice; the system comprises the voice sending end (sender), a voice sending end proxy server (proxy 1), a voice receiving end proxy server (proxy 2), the voice receiving end (receiver) and a private key generator; the voice sending end (sender) comprises a safety SIP conversation module (SSM) and a voice encryption/decryption module (VEM), the voice receiving end (receiver) comprises an SIP conversation module (SSM), a voice encryption/decryption module (VEM) and a voice quality guarantee module (QEM); the method and system can effectively improve VoIP communication safety and communication quality.

Description

technical field [0001] The present invention relates to the technical field of communication network information security, and mainly relates to a secure session technology based on identity signature and verification and a voice encryption technology based on stream ciphers. While ensuring communication security, the self-adaptive caching technology based on variable-scale windows is used to ensure communication voice security. quality. Background technique [0002] VoIP is a new type of communication technology that uses the Internet to carry voice data. It adopts various technologies such as compression coding, packaging and grouping, routing transmission, unpacking and decoding for voice to realize voice communication on the IP network or the Internet. Due to the characteristics of the Internet itself, VoIP Compared with the traditional telephone network, transmitting voice is cheaper and easier to expand, but the VoIP protocol itself is not perfect, and VoIP faces many ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 余荣威石源杜钢吴开诚王丽娜袁杰
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products