Check patentability & draft patents in minutes with Patsnap Eureka AI!

Security and protection communication method based on VoIP

A communication method and a communication terminal technology, which are applied in telephone communication, devices for branch offices to provide special services, and data exchange details, etc., can solve problems such as increased cost and difficulty, system instability, and infeasibility, and improve risk information. Transmission speed, high communication stability, and good versatility

Active Publication Date: 2015-02-25
浙江标谱软件科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The present invention adopts the open standard protocol to expand the function conveniently, and it can be deployed by using the coverage of the network, and the network resources can be fully utilized; but the defects in the method of the joint defense alarm are: 1. Compared with the voice protocol in the patent, it is not open and standard, The expansion of system access and applications on other platforms brings complexity and infeasibility, and proprietary protocols increase the cost and difficulty of system transformation; 2. The comparison patent does not define the processing of the system when encountering large concurrent communications , and there is no data disaster recovery strategy, so when the communication reaches the peak value, it will lead to system instability, resulting in the inability to realize the emergency function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security and protection communication method based on VoIP
  • Security and protection communication method based on VoIP
  • Security and protection communication method based on VoIP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described in detail below in conjunction with the accompanying drawings and examples. The following examples are explanations of the present invention and the present invention is not limited to the following examples.

[0026] see figure 1 , the present embodiment is based on the VoIP security communication method, and its hardware basis includes a server and a client (i.e. a communication terminal section). Setting, the client is composed of basic IP telephones, or replaced by ordinary telephones combined with voice gateways, and the server and client are combined to complete interactive joint defense, emergency broadcast, voice message and basic communication functions.

[0027] This embodiment is based on the VoIP security communication method, and the method adopted is as follows: All required communication terminal nodes are assigned numbers to become registered users (verification is required during terminal registration), an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security and protection communication method based on a VoIP. The security and protection communication method based on the VoIP is characterized in that communication terminal nodes are connected through the Internet to achieve voice communication between the communication terminal nodes, the communication terminal nodes are enrolled into corresponding interaction joint defense sets, interaction joint defense set information is stored in a foundation database, and accordingly the interaction joint defense function can be achieved. According to the security and protection communication method based on the VoIP, the one-to-many mode from a server to communication terminals is established, in the type information pushing process, a fast information transmission channel can be provided, and emergency broadcasting can be notified in time; multiple functions are fused together, under the condition that the communication terminals do not need to be greatly adjusted, an existing network environment can be used for achieving emergency broadcasting, and the communication function, the interaction joint defense function and the message leaving function can be achieved by the way that the terminals make calls; moreover, the security and protection communication method based on the VoIP is good in universality and high in communication stability.

Description

technical field [0001] The invention relates to a VoIP-based security communication method. Background technique [0002] 1. VoIP telephone is a new business of voice communication through Internet technology or network. The biggest advantage of VoIP is that it can widely use the Internet and the global IP interconnection environment to provide more and better services. Traditional telephones use the public telephone network as the medium for voice transmission, while IP telephony converts voice signals between the public telephone network and the Internet, compresses and encapsulates voice signals, and converts them into IP packets. At the same time, IP technology allows multiple users to Sharing the same bandwidth resources has changed the way that a single user monopolizes a channel in traditional telephony, saving users the cost of using a separate channel. In the current communication system, the communication terminal has the function of realizing general communicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M7/00H04L12/18H04L29/06
Inventor 陈国锋
Owner 浙江标谱软件科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More