Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

End-to-end secret key negotiation method for VoIP (Voice Over Internet Protocol) real-time data safety transmission

A technology for secure transmission and real-time data, applied in transmission systems and key distribution, can solve the problems of inappropriate VoIP data transmission security protection, and achieve the effect of improving security

Inactive Publication Date: 2015-04-01
INST OF INFORMATION ENG CAS
View PDF10 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The solutions proposed by existing patents are not suitable for the security protection of VoIP data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • End-to-end secret key negotiation method for VoIP (Voice Over Internet Protocol) real-time data safety transmission
  • End-to-end secret key negotiation method for VoIP (Voice Over Internet Protocol) real-time data safety transmission
  • End-to-end secret key negotiation method for VoIP (Voice Over Internet Protocol) real-time data safety transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention is described more fully below in conjunction with accompanying drawing:

[0032] The present invention is an end-to-end key negotiation method for mobile terminal VoIP real-time data security transmission, including two stages: signaling security transmission stage and key negotiation stage, the first stage uses TLS protocol for protection, and the second stage The stage uses TLS protocol and SM2 public key two-layer encryption method.

[0033] Such as figure 1 As shown, in the signaling security transmission phase, in the VoIP signaling transmission phase, the client and the server save each other's RSA public key. The SIP signaling between the client and the server adopts the TLS protocol for two-way authentication and protection. When the communication is initiated, the client uses the TLS protocol to protect the communication content, and uses the client's RSA private key to sign the encrypted communication content.

[0034] After the server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an end-to-end secret key negotiation method for VoIP (Voice Over Internet Protocol) real-time data safety transmission, which is applicable to mobile phone terminals. The method comprises the following steps of (1) in a signal security transmission stage, adopting a TLS (Transport Layer Security) protocol to bidirectionally authenticating and protecting an SIP (Session Initiation Protocol) signal; (2) in an end-to-end secret key negotiation stage, adopting a two-layer encryption way, at a first layer, respectively adopting the TLS protocol to protect between a communication initiator and a server as well as between the server and a communication receiver, and at a second layer, respectively using SM2 (Signal Module) public keys of the communication initiator and the communication receiver to protect secret key negotiation parameter information of the communication initiator and the communication receiver. According to the end-to-end secret key negotiation method for VoIP (Voice Over Internet Protocol) real-time data safety transmission, the two-layer encryption way is adopted to protect the secret key negotiation parameters, and the signal is bidirectionally authenticated and protected at the signal transmission stage, so that the safety of information transmission is greatly improved.

Description

technical field [0001] The invention relates to an end-to-end key negotiation method, in particular to an end-to-end key negotiation method for safe VoIP real-time data transmission, which is suitable for VoIP communication (Voice over Internet Protocol) and belongs to the technical field of digital networks. Background technique [0002] With the rapid development of mobile communication technology, smart phone terminals have been widely used, and various applications running on them, such as VoIP voice communication and instant messaging, have brought great convenience to people's work and life. In April 2013, Microsoft announced that Skype users around the world have accumulated 2 billion minutes of communicating with others using Skype every day, accounting for a quarter of the world's international long-distance calls. The basic principle of VoIP is to use the voice compression algorithm to compress the voice data encoding, and then transmit according to the TCP / IP stan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 顾小卓周卫华朱大立张仁军
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products