End-to-end secret key negotiation method for VoIP (Voice Over Internet Protocol) real-time data safety transmission
A technology for secure transmission and real-time data, applied in transmission systems and key distribution, can solve the problems of inappropriate VoIP data transmission security protection, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] The present invention is described more fully below in conjunction with accompanying drawing:
[0032] The present invention is an end-to-end key negotiation method for mobile terminal VoIP real-time data security transmission, including two stages: signaling security transmission stage and key negotiation stage, the first stage uses TLS protocol for protection, and the second stage The stage uses TLS protocol and SM2 public key two-layer encryption method.
[0033] Such as figure 1 As shown, in the signaling security transmission phase, in the VoIP signaling transmission phase, the client and the server save each other's RSA public key. The SIP signaling between the client and the server adopts the TLS protocol for two-way authentication and protection. When the communication is initiated, the client uses the TLS protocol to protect the communication content, and uses the client's RSA private key to sign the encrypted communication content.
[0034] After the server...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com