VoIP safety meeting session key transmission method

A conference session and key technology, which is applied in the field of secure conference session key transmission, can solve the problems of no secret at all, complicated process, no VoIP security conference signature authentication, etc., to ensure confidentiality and integrity, and reduce communication costs Effect

Inactive Publication Date: 2015-05-13
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Chinese patent CN200610034623.6 uses the Hash function to calculate the message digest on the multicast side, and encrypts the calculation result and sends it to the receiver; this method belongs to the authentication mechanism, but because the Hash function is public and there is no secret at all, it has to The message digest is encrypted by the public key encryption method, and the calculation is initiated by the multicast party. During the calculation process, additional information such as the receiver's key and IP address are required, so interaction with the receiver is required, and the process is more complicated.
In a secure meeting, since the session key of the group meeting in the same group is the same, malicious meeting members will intercept, decrypt, and tamper with the voice data during the meeting, and the special feature of the VoIP group meeting is that the server needs to The voices sent by all members are mixed, and there is currently no particularly effective mechanism for signature authentication for VoIP security conferences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • VoIP safety meeting session key transmission method
  • VoIP safety meeting session key transmission method
  • VoIP safety meeting session key transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention is described more fully below in conjunction with accompanying drawing:

[0036] The present invention is a method applicable to mobile terminal VoIP secure conference session key transmission, including four stages: signaling security transmission stage, group conference session key transmission stage, group conference session key update stage and data security In the transmission stage, the TLS protocol is used to protect the signaling data in the first stage, and the two-layer encryption method of the RSA public key algorithm and the SM2 public key algorithm is used in the second stage to protect the transmission of the group meeting session key. The media server regenerates the session key of the group meeting at regular intervals, and distributes it to the clients of each meeting member. In the fourth stage, SRTP protocol and digital signature are used to protect the transmitted voice data.

[0037] Such as figure 1 As shown, in the signaling...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a VoIP safety meeting session key transmission method. The VoIP safety meeting session key transmission method includes that 1) a meeting initiator generates communication request information for building a group, encrypts the communication request information through an encryption key of a TLS passage, signs through an RSA signature key of the meeting initiator and sends to the server; the server uses a corresponding RSA signature public key to verify the information and decodes the information through an encryption key of the TLS passage to obtain the communication request information; 2) the server generates a group ID and a group meeting session key, builds the group and sends invitation information to a client to be invited; 3) the client uses an RSA signature public key of the server to verify the invitation information, decodes the invitation information through an encryption key of the TLS passage, uses an SM2 public key of the server to verify the information and uses an SM2 key thereof to decode the cipher-text to obtain the group ID and group meeting session key. The VoIP safety meeting session key transmission method greatly improves the information transmission safety.

Description

technical field [0001] The invention relates to a secure conference session key transmission method, which is suitable for mobile terminal VoIP (Voice over Internet Protocol) secure conferences and belongs to the technical field of digital networks. Background technique [0002] Currently, VoIP applications on the Internet are very popular, and some very common applications include Skype, Gtalk, FaceTime and so on. The technical principle of VoIP is that the sender converts voice data into digital data, encodes the digital data into data packets, and sends them to the receiver through the IP network. The receiver decodes the data packets and recovers the voice data. VoIP not only supports communication on the circuit switching network, but also enables users to make free calls on the Internet. VoIP technology allows enterprises to transmit voice data over data networks, lower communication costs and provide more services. [0003] However, because VoIP transmits data over ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 顾小卓周卫华朱大立张仁军
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products