Unlock instant, AI-driven research and patent intelligence for your innovation.

A voip secure conference session key transmission method

A conference session and key technology, which is applied in the field of secure conference session key transmission, can solve the problems of no secret at all, complicated process, no VoIP security conference signature authentication, etc., to ensure confidentiality and integrity, and reduce communication costs Effect

Inactive Publication Date: 2018-04-17
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Chinese patent CN200610034623.6 uses the Hash function to calculate the message digest on the multicast side, and encrypts the calculation result and sends it to the receiver; this method belongs to the authentication mechanism, but because the Hash function is public and there is no secret at all, it has to The message digest is encrypted by the public key encryption method, and the calculation is initiated by the multicast party. During the calculation process, additional information such as the receiver's key and IP address are required, so interaction with the receiver is required, and the process is more complicated.
In a secure meeting, since the session key of the group meeting in the same group is the same, malicious meeting members will intercept, decrypt, and tamper with the voice data during the meeting, and the special feature of the VoIP group meeting is that the server needs to The voices sent by all members are mixed, and there is currently no particularly effective mechanism for signature authentication for VoIP security conferences

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A voip secure conference session key transmission method
  • A voip secure conference session key transmission method
  • A voip secure conference session key transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following describes the present invention more fully in conjunction with the accompanying drawings:

[0036] The invention is a method suitable for mobile terminal VoIP security conference session key transmission method, including four stages: signaling security transmission stage, group conference session key transmission stage, group conference session key update stage and data security In the transmission stage, the first stage uses the TLS protocol to protect the signaling data, and the second stage uses the RSA public key algorithm and the SM2 public key algorithm two-layer encryption method to protect the transmission of the group conference session key. In the third stage The media server regenerates the group meeting session key at regular intervals and distributes it to the client of each meeting member. In the fourth stage, the SRTP protocol and digital signature are used to protect the transmitted voice data.

[0037] Such as figure 1 As shown, in the signali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a VoIP security conference session key transmission method. This method is as follows: 1) The conference initiator generates a communication request message for establishing a group, then encrypts it with the encryption key of the TLS channel, and then sends it to the server after signing with its own RSA signature private key; the server uses the corresponding RSA signature public key Verify the message, and then decrypt it with the encryption key of the TLS channel to obtain the communication request message; 2) The server generates a group ID and a group meeting session key, establishes a group and sends an invitation message to the client to be invited ;3) The client uses the server's RSA signature public key to verify the invitation message, then decrypts it with the encryption key of the TLS channel, then uses the server's SM2 public key to verify it, and then uses its own SM2 private key to decrypt the ciphertext, Get the group ID and group meeting session key. The invention greatly improves the security of information transmission.

Description

Technical field [0001] The invention relates to a secure conference session key transmission method, which is suitable for mobile terminal VoIP (Voice over Internet Protocol) secure conferences and belongs to the technical field of digital networks. Background technique [0002] Currently, VoIP applications on the Internet are very popular, and some very common applications include Skype, Gtalk, FaceTime, etc. The technical principle of VoIP is that the sender converts voice data into digital data and encodes the digital data into data packets, which are sent to the receiver through the IP network, and the receiver decodes the data packets to recover the voice data. VoIP not only supports communication on circuit-switched networks, but also enables users to make free calls on the Internet. VoIP technology allows enterprises to transmit voice data through data networks, with lower communication costs and providing more services. [0003] Nevertheless, because VoIP transmits data o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 顾小卓周卫华朱大立张仁军
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI