Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SIP protocol based session encryption method

A technology of SIP protocol and encryption method, which is applied in the field of information security, can solve problems such as complex implementation process, eavesdropping on call content, and poor flexibility, and achieve the effects of reducing complexity, saving configuration work, and simplifying the encryption process

Inactive Publication Date: 2015-07-01
BEIJING DATANG GOHIGH SOFTWARE TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the call connection based on the SIP protocol, the data packets exchanged by both parties are in plain text, so the call content is very easy to be eavesdropped on the network, and there is a large potential information security risk; the existing call content encryption methods still have the following problems : The standard SRTP protocol is adopted, and the implementation process is relatively complicated; the same key is preset on the calling terminal and the called terminal, and both parties use the same encryption algorithm to implement, so the flexibility is poor. Once the key is leaked, all subsequent connections The content of the call may be leaked, and the remedial measures need to modify the configuration of each terminal one by one

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SIP protocol based session encryption method
  • SIP protocol based session encryption method
  • SIP protocol based session encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0024] figure 2 is a flow chart of the method of the present invention, image 3 It is a message flow schematic diagram of a specific embodiment of the present invention, as shown in the figure, the method for encrypting calls based on the SIP protocol disclosed by the present invention, the steps are:

[0025] S1: The calling party initiates a SIP request message (INVITE message) to establish a connection to the SIP server. After receiving the request message, the SIP server finds the called party through a route search and sends a SIP request message (INVITE message) to the called party to establish a connection. information);

[0026] S2: The SIP server sends randomly generated keys to the calling party and the called party;

[0027] The SIP server generates a 16-bit random number through a random function as the key for this call conne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SIP protocol based session encryption method. The SIP protocol based session encryption method comprises the steps that a calling party sends an SIP request message for connection establishment to a called party through an SIP server; the SIP server sends randomly-generated secret keys to the calling party and the called party, and then secret key receiving confirmation messages are sent to the SIP server after the calling party and the called party receive the secret keys sent by the SIP server; the calling party and the called party establish session connection; the calling party and the called party use the same encryption algorithm and the secret keys sent by the SIP server to perform encryption and decryption to voice data. By means of the SIP protocol based session encryption method, IP voice encryption processing process can be greatly simplified. Compared with an SRTP protocol, achievement complexity is greatly reduced. Compared with pre-configured fixed secret keys, configuration work is omitted, the secret keys for communicating connection are different each time, and even if the secret keys are cracked, session contents after connection is re-established cannot be obtained.

Description

technical field [0001] The invention relates to a call encryption method based on the SIP protocol, belonging to the technical field of information security. Background technique [0002] SIP (Session Initiation Protocol) is a signaling control protocol at the session layer, used to create, modify and release sessions of one or more participants, such as figure 1 As shown, when two terminals want to initiate a call, the calling party sends a SIP request message for establishing a connection to the SIP server. After receiving the request message, the SIP server sends a SIP request message for establishing a connection to the called party, and the called party accepts the request. , The calling party and the called party establish a call connection, and the voice content exchanged between the calling party and the called party is based on the RTP real-time transmission protocol. The voice data packet is encapsulated into an IP packet and transmitted on the IP network. [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08
Inventor 王允升付景林赵德胜
Owner BEIJING DATANG GOHIGH SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products