Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Flexible and controllable session encryption method

An encryption method and flexible technology, applied in the field of information security, can solve problems such as eavesdropping on call content, complex implementation process, and flexible selection of call content, etc., to achieve the effect of simplifying the encryption process, reducing complexity, and saving configuration work

Inactive Publication Date: 2015-07-01
BEIJING DATANG GOHIGH DATA NETWORKS TECH CO LTD
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the call connection based on the SIP protocol, the data packets exchanged by both parties are in plain text, so the call content is very easy to be eavesdropped on the network, and there is a large potential information security risk; the existing call content encryption methods still have the following problems : The standard SRTP protocol is adopted, and the implementation process is relatively complicated; the same key is preset on the calling terminal and the called terminal, and both parties use the same encryption algorithm to implement, so the flexibility is poor. Once the key is leaked, all subsequent connections The content of the call may be leaked, and the remedial measures need to modify the configuration of each terminal one by one. In addition, the same system cannot support encryption and non-encryption at the same time, that is, it is impossible to flexibly choose whether the call content needs to be encrypted according to actual needs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flexible and controllable session encryption method
  • Flexible and controllable session encryption method
  • Flexible and controllable session encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0027] figure 2 is a flow chart of the method of the present invention, image 3 is one of the message flow schematic diagrams of a specific embodiment of the present invention, Figure 4 It is the second schematic diagram of message flow in a specific embodiment of the present invention; as shown in the figure, the steps of the flexible and controllable call encryption method disclosed by the present invention are:

[0028] S1: The calling party initiates a SIP request message (INVITE message) to establish a connection to the SIP server, and the request message carries the identification of whether the call content of this connection needs to be encrypted;

[0029] If the INVITE message carries the extended message header P_ENCRYPT field, it means that the call content of this connection needs to be encrypted. If there is no such extension...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a flexible and controllable session encryption method. An SIP server in the calling direction sends a connection establishment request message carrying an identification indicating whether session contents during connection are needed to be encrypted or not, the SIP server obtains a randomly-generated secret key through a password server if encryption is needed, the secret key is sent to two communicated parties by utilizing messages interacted by the two communicated parties, and follow-up voice data of the two parties are encrypted by adopting a encrypted and the secret key; if the encryption is not needed, the SIP server directly sends a connection establishment request message to a called party. The IP voice encryption processing process can be simplified. Compared with secret keys configured and fixed in advance, configuration work is omitted, communicated-connected secret keys each time are different, and even if the secret keys are cracked, session contents after connection is re-established cannot be obtained.

Description

technical field [0001] The invention relates to a flexible and controllable call encryption method, which belongs to the technical field of information security. Background technique [0002] SIP (Session Initiation Protocol) is a signaling control protocol at the session layer, used to create, modify and release sessions of one or more participants, such as figure 1 As shown, when two terminals want to initiate a call, the calling party sends a SIP request message for establishing a connection to the SIP server. After receiving the request message, the SIP server sends a SIP request message for establishing a connection to the called party, and the called party accepts the request. , The calling party and the called party establish a call connection, and the voice content exchanged between the calling party and the called party is based on the RTP real-time transmission protocol. The voice data packet is encapsulated into an IP packet and transmitted on the IP network. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
Inventor 王允升付景林侯玉成
Owner BEIJING DATANG GOHIGH DATA NETWORKS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products