Flexible and controllable session encryption method
An encryption method and flexible technology, applied in the field of information security, can solve problems such as eavesdropping on call content, complex implementation process, and flexible selection of call content, etc., to achieve the effect of simplifying the encryption process, reducing complexity, and saving configuration work
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0027] figure 2 is a flow chart of the method of the present invention, image 3 is one of the message flow schematic diagrams of a specific embodiment of the present invention, Figure 4 It is the second schematic diagram of message flow in a specific embodiment of the present invention; as shown in the figure, the steps of the flexible and controllable call encryption method disclosed by the present invention are:
[0028] S1: The calling party initiates a SIP request message (INVITE message) to establish a connection to the SIP server, and the request message carries the identification of whether the call content of this connection needs to be encrypted;
[0029] If the INVITE message carries the extended message header P_ENCRYPT field, it means that the call content of this connection needs to be encrypted. If there is no such extension...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com