Distributed network telephone system

A technology of distributed network and telephone system, applied in the field of distributed network telephone system, can solve the problems of low connectivity rate and communication quality, high probability of data interception and tampering, low security, etc. The effect of enhancing network adaptability and improving security

Inactive Publication Date: 2015-07-01
HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0035] 3. P2P type: There are too many network nodes through which data flows, the probability of data being intercepted and tampered with is relatively high, an

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed network telephone system
  • Distributed network telephone system
  • Distributed network telephone system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0067] refer to Figure 5 , a distributed Internet telephone system, comprising a VoIP terminal A and a VoIP terminal B, said VoIP terminal A and VoIP terminal B are connected through n servers C, and its specific steps are as follows:

[0068] (1) When VoIP terminal A and VoIP terminal B are started, servers C1, C2...Cn verify VoIP terminal A and VoIP terminal B respectively;

[0069] (2) VoIP terminal A requests to call VoIP terminal B from servers C1, C2...Cn;

[0070] (3) Servers C1, C2...Cn receive the request from VoIP terminal A, find VoIP terminal B, and establish a connection;

[0071] (4) VoIP terminal B confirms the answer;

[0072] (5) VoIP terminals A and B are forwarded by servers C1, C2...Cn for voice communication, and the data streams to be sent by VoIP terminals A and B are divided into multiple data fragments, and the data fragments are formed according to the set traffic strategy. Each data block is encrypted with a different encryption method / different ...

Embodiment 2

[0097] The difference between this embodiment and Embodiment 1 is that when any encryption key in step (5) needs to be modified, the modified key message is encrypted twice, and then forwarded by a different server C. The modification key message stores the content of the encryption key modified through negotiation between the communication parties. The modification key message itself is generally an encrypted message with certain security, but the present invention uses secondary encryption and random physical path , making it difficult for attackers to obtain and crack such sensitive messages, thus making the entire communication more secure.

[0098] see Figure 8 , taking the case of 3 servers as an example, showing the process of modifying the key K2:

[0099] 1. The data sent by VoIP terminal A through server C2 is encrypted by K2;

[0100] 2. VoIP terminal A wishes to modify the secret key K2;

[0101] 3. VoIP terminal A performs K1 encryption on the update K2 secret...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed network telephone system. The distributed network telephone system comprises a VoIP terminal A and a VoIP terminal B, the VoIP terminal A and VoIP terminal B have talking connection through n servers C, and the concrete steps include that (1) when the VoIP terminal A and VoIP terminal B are started, the servers C1, C2, ...Cn verify the VoIP terminal A and VoIP terminal B; (2) the VoIP terminal sends a VoIP terminal B calling request to the servers C1, C2, ...Cn; (3) the servers C1, C2, ...Cn receive the request of the VoIP terminal A, find the VoIP terminal B and build connection; (4) the VoIP terminal B confirms answering; (5) the VoIP terminals A and B perform voice communication through the transmitting of the servers C1, C2, ...Cn, and each server C loads partial data according to strategy.

Description

technical field [0001] The invention relates to a distributed network telephone system. Background technique [0002] The global wireless network coverage rate reached 61% at the end of 2013, and major cities in China have proposed that the wireless broadband coverage rate will reach more than 90% around 2015. The social environment is very suitable for the development of VoIP Internet telephony. There are already more than 1,500 VoIP network telephone service providers in the world, some of which have been affirmed worldwide. [0003] In China, free applications such as WeChat, Yixin, and Lianglian, which are similar to VoIP and provide instant messaging services for smart terminals based on network transmission, have replaced SMS and become the most popular social tools on mobile platforms. [0004] However, from the icloud leak door incident, it can be found that when the server is breached, the security of user data cannot be discussed at all. The Prism Gate incident s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04M7/00H04L29/08
Inventor 苗欣叶峻豪
Owner HANGZHOU SYNOCHIP DATA SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products