Proactive defense method for call interception in telecommunication network

An active defense and telecommunications network technology, applied in the field of communication, to achieve the effect of easy interception, increasing the difficulty of cracking, and achieving weak correlation or irrelevance

Active Publication Date: 2016-01-13
THE PLA INFORMATION ENG UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention aims at the static and easy-to-locate problems of encrypted transmission of telephone communication content existing in the prior art, and proposes an active defense method for wiretapping of telecommunication network calls

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proactive defense method for call interception in telecommunication network
  • Proactive defense method for call interception in telecommunication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Example 1: Combining Figure 1-Figure 2 , a kind of active defense method against telecommunication network call wiretapping, this method comprises the following steps:

[0021] Step 1: Establish a dynamic routing set; in a telecommunication network, a physical routing refers to a set of channels with fixed source and destination addresses, fixed physical bandwidth, and static binding of channel identifiers and physical channels. Dynamic routing is based on physical routing. It is a logical routing generated by using the SS7 multi-point code technology, IP address pool technology and the dynamic address mapping method agreed between network elements. A set of channels with variable source and destination addresses, variable bandwidth capacity, and temporary pairing of channel identifiers and physical channels. Different from physical channels, such as 64kb / sTDM voice channel or RTP port, where the basic unit of service bearing in physical routing is, the basic unit of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of communication, and particularly relates to a proactive defense method for call interception in a telecommunication network. Firstly, a logic route set is defined on a network topology and protocol layer, a dynamic mapping mechanism for a visible logic route set and a secrete real route set is built, and a media path subset comprising a plurality of physical channels and providing a channel hopping mechanism is provided for each telephone call; and then, a media stream fragmentation technology and the channel hoping mechanism are used comprehensively for discrete transmission of the media information, and the media streams being easy to find the paths and intercept and being recombined in sequence in the network view can be converted into irregular 'data puzzles' which have disordered paths and data packages, and are difficult to intercept completely and recombine for a third party. Furthermore, the method can be combined with a content encryption manner, so as to form a binary encryption mechanism that allows the media path to be collaborative with the media content, so that the information security performance of telephone call is further enhanced.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to an active defense method against call wiretapping of a telecommunication network. Background technique [0002] Call wiretapping is one of the main security threats faced by public telecommunication networks and private telephone networks. The most direct means to implement call eavesdropping is to connect and lead the call line, intercept the line signal and use decoding and decryption technology to restore the communication content, so as to achieve the purpose of eavesdropping. At present, my country's public telecommunications network does not provide preventive measures against call eavesdropping, and mainly relies on telephone users themselves to increase their awareness of confidentiality to prevent risks. In the private telephone network of the government, military and other departments, the encryption telephone terminal (secret telephone) is mainly use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04M1/68
CPCH04L63/04H04L63/0428H04M1/68
Inventor 陈福才倪恒王凯黄瑞阳何赞园高超吴奇
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products