Secret key distribution method based on session initiation protocol (SIP) communication system

A key distribution and communication system technology, applied to key distribution, can solve the problems of poor real-time performance, high cost, information leakage, etc., and achieve the effect of strong real-time performance and simplified key distribution process

Active Publication Date: 2016-10-05
BEIJING DATANG GOHIGH DATA NETWORKS TECH CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] SIP (Session Initiation Protocol) is a signaling control protocol at the session layer, which is used to create, modify and release the session of one or more participants. The calling terminal and the called terminal establish a communication connection through the VOIP server, and the calling terminal and the called terminal interact. The voice content is based on the RTP real-time transmission protocol. The voice data packets are encapsulated into IP packets and transmitted on the IP network. During the transmission process, if the data packets are not processed, the call content data in plain text will be eavesdropped, resulting in information leakage. Hidden dangers
[0003] In order to ensure the security and integrity of the communication content of both parties, the PKI system is widely used, and digital certificates, asymmetric encryption, digital signatures and other technologies are used to distribute keys to ensure the confidentiality, integrity and non-repudiation of keys. The obtained key encrypts the data packet and then transmits it. However, the SIP communication system based on the PKI system architecture has the problems of complex implementation, high cost, and poor real-time performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key distribution method based on session initiation protocol (SIP) communication system
  • Secret key distribution method based on session initiation protocol (SIP) communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.

[0026] figure 1 It is a block diagram of the SIP communication system of the present invention, such as figure 1 As shown, the key distribution method based on the SIP communication system disclosed by the present invention is based on the architecture of a VOIP server, a key distribution server (KDS: Key Distribution Server), and several terminals (SIP terminals), and the terminals are established through the VOIP server. Communication connection, the VOIP server is connected to the key distribution server through the network, can obtain the key from the key distribution server, and distribute the obtained key to the terminal.

[0027] Such as figure 2 Shown, the key distribution method based on SIP communication system of the present invention, comprises the following steps:

[0028] S1: the calling terminal sends a call request message ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a secret key distribution method based on an SIP communication system. The secret key distribution method is realized based on a communication system composed of a VOIP server, a secret key distribution server and a plurality of terminals, and is characterized in that the terminals send the calling request messages to the VOIP server, the VOIP server sends a secret key obtaining request message to the secret key distribution server, and the secret key distribution server utilizes the public keys of the terminals to generate the secret key data of the terminals and distributes the secret key data to the terminals via the VOIP server; after receiving the corresponding secret key data, the terminals utilizes the own private keys to decrypt the secret key data to obtain the session keys, and the calling and called terminals utilize the session keys to realize the secret communication. According to the present invention, a secret key distribution process is simplified, the secret key data is transmitted to the terminals by the SIP messages in communication connection without needing to increase the message number additionally, the real-time performance is stronger, and the secret communication of the terminals can be realized.

Description

technical field [0001] The invention relates to a key distribution method based on a SIP communication system, belonging to the technical field of information security. Background technique [0002] SIP (Session Initiation Protocol) is a signaling control protocol at the session layer, which is used to create, modify and release the session of one or more participants. The calling terminal and the called terminal establish a communication connection through the VOIP server, and the calling terminal and the called terminal interact. The voice content is based on the RTP real-time transmission protocol. The voice data packets are encapsulated into IP packets and transmitted on the IP network. During the transmission process, if the data packets are not processed, the call content data in plain text will be eavesdropped, resulting in information leakage. hidden dangers. [0003] In order to ensure the security and integrity of the communication content of both parties, the PKI...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04M7/00
Inventor 付景林李耀龙王允升王志刚
Owner BEIJING DATANG GOHIGH DATA NETWORKS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products