Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key distribution method applicable to VOIP voice encryption

A technology of key distribution and voice encryption, applied in key distribution, which can solve problems such as hidden dangers of information security, difficulty in identity authentication, and eavesdropping on call content.

Active Publication Date: 2017-07-07
BEIJING DATANG GOHIGH SOFTWARE TECH
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to the call connection based on the SIP protocol, the data packets exchanged by both parties are in plain text. Therefore, the call content is very easy to be eavesdropped on the network, and there is a large information security risk.
At present, the security design for VoIP mainly solves the problem of secure distribution of voice encryption keys through the transmission protection of the SIP protocol, such as the IPSec transmission protection protocol at the IP layer and the SSL transmission protection protocol at the TCP layer; in addition, it is also implemented by extending the SIP protocol. End-to-end session key negotiation method, but the negotiation method will lead to the difficulty of identity authentication and effective supervision of both parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key distribution method applicable to VOIP voice encryption
  • Key distribution method applicable to VOIP voice encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Such as figure 1As shown, the key distribution method suitable for VOIP voice encryption provided by the present invention is: the calling terminal initiates a session key application to the key distribution server (KDS, Key Distributiong Server) to trigger key distribution, and the key distribution is triggered by the key distribution server. The distribution server generates a session key for both the main terminal and the called terminal, and returns it to the calling terminal; after the calling terminal obtains the session key, it initiates an encrypted call to the called terminal through the VOIP server, and sends the key generated by the key distribution server The feature data is sent to the called terminal, and the media stream transmission channel is established between the calling terminal and the calling terminal through the VOIP server; both the calling terminal and the called terminal use the session key to encrypt the media stream and then transmit it to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key distribution method applicable to VOIP voice encryption, which is characterized in that a calling terminal initiates a session key application to a key distribution server (KDS) so as to trigger key distribution, the KDS generates a session key for a calling party and a called party and returns the session key to the calling terminal; the calling terminal initiates an encryption call to a called terminal through a VOIP server after acquiring the session key and sends key feature data generated by the KDS to the called terminal, and a media stream transmission channel is established between the calling party and the called party through the VOIP server; the calling party and the called party encrypt media streams by using the session key and send the encrypted media streams to each other, and the receiving parties decrypt the received data by using the session key so as to acquire the media streams. The key distribution method has the advantages that the key is directly generated by the KDS, thereby being easy to perform key management, and reducing adjustment and transformation for the VoIP server; the KDS performs identity verification on the calling party and the called party before the key is generated, thereby making up the vulnerability of identity authentication of an SIP (Session Initiation Protocol); one session is provided with one key, encryption is performed in the whole process, no plaintext appears in the transmission process, and the security is high.

Description

technical field [0001] The invention relates to a key distribution mechanism, in particular to a method for realizing end-to-end media stream encryption key distribution between a calling terminal and a called terminal in a packet switching network, and belongs to the field of encryption communication. Background technique [0002] With the development of network communication and computer technology, voice and video applications based on packet networks have been widely used. The VOIP signaling standards mainly used in packet network communication include the H.323 system proposed by ITU-T and the SIP system proposed by IETF. The application based on the SIP standard has many advantages over the application based on the H.323 system, and a large number of applications have been gradually obtained. application. [0003] SIP (Session Initiation Protocol) is a signaling control protocol at the session layer, which is used to create, modify and release the session of one or mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L9/083H04L63/0442H04L63/062H04L63/08H04L65/762
Inventor 付景林侯玉成赵德胜孟汉峰王芊刘雪峰丁明锋张新中鞠秀芳李永丰李耀龙石宇光王志刚杨永强袁文旗肖静晗
Owner BEIJING DATANG GOHIGH SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products