A key distribution method suitable for VoIP voice encryption
A technology of key distribution and voice encryption, applied in key distribution, which can solve problems such as hidden dangers of information security, eavesdropping of call content, and difficulty in identity authentication.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0060] Such as figure 1As shown, the key distribution method suitable for VOIP voice encryption provided by the present invention is: the calling terminal initiates a session key application to the key distribution server (KDS, Key Distributiong Server) to trigger key distribution, and the key distribution is triggered by the key distribution server. The distribution server generates a session key for both the main terminal and the called terminal, and returns it to the calling terminal; after the calling terminal obtains the session key, it initiates an encrypted call to the called terminal through the VOIP server, and sends the key generated by the key distribution server The feature data is sent to the called terminal, and the media stream transmission channel is established between the calling terminal and the calling terminal through the VOIP server; both the calling terminal and the called terminal use the session key to encrypt the media stream and then transmit it to th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com