Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A key distribution method suitable for VoIP voice encryption

A technology of key distribution and voice encryption, applied in key distribution, which can solve problems such as hidden dangers of information security, eavesdropping of call content, and difficulty in identity authentication.

Active Publication Date: 2019-10-22
BEIJING DATANG GOHIGH SOFTWARE TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to the call connection based on the SIP protocol, the data packets exchanged by both parties are in plain text. Therefore, the call content is very easy to be eavesdropped on the network, and there is a large information security risk.
At present, the security design for VoIP mainly solves the problem of secure distribution of voice encryption keys through the transmission protection of the SIP protocol, such as the IPSec transmission protection protocol at the IP layer and the SSL transmission protection protocol at the TCP layer; in addition, it is also implemented by extending the SIP protocol. End-to-end session key negotiation method, but the negotiation method will lead to the difficulty of identity authentication and effective supervision of both parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key distribution method suitable for VoIP voice encryption
  • A key distribution method suitable for VoIP voice encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Such as figure 1As shown, the key distribution method suitable for VOIP voice encryption provided by the present invention is: the calling terminal initiates a session key application to the key distribution server (KDS, Key Distributiong Server) to trigger key distribution, and the key distribution is triggered by the key distribution server. The distribution server generates a session key for both the main terminal and the called terminal, and returns it to the calling terminal; after the calling terminal obtains the session key, it initiates an encrypted call to the called terminal through the VOIP server, and sends the key generated by the key distribution server The feature data is sent to the called terminal, and the media stream transmission channel is established between the calling terminal and the calling terminal through the VOIP server; both the calling terminal and the called terminal use the session key to encrypt the media stream and then transmit it to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key distribution method suitable for VOIP voice encryption. The calling terminal initiates a session key application to a key distribution server (KDS for short), triggers key distribution, and the KDS generates a session between the main and called parties. The key is returned to the calling terminal; after the calling terminal obtains the session key, it initiates an encrypted call to the called terminal through the VOIP server, sends the key characteristic data generated by KDS to the called terminal, and the calling and called parties through the VOIP server Establish a media stream transmission channel; both parties use the session key to encrypt the media stream and transmit it to the other party, and the other party uses the session key to decrypt the received data to obtain the media stream. Advantages of the present invention: the key is directly generated by KDS, which is easy to manage the key and reduces the adjustment and transformation of the VoIP server; Encryption, full encryption, no plaintext in the transmission process, high security.

Description

technical field [0001] The invention relates to a key distribution mechanism, in particular to a method for realizing end-to-end media stream encryption key distribution between a calling terminal and a called terminal in a packet switching network, and belongs to the field of encryption communication. Background technique [0002] With the development of network communication and computer technology, voice and video applications based on packet networks have been widely used. The VOIP signaling standards mainly used in packet network communication include the H.323 system proposed by ITU-T and the SIP system proposed by IETF. The application based on the SIP standard has many advantages over the application based on the H.323 system, and a large number of applications have been gradually obtained. application. [0003] SIP (Session Initiation Protocol) is a signaling control protocol at the session layer, which is used to create, modify and release the session of one or mo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0825H04L9/083H04L63/0442H04L63/062H04L63/08H04L65/762
Inventor 付景林侯玉成赵德胜孟汉峰王芊刘雪峰丁明锋张新中鞠秀芳李永丰李耀龙石宇光王志刚杨永强袁文旗肖静晗
Owner BEIJING DATANG GOHIGH SOFTWARE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products