Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video conference calling method and video conference calling device

A technology of video conferencing and calling method, which is applied in the direction of video conferencing system, usage of multiple keys/algorithms, two-way working system, etc. It can solve the problems of lack of certain security for domestic video conferencing, and achieve the effect of strengthening security performance

Active Publication Date: 2018-04-03
SUZHOU KEDA TECH
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, the national secret encryption algorithm mentioned above has not been applied in the field of video conferencing, which makes the security of domestic video conferencing lack of certain guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video conference calling method and video conference calling device
  • Video conference calling method and video conference calling device
  • Video conference calling method and video conference calling device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] This embodiment provides a video conference calling method, such as figure 2 As shown, including the following steps:

[0076] Step S11: The first conference terminal sends request signaling to the second conference terminal or the conference platform, and the first conference terminal supports the national secret encryption algorithm.

[0077] The request signaling sent by the first conference terminal is generally H.225 signaling. The so-called first conference terminal supports the national secret encryption algorithm, which means that the H.245 capability set on the first conference terminal side has the OID corresponding to the national secret encryption algorithm registered in the ITU, for example, the SM4 national secret encryption algorithm The corresponding OID is 1.2.156.10197.1.104.

[0078] It should be noted that if the request signaling is sent to the second conference terminal, the request signaling can be H.225SETUP call request signaling, which means that th...

Embodiment 2

[0089] This embodiment provides a video conference calling method, which is applied to an unregistered first conference terminal and a second conference terminal, and the first conference terminal supports a national secret encryption algorithm. Such as image 3 As shown, including the following steps:

[0090] Step S21: The first conference terminal sends H.225 SETUP call request signaling to the second conference terminal. The call request signaling carries an identifier for indicating that the first conference terminal supports the national secret encryption algorithm.

[0091] The so-called first conference terminal supports the national secret encryption algorithm, which means that the H.245TCS capability on the first conference terminal side has the OID corresponding to the national secret encryption algorithm registered in the ITU, for example, the SM4 national secret encryption algorithm The corresponding OID is 1.2.156.10197.1.104. The identifier used to indicate that the...

Embodiment 3

[0101] This embodiment provides a video conference calling method, which is applied to the first conference terminal and the second conference terminal registered on the conference platform, and both the first conference terminal and the conference platform support the national secret encryption algorithm. Such as Figure 4 As shown, including the following steps:

[0102] Step S31: The first conference terminal sends ARQ query request signaling to the conference platform, and the query request signaling is used to query the address of the second conference terminal.

[0103] Step S32: The first conference terminal receives the ACF feedback information of the conference platform.

[0104] In this embodiment, the ACF feedback information of the conference platform includes the address of the second conference terminal. In addition, when the second conference terminal supports the national secret encryption algorithm, the feedback information also carries a message indicating that the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of video conference technologies, and discloses a video conference calling method and a video conference calling device. The video conference calling method includestransmitting request signals to second conference terminals or conference platforms by the aid of first conference terminals which support domestic password encryption algorithms; receiving feedbackinformation of the second conference terminals or the conference platforms by the aid of the first conference terminals; judging whether the second conference terminals support the domestic password encryption algorithms or not by the aid of the first conference terminals according to the feedback information; setting up conferences on the basis of the domestic password encryption algorithms by the aid of the first conference terminals and the second conference terminals when the fact that the second conference terminals support the domestic password encryption algorithms is determined, and carrying out encryption processing on data by the aid of the domestic password encryption algorithms. The data are transmitted in the conferences. The video conference calling method and the video conference calling device have the advantages that the domestic password encryption algorithms are applied to data transmission procedures in the video conferences on the premise that two ends support thedomestic password encryption algorithms, accordingly, the safety of data transmission in the video conferences can be sufficiently guaranteed, and the video conference calling method and the video conference calling device are favorable for promoting integration of national standards and international standards.

Description

Technical field [0001] The invention relates to the technical field of video conferences, in particular to a video conference calling method and device. Background technique [0002] The ITU-T H.323 protocol is a set of standard audio and video transmission protocols developed by the International Telecommunications Union under the jurisdiction of the United Nations. It is currently a communication protocol used in most video conferences. It consists of a set of protocols, including H.225 for call establishment, H.245 for control, H.323 for large conferences, and H.450.X for supplementary services. [0003] For network security considerations, there is a set of H.235 series standards in the ITU-T H.323 protocol suite, which is specifically for the security and encryption-related standard recommendations and requirements of the H.323 protocol. The vast majority of enterprises are using H. When using the 323 protocol for video conferences, the standard H.235 encryption algorithm wil...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/14H04N7/15
CPCH04L9/14H04L63/0428H04L65/1069H04N7/15
Inventor 韦国华胡小鹏万春雷王超
Owner SUZHOU KEDA TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products