Dynamic switching method for VoIP audio-video encryption keys

An encryption key, audio and video technology, applied in the field of network communication, can solve problems such as interruption and low security of the scheme, and achieve the effect of improving security

Active Publication Date: 2018-05-15
SHENZHEN GRANDSTREAM NETWORKS TECH +1
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the signaling layer, the encryption key is generally directly generated by the initiator and sent to the peer through the SIP protocol. This method relies on other data protection mechanisms in the signaling layer, and the security of the scheme itself is low.
And because the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic switching method for VoIP audio-video encryption keys
  • Dynamic switching method for VoIP audio-video encryption keys
  • Dynamic switching method for VoIP audio-video encryption keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The basic principles of the present invention are as follows: This solution completes the dynamic switching of audio and video encryption keys based on the DTLS protocol at the media layer, uses the security of the DLTS protocol to ensure that the encryption key is not easily leaked, and the session is not interrupted when the key is dynamically switched. The overall structure of this solution consists of three parts, which are initial negotiation, SRTP encrypted transmission and re-negotiation. The main negotiation process is completed at the media transport layer and has little correlation with the signaling layer.

[0025] In order to make the purpose, technical solutions and advantages of the present invention clearer, examples are given below. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention.

[0026] figure 1 It is a schematic diagram of the comm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention mainly discloses a dynamic switching method for VoIP audio-video encryption keys. The dynamic switching method is applied to key negotiation between a client and a server end. The methodcomprises the following steps: (a) carrying out primary key negotiation between the client and the server end through medium layer sockets; (b) acquiring a group of SRTP encryption keys after the primary negotiation is finished, storing client confirmation information and server end confirmation information, and simultaneously starting encryption transmission of medium data; and (c) initiating renegotiation by virtue of the client or the server end during the encryption transmission of the medium data, and updating the client confirmation information and the server end confirmation information. According to the method, the key negotiation process is sent by virtue of the medium layer sockets, the renegotiation can be initiated by two communication parties in any manner, conversation can be held before and after the encryption keys are dynamically switched, and a medium channel does not need to be destroyed and constructed again.

Description

technical field [0001] The invention belongs to network communication technology, in particular to audio and video encryption technology in network communication. Background technique [0002] In the process of VoIP media communication, the security of media data is particularly important. In VoIP, media data usually uses RTP for data intercommunication, and SRTP (Secure Real-time Transport Protocol) is the most commonly used secure transmission mechanism for RTP. Encrypt RTP data based on key to improve security. The key is very important to the SRTP protocol. The data of both parties in transmission depends on the key for encryption. Therefore, the security of the key is closely related to the data security of both parties in transmission. SRTP itself does not provide key negotiation, and usually uses signaling to exchange, and during a call, the key associated with SRTP is fixed. Usually, the interaction of signaling is cumbersome and inefficient, and the way of exchang...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0838H04L63/061H04L65/65
Inventor 陈超孙松山徐晓峰李夏宾
Owner SHENZHEN GRANDSTREAM NETWORKS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products