Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video conference terminal registration method, terminal and gatekeeper

A video conference and terminal technology, applied in the field of security authentication, can solve the problem of lack of certain guarantee of video conference security, achieve the effect of simple and fast judgment process and improve registration efficiency

Active Publication Date: 2018-05-18
SUZHOU KEDA TECH
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, at present, the national secret algorithm has not been applied in the field of video conferencing, which makes the security of domestic video conferencing lack a certain guarantee

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video conference terminal registration method, terminal and gatekeeper
  • Video conference terminal registration method, terminal and gatekeeper
  • Video conference terminal registration method, terminal and gatekeeper

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] This embodiment provides a video conferencing terminal registration method, the execution subject is figure 1 Any video conferencing terminal in T1 or T2. Such as figure 2 shown, including the following steps:

[0071] Step S11 , the video conferencing terminal carries an encryption token of the standard H.235 encryption algorithm and sends RRQ registration request signaling to the gatekeeper, and the video conferencing terminal supports the national secret encryption algorithm.

[0072] Step S12, the video conference terminal receives the feedback information from the gatekeeper. Wherein, the feedback information of the gatekeeper is generally RCF registration confirmation signaling or RRJ registration rejection signaling.

[0073] Step S13 , when the feedback information is the RRJ registration rejection signaling, it is judged whether registration based on the national secret encryption algorithm is required. Otherwise, if image 3 As shown, step S15 is execute...

Embodiment 2

[0107] This embodiment provides a video conferencing terminal registration method, the execution subject is figure 1 The target gatekeeper in . Such as Figure 8 shown, including the following steps:

[0108] Step S21, receiving the RRQ registration request signaling sent by the video conference terminal carrying the encryption token of the national secret encryption algorithm.

[0109]Step S22. Obtain the second ciphertext by using the same national secret encryption algorithm as that of the video conferencing terminal.

[0110] Wherein, the method for obtaining the second ciphertext is the same as the method for obtaining the first ciphertext by the video conferencing terminal in Embodiment 1. The only difference is that information such as passwords and E.164 aliases on the gatekeeper side are obtained from the server side by the gatekeeper side. obtained from the database.

[0111] Step S23, when the second ciphertext is the same as the first ciphertext in the encrypte...

Embodiment 3

[0120] This embodiment provides a specific implementation manner of the method for registering a video conference terminal in Embodiment 1 above. Include the following steps:

[0121] 1) The video conference terminal carries an encryption token of the standard H.235 encryption algorithm to initiate RRQ registration request signaling to the gatekeeper.

[0122] 2) The video conferencing terminal receives the feedback information from the gatekeeper. When the feedback information is the RCF registration confirmation signaling, the registration is successful with the authentication mode of the standard H.235 encryption algorithm; when the feedback information is the RRJ registration rejection signaling, then perform step 3 ).

[0123] 3) Determine whether the reason for the registration refusal is "genericDataReason", and determine whether the specific reason for the refusal of the logo is the need for national secret SM3 encryption.

[0124] 4) When the judgment result is that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security authentication, and discloses a video conference terminal registration method, a terminal and a gatekeeper. The method comprises the followingsteps: sending, by an encryption token carrying a standard H.235 encryption algorithm of a video conference terminal, RRQ registration request signaling to the gatekeeper, wherein the video conferenceterminal supports a national secret encryption algorithm; receiving, by the video conference terminal, feedback information of the gatekeeper; when the feedback information is RRJ registration rejection signaling, judging whether registration needs to be performed based on the national secret encryption algorithm; and when the judgment result is that the registration needs to be performed based on the national secret encryption algorithm, sending, by the encryption token carrying the standard H.235 encryption algorithm of the video conference terminal, the RRQ registration request signaling to the gatekeeper. According to the video conference terminal registration method, the national secret encryption algorithm is reasonably applied to the registration process of the video conference terminal, thus effectively improving the security and confidentiality of the video conference, and simultaneously promoting the integration of the international standard and the domestic standard.

Description

technical field [0001] The invention relates to the technical field of security authentication, in particular to a video conferencing terminal registration method, a terminal and a gatekeeper. Background technique [0002] The ITU-T H.323 protocol is a set of standard audio and video transmission protocols formulated by the International Telecommunication Union under the jurisdiction of the United Nations. It is a communication protocol used by most video conferences at present. It consists of a set of protocols, including H.225 for establishing calls, H.245 for control, H.323 for large conferences, and H.450.X for supplementary services. [0003] For the sake of network security, there is a set of H.235 series standards in the ITU-T H.323 protocol suite, which is specifically for the security and encryption-related standard recommendations and requirements of the H.323 protocol. Most enterprises are using H. 323 protocol, the standard H.235 encryption algorithm will be use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3234H04L9/3239H04L63/0428H04L65/1073H04L65/403H04L65/60
Inventor 韦国华胡小鹏万春雷王超
Owner SUZHOU KEDA TECH
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More