Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing encryption communication

A technology for encrypted communication and communication nodes, applied in the field of encrypted communication, can solve the problems of reducing user satisfaction, low security, and inability to correctly parse information, so as to avoid adverse effects and improve communication security and user satisfaction. Effect

Active Publication Date: 2006-12-20
HUAWEI TECH CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Encryption should be performed when transmitting these information that requires high security, so that the transmitted information cannot be correctly analyzed even if it is obtained illegally
[0004] However, the current application of RFC 2833 does not encrypt the transmitted information when transmitting information, and the security of communication using RFC 2833 is low
In this case, if the information is illegally obtained during transmission, the person who obtains the information illegally can directly read the content contained in the obtained information, which is likely to adversely affect the legal owner of the information, thereby reducing user satisfaction
[0005] In fact, there are still many other types of communication protocols that cannot realize encrypted communication of information, and the security of communication using these communication protocols is also very low, which is likely to have an adverse effect on the legal owner of information, thereby reducing user satisfaction

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing encryption communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0034] In the method for implementing encrypted communication provided by the present invention, the first communication node sends its own media capability information and communication encryption capability information to the second communication node; the media capability information represents the media capability of the communication node, and the communication The encryption capability information represents that the communication node has encrypted communication capability; the second communication node judges whether it has the communication encryption capability and the media capability that overlaps with the first communication node according to the media capability information and communication encryption capability information from the first communication node, If so, the first and second communication nodes determine the same data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for realizing encrypted communication, wherein when two communication nodes communicate, the first node sends itself media ability information and the communication encrypt ability information to the second node; the media ability information represents said node has media ability and the communication encrypt ability represents the node has encrypted communication ability; the second node based on the media ability and communication encrypt ability information, judges if it has the communication encrypt ability and the media ability crossed with the first communication node; if it has, the first and second nodes confirm the same data encrypted key, and use said media ability and the data encrypted key to process encrypted communication. The invention can avoid the communication information between the first and second communication nodes to be obtained illegally, and the illegal user can not analyze or read the content of obtained message, to improve the communication safety.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for realizing encrypted communication. Background technique [0002] Currently, the RFC 2833 protocol describes how to transmit dual-tone multi-frequency signals (DTMF) and other network signaling and events in real-time transport protocol (RTP) packets. [0003] Among the above-mentioned information transmitted by applying RFC 2833, a considerable part of the information requires high security. Such as: transaction data of commercial departments such as banks, user personal information, etc. Encryption should be carried out when transmitting these information with high security requirements, so that the transmitted information cannot be correctly analyzed even if it is obtained illegally. [0004] However, at present, RFC 2833 is used to transmit information without encrypting the transmitted information, and the security of communication using RFC 2833 is low. In this case...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L29/06
Inventor 王鹏王敬
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products