Internet protocol telephony security architecture
a technology of security architecture and network protocol, applied in the field of network security, can solve the problems of adding overhead and process being open to denial of service attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0015]FIG. 1 shows a flow chart demonstrating an overview of one embodiment of the invention. In flow chart 100, a server is provided 104 and a client coupled to the server is also provided 108. A trusted third party for the server and the client is provided 112 and the server is allowed to initiate a key management session with the client by utilizing a nonce 116.
[0016] It should be understood that a server is a shared computer on a network, such as a signaling controller used in an IP telephony network. Furthermore, it should be understood that a client is a computer or device served by another network computing device, such as a cable telephony adapter (client) being served by a signaling controller (server) via an IP telephony system. In addition, it should be understood that a trusted third party for the server and the client is a device or computer utilized by at least two parties that facilitates cryptographic processes such as certifying the identity of one of the two parti...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



