Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method for sip message and encrypted sip communication system

An encrypted communication system and communication system technology, which is applied in the field of encrypted communication system, to achieve the effect of shortening time and rapid implementation

Inactive Publication Date: 2006-11-01
HITACHI LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That is, since the SIP identifier is not generally described in the public key certificate, there is a problem that a special public key certificate in which the SIP identifier is described must be used in order to realize the SIP communication system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method for sip message and encrypted sip communication system
  • Encryption method for sip message and encrypted sip communication system
  • Encryption method for sip message and encrypted sip communication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] The system of Embodiment 1 is constituted by connecting the following devices through the network 0, that is, the user terminal device 10 used by the user 1, the application server device 20 providing the service 2, and establishing and controlling the user terminal device 10 and the application server device 20 through SIP communication. communication between the session management device 30.

[0039] The user terminal device 10 , the application server device 20 , and the session management device 30 each have a SIP function unit 301 , an encryption function unit 302 , a communication function unit 303 , a public key certificate DB 304 , and a session DB 305 .

[0040] In addition, when specifically showing the SIP function part 301 operating in the user terminal device 10, it will be expressed as the SIP function part 301 hereinafter. 1 , when representing the SIP function unit 301 operating in the application server device 20, it is expressed as the SIP function uni...

Embodiment 2

[0294] The system structure of Embodiment 2 is similar to that of Embodiment 1.

[0295] However, in Embodiment 2, when sending the REGISTER message 41, the SIP function unit 301 must generate the encrypted data 50 in the form of a public key encrypted message, and when sending a SIP message other than the REGISTER message 41 (such as the INVITE message 43), it must Encrypted data 50 in the form of a common key encrypted message is generated.

[0296] Therefore, the encryption function unit 302 also has a function of updating the session information 70 stored in the session DB 305 , and the SIP function unit 301 has a function of instructing the encryption function unit 302 to update the session information 70 .

[0297] Furthermore, the encryption function unit 302 of the session management device 30 3 It has a function of generating not only the common information for decryption 720 but also the common information for encryption 710 .

[0298] On the other hand, the encryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

It takes time for an encryption data communication system to transfer encrypted data, because negotiations of security parameters are necessary prior to communications in order to protect security and integrity of a SIP message or public key cryptography is required to be used for an encryption process, a decryption process, an digital signature process and an digital digital signature verification process each time a SIP message is transmitted / received. When a SIP message is transferred between two entities, the message is encrypted by shared information if the information is being shared between the entities, or the message is encrypted by the public key of the transmission destination entity if the shared information is not being shared. The encrypted message contains shared information to be used for the transmission destination entity of the encrypted data to encrypt or decrypt the message, during communications after the encrypted data is generated.

Description

technical field [0001] The present invention relates to an encryption method and an encryption communication system for SIP messages communicated between multiple entities such as a server and a client. Background technique [0002] In order to establish communication (IP phone, etc.) between two entities (for example, through a device or a process implemented by executing software on a device), the SIP (Session Initiation Protocol) protocol is widely used (the specific content of SIP, for example, refer to IETF, RFC3261 "SIP: Session Initiation Protocol" IETF, June 2002, URL: http: / / www.ietf.org / rfc / rfc3261.txt (referred to as document 1)). [0003] In SIP, there is a structure of communication establishment processing between server participating entities (hereinafter also referred to as SIP clients) called SIP servers. [0004] At this time, since the communication messages (hereinafter also referred to as SIP messages) exchanged between the SIP client and the SIP serve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/32
CPCH04L9/0838H04L65/1104H04L65/70H04L65/1101
Inventor 锻忠司高田治藤城孝宏星野和义
Owner HITACHI LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products