WO2016116034A1 - Procédé, appareil et système de transmission de données - Google Patents

Procédé, appareil et système de transmission de données Download PDF

Info

Publication number
WO2016116034A1
WO2016116034A1 PCT/CN2016/071359 CN2016071359W WO2016116034A1 WO 2016116034 A1 WO2016116034 A1 WO 2016116034A1 CN 2016071359 W CN2016071359 W CN 2016071359W WO 2016116034 A1 WO2016116034 A1 WO 2016116034A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
hash function
port number
target
fingerprint information
Prior art date
Application number
PCT/CN2016/071359
Other languages
English (en)
Chinese (zh)
Inventor
肖晶
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2016116034A1 publication Critical patent/WO2016116034A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to the field of communications and, more particularly, to a method, apparatus and system for transmitting data.
  • a media communication technology for example, video conferencing technology, etc.
  • H.323 protocol which can establish a session connection through the H.323 protocol, and thus can perform connection with other terminal devices through the session connection.
  • Embodiments of the present invention provide a method, apparatus, and system for transmitting data, which can improve security of transmitted data.
  • a first aspect provides a method for transmitting data, which is applied to a communication system including a first terminal device and a second terminal device, and the first terminal device and the second terminal device pass the H.323 protocol.
  • Communicating the method includes: the first terminal device receives a first hash function list sent by the second terminal device, where the first hash function list includes at least one hash function supported by the second terminal device, Determining a first hash function in the first hash function list, and determining first fingerprint information corresponding to the first hash function, and transmitting the first hash function and the first fingerprint to the second terminal device Information, wherein the first hash function belongs to a hash function supported by the first terminal device, the first hash function and the first fingerprint information are used to authenticate the first terminal device;
  • the second terminal device sends a second hash function list, where the second hash function list includes at least one hash function supported by the first terminal device, and receives the second hash sent by the second terminal.
  • a second number of fingerprint information wherein the second hash function to the second terminal device is determined from the second list of the hash function, the hash function and the second terminal belong to the second set a supported hash function, the second fingerprint information is fingerprint information corresponding to the second hash function, and the second hash function and the second fingerprint information are used for authenticating the second terminal device;
  • the terminal device performs authentication processing with the second terminal device according to the first hash function, the first fingerprint information, the second hash function, and the second fingerprint information to establish a data packet transport layer security protocol DTLS protocol. Connect and transfer data between the second terminal device through the DTLS protocol connection.
  • the method further includes: the first terminal device sends a first port number to the second terminal device, where the first port number is the first terminal device a port number used to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection; the first terminal device receives a second port number sent by the second terminal device, and the second port number is the second terminal a port number used by the device to establish an SCTP connection based on the DTLS protocol connection; the first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number, in the DTLS On the protocol connection, data is transmitted between the SCTP connection and the second terminal device.
  • the method further includes: the first terminal device sends the first role indication information to the second terminal device, where the first role indication information is used to indicate the first a role supported by the terminal device, the role is at least one of "active" and "passive"; the first terminal device receives the second role indication information sent by the second terminal device, and the second role indication information is used to indicate a role supported by the second terminal device; and the first terminal device performs authentication processing with the second terminal device according to the first hash function, the first fingerprint information, the second hash function, and the second fingerprint information The first terminal device according to the first hash function, the first fingerprint information, the second hash function, the second fingerprint information, and a corner supported by the first terminal device And the role of the second terminal device performs an authentication process supported by the
  • a second aspect provides a method for transmitting data, which is applied to a communication system including a first terminal device and a second terminal device, and the first terminal device and the second terminal device pass the H.323 protocol.
  • Communicating the method includes: the first terminal device receives a first hash function list sent by the second terminal device, where the first hash function list includes at least one hash function supported by the second terminal device; The first terminal device determines a target hash function from the first hash function list, and determines fingerprint information corresponding to the target hash function, wherein the target hash function a hash function supported by the first terminal device; the first terminal device sends the target hash function and the fingerprint information to the second terminal device; the first terminal device according to the target hash function and the fingerprint information And performing authentication processing with the second terminal device to establish a data packet transport layer security protocol DTLS protocol connection, and transmitting data between the second terminal device and the second terminal device through the DTLS protocol connection.
  • the method before the determining, by the first terminal device, the target hash function from the first hash function list, the method further includes: receiving, by the first terminal device The role indication information sent by the second terminal device, the role indication information is used to indicate a role supported by the second terminal device, the role is at least one of “active” and “passive”; the first terminal device is according to the role Determining information, determining a role supported by the second terminal device; and determining, by the first terminal device, the target hash function from the first hash function list, including: determining, by the first terminal device, that the first terminal device supports When the role includes "active" and the role supported by the second terminal device includes "passive", the target hash function is determined from the first hash function list.
  • the first terminal device determines the target hash function from the first hash function list, including: the first terminal device is configured according to A hash function supported by itself determines a target hash function from the first hash function list.
  • the method before the determining, by the first terminal device, the target hash function from the first hash function list, the method further includes: The first terminal device sends a second hash function list to the second terminal device, where the second hash function list includes at least one hash function supported by the first terminal device, so that the second terminal device is configured according to the first a second hash function list, the first hash function list is determined, wherein the hash function included in the first hash function list belongs to the second hash function list; and the first terminal device is from the first Determining the target hash function in the hash function list includes: the first terminal device determines that any of the hash functions in the first hash function list is a target hash function.
  • the method further includes: the first terminal device sends a first port number to the second terminal device, where the first port number is a port number used by the first terminal device to establish a flow control transport protocol (SCTP) connection based on the DTLS protocol connection; the first terminal device receives a second port number sent by the second terminal device, the second port number a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection; the first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number To connect to the DTLS protocol Data is transmitted between the SCTP connection and the second terminal device.
  • SCTP flow control transport protocol
  • a third aspect provides a method for transmitting data, which is applied to a communication system including a first terminal device and a second terminal device, and the first terminal device and the second terminal device pass the H.323 protocol.
  • Communicating the method includes: the second terminal device sends a first hash function list to the first terminal device, where the first hash function list includes at least one hash function supported by the second terminal device; The second terminal device receives the target hash function sent by the first terminal device and the fingerprint information corresponding to the target hash function, where the target hash function is that the first terminal device is from the first hash function list.
  • Determining, and the target hash function belongs to a hash function supported by the first terminal device; the second terminal device performs authentication processing with the first terminal device according to the target hash function and the fingerprint information to establish data
  • the packet transport layer security protocol DTLS protocol is connected, and the data is transmitted between the second terminal device through the DTLS protocol connection.
  • the method further includes: the second terminal device sends the role indication information to the first terminal device, where the role indication information is used to indicate a role supported by the second terminal device, and the role is at least one of “active” or “passive” So that the first terminal device determines the target ha from the first hash function list when determining that the role supported by the first terminal device includes “active” and the role supported by the second terminal device includes “passive” Greek function.
  • the target hash function is that the first terminal device is configured from the first hash function list according to a hash function supported by the first terminal device definite.
  • the second terminal device receives, at the second terminal device, a target hash function sent by the first terminal device and corresponding to the target hash function.
  • the method further includes: the second terminal device receiving the second hash function list sent by the first terminal device, where the second hash function list includes at least one hash function supported by the first terminal device. The second terminal device determines the first hash function list according to the second hash function list, so that the hash function included in the first hash function list belongs to the second hash function list.
  • the method further includes: receiving, by the second terminal device, the first port number sent by the first terminal device, the first port number Is the flow control used by the first terminal device to establish a connection based on the DTLS protocol.
  • the second terminal device sends a second port number to the first terminal device, where the second port number is used by the second terminal device to establish an SCTP connection based on the DTLS protocol a port number of the connection; the second terminal device establishes an SCTP connection with the first terminal device according to the first port number and the second port number, to connect to the first terminal device through the SCTP connection on the DTLS protocol connection Transfer data between.
  • a fourth aspect provides a method for transmitting data, which is applied to a communication system including a first terminal device, a second terminal device, and a gateway device, where the first terminal device and the gateway device pass H.323 The protocol communication, the second terminal device and the gateway device communicate with each other through a session initiation protocol, the method comprising: the gateway device receiving at least one first hash function sent by the second terminal device, the first hash function a hash function supported by the second terminal device, sending, to the first terminal device, a first hash function list recorded with the first hash function, and receiving a target first hash function sent by the first terminal device And the first fingerprint information, wherein the target first hash function is determined by the first terminal device from the first hash function list, and the target first hash function belongs to the first terminal device supported by the first terminal device a first function, the first fingerprint information is fingerprint information corresponding to the target first hash function, and the target first hash function and the first fingerprint information are used to set the first terminal Performing authentication; the gateway device receives
  • Fingerprint information, the target second hash function and the second fingerprint information are used to authenticate the second terminal device; the gateway device sends the target first hash function and the first fingerprint information to the second terminal device, And sending the target second hash function and the second fingerprint information to the first terminal device, so that the first terminal device and the second terminal device according to the target first hash function,
  • the first fingerprint information, the target second hash function and the second fingerprint information are subjected to an authentication process to establish a data packet transport layer security protocol DTLS protocol connection, and the data is transmitted through the DTLS protocol connection.
  • the method further includes: the gateway device receiving the first role indication information sent by the first terminal device, and the second role indication sent by the second terminal device Information, the first role indication information is used to indicate that the first terminal device supports a role, the second role indication information is used to indicate a role supported by the second terminal device, the role is at least one of “active” and “passive”; the gateway device sends the first to the second terminal device The role indicates information, and sends the second role indication information to the first terminal device, so that the first terminal device and the second terminal device according to the first hash function, the first fingerprint information, and the second The function, the second fingerprint information, the role supported by the first terminal device, and the role supported by the second terminal device perform authentication processing.
  • the method further includes: receiving, by the gateway device, the first port number sent by the first terminal device and the second terminal device a second port number, where the first port number is a port number used by the first terminal device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection, where the second port number is the second terminal device a port number used to establish an SCTP connection based on the DTLS protocol connection; the gateway device forwards the first port number to the second terminal device, and forwards the second port number to the first terminal device, to facilitate the The first terminal device and the second terminal device establish an SCTP connection according to the first port number and the second port number, and transmit data through the SCTP connection.
  • a fifth aspect provides a method for transmitting data, which is applied to a communication system including a first terminal device, a second terminal device, and a gateway device, where the first terminal device and the gateway device pass H.323
  • the second terminal device communicates with the gateway device through the session initiation protocol SIP
  • the method includes: the first terminal device receiving the first hash function list sent by the gateway device, where the first hash is Recording, in the function list, at least one first hash function sent by the second terminal device to the gateway device, the first hash function belonging to a hash function supported by the second terminal device, from the first hash function Determining a target first hash function in the list, and determining first fingerprint information corresponding to the target first hash function, wherein the target first hash function belongs to a hash function supported by the first terminal device, The target first hash function and the first fingerprint information are used to authenticate the first terminal device, and send the target first hash function and the first fingerprint letter to the gateway device.
  • the gateway device sends the target first hash function and the first fingerprint information to the second terminal device;
  • the first terminal device sends a second hash function list to the gateway device, the second hash
  • the function list includes at least one second hash function supported by the first terminal device, and receives a target second hash function and second fingerprint information sent by the gateway device, where the target second hash function is the second Determining, by the terminal device, part or all of the second hash function sent by the gateway device, and the target second hash function belongs to the second terminal device a hash function, the second fingerprint information is fingerprint information corresponding to the target second hash function, and the target second hash function and the second fingerprint information are used for authenticating the second terminal device; a terminal device performs authentication processing with the second terminal device according to the target first hash function, the first fingerprint information, the target second hash function, and the second fingerprint information to establish a data packet transport layer security protocol.
  • the DTLS protocol is connected, and data is transmitted between the second terminal device through the DTLS protocol connection
  • the method further includes: the first terminal device sends a first port number to the gateway device, where the first port number is used by the first terminal device a port number for establishing a flow control transport protocol SCTP connection based on the DTLS protocol connection, so that the gateway device sends the first port number to the second terminal device; the first terminal device receives the sent by the gateway device a second port number, the second port number is sent by the second terminal device to the gateway device, and the second port number is used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection. a port number; the first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number, to transmit between the SCTP connection and the second terminal device on the DTLS protocol connection. data.
  • the method further includes: the first terminal device sends the first role indication information to the gateway device, where the first role indication information is used to indicate the first a role supported by the terminal device, the role is at least one of "active" and "passive", so that the gateway device sends the first role indication information to the second terminal device; the first terminal device receives the gateway a second role indication information sent by the device, where the second role indication information is sent by the second terminal device to the gateway device, and the second role indication information is used to indicate a role supported by the second terminal device; a terminal device according to the target first hash function, the first fingerprint information, the target second hash function, and the second fingerprint information and the second terminal device
  • the authentication process includes: the first terminal device according to the target first hash function, the first fingerprint information, the target second
  • a sixth aspect provides a method for transmitting data, which is applied to a communication system including a first terminal device, a second terminal device, and a gateway device, where the first terminal device and the gateway device pass H.323 Protocol communication, the second terminal device and the gateway device pass the session initialization protocol
  • the SIP communication includes: the gateway device receiving a hash function list sent by the first terminal device, the hash function list including at least one hash function supported by the first terminal device; the gateway device according to the The hash function list is negotiated with the second terminal device to determine at least one candidate hash function from the hash function list, wherein the candidate hash function belongs to a hash function supported by the second terminal device;
  • the gateway device sends the candidate hash function to the first terminal device, so that the first terminal device determines a target hash function from the candidate hash function, and determines a fingerprint corresponding to the target hash function.
  • the gateway device receives the target hash function and the fingerprint information sent by the first terminal device, and sends the target hash function and the fingerprint information to the second terminal, so as to facilitate the first terminal device and the first
  • the second terminal device performs authentication processing according to the target hash function and the fingerprint information to establish a data packet transport layer security protocol DTLS protocol connection, and passes the DTL
  • the S protocol connection transmits data.
  • the gateway device performs a negotiation process with the second terminal device according to the hash function list, to determine at least one candidate from the hash function list.
  • the hash function includes: the gateway device sends a to-be-verified hash function to the second terminal device, where the to-be-verified hash function is any hash function in the hash function list; the gateway device receives the second terminal device a verification message, the verification message is used to indicate whether the to-be-verified hash function belongs to a hash function supported by the second terminal device; and the gateway device determines, according to the verification message, that the to-be-verified hash function belongs to the second When the hash function supported by the terminal device is used, the hash function to be verified is determined as an alternative hash function.
  • the gateway device determines, according to the verification message, that the to-be-verified hash function belongs to a hash function supported by the second terminal device Determining the to-be-verified hash function as an alternative hash function includes: determining, by the gateway device, that the verification message carries the to-be-verified hash function, determining that the to-be-verified hash function belongs to the second terminal device support a hash function and determine the hash function to be verified as an alternate hash function.
  • the method further includes: receiving, by the gateway device, the first port number sent by the first terminal device and the second terminal device a second port number, where the first port number is a port number used by the first terminal device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection, where the second port number is the second terminal device a port number used to establish an SCTP connection based on the DTLS protocol connection; the gateway device forwards the first port number to the second terminal device, and to the first The terminal device forwards the second port number, so that the first terminal device and the second terminal device establish an SCTP connection according to the first port number and the second port number, and transmit data through the SCTP connection.
  • a seventh aspect provides a method for transmitting data, which is applied to a communication system including a first terminal device, a second terminal device, and a gateway device, where the first terminal device and the gateway device pass H.323 Protocol communication, the second terminal device communicates with the gateway device through a session initiation protocol SIP, the method includes: the first terminal device sends a hash function list to the gateway device, the hash function list including the first terminal At least one hash function supported by the device, so that the gateway device performs a negotiation process with the second terminal device according to the hash function list to determine at least one candidate hash function from the hash function list, where The candidate hash function belongs to the hash function supported by the second terminal device; the first terminal device receives the candidate hash function sent by the gateway device; the first terminal device determines from the candidate hash function a target hash function, and determining fingerprint information corresponding to the target hash function; the first terminal device sends the target hash function to the gateway device The fingerprint information, so that the gateway device forwards the target has
  • the method further includes: the first terminal device sends a first port number to the gateway device, so that the gateway device forwards the first port device to the second terminal device a first port number, where the first port number is a port number used by the first terminal device to establish a flow control transport protocol (SCTP) connection based on the DTLS protocol connection; the first terminal device receives the first a second port number sent by the second terminal device to the gateway device, where the second port number is a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection The first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number to transmit data through the SCTP connection.
  • SCTP flow control transport protocol
  • an apparatus for transmitting data configured in a communication system including the apparatus and the second terminal device, wherein the apparatus communicates with the second terminal device by using an H.323 protocol
  • the apparatus The receiving unit is configured to receive a first hash function list sent by the second terminal device, where the first hash function list includes at least one hash function supported by the second terminal device, and a processing unit, configured to Determining the first hash function in the first hash function list, and determining a first fingerprint information corresponding to the first hash function; a sending unit, configured to send the first hash function and the first fingerprint information to the second terminal device, where the first hash function belongs to the device a supported hash function, the first hash function and the first fingerprint information are used for authentication of the device; the sending unit is further configured to send a second hash function list to the second terminal device, the second hash The function list includes at least one hash function supported by the device; the receiving unit is further configured to receive the second hash function and the second fingerprint information sent by
  • the second hash function and the second fingerprint information are used to authenticate the second terminal device; the processing unit is further configured to: according to the first hash function, the first fingerprint information, the second hash function And the first Fingerprint information of the second terminal device performs an authentication process, to establish a data packet transport layer security protocol DTLS protocol connection, and connected to transfer data between the second terminal device via the DTLS protocol.
  • the sending unit is further configured to send, by the second terminal device, a first port number, where the first port number is used by the device for establishing a port number of the SCTP connection of the flow control transmission protocol connected to the DTLS protocol; the receiving unit further receives and receives a second port number sent by the second terminal device, where the second port number is used by the second terminal device Establishing a port number of the SCTP connection connected according to the DTLS protocol; the processing unit is further configured to establish an SCTP connection with the second terminal device according to the first port number and the second port number, to pass the DTLS protocol connection The SCTP connection transmits data between the second terminal device.
  • the sending unit is further configured to send, to the second terminal device, first role indication information, where the first role indication information is used to indicate The role supported by the device, the role is at least one of "active" and "passive”;
  • the receiving unit is further configured to receive second role indication information sent by the second terminal device, where the second role indication information is used Determining a role supported by the second terminal device;
  • the processing unit is specifically configured to: according to the first hash function, the first fingerprint information, the second hash function, the second fingerprint information, a role and a role supported by the device The role supported by the second terminal device performs authentication processing with the second terminal device.
  • a ninth aspect provides an apparatus for transmitting data, configured in a communication system including the apparatus and the second terminal device, where the apparatus and the second terminal apparatus are performed by using an H.323 protocol Communication
  • the device includes: a receiving unit, configured to receive a first hash function list sent by the second terminal device, where the first hash function list includes at least one hash function supported by the second terminal device; And determining a target hash function from the first hash function list, and determining fingerprint information corresponding to the target hash function, wherein the target hash function belongs to a hash function supported by the device; sending a unit, configured to send the target hash function and the fingerprint information to the second terminal device; the processing unit is further configured to perform authentication processing with the second terminal device according to the target hash function and the fingerprint information to establish data
  • the packet transport layer security protocol DTLS protocol is connected, and the data is transmitted between the second terminal device through the DTLS protocol connection.
  • the receiving unit is further configured to receive role indication information that is sent by the second terminal device, where the role indication information is used to indicate a role supported by the second terminal device.
  • the role is at least one of "active” and “passive”;
  • the processing unit is further configured to determine a role supported by the second terminal device according to the role indication information, and determine that the role supported by the device includes "active” And when the role supported by the second terminal device includes "passive", the target hash function is determined from the first hash function list.
  • the processing unit is specifically configured to determine a target hash from the first hash function list according to a hash function supported by the processing unit. function.
  • the sending unit is further configured to send, to the second terminal device, a second hash function list, where the second hash function list includes At least one hash function supported by the device, so that the second terminal device determines the first hash function list according to the second hash function list, wherein the hash included in the first hash function list The function belongs to the second hash function list; and the processing unit is specifically configured to determine that any of the hash functions in the first hash function list is a target hash function.
  • the sending unit is further configured to send, to the second terminal device, a first port number, where the first port number is used by the device a port number for establishing a flow control transport protocol SCTP connection based on the DTLS protocol connection;
  • the receiving unit is further configured to receive a second port number sent by the second terminal device, where the second port number is the second terminal device a port number used to establish an SCTP connection based on the DTLS protocol connection;
  • the processing unit further establishes an SCTP connection with the second terminal device according to the first port number and the second port number, in the DTLS On the protocol connection, data is transmitted between the SCTP connection and the second terminal device.
  • an apparatus for transmitting data configured in a communication system including a first terminal device and the device, wherein the first terminal device communicates with the device by using an H.323 protocol
  • the device The sending unit is configured to send, to the first terminal device, a first hash function list, where the first hash function list includes at least one hash function supported by the device, and a receiving unit, configured to receive the first terminal a target hash function sent by the device and fingerprint information corresponding to the target hash function, wherein the target hash function is determined by the first terminal device from the first hash function list, and the target hash is The function belongs to the hash function supported by the first terminal device; the processing unit is configured to perform authentication processing with the first terminal device according to the target hash function and the fingerprint information to establish a data packet transport layer security protocol DTLS protocol. Connect and transfer data between the device through the DTLS protocol connection.
  • the sending unit is further configured to send role indication information to the first terminal device, where the role indication information is used to indicate a role supported by the device, where the role is At least one of "active” or “passive”, so that the first terminal device is from the first when determining that the role supported by the first terminal device includes “active” and the role supported by the device includes "passive"
  • the target hash function is determined in the list of hash functions.
  • the target hash function is that the first terminal device is configured from the first hash function list according to a hash function supported by the first terminal device definite.
  • the receiving unit is further configured to receive a second hash function list sent by the first terminal device, where the second hash function list is Include at least one hash function supported by the first terminal device; the processing unit is further configured to determine the first hash function list according to the second hash function list, so that the first hash function list is included The hash function belongs to the second hash function list.
  • the receiving unit is further configured to receive a first port number that is sent by the first terminal device, where the first port number is the first a port number used by the terminal device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection;
  • the sending unit is further configured to send a second port number to the first terminal device, where the second port number is the device a port number used to establish an SCTP connection based on the DTLS protocol connection;
  • the processing unit is further configured to establish an SCTP connection with the first terminal device according to the first port number and the second port number, in the DTLS On the protocol connection, data is transmitted between the SCTP connection and the first terminal device.
  • an apparatus for transmitting data configured in a communication system including a first terminal device, a second terminal device, and the device, between the first terminal device and the device Communicating by the H.323 protocol, the second terminal device communicates with the device through a session initiation protocol SIP, the device includes: a receiving unit, configured to receive at least one first hash function sent by the second terminal device, where The first hash function belongs to the hash function supported by the second terminal device, and receives the second hash function list sent by the first terminal device, where the second hash function list includes the first terminal device supported by the first terminal device.
  • At least one second hash function configured to send, to the first terminal device, a first hash function list recorded with the first hash function, and send the second hash function to the second terminal device Part or all of the receiving unit, the receiving unit is further configured to receive the target first hash function and the first fingerprint information sent by the first terminal device, and receive the target sent by the second terminal device a second hash function and the second fingerprint information, wherein the target first hash function is determined by the first terminal device from the first hash function list, and the target first hash function belongs to the first terminal device a supported hash function, the first fingerprint information is fingerprint information corresponding to the target first hash function, and the target first hash function and the first fingerprint information are used to authenticate the first terminal device, where The target second hash function is determined by the second terminal device from part or all of the second hash function, and the target second hash function belongs to a hash function supported by the second terminal device, the second The fingerprint information is fingerprint information corresponding to the second hash function of the target, the
  • the receiving unit is further configured to receive the first role indication information sent by the first terminal device and the second role indication sent by the second terminal device Information, the first role indication information is used to indicate a role supported by the first terminal device, and the second role indication information is used to indicate a role supported by the second terminal device, where the role is “active” and “passive” At least one type;
  • the sending unit is further configured to send the first role indication information to the second terminal device, and send the second role indication information to the first terminal device, so as to facilitate the first terminal device and the second The terminal device according to the first hash function, the first fingerprint information, the second hash function, the second fingerprint information, a role supported by the first terminal device, and the second terminal
  • the role supported by the end device is authenticated.
  • the receiving unit is further configured to receive, by the first terminal device, the first port number and the second terminal device a second port number, where the first port number is a port number used by the first terminal device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection, where the second port number is the second terminal device a port number used to establish an SCTP connection based on the DTLS protocol connection; the sending unit is further configured to forward the first port number to the second terminal device, and forward the second port number to the first terminal device, So that the first terminal device and the second terminal device establish an SCTP connection according to the first port number and the second port number, and transmit data through the SCTP connection.
  • an apparatus for transmitting data configured in a communication system including the apparatus, a second terminal device, and a gateway device, where the device communicates with the gateway device by using an H.323 protocol,
  • the second terminal device communicates with the gateway device through the session initiation protocol SIP
  • the device includes: a receiving unit, configured to receive a first hash function list sent by the gateway device, where the first hash function list records Having at least one first hash function sent by the second terminal device to the gateway device, the first hash function belongs to a hash function supported by the second terminal device; and the processing unit is configured to use the first hash Determining a target first hash function in the function list, and determining first fingerprint information corresponding to the target first hash function, wherein the target first hash function belongs to a hash function supported by the device, the target a hash function and the first fingerprint information are used for authentication of the device; and a sending unit, configured to send the target first hash function and the first fingerprint letter to the gateway device So that
  • the sending unit is further configured to send, to the gateway device, a first port number, where the first port number is used by the device for establishing The flow control connection protocol of the DTLS protocol is connected to the port number of the SCTP connection, so that the gateway device sends the first port number to the second terminal device; the receiving unit is further configured to receive the second port number sent by the gateway device.
  • the second port number is sent by the second terminal device to the gateway device, and the second port number is a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection;
  • the processing unit is further configured to establish an SCTP connection with the second terminal device according to the first port number and the second port number, to transmit data between the SCTP connection and the second terminal device on the DTLS protocol connection.
  • the sending unit is further configured to send, to the gateway device, first role indication information, where the first role indication information is used to indicate a role supported by the device, the role is at least one of "active" and "passive", so that the gateway device sends the first role indication information to the second terminal device;
  • the receiving unit is further configured to receive the a second role indication information sent by the gateway device, where the second role indication information is sent by the second terminal device to the gateway device, and the second role indication information is used to indicate a role supported by the second terminal device;
  • the processing unit is specifically configured to: according to the target first hash function, the first fingerprint information, the target second hash function, the second fingerprint information, a role supported by the device, and a role supported by the second terminal device The second terminal device performs an authentication process.
  • an apparatus for transmitting data configured in a communication system including a first terminal device, a second terminal device, and the device, the first terminal device and the device passing the H.323 Protocol communication, the second terminal device communicates with the device through a session initiation protocol SIP, the device includes: a receiving unit, configured to receive a hash function list sent by the first terminal device, where the hash function list includes the first At least one hash function supported by a terminal device; a processing unit, configured to perform a negotiation process with the second terminal device according to the hash function list, to determine at least one candidate hash function from the hash function list, The candidate hash function belongs to the hash function supported by the second terminal device, and the sending unit is configured to send the candidate hash function to the first terminal device, so that the first terminal device obtains the candidate Determining a target hash function in the hash function, and determining fingerprint information corresponding to the target hash function; the receiving unit is further configured to receive the first terminal device to send Certain hash function and the fingerprint
  • the sending unit is further configured to send a to-be-verified hash function to the second terminal device, where the to-be-verified hash function is the hash function list Any one of the hash functions;
  • the receiving unit is further configured to receive the verification message sent by the second terminal device, where the verification message is used to indicate whether the to-be-verified hash function belongs to a hash function supported by the second terminal device;
  • the processing unit is specifically configured to determine, according to the verification message, that the to-be-verified hash function belongs to a hash function supported by the second terminal device, and determine the to-be-verified hash function as an alternate hash function.
  • the processing unit is specifically configured to: when determining that the verification message carries the to-be-verified hash function, determine the to-be-verified The hash function belongs to a hash function supported by the second terminal device, and the hash function to be verified is determined as an alternate hash function.
  • the receiving unit is further configured to receive, by the first terminal device, the first port number and the second terminal device a second port number, where the first port number is a port number used by the first terminal device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection, where the second port number is the second terminal device a port number used to establish an SCTP connection based on the DTLS protocol connection; the sending unit is further configured to forward the first port number to the second terminal device, and forward the second port number to the first terminal device, So that the first terminal device and the second terminal device establish an SCTP connection according to the first port number and the second port number, and transmit data through the SCTP connection.
  • an apparatus for transmitting data configured in a communication system including the apparatus, a second terminal device, and a gateway device, where the device communicates with the gateway device by using an H.323 protocol,
  • the second terminal device communicates with the gateway device through a session initiation protocol SIP.
  • the device includes: a sending unit, configured to send a hash function list to the gateway device, where the hash function list includes at least one supported by the device.
  • the gateway device performs a negotiation process with the second terminal device according to the hash function list to determine at least one candidate hash function from the hash function list, wherein the candidate hash function belongs to a hash function supported by the second terminal device; a receiving unit, configured to receive the candidate hash function sent by the gateway device; and a processing unit, configured to determine a target hash function from the candidate hash function, and determine Relative to the target hash function
  • the sending unit is further configured to send the target hash function and the fingerprint information to the gateway device, so that the gateway device forwards the target hash function and the fingerprint information to the second terminal;
  • the processing unit The method is further configured to perform an authentication process with the second terminal device according to the target hash function and the fingerprint information to establish a data packet transport layer security protocol DTLS protocol connection, and connect and transmit data through the DTLS protocol.
  • the sending unit is further configured to send the first port number to the gateway device, so that the gateway device forwards the first to the second terminal device a port number, where the first port number is a port number used by the device to establish a flow control transport protocol (SCTP) connection based on the DTLS protocol connection;
  • the receiving unit is further configured to receive a second port number sent by the gateway device, The second port number is sent by the second terminal device to the gateway device, where the second port number is a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection;
  • the processing unit The method is further configured to establish an SCTP connection with the second terminal device according to the first port number and the second port number to transmit data through the SCTP connection.
  • a system for transmitting data including a first terminal device, a second terminal device, and a gateway device, where the first terminal device communicates with the gateway device by using an H.323 protocol, where the The second terminal device communicates with the gateway device through a session initiation protocol SIP, wherein the gateway device is configured to receive at least one first hash function sent by the second terminal device, where the first hash function belongs to the second terminal a hash function supported by the device, sending, to the first terminal device, a first hash function list recorded with the first hash function, and receiving the target first hash function and the first fingerprint information sent by the first terminal device
  • the target first hash function is determined by the first terminal device from the first hash function list, and the target first hash function belongs to a hash function supported by the first terminal device, where the The fingerprint information is fingerprint information corresponding to the target first hash function, and the target first hash function and the first fingerprint information are used for authenticating the first terminal device, and are used for a second hash function list sent by
  • the target second hash function is determined by the second terminal device from part or all of the second hash function sent by the gateway device, and the target second hash function belongs to the second terminal a hash function supported by the device
  • the second fingerprint information is fingerprint information corresponding to the target second hash function
  • the target second hash function and the second fingerprint information are used to authenticate the second terminal device
  • performing authentication processing with the second terminal device according to the target first hash function, the first fingerprint information, the target second hash function, and the second fingerprint information to establish data.
  • the packet transport layer security protocol DTLS protocol is connected, and the data is transmitted between the second terminal device through the DTLS protocol connection.
  • a system for transmitting data includes: a first terminal device, a second terminal device, and a gateway device, where the first terminal device communicates with the gateway device by using an H.323 protocol, where the The second terminal device communicates with the gateway device through a session initiation protocol SIP, wherein the gateway device is configured to receive a hash function list sent by the first terminal device, where the hash function list includes the first terminal device supported by the first terminal device At least one hash function for performing a negotiation process with the second terminal device according to the hash function list to determine at least one candidate hash function from the hash function list, wherein the candidate hash function belongs to a hash function supported by the second terminal device, configured to send the candidate hash function to the first terminal device, so that the first terminal device determines a target hash function from the candidate hash function, and determines a fingerprint letter corresponding to the target hash function And receiving the target hash function and the fingerprint information sent by the first terminal device, and sending the target hash function and the fingerprint
  • a method, apparatus, and system for transmitting data by enabling a first terminal device to negotiate a hash function and fingerprint information with a second terminal device based on an H.323 protocol, capable of being in the first terminal device and
  • the second terminal device performs authentication processing based on the hash function and the fingerprint information and establishes a DTLS protocol connection, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol.
  • the security authentication mechanism improves the security of the transmitted data, and enables the DTLS protocol to be applied to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 1 is a schematic flowchart of a method of transmitting data according to an embodiment of the present invention.
  • FIG. 2 is a schematic flow chart of a method of transmitting data according to another embodiment of the present invention.
  • FIG. 3 is a schematic flowchart of a method of transmitting data according to still another embodiment of the present invention.
  • FIG. 4 is a schematic flow chart of a method of transmitting data according to still another embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of a method of transmitting data according to still another embodiment of the present invention.
  • FIG. 6 is a schematic flowchart of a method of transmitting data according to still another embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of a method of transmitting data according to still another embodiment of the present invention.
  • FIG. 8 is a schematic block diagram of an apparatus for transmitting data according to an embodiment of the present invention.
  • FIG. 9 is a schematic block diagram of an apparatus for transmitting data according to another embodiment of the present invention.
  • FIG. 10 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • FIG. 11 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • FIG. 12 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • FIG. 13 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • FIG. 14 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • Figure 15 is a schematic block diagram of an apparatus for transmitting data in accordance with an embodiment of the present invention.
  • 16 is a schematic block diagram of an apparatus for transmitting data according to another embodiment of the present invention.
  • FIG. 17 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • FIG. 18 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • FIG. 19 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • 20 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • 21 is a schematic block diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • FIG. 22 is a schematic architectural diagram of a system for transmitting data according to still another embodiment of the present invention.
  • 23 is a schematic architectural diagram of an apparatus for transmitting data according to still another embodiment of the present invention.
  • the technical solution of the present invention can be applied to various communication systems that implement media communication, such as a video conference system.
  • the terminal device in the communication system may be configured with a video codec module, an audio codec module, a signaling module, a control module, a configuration module, and other functional modules, and the main function is to receive and initiate a remote conference terminal.
  • the call encodes the video and audio streams collected by the local camera and the MIC to the remote end, and simultaneously decodes the video and audio streams of the far end and outputs them to the display and the speaker of the local end, thereby, two or two
  • the above terminal equipment is in the above hard Under the support of the device, video communication can be performed based on various standard protocols provided by the communication system.
  • the terminal device may be a user equipment (UE, User Equipment), etc., such as a smart mobile terminal or a computer, etc., which exchange voice and/or data via the Internet or a data transmission cable, and may also be a network side device.
  • UE user equipment
  • UE User Equipment
  • MCU Multi-point Control Unit
  • Selective Forwarding Unit a Selective Forwarding Unit
  • both terminal devices may be devices that establish a session connection using the H.323 protocol (ie, Case 1), or one terminal device may be a device that establishes a session connection using the H.323 protocol, and another device.
  • the device can be a device that establishes a session connection using SIP (ie, Case 2).
  • two devices that establish a session connection by using the H.323 protocol may negotiate a hash function and fingerprint information for performing security authentication in the following manner A or mode B to establish a DTLS connection.
  • the DTLS connection may be based on a User Datagram Protocol (UDP) or may be based on a Transmission Control Protocol (TCP).
  • UDP User Datagram Protocol
  • TCP Transmission Control Protocol
  • FIG. 1 shows a schematic flow diagram of a method 100 of transmitting data in accordance with an embodiment of the present invention.
  • the first terminal device communicates with the second terminal device by using the H.323 protocol.
  • the method 100 includes:
  • the first terminal device receives, according to the H.323 protocol, a first hash function list sent by the second terminal device, where the first hash function list includes at least one hash function supported by the second terminal device. Determining a first hash function from the first hash function list, and determining first fingerprint information corresponding to the first hash function, and transmitting the first hash function and the first terminal device to the second terminal device a fingerprint information, wherein the first hash function belongs to a hash function supported by the first terminal device, and the first hash function and the first fingerprint information are used to authenticate the first terminal device;
  • the first terminal device sends the second terminal device to the second terminal device according to the H.323 protocol.
  • a hash function list the second hash function list includes at least one hash function supported by the first terminal device, and receives a second hash function and second fingerprint information sent by the second terminal, where the second The hash function is determined by the second terminal device from the second hash function list, and the second hash function belongs to a hash function supported by the second terminal device, and the second fingerprint information is the second The fingerprint information corresponding to the hash function, the second hash function and the second fingerprint information are used to authenticate the second terminal device;
  • the first terminal device performs authentication processing with the second terminal device according to the first hash function, the first fingerprint information, the second hash function, and the second fingerprint information to establish a data packet transport layer security.
  • the protocol DTLS protocol is connected, and the data is transmitted between the second terminal device through the DTLS protocol connection.
  • the first terminal device (hereinafter, for convenience of understanding and distinction, recorded as: terminal device # ⁇ ) and the second terminal device (hereinafter, in order to facilitate understanding and distinction, note: terminal The device # ⁇ ) may be configured in a communication system using the H.323 protocol (specifically, establishing a session connection using the H.323 protocol), whereby the terminal device # ⁇ and the terminal device # ⁇ can be based on the H.323
  • the protocol communicates, for example, signaling.
  • the terminal device # ⁇ may record a hash function that it can support in the hash function list # ⁇ (ie, an example of the first hash function list), and encapsulate the hash function list # ⁇ table according to the H.323 protocol.
  • the message provided by the communication system can be transmitted between the terminal device # ⁇ and the terminal device # ⁇ , and the message is transmitted to the terminal device # ⁇ .
  • the terminal device # ⁇ can record the hash function that it can support in the hash function list # ⁇ (ie, an example of the second hash function list), and list the hash function according to the H.323 protocol.
  • the alpha table is encapsulated into a message provided by the communication system that can be transmitted between the terminal device # ⁇ and the terminal device # ⁇ , and the message is transmitted to the terminal device # ⁇ .
  • the first hash function list is carried by a terminal capability set (Terminal Capability Set) message sent by the first terminal device to the second terminal device, where the second hash function list is sent to the second terminal device and sent to the second A terminal capability set message of a terminal device.
  • Terminal Capability Set Terminal Capability Set
  • hash function list # ⁇ and hash function list # ⁇ can be carried by the message provided in the existing protocol, which improves the versatility and practicability of the present invention.
  • terminal capability set message enumerated above is only an exemplary description of the message carrying the above hash function list # ⁇ and hash function list # ⁇ , and the present invention is also limited thereto, and other can be in the terminal device # ⁇ Message transmitted between terminal device # ⁇ , or terminal device # ⁇ and terminal
  • the end device # ⁇ can send and receive messages based on the H.323 protocol, and all fall within the protection scope of the present invention.
  • the hash function recorded by the terminal device # ⁇ in the hash function list # ⁇ may be all the hash functions supported by the terminal device # ⁇ , or may be the terminal device # ⁇ .
  • the supported partial hash function is not particularly limited in the present invention.
  • the number of hash functions recorded by the hash function list may be determined according to a system (or standard) or a message carried by the hash function list. The capacity (or the amount of information that the message can carry) is arbitrarily changed.
  • the hash function recorded by the terminal device # ⁇ in the hash function list # ⁇ may be all the hash functions supported by the terminal device # ⁇ , or may be a partial hash function supported by the terminal device # ⁇ ,
  • the invention is not particularly limited.
  • the number of hash functions recorded by the hash function list may be determined according to a system (or standard) or a capacity of a message carried by the hash function list (or, the message can The amount of information carried is arbitrarily changed.
  • the terminal device # ⁇ can receive the above-described message carrying the hash function list # ⁇ , and decapsulate the message based on the H.323 protocol to acquire the hash function list # ⁇ .
  • the terminal device # ⁇ can receive the above message carrying the hash function list # ⁇ , and decapsulate the message based on the H.323 protocol to acquire the hash function list # ⁇ .
  • the terminal device # ⁇ may compare the hash function in the hash function list # ⁇ with the hash function supported by itself, thereby determining that the hash function list # ⁇ belongs to the terminal device # ⁇ .
  • the hash function that can be supported is used as the hash function # ⁇ (i.e., the first hash function) for authentication of the terminal device # ⁇ by the terminal device # ⁇ .
  • the terminal device # ⁇ may perform the above-described collation processing in a prescribed order (eg, from the first hash function in the hash function list # ⁇ ), when determining that one belongs to
  • the hash function list # ⁇ belongs to a hash function that can be supported by the terminal device # ⁇
  • the hash function is used as the hash function # ⁇ , and the above-described collation processing is ended.
  • the terminal device # ⁇ may select any hash function from the determined hash function after determining all the hash functions in the hash function list # ⁇ that are supported by the terminal device # ⁇ , as the Greek function # ⁇ .
  • the terminal device # ⁇ may determine the fingerprint information corresponding to the hash function # ⁇ (ie, the first fingerprint information, hereinafter, for the sake of distinction, the fingerprint information # ⁇ ), and the process can be similar to the process of determining the fingerprint information corresponding to a hash function in the prior art, and a detailed description thereof will be omitted herein to avoid redundancy.
  • the fingerprint information corresponding to the hash function # ⁇ ie, the first fingerprint information, hereinafter, for the sake of distinction, the fingerprint information # ⁇
  • the process can be similar to the process of determining the fingerprint information corresponding to a hash function in the prior art, and a detailed description thereof will be omitted herein to avoid redundancy.
  • the terminal device # ⁇ can use the hash function in the hash function list # ⁇ and its self.
  • the body-supported hash function performs a collation process to determine a hash function that the terminal device ## can support in the hash function list # ⁇ , as the terminal device # ⁇ performs for the terminal device # ⁇
  • the authenticated hash function # ⁇ ie, the second hash function
  • the terminal device # ⁇ can determine the fingerprint information corresponding to the hash function # ⁇ (ie, the second fingerprint information, hereinafter, for convenience) Distinguish, record as fingerprint information # ⁇ ).
  • the terminal device # ⁇ can encapsulate the hash function # ⁇ and the fingerprint information # ⁇ determined by the communication device to be able to transmit between the terminal device # ⁇ and the terminal device # ⁇ according to the H.323 protocol. Within the message, and the message is transmitted to the terminal device # ⁇ .
  • the terminal device # ⁇ can encapsulate the hash function # ⁇ and the fingerprint information # ⁇ determined by the terminal device into a communication system capable of being transmitted between the terminal device # ⁇ and the terminal device # ⁇ according to the H.323 protocol. Within the message, and transmit the message to terminal device # ⁇ .
  • the first hash function and the first fingerprint information are carried in an Open Logical Channel message
  • the second hash function and the second fingerprint information are carried in an Open Logical Channel (Open Logical Channel) Ack) message
  • the second hash function and the second fingerprint information are carried in an open logical channel message, and the first hash function and the first fingerprint information are carried in an open logical channel acknowledgement message.
  • the target hash function and the fingerprint information can be carried by the message provided in the existing protocol, which improves the versatility and practicability of the present invention.
  • open logical channel message and open logical channel acknowledgement message are merely exemplary descriptions, and the present invention is also limited thereto, and other messages that can be transmitted between the terminal device # ⁇ and the terminal device # ⁇ , or It is said that the terminal device # ⁇ and the terminal device # ⁇ can transmit and receive messages based on the H.323 protocol, and all fall within the protection scope of the present invention.
  • both the terminal device # ⁇ and the terminal device # ⁇ can know the target hash function and the fingerprint information, and thus, the terminal device # ⁇ and the terminal device # ⁇ can be determined according to the hash function # ⁇ , the fingerprint information # determined as described above.
  • the ⁇ , the hash function # ⁇ , and the fingerprint information # ⁇ perform secure authentication processing, and the secure authentication processing can be performed in the DTLS handshake phase.
  • the terminal device # ⁇ can generate the verification information # ⁇ 1 according to the hash function # ⁇ and the fingerprint information # ⁇ (for example, the terminal device # ⁇ can generate a code according to the hash function # ⁇ and the fingerprint information # ⁇ ), and The verification information is sent to the terminal device # ⁇ through DTLS signaling.
  • the terminal device # ⁇ generates the verification information # ⁇ 2 based on the hash function # ⁇ and the fingerprint information # ⁇ (for example, the terminal device # ⁇ can generate a code based on the hash function # ⁇ and the fingerprint information # ⁇ ).
  • the terminal device # ⁇ determines that the above-described verification information # ⁇ 1 transmitted by the terminal device # ⁇ by DTLS coincides with the verification information # ⁇ 2 generated by the terminal device # ⁇ , the terminal device # ⁇ can determine that the terminal device # ⁇ passes the security verification, and can The terminal device # ⁇ establishes a DTLS connection.
  • the terminal device # ⁇ can generate the verification information # ⁇ 1 according to the hash function # ⁇ and the fingerprint information # ⁇ (for example, the terminal device # ⁇ can encrypt the fingerprint information # ⁇ according to the hash function # ⁇ to generate a code. And send the verification information to the terminal device # ⁇ .
  • the terminal device # ⁇ generates the authentication information # ⁇ 2 based on the hash function # ⁇ and the fingerprint information # ⁇ (for example, the terminal device # ⁇ can encrypt the fingerprint information # ⁇ according to the hash function # ⁇ to generate a code).
  • the terminal device # ⁇ determines that the above-described verification information # ⁇ 1 transmitted by the terminal device # ⁇ coincides with the verification information # ⁇ 2 generated by the terminal device # ⁇ , the terminal device # ⁇ can determine that the terminal device # ⁇ passes the security verification and can communicate with the terminal.
  • Device # ⁇ establishes a DTLS connection.
  • the method before the first terminal device performs authentication processing with the second terminal device according to the first hash function, the first fingerprint information, the second hash function, and the second fingerprint information, the method further include:
  • the second role indication information that is sent by the second terminal device according to the H.323 protocol, where the second role indication information is used to indicate a role supported by the second terminal device, where the role is “active” And at least one of "passive";
  • the first terminal device performs authentication processing with the second terminal device according to the first hash function, the first fingerprint information, the second hash function, and the second fingerprint information, including:
  • the first terminal device according to the first hash function, the first fingerprint information, the second hash function, the second fingerprint information, a role supported by the first terminal device, and a role supported by the second terminal device
  • the second terminal device performs an authentication process.
  • the system can provide three roles, namely, “active”, “passive”, and “active passive” (hereinafter, for ease of understanding and explanation, simply referred to as “all can be”)
  • the terminal device # ⁇ and the terminal device # ⁇ can notify each other of the roles of each other, thereby determining the originator of the above DTLS handshake based on the role.
  • the terminal device# ⁇ can be used as the initiator of the above DTLS handshake.
  • the terminal device # ⁇ can be used as the initiator of the above DTLS handshake.
  • the second role indication information is carried in the same message as the first hash function list, and the first role indication information and the second hash function list are carried in the same message.
  • the terminal device # ⁇ may send the hash function list # ⁇ and the second role indication information to the terminal device # ⁇ at the same time, and the terminal device # ⁇ may The hash function list # ⁇ and the first role indication information are transmitted to the terminal device # ⁇ at the same time, thereby reducing the information interaction process, and the message exchanged between the terminal device # ⁇ and the terminal device # ⁇ can be reduced.
  • the amount of processing increases processing efficiency.
  • the terminal device # ⁇ and the terminal device # ⁇ can establish a DTLS protocol connection.
  • the method and the process for establishing the DTLS protocol connection between the terminal device # ⁇ and the terminal device # ⁇ may be similar to the prior art, and a detailed description thereof is omitted herein to avoid redundancy.
  • the terminal device # ⁇ and the terminal device # ⁇ can connect and transmit the related data of the video conference through the DTLS protocol.
  • the terminal device # ⁇ and the terminal device # ⁇ can perform authentication authentication exchange according to the procedure specified in RFC 6347, and after the authentication authentication is successful, the logical channel is turned on to perform data transmission.
  • the terminal device # ⁇ and the terminal device # ⁇ can establish an application layer protocol connection, for example, a Stream Control Transmission Protocol (SCTP) connection, and transmit data through the SCTP connection, based on the connection of the DTLS protocol.
  • SCTP Stream Control Transmission Protocol
  • SCTP is only an exemplary description of the transport layer protocol, and the present invention is not limited thereto, and various other transport layer protocols for transmitting data are all within the scope of the present invention.
  • a process of establishing an SCTP connection by using a DTLS protocol connection will be described as an example.
  • the method further includes:
  • the first terminal device sends a first port number to the second terminal device, where the first port number is used by the first terminal device to establish a flow control transmission protocol based on the DTLS protocol connection.
  • the first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number, so as to transmit data between the SCTP connection and the second terminal device on the DTLS protocol connection.
  • the terminal device # ⁇ can determine the port number to be connected based on the DTLS protocol, and further, can select a port number for establishing an SCTP connection with the terminal device # ⁇ (hereinafter, for ease of understanding and distinction, note: port No. # ⁇ ), and the terminal device # ⁇ can transmit the port number # ⁇ to the terminal device # ⁇ according to the H.323 protocol.
  • the terminal device # ⁇ can determine the port number to be connected based on the DTLS protocol, and further, the port number for establishing an SCTP connection with the terminal device # ⁇ can be selected therefrom (hereinafter, for ease of understanding and distinction, it is noted as: port number # ⁇ ), and the terminal device # ⁇ can transmit the port number # ⁇ to the terminal device # ⁇ according to the H.323 protocol.
  • the first port number is carried in a terminal capability set message or a logical channel message
  • the second port number is carried in a terminal capability set message or a logical channel message.
  • the terminal device # ⁇ and the terminal device # ⁇ have been able to confirm that the DTLS protocol connection is to be established, they can transmit the port number selected for establishing the SCTP connection to the other party before establishing the DTLS protocol connection.
  • the terminal device # ⁇ can transmit the selected port number (ie, port number # ⁇ ) to the terminal device # ⁇ through the above Open Logical Channel message.
  • the terminal device # ⁇ can transmit its selected port number (ie, port number # ⁇ ) to the terminal device # ⁇ through the above Open Logical Channel message.
  • terminal device # ⁇ and the terminal device # ⁇ may also transmit the port number selected for establishing the SCTP connection to the other party through the terminal capability set message.
  • the terminal device # ⁇ may transmit the selected port number (ie, port number # ⁇ ) to the terminal device # ⁇ through the above-mentioned Terminal Capability Set message or by updating the Terminal Capability Set message.
  • the terminal device # ⁇ may transmit its selected port number (ie, port number # ⁇ ) to the terminal device # ⁇ through the above-described Terminal Capability Set message or by updating the Terminal Capability Set message.
  • the first port number and the first hash function and the first fingerprint information are carried in the same type of message, and the second port number and the second hash function and the second fingerprint information are carried in the same message. .
  • the first port number and the second hash function list are carried in the same type of message, and the second port number is carried in the same message as the first hash function list.
  • the terminal device # ⁇ and the terminal device # ⁇ can know the port number used by each other, thereby establishing an SCTP connection according to the port number, and performing data transmission, and establishing an SCTP connection according to the port number and passing
  • the method and process for transmitting data by the SCTP connection may be similar to the prior art. Here, in order to avoid redundancy, detailed description thereof is omitted.
  • the hash function is negotiated between the terminal device # ⁇ and the terminal device # ⁇ listed above to establish a DTLS connection process, but the present invention is not limited thereto, and other parameters for establishing a DTLS connection may be used. It is determined by a negotiation process between the terminal device # ⁇ and the terminal device # ⁇ , and the negotiation process is similar to the negotiation process enumerated in the above method 100.
  • the hash function # ⁇ and the hash function # ⁇ determined as described above may be the same or different, and the present invention is not particularly limited.
  • the first terminal device and the second terminal device can negotiate the hash function and the fingerprint information based on the H.323 protocol, and can be in the first terminal device and the second terminal device.
  • a DTLS protocol connection based on the hash function and the fingerprint information is established, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism to improve the security of the transmission data.
  • And can make the DTLS protocol applicable to terminal devices using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 2 shows a schematic flow chart of a method 200 of transmitting data according to an embodiment of the present invention, as described from the perspective of a first terminal device (ie, a decision device described later).
  • the first terminal device and the second terminal device communicate through the H.323 protocol.
  • the method 200 includes:
  • the first terminal device receives, according to the H.323 protocol, a first hash function list sent by the second terminal device, where the first hash function list includes at least one hash function supported by the second terminal device ;
  • the first terminal device determines a target hash function from the first hash function list, and Determining fingerprint information corresponding to the target hash function, wherein the target hash function belongs to a hash function supported by the first terminal device;
  • the first terminal device sends the target hash function and the fingerprint information to the second terminal device according to the H.323 protocol.
  • the first terminal device establishes a data packet transport layer security protocol DTLS protocol connection with the second terminal device according to the target hash function and the fingerprint information, to transmit data between the second terminal device and the second terminal device through the DTLS protocol connection.
  • the first terminal device (hereinafter, for ease of understanding and distinction, recorded as: terminal device #1) and the second terminal device (hereinafter, for ease of understanding and distinction, note: terminal Device #2) may be configured in a communication system using the H.323 protocol (specifically, establishing a session connection using the H.323 protocol), whereby terminal device #1 and terminal device #2 can be based on the H.323
  • the protocol communicates, for example, signaling.
  • the terminal device #1 and the terminal device #2 may determine a hash function and fingerprint information (also referred to as a security parameter) through negotiation, so that a data packet may be established based on the hash function and the fingerprint information.
  • the Datagram Transport Layer Security (DTLS) protocol is used to transmit data through the DTLS protocol, thereby effectively utilizing the DTLS protocol security authentication mechanism (ie, encryption and authentication based on hash functions and fingerprint information). The security of data transmission.
  • DTLS Datagram Transport Layer Security
  • the process in which the terminal device #1 negotiates with the terminal device #2 to determine the hash function and the fingerprint information may be: the terminal device (ie, the decision device) that makes the decision is determined from one of the supported hash functions.
  • the target hash function finally used for the above encryption and authentication, the target hash function and the fingerprint information are sent to another device, and a DTLS connection establishment process, that is, a DTLS handshake, is initiated based on the target hash function and its corresponding fingerprint information.
  • a DTLS connection establishment process that is, a DTLS handshake
  • the terminal device #2 can record the hash function that it can support in the hash function list (hereinafter, for ease of understanding and differentiation, as follows: the first hash function list), according to the H.323 protocol.
  • a hash function list is encapsulated into a message provided by the communication system that can be transmitted between the terminal device #1 and the terminal device #2, and the message is transmitted to the terminal device #1.
  • the first hash function list is carried in a terminal capability set message.
  • a terminal device may be mentioned. Terminal Capability Set message.
  • the first hash function list can be carried by the message provided in the existing protocol, which improves the versatility and practicability of the present invention.
  • terminal capability set message enumerated above is only an exemplary description of the message carrying the first hash function list, and the present invention is limited thereto, and the other can be between the terminal device #1 and the terminal device #2.
  • the hash function recorded by the terminal device #2 in the first hash function list may be all the hash functions supported by the terminal device #2, or may be the terminal device #2.
  • the supported partial hash function is not particularly limited in the present invention.
  • the number of hash functions recorded by the hash function list may be determined according to a system (or standard) or a message carried by the hash function list. The capacity (or the amount of information that the message can carry) is arbitrarily changed.
  • the terminal device #1 can receive the message carrying the first hash function list and decapsulate the message based on the H.323 protocol to obtain the first hash function list.
  • the method before the determining, by the first terminal device, the target hash function from the first hash function list, the method further includes:
  • the first terminal device receives, according to the H.323 protocol, role indication information sent by the second terminal device, where the role indication information is used to indicate a role supported by the second terminal device, and the role is “active” and “passive”. At least one of them;
  • Determining, by the first terminal device, the target hash function from the first hash function list including:
  • the first terminal device determines a target hash function from the first hash function list when determining that the role supported by the first terminal device includes “active" and the role supported by the second terminal device includes “passive”.
  • the system can provide three roles, namely, “active”, “passive”, and “all”.
  • the terminal device whose role is “active” can be used as the above-mentioned decision device, and the terminal device whose role is "passive” or “all” can be confirmed as the active terminal, that is, the participant of the video conference needs to establish the DTLS described later. Connect and transmit data related to video conferencing (for example, video data and audio data, etc.).
  • the terminal device #2 is in the information that can be used to indicate the role it supports (ie, the role refers to The information is sent to the terminal device #1. It should be noted that since the present specification is described by using the terminal device #1 as a decision terminal, it is necessary to make the role of the terminal device #2 "passive” or "all". Or, the role indicated by the role indication information needs to include "passive”, that is, the role of the terminal device #2 is "passive” or "all”.
  • the terminal device #1 determines that it can support the "active" role (or can be used as the above-described decision device), and determines that the terminal device #2 can support "passive” according to the above-described role support information (or, say, the terminal device # After the role of 2 is "passive” or "all", at S220, a hash function that both terminal device #1 and terminal device #2 can support is determined from the first hash function list as used for establishing The target hash function of the DTLS connection described later.
  • the role indication information is carried in the same message as the first hash function list.
  • the terminal device #2 may send the first hash function list and the role indication information to the terminal device #1 through the same message, thereby reducing the information interaction process, thereby reducing The number of messages exchanged between the terminal device #1 and the terminal device #2 improves the processing efficiency.
  • the terminal device #1 can determine the manner of the target hash function by any of the following modes 1 and 2.
  • the first terminal device determines the target hash function from the first hash function list, including:
  • the terminal device #1 may compare the hash function in the first hash function list with the hash function supported by itself, thereby determining the first hash function list.
  • the hash function that the terminal device #1 can support is used as the target hash function.
  • the terminal device #1 may perform the above-described collation processing in a prescribed order (eg, from the first hash function in the first hash function list), when determining one belongs to
  • the first hash function list belongs to the hash function that can be supported by the terminal device #1
  • the hash function is used as the target hash function, and the above-mentioned comparison processing is ended.
  • the terminal device #1 may select any hash function from the determined hash function as the target after determining all the hash functions in the first hash function list that are supported by the terminal device #1. Hash function.
  • the terminal device #2 can determine the first hash function list only according to a hash function that can be supported by itself, or the first hash function list can be in advance (for example, the factory When it is configured in the terminal device #2, the processing load of the terminal device #2 can be reduced, and the performance requirement for the terminal device #2 can be reduced.
  • the method before the determining, by the first terminal device, the target hash function from the first hash function list, the method further includes:
  • the first terminal device sends a second hash function list to the second terminal device according to the H.323 protocol, where the second hash function list includes at least one hash function supported by the first terminal device, so as to facilitate Determining, by the second terminal device, the first hash function list according to the second hash function list, wherein the hash function included in the first hash function list belongs to the second hash function list;
  • Determining, by the first terminal device, the target hash function from the first hash function list including:
  • the first terminal device determines that any of the hash functions in the first hash function list is a target hash function.
  • the terminal device #1 can record the hash function that it can support in the hash function list (hereinafter, for ease of understanding and differentiation, as follows: the second hash function list), according to H
  • the .323 protocol encapsulates the second hash function list into a message provided by the communication system that can be transmitted between the terminal device #1 and the terminal device #2, and transmits the message to the terminal device #1.
  • the second hash function list is carried in a terminal capability set message.
  • a terminal capability set message may be listed, so that the second hash function list can be carried by using the message provided in the existing protocol, thereby improving the versatility of the present invention. And practicality.
  • terminal capability set message enumerated above is only an exemplary description of the message carrying the second hash function list, and the present invention is limited thereto, and the other can be between the terminal device #1 and the terminal device #2.
  • the hash function recorded by the terminal device #1 in the second hash function list may be all the hash functions supported by the terminal device #1, or may be the terminal device #1.
  • the supported partial hash function is not particularly limited in the present invention, for example, the hash function list
  • the number of recorded hash functions may be arbitrarily changed according to the system (or standard) specification or the capacity of the message carried by the hash function list (or the amount of information that the message can carry).
  • the terminal device #2 can receive the above message carrying the second hash function list, and decapsulate the message based on the H.323 protocol to obtain the second hash function list.
  • the terminal device #2 can compare the hash function in the second hash function list with the hash function supported by itself, thereby determining that the first hash function list belongs to the terminal device #2.
  • a supported hash function and record the hash function in the second hash function list For example, by way of example and not limitation, the terminal device #2 may perform the above-described collation processing in a prescribed order (eg, from the first hash function in the second hash function list), when determining one belongs to When the second hash function list belongs to a hash function that can be supported by the terminal device #2, the hash function is recorded in the first hash function list. Also, in this case, the terminal device #2 can appropriately adjust the number of times of the above-described collation processing according to the number of hash functions that the second hash function list needs to record.
  • the hash function recorded in the first hash function list received by the terminal device #1 in S210 is a hash function that both the terminal device #1 and the terminal device #2 can support, and therefore, at S220 In the terminal device #1, any hash function may be selected from the determined hash functions as the target hash function.
  • the terminal device #1 can confirm the target hash function by performing a simple selection action, and the second hash function list can be configured in advance (for example, at the time of shipment) at the terminal.
  • the processing load of the terminal device #1 can be reduced, and the performance requirement for the terminal device #1 can be reduced.
  • the terminal device #1 may determine the fingerprint information corresponding to the target hash function, and the process may be related to determining a fingerprint corresponding to the hash function in the prior art.
  • the process of the information is similar, and the detailed description thereof is omitted here to avoid redundancy.
  • the terminal device #1 may encapsulate the target hash function and the fingerprint information into a message that can be transmitted between the terminal device #1 and the terminal device #2 according to the H.323 protocol. And the message is transmitted to terminal device #2.
  • the target hash function and the fingerprint information are carried in the open logical channel message.
  • an Open Logical Channel message may be enumerated, so that the target hash function and the fingerprint information can be carried by using the message provided in the existing protocol.
  • the versatility and utility of the present invention are enhanced.
  • the above-listed open logical channel message is only an exemplary description of the message carrying the above-mentioned target hash function and fingerprint information, and the present invention is also limited thereto, and other can be in the terminal device #1 and the terminal device #2.
  • the terminal device #2 can receive the above message carrying the target hash function and the fingerprint information, and decapsulate the message based on the H.323 protocol to acquire the target hash function and the fingerprint information.
  • both the terminal device #1 and the terminal device #2 can know the target hash function and the fingerprint information, and thus, at S240, the terminal device #1 and the terminal device #2 can establish a DTLS connection according to the target hash function and the fingerprint information.
  • the terminal device #1 can perform security authentication (also referred to as a DTLS handshake) with the terminal device #2 according to the target hash function and the fingerprint information.
  • the terminal device #1 can generate the verification information #1 according to the target hash function and the fingerprint information (for example, the terminal device #1 can encrypt the fingerprint information according to the target hash function to generate a code), and the verification information # 1 is sent to terminal device #2.
  • the terminal device #2 can generate the verification information #2 according to the target hash function and the fingerprint information (for example, the terminal device #2 can encrypt the fingerprint information according to the target hash function to generate a code), and the verification information # 2 is sent to terminal device #1.
  • the terminal device #2 when the terminal device #2 determines that the above-described verification information #1 transmitted by the terminal device #1 coincides with the verification information #2 generated by it, the terminal device #2 can determine that the terminal device #1 passes the security verification, and can be associated with the terminal device # 1 Establish a DTLS connection.
  • the terminal device #1 determines that the above-mentioned verification information #2 transmitted by the terminal device #2 coincides with the verification information #1 generated by it, the terminal device #1 can determine that the terminal device #2 passes the security verification, and can be associated with the terminal device. #2 Establish a DTLS connection.
  • the method and process for establishing the DTLS protocol connection between the terminal device #1 and the terminal device #2 may be similar to the prior art.
  • detailed description thereof is omitted.
  • the method further includes:
  • the confirmation information sent by the second terminal device to the second terminal device according to the H.323 protocol is used to indicate that the second terminal device receives the target hash function and the fingerprint information.
  • the terminal device #2 may According to the H.323 protocol, the confirmation information for indicating that the terminal device #2 has received the target hash function is encapsulated into a message provided by the communication system that can be transmitted between the terminal device #1 and the terminal device #2, And the message is transmitted to terminal device #1.
  • the acknowledgement information is carried in an open logical channel acknowledgement message.
  • an Open Logical Channel Ack message may be listed, so that the acknowledgement information can be carried by using the message provided in the existing protocol, thereby improving the versatility of the present invention and Practicality.
  • the above-mentioned open logical channel acknowledgement message is only an exemplary description of the message carrying the above acknowledgement information, and the present invention is also limited thereto, and other messages that can be transmitted between the terminal device #1 and the terminal device #2.
  • the terminal device #1 and the terminal device #2 can transmit and receive messages based on the H.323 protocol, and all fall within the protection scope of the present invention.
  • the terminal device #1 can receive the message carrying the confirmation information, and decapsulate the message based on the H.323 protocol to obtain the confirmation information, thereby determining that the terminal device #2 has received the target hash function, and can execute The operation in the above S240.
  • the terminal device #1 After the terminal device #2 returns the confirmation information to the terminal device #1 after receiving the target hash function and the fingerprint information, the terminal device #1 can determine, according to the confirmation information, that the terminal device #2 is ready to perform DTLS establishment. Thereby, the reliability of the method for transmitting data of the embodiment of the present invention can be further improved.
  • the terminal device #1 and the terminal device #2 can connect and transmit related data of the video conference through the DTLS protocol.
  • the terminal device #1 and the terminal device #2 can perform authentication authentication exchange according to the procedure specified in RFC 6347, and after the authentication authentication is successful, the logical channel is turned on for data transmission.
  • the terminal device #1 and the terminal device #2 may establish an application layer protocol connection, for example, a Stream Control Transmission Protocol (SCTP) connection, and transmit data through the SCTP connection, based on the DTLS protocol connection.
  • SCTP Stream Control Transmission Protocol
  • SCTP is only an exemplary description of the application layer protocol, and the present invention is not limited thereto, and various other application layer protocols for transmitting data are all within the scope of the present invention.
  • a process of establishing an SCTP connection by using a DTLS protocol connection will be described as an example.
  • the method further includes:
  • the first terminal device sends a first port number to the second terminal device, where the first port number is the a port number used by the first terminal device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection;
  • the first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number, so as to transmit data between the SCTP connection and the second terminal device on the DTLS protocol connection.
  • the terminal device #1 can determine the port number based on the DTLS protocol connection, and further, can select a port number for establishing an SCTP connection with the terminal device #2 (hereinafter, In order to facilitate understanding and differentiation, it is recorded as: port number #1), and the terminal device #1 can transmit the port number #1 to the terminal device #2 according to the H.323 protocol.
  • the terminal device #2 can determine the port number based on the DTLS protocol connection, and further, can select a port number for establishing an SCTP connection with the terminal device #1 (hereinafter, for ease of understanding and distinction, note: port number # 2), and the terminal device #2 can transmit the port number #2 to the terminal device #1 according to the H.323 protocol.
  • the first port number is carried in a terminal capability set message or a logical channel message is started, and
  • the second port number is carried in a terminal capability set message or a logical channel open message.
  • the terminal device #1 and the terminal device #2 have been able to confirm the DTLS protocol connection to be established, and thus, before establishing the DTLS protocol connection, Select the port number used to establish the SCTP connection and send it to the other party.
  • the terminal device #1 can transmit the selected port number (ie, port number #1) to the terminal device #2 through the above Open Logical Channel message.
  • the terminal device #2 can transmit its selected port number (ie, port number #2) to the terminal device #1 through the above Open Logical Channel message.
  • the terminal device #1 and the terminal device #2 may also send the port number selected for establishing the SCTP connection to the other party through the terminal capability set message.
  • the terminal device #1 may transmit its selected port number (ie, port number #1) to the terminal device #2 through the above-described Terminal Capability Set message or by updating the Terminal Capability Set message.
  • Terminal device #2 can pass The above Terminal Capability Set message, or by updating the Terminal Capability Set message, sends its selected port number (ie, port number #2) to the terminal device #1.
  • the first port number and the second hash function list are carried in the same type of message.
  • the terminal device #1 can carry the port number #1, the second hash function list, and the role information in the same type of message.
  • terminal device #2 can host port number #2 and the first hash function list in the same type of message.
  • the first port number is carried in the same message as the target hash function and the fingerprint information.
  • the terminal device #1 can carry the port number #1, the target hash function, and the fingerprint information in the same message.
  • terminal device #2 can carry port number #2 and acknowledgment information in the same message.
  • the terminal device #1 and the terminal device #2 can know the port number used by each other, thereby establishing an SCTP connection according to the port number, and performing data transmission, and establishing an SCTP connection according to the port number and passing
  • the method and process for transmitting data by the SCTP connection may be similar to the prior art. Here, in order to avoid redundancy, detailed description thereof is omitted.
  • the hash function is negotiated between the terminal device #1 and the terminal device #2 listed above to establish a DTLS connection process, but the present invention is not limited thereto, and other parameters for establishing a DTLS connection may be used. It is determined by a negotiation process between the terminal device #1 and the terminal device #2, and the negotiation process is similar to the negotiation process enumerated in the above method 200.
  • the communication between the first terminal device and the second terminal device by the H.323 protocol refers to passing the H through the hash function list, the hash function, and the fingerprint information before performing the authentication process.
  • the .323 protocol communicates, after determining the first hash function, the first fingerprint information, the second hash function, and the second fingerprint information for performing authentication as described above, the signaling or message that can be provided according to the DTLS protocol.
  • the authentication process is performed, that is, the first terminal device and the second terminal device may perform communication without using the H.323 protocol when performing authentication processing.
  • the first terminal device and the second terminal device can negotiate the hash function and the fingerprint information based on the H.323 protocol, and can be in the first terminal device and the second terminal device. Establishing a DTLS protocol connection based on the hash function and the fingerprint information, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection.
  • the security authentication mechanism of the DTLS protocol can be effectively utilized to improve the security of the transmitted data, and the DTLS protocol can be applied to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • the device that establishes the session connection by using the H.323 protocol and the device that establishes the session connection by using the SIP may negotiate the hash function and the fingerprint information for performing security authentication through the gateway device in the following manner C or manner D.
  • the DTLS connection may be UDP based or TCP based.
  • FIG. 3 shows a schematic flow diagram of a method 300 of transmitting data in accordance with another embodiment of the present invention, as described from the perspective of a gateway device.
  • the first terminal device communicates with the gateway device through an H.323 protocol, and the second terminal device and the gateway device Through session initiation protocol SIP communication, as shown in FIG. 3, the method 300 includes:
  • the gateway device receives at least one first hash function sent by the second terminal device, where the first hash function belongs to a hash function supported by the second terminal device, and sends the record to the first terminal device.
  • a first hash function list of the first hash function receiving the target first hash function and the first fingerprint information sent by the first terminal device, where the target first hash function is the first terminal device from the Determining in the first hash function list, and the target first hash function belongs to a hash function supported by the first terminal device, and the first fingerprint information is fingerprint information corresponding to the target first hash function,
  • the target first hash function and the first fingerprint information are used to authenticate the first terminal device;
  • the gateway device receives the second hash function list sent by the first terminal device, where the second hash function list includes at least one second hash function supported by the first terminal device, to the second terminal device Sending part or all of the second hash function, receiving the target second hash function and the second fingerprint information sent by the second terminal device, where the target second hash function is the second terminal device from the first Determined in part or all of the two hash functions, and the target second hash function belongs to a hash function supported by the second terminal device, and the second fingerprint information is a fingerprint corresponding to the target second hash function.
  • Information, the target second hash function and the second fingerprint information are used to authenticate the second terminal device;
  • the gateway device sends the target first hash function and the first to the second terminal device. Fingerprint information, and sending the target second hash function and the second fingerprint information to the first terminal device, so that the first terminal device and the second terminal device according to the target first hash function, the first The fingerprint information, the target second hash function and the second fingerprint information are subjected to an authentication process to establish a packet transport layer security protocol DTLS protocol connection, and the data is transmitted through the DTLS protocol connection.
  • the media communication technology can provide a variety of sessions (also referred to as "calls") to establish protocols, thereby, the terminal device can be based on its own capabilities (for example, The supported session establishment protocol selects a corresponding session establishment protocol to establish a session connection, and then can negotiate with other terminal devices through the session connection to establish a data transmission connection, thereby completing media communication with other terminal devices.
  • sessions also referred to as "calls”
  • the supported session establishment protocol selects a corresponding session establishment protocol to establish a session connection, and then can negotiate with other terminal devices through the session connection to establish a data transmission connection, thereby completing media communication with other terminal devices.
  • H.323 protocol corresponds to a data transmission connection based on the H.235 protocol
  • SIP Session Initiation Protocol
  • DTLS Datagram Transport Layer Security
  • the gateway device forwards the data transmitted between the two terminal devices (for example, converting the encoding format, etc.), thereby increasing the burden on the gateway device, reducing the transmission performance of the system, and seriously affecting user experience.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a relationship between the first terminal device and the second terminal device.
  • the DTLS protocol of the security parameter is connected, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving Affect the user experience.
  • the first terminal device (hereinafter, for ease of understanding and distinction, recorded as: terminal device #X) and can be configured to use the H.323 protocol (specifically, using H. The sub-communication system in which the 323 protocol establishes a session connection), the second terminal device (hereinafter, for ease of understanding and distinction, recorded as: terminal device #Y) can be configured to use the SIP protocol (specifically, establishing a session connection using the SIP protocol) Sub-communication system, thus, terminal device #X and gateway The devices can communicate based on the H.323 protocol, for example, transmitting signaling, and the terminal device #Y and the gateway device can communicate based on the SIP protocol, for example, transmitting signaling.
  • the terminal device #X and the terminal device #Y may negotiate to determine a hash function and fingerprint information (also referred to as a security parameter) via the gateway device, so that data may be established based on the hash function and the fingerprint information.
  • the Datagram Transport Layer Security (DTLS) is used to transmit data through the DTLS protocol, thereby effectively utilizing the security authentication mechanism of the DTLS protocol (ie, encryption and authentication based on hash functions and fingerprint information). Improve the security of data transmission.
  • the terminal device #X may record a hash function (ie, a second hash function) that it can support in the second hash function list, and encapsulate the second hash function list into the communication system according to the H.323 protocol.
  • a hash function ie, a second hash function
  • the second hash function list sent by the first terminal device to the gateway device is carried in a terminal capability set message sent by the first terminal device to the gateway device.
  • a terminal capability set (Terminal Capability Set) message may be listed, so that the hash function list can be carried by using the message provided in the existing protocol, thereby improving the present invention. Versatility and practicality.
  • the terminal capability set message enumerated above is only an exemplary description of the message carrying the second hash function list, and the present invention is limited thereto, and the other can be transmitted between the terminal device #X and the gateway device.
  • the second hash function recorded by the terminal device #X in the second hash function list may be all the hash functions supported by the terminal device #X, or may be the terminal device.
  • the partial hash function supported by #X is not specifically limited.
  • the number of second hash functions recorded by the second hash function list may be specified according to a system (or standard) or the hash function list.
  • the capacity of the message carried (or the amount of information that the message can carry) is arbitrarily changed.
  • the description of the same over-same situation that occurs when communication between the terminal device #X and the gateway device is omitted.
  • the terminal device #Y may encapsulate the first hash function that it can support according to the transmission mode specified by the SIP into the message that can be transmitted between the terminal device #Y and the gateway device provided by the communication system, and The message is transmitted to the gateway device.
  • the first hash function sent by the second terminal device to the gateway device is carried by the session description protocol (SDP, Session) of the SIP message sent by the second terminal device to the gateway device. Descrption Protocol) in the message body.
  • SDP session description protocol
  • Session Session protocol
  • Descrption Protocol Descrption Protocol
  • a SIP message including an SDP message body may be enumerated, so that the hash function column can be carried by using the message provided in the existing protocol, thereby improving the versatility of the present invention and Practicality.
  • the SDP message enumerated above is only an exemplary description of the message carrying the first hash function, and the present invention is also limited thereto, and other messages that can be transmitted between the terminal device #Y and the gateway device, or It is said that the message that the terminal device #Y and the gateway device can transmit and receive based on the SIP-defined manner falls within the protection scope of the present invention.
  • the first hash function sent by the terminal device #Y to the gateway device may be all the hash functions supported by the terminal device #Y, or may be supported by the terminal device #Y.
  • the partial hash function is not particularly limited in the present invention.
  • the second terminal device may separately separate the plurality of first hash functions by using multiple SDP messages (ie, each SDP message carries a first hash function) Transfer to the gateway device.
  • SDP messages ie, each SDP message carries a first hash function
  • the gateway device can receive the message carrying the second hash function list, and decapsulate the message according to the H.323 protocol to obtain the second hash function list, and obtain the record in the second hash function.
  • the second hash function in the list may transmit part or all of the second hash function to the terminal device #Y based on SIP.
  • the gateway device may first select any one of the second hash function lists (for example, the second The first hash function in the list of function functions, and encapsulates the hash function into a message provided by the communication system between the gateway device and the terminal device #Y according to SIP, and transmits the message to the terminal.
  • Device #Y and the gateway device can also transfer the remaining hash function in the second hash function list to #Y by a similar method.
  • the terminal device #Y can receive (one or more) messages carrying the second hash function described above, and decapsulate the message based on the SIP to obtain part or all of the second hash function. And, the terminal device #Y may compare some or all of the second hash function with a hash function supported by itself, thereby determining one or more belonging to the terminal from part or all of the second hash function.
  • the hash function that device #Y can support ie, the target second hash function.
  • the terminal device #Y can determine the fingerprint information (ie, the second fingerprint information) corresponding to the target second hash function. Thereafter, the terminal device #Y may transmit the target second hash function and the second fingerprint information determined as described above to the gateway device by, for example, an SDP message or the like.
  • the specific process may be that the gateway device first selects any hash function from the second hash function list, encapsulates it in the SDP message body of the SIP invite message, and sends it to the terminal device #Y, and then needs to send
  • the other hash functions in the second hash function list can be encapsulated in the SDP message body of the SIP Update message and sent to the terminal device #Y.
  • the terminal device #Y After receiving a hash function, the terminal device #Y encapsulates the hash function in the SDP message body of the SIP response message (such as SIP 183 response message, SIP Update response message) if it is confirmed that the hash function can be supported. Sent to the gateway device. And, the terminal device #Y confirms one of the hash functions that can be supported as the target second hash function, and encapsulates the target second hash function and its corresponding fingerprint information (ie, the second fingerprint information). The SDP message body of the SIP Update message is sent to the gateway device.
  • SDP message body of the SIP Update message is sent to the gateway device.
  • the gateway device may send the target second hash function and the second fingerprint information to the terminal device #X according to the H.323 protocol by, for example, turning on a logical channel message or a terminal capability set message.
  • the terminal device #X can know the hash function and the fingerprint information for the verification of the terminal device #Y, that is, the above-described target second hash function and second fingerprint information.
  • the gateway device can receive the message carrying the first hash function(s) supported by the terminal device #Y, and decapsulate the message according to the manner specified by the SIP to obtain the first hash function. .
  • the gateway device records part or all of the first hash function in a hash function list (ie, the first hash function list), and may pass, for example, a terminal capability set message based on the H.323 protocol. Sending the above list of the first hash function to the terminal device #X.
  • a hash function list ie, the first hash function list
  • the terminal device #X can receive the message carrying the first hash function list, and decapsulate the message based on the H.323 protocol to obtain the first hash function list, thereby being able to know that the terminal device #Y can Support some or all of the above first hash function. And, the terminal device #X may compare some or all of the first hash function with a hash function supported by itself, thereby determining one or more belonging to the terminal from part or all of the first hash function. The hash function that device #X can support (ie, the target first hash function). And, the terminal device #Y can determine the fingerprint information (ie, the first fingerprint information) corresponding to the target first hash function. Thereafter, the terminal device #X may transmit the target first hash function and the first fingerprint information determined as described above to the gateway device by, for example, turning on a logical channel message or the like.
  • the gateway device may, according to the SIP, pass the target first through, for example, an SDP message.
  • the Greek function and the first fingerprint information are sent to the terminal device #Y.
  • the terminal device #Y can know the hash function and the fingerprint information for the verification of the terminal device #X, that is, the above-described target first hash function and the first fingerprint information.
  • the target first hash function is recorded as the hash function #X
  • the first fingerprint information is recorded as the fingerprint information #X
  • the target second hash function is recorded as the hash function #Y
  • the second fingerprint information is recorded as fingerprint information #Y. That is, both the terminal device #X and the terminal device #Y can know the hash function and the fingerprint information for authenticating each other, and thus, the terminal device #X and the terminal device #Y can be determined according to the hash function # as described above.
  • X, fingerprint information #X, hash function #Y, and fingerprint information #Y perform security authentication (also referred to as: DTLS handshake).
  • the terminal device #X can generate the authentication information #X 1 according to the hash function #X and the fingerprint information #X (for example, the terminal device #X can generate a code according to the hash function #X and the fingerprint information #X), and The verification information is sent to the terminal device #Y through DTLS signaling.
  • the terminal device #Y generates the verification information #X 2 based on the hash function #X and the fingerprint information #X (for example, the terminal device #Y can generate a code based on the hash function #X and the fingerprint information #X).
  • the terminal device may determine the terminal device #X #Y via secure authentication, may be The terminal device #X establishes a DTLS connection.
  • the terminal device may #Y #Y generate verification hash function #Y #Y. 1 and the fingerprint information (e.g., the terminal device may encrypt #Y fingerprint information #Y hash function to generate a code for #Y ) and send the verification information to the terminal device #X.
  • the fingerprint information e.g., the terminal device may encrypt #Y fingerprint information #Y hash function to generate a code for #Y .
  • the terminal device #X generates the verification information #Y 2 based on the hash function #Y and the fingerprint information #Y (for example, the terminal device #X can encrypt the fingerprint information #Y according to the hash function #Y to generate a code).
  • the terminal device #X determines that the above-described verification information #Y 1 transmitted by the terminal device #Y coincides with the verification information #Y 2 generated by the terminal device #X, the terminal device #X can determine that the terminal device #Y passes the security verification, and can be associated with the terminal Device #Y establishes a DTLS connection.
  • the method further includes:
  • the gateway device receives the first role indication information sent by the first terminal device and the second role indication information sent by the second terminal device, where the first role indication information is used to indicate a role supported by the first terminal device, where the The second role indication information is used to indicate a role supported by the second terminal device, and the role is at least one of “active” and “passive”;
  • the gateway device sends the first role indication information to the second terminal device, and sends the second role indication information to the first terminal device, so that the first terminal device and the second terminal device are configured according to the first The function, the first fingerprint information, the second hash function, the second fingerprint information, the role supported by the first terminal device, and the role supported by the second terminal device perform authentication processing.
  • the system can provide three roles, namely, “active”, “passive”, and “active passive” (hereinafter, for ease of understanding and explanation, simply referred to as “all can be”)
  • the terminal device #X and the terminal device #Y can notify each other of the roles of each other via the gateway device.
  • the terminal device #X may send information (ie, first role indication information) for supporting a role that can be supported by the terminal capability set message or the open logical channel message to the gateway device, and the gateway device sends the information through the SDP message.
  • a role indication message is sent to the terminal device #Y.
  • the terminal device #Y may send, by using an SDP message, information for supporting a role that it can support (ie, second role indication information) to the gateway device, and the gateway device uses the terminal capability set message or the logical channel to open the first
  • the second role indication information is sent to the terminal device #X.
  • the initiator of the above DTLS handshake is determined.
  • the terminal device #X Can be used as the initiator of the above DTLS handshake.
  • the terminal device# X can be used as the initiator of the above DTLS handshake.
  • the terminal device #X and the terminal device #Y can establish a DTLS protocol connection.
  • the method and the process for establishing the DTLS protocol connection between the terminal device #X and the terminal device #Y may be similar to the prior art, and a detailed description thereof is omitted herein to avoid redundancy.
  • the terminal device #X and the terminal device #Y can connect and transmit related data of the video conference through the DTLS protocol.
  • the terminal device #X and the terminal device #Y can perform authentication authentication exchange according to the procedure specified in RFC 6347, and after the authentication authentication is successful, the logical channel is turned on to perform data transmission.
  • the terminal device #X and the terminal device #Y may be based on the connection of the DTLS protocol.
  • Establish an application layer protocol connection for example, a Stream Control Transmission Protocol (SCTP) connection, and transmit data through the SCTP connection.
  • SCTP Stream Control Transmission Protocol
  • SCTP is only an exemplary description of the application layer protocol, and the present invention is not limited thereto, and various other application layer protocols for transmitting data are all within the scope of the present invention.
  • a process of establishing an SCTP connection by using a DTLS protocol connection will be described as an example.
  • the method further includes:
  • the method also includes:
  • the first terminal device sends a first port number to the gateway device, where the first port number is a port number used by the first terminal device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection, so as to facilitate
  • the gateway device sends the first port number to the second terminal device;
  • the first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number, so as to transmit data between the SCTP connection and the second terminal device on the DTLS protocol connection.
  • the terminal device #X can determine the port number to be connected based on the DTLS protocol, and further, can select a port number for establishing an SCTP connection with the terminal device #Y (hereinafter, for ease of understanding and distinction, note: port No. #X), and the terminal device #X can transmit the port number #X to the gateway device by, for example, turning on a logical channel message or a terminal capability set message according to the H.323 protocol, whereby the gateway device can pass, for example, SDP or the like. The message sends the port number #X to the terminal device #Y.
  • the terminal device #Y can determine the port number connected based on the DTLS protocol, and further, can select a port number for establishing an SCTP connection with the terminal device #X (hereinafter, for ease of understanding and distinction, it is noted as: port number #Y), and the terminal device #Y can transmit the port number #Y to the gateway device by, for example, an SDP message according to the SIP, so that the gateway device can connect the port by, for example, turning on a logical channel message or a terminal capability set message or the like. #X is sent to the terminal device #X.
  • the terminal device #X and the terminal device #Y can know the port number used by each other, thereby being able to establish an SCTP connection according to the port number, and perform data transmission, and
  • the method and process for establishing an SCTP connection according to the port number and transmitting data through the SCTP connection may be similar to the prior art.
  • a detailed description thereof will be omitted.
  • the hash function is negotiated between the terminal device #X and the terminal device #Y listed above to establish a DTLS connection process, but the present invention is not limited thereto, and other parameters for establishing a DTLS connection may be used. It is determined by a negotiation process between the terminal device #X and the terminal device #Y, and the negotiation process is similar to the negotiation process enumerated in the above method 300.
  • the hash function #X and the hash function #Y determined as described above may be the same or different, and the present invention is not particularly limited.
  • a method for transmitting data according to an embodiment of the present invention using a H.323 protocol, a first terminal device, and a second terminal device using SIP to negotiate a hash function and fingerprint information via a gateway device, capable of being in the first terminal device and A DTLS protocol connection based on the hash function and the fingerprint information is established between the two terminal devices, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism.
  • the security of the transmitted data, and the DTLS protocol can be applied to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • the method 400 includes:
  • the gateway device receives a hash function list sent by the first terminal device, where the hash function list includes at least one hash function supported by the first terminal device;
  • the gateway device performs a negotiation process with the second terminal device according to the hash function list to determine at least one candidate hash function from the hash function list, where the candidate hash function belongs to the second a hash function supported by the terminal device;
  • the gateway device sends the candidate hash function to the first terminal device, so that the first terminal device determines a target hash function from the candidate hash function, and determines that the target hash function is corresponding to the target hash function. Fingerprint information;
  • the gateway device receives the target hash function and the fingerprint information sent by the first terminal device, and sends the target hash function and the fingerprint information to the second terminal, so as to facilitate the first terminal.
  • the end device and the second terminal device establish a data packet transport layer security protocol DTLS protocol connection according to the target hash function and the fingerprint information, and transmit data through the DTLS protocol connection.
  • the media communication technology can provide a variety of sessions (also referred to as "calls") to establish protocols, thereby, the terminal device can be based on its own capabilities (for example, The supported session establishment protocol selects a corresponding session establishment protocol to establish a session connection, and then can negotiate with other terminal devices through the session connection to establish a data transmission connection, thereby completing media communication with other terminal devices.
  • sessions also referred to as "calls”
  • the supported session establishment protocol selects a corresponding session establishment protocol to establish a session connection, and then can negotiate with other terminal devices through the session connection to establish a data transmission connection, thereby completing media communication with other terminal devices.
  • H.323 protocol corresponds to a data transmission connection based on the H.235 protocol
  • SIP Session Initiation Protocol
  • DTLS Datagram Transport Layer Security
  • the gateway device forwards the data transmitted between the two terminal devices (for example, converting the encoding format, etc.), thereby increasing the burden on the gateway device, reducing the transmission performance of the system, and seriously affecting user experience.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a relationship between the first terminal device and the second terminal device.
  • the DTLS protocol of the security parameter is connected, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving Affect the user experience.
  • the first terminal device (hereinafter, for convenience of understanding and distinction, recorded as: terminal device #A) and can be configured to use the H.323 protocol (specifically, using H. The sub-communication system in which the 323 protocol establishes a session connection), the second terminal device (hereinafter, for ease of understanding and distinction, recorded as: terminal device #B) can be configured to use the SIP protocol (specifically, establishing a session connection using the SIP protocol) a sub-communication system, whereby the terminal device #A and the gateway device can communicate based on the H.323 protocol, for example, transmitting signaling, and the terminal device #B and the gateway device can communicate based on the SIP protocol, For example, signaling is transmitted.
  • H.323 protocol specifically, using H.
  • SIP protocol establishing a session connection using the SIP protocol
  • the terminal device #A and the terminal device #B may negotiate via the gateway device. Determining a hash function and fingerprint information (which may also be referred to as a security parameter), whereby a data packet transport layer security (DTLS) may be established based on the hash function and the fingerprint information to perform the DTLS protocol. Data transmission, thereby enabling efficient use of the DTLS protocol's secure authentication mechanism (ie, encryption and authentication based on hash functions and fingerprint information) to improve data transmission security.
  • DTLS data packet transport layer security
  • the terminal device #A can record the hash function that it can support in the hash function list, and encapsulate the hash function list into the communication system to provide the terminal device #A and the gateway device according to the H.323 protocol.
  • the message is transmitted between and transmitted to the gateway device.
  • the hash function list sent by the first terminal device to the gateway device is carried in a terminal capability set message sent by the first terminal device to the gateway device.
  • a terminal capability set (Terminal Capability Set) message may be listed, so that the hash function list can be carried by using the message provided in the existing protocol, thereby improving the present invention. Versatility and practicality.
  • terminal capability set message enumerated above is only an exemplary description of a message carrying the above hash function list, and the present invention is also limited thereto, and other messages that can be transmitted between the terminal device #A and the gateway device, In other words, the message that the terminal device #A and the gateway device can send and receive based on the H.323 protocol falls within the protection scope of the present invention.
  • the hash function recorded by the terminal device #A in the hash function list may be all the hash functions supported by the terminal device #A, or may be supported by the terminal device #A.
  • the partial hash function is not particularly limited in the present invention.
  • the number of hash functions recorded by the hash function list may be determined according to a system (or standard) or a capacity of a message carried by the hash function list ( In other words, the amount of information that the message can carry is arbitrarily changed.
  • the gateway device can receive the message carrying the hash function list and decapsulate the message based on the H.323 protocol to obtain the hash function list.
  • the gateway device may perform a negotiation process with the terminal device #B based on the SIP function list according to the foregoing hash function list to determine, from the hash function list, the one or more supported by the terminal device #B.
  • Alternative hash function As an example and not a limitation, the following specific process of the negotiation process can be cited.
  • the gateway device performs a negotiation process with the second terminal device according to the hash function list, to determine at least one candidate hash function from the hash function list, including:
  • the gateway device sends a to-be-verified hash function to the second terminal device, the to-be-verified hash function Is any hash function in the list of hash functions;
  • the gateway device receives the verification message sent by the second terminal device, where the verification message is used to indicate whether the to-be-verified hash function belongs to a hash function supported by the second terminal device;
  • the gateway device determines, according to the verification message, that the to-be-verified hash function belongs to the hash function supported by the second terminal device, and determines the to-be-verified hash function as an alternative hash function.
  • the gateway device may select any hash function (for example, the first one in the hash function list) from the hash function list as a hash function to be verified, and encapsulate the to-be-verified hash function according to SIP.
  • the message provided by the communication system can be transmitted between the gateway device and the terminal device #B, and the message is transmitted to the terminal device #B.
  • the to-be-verified hash function sent by the gateway device to the second terminal device is carried in the session description protocol invitation SDP Offer message body in the SIP message sent by the gateway device to the second terminal device.
  • the hash function to be verified can be carried by the message provided in the existing protocol, which improves the versatility and practicability of the present invention.
  • the terminal device #B can receive the message of the hash function to be verified, and decapsulate the message based on the SIP to obtain the hash function to be verified.
  • the terminal device #B can compare the hash function to be verified with the hash function supported by itself, thereby determining whether the to-be-verified hash function belongs to a hash function that the terminal device #B can support.
  • the terminal device #B may send a verification to the gateway device according to the SIP that the terminal device #B can support the to-be-verified hash function.
  • Message hereinafter, for ease of understanding and differentiation, remember: the first type of verification message. Therefore, when receiving the first type of verification message, the gateway device may determine that the to-be-verified hash function sent to the terminal device #B belongs to the terminal device #B and can support the to-be-verified hash function, thereby further verifying the to-be-verified
  • the hash function is determined to be an alternate hash function.
  • the terminal device #B may send a notification to the gateway device according to the SIP that the terminal device #B does not support the to-be-verified hash function.
  • Verification message (hereinafter, for ease of understanding and differentiation, it is recorded as: the second type of verification message). Therefore, when receiving the second type of verification message, the gateway device may determine that the to-be-verified hash function sent to the terminal device #B does not belong to the terminal device #B, and can support the to-be-verified hash function, and thus does not The hash function to be verified is determined as an alternative hash function.
  • the gateway device determines, according to the verification message, that the to-be-verified hash function belongs to the When the hash function supported by the second terminal device is used, the hash function to be verified is determined as an alternate hash function, including:
  • the gateway device determines that the to-be-verified hash function belongs to a hash function supported by the second terminal device, and determines the to-be-verified hash function as an alternative. Greek function.
  • the gateway device may determine whether the verification message carries the gateway device and sends the message to the terminal device #B.
  • the hash function to be verified may be verified.
  • the terminal device #B determines that the to-be-verified hash function sent by the gateway device belongs to a hash function supported by the terminal device #B
  • the hash function to be verified may be encapsulated in the verification message and sent to the verification message.
  • the gateway device when the gateway device determines that the verification message carries the hash function to be verified, the verification message may be determined to be the first type of verification message, that is, the carried hash function to be verified belongs to the candidate hash function. .
  • the gateway device may determine that the verification message is the second type of verification message, that is, the to-be-verified hash function sent to the terminal device #B is not in the standby mode. Select the hash function.
  • the verification message sent by the second terminal device to the gateway device is a SIP message
  • the to-be-verified hash function sent by the second terminal device to the gateway device is carried in the SDP Answer message body of the SIP message.
  • the gateway device may determine an alternate hash function (for example, the gateway device may sequentially select a plurality of hash functions to be verified and perform multiple negotiation with the terminal device #B until an alternative hash function is determined. ), stop the above consultation.
  • an alternate hash function for example, the gateway device may sequentially select a plurality of hash functions to be verified and perform multiple negotiation with the terminal device #B until an alternative hash function is determined.
  • the gateway device may also perform N (ie, the number of hash functions included in the hash function list) with the terminal device #B to determine that all of the hash function lists can be used as an alternative hash function. Greek function.
  • the gateway device may encapsulate the candidate hash function into the communication system to provide the terminal device according to the H.323 protocol. #A and the message transmitted between the gateway device, and transmit the message to the terminal Prepare #A.
  • an alternate hash function sent by the gateway device to the first terminal device is carried in a terminal capability set message sent by the gateway device to the first terminal device.
  • a terminal capability set (Terminal Capability Set) message may be listed, so that the candidate hash function can be carried by using the message provided in the existing protocol, thereby improving the present The versatility and utility of the invention.
  • terminal capability set message listed above is only an exemplary description of the message carrying the above-mentioned alternative hash function, and the present invention is also limited thereto, and other messages that can be transmitted between the terminal device #A and the gateway device.
  • the terminal device #A and the gateway device can send and receive messages based on the H.323 protocol, and all fall within the protection scope of the present invention.
  • the terminal device #A can receive the message of the above alternative hash function and decapsulate the message based on the H.323 protocol to obtain the above-described alternative hash function. Since the alternative hash function is a hash function that both terminal device #A and terminal device #B can support, terminal device #A can select any hash function from the candidate hash function as the target. Greek function.
  • the terminal device #A may determine the fingerprint information corresponding to the target hash function, and the process may be related to determining a fingerprint corresponding to the hash function in the prior art.
  • the process of the information is similar, and the detailed description thereof is omitted here to avoid redundancy.
  • the terminal device #A may encapsulate the target hash function and the fingerprint information into a message that can be transmitted between the terminal device #A and the gateway device according to the H.323 protocol, and the message is Transfer to the gateway device.
  • the target hash function and the fingerprint information sent by the first terminal device to the gateway device are carried in an open logical channel message sent by the first terminal device to the gateway device.
  • an Open Logical Channel message may be enumerated, so that the target hash function and the fingerprint information can be carried by using the message provided in the existing protocol.
  • the versatility and utility of the present invention are enhanced.
  • the above-listed open logical channel message is only an exemplary description of the message carrying the above-mentioned target hash function and fingerprint information, and the present invention is also limited thereto, and other can be transmitted between the terminal device #A and the gateway device.
  • the gateway device can receive the above-mentioned carrying target hash function and fingerprint The message of the information, and decapsulating the message based on the H.323 protocol to obtain the above-mentioned target hash function and fingerprint information.
  • the target hash function and the fingerprint information may be encapsulated into a message that can be transmitted between the terminal device #B and the gateway device according to the SIP, and the message is transmitted to the terminal device #B.
  • the target hash function and the fingerprint information sent by the gateway device to the second terminal device are carried in an SDP Offer message body in the SIP message sent by the gateway device to the second terminal device.
  • the target hash function and the fingerprint information can be carried by the message provided in the existing protocol, which improves the versatility and practicability of the present invention.
  • the above-listed open logical channel message is only an exemplary description of the message carrying the above-mentioned target hash function and fingerprint information, and the present invention is also limited thereto, and other can be transmitted between the terminal device #B and the gateway device.
  • the message, or the message that the terminal device #B and the gateway device can send and receive based on the SIP, are all within the scope of the present invention.
  • the terminal device #B can receive the above-mentioned message carrying the target hash function and the fingerprint information, and decapsulate the message based on the SIP to acquire the target hash function and the fingerprint information.
  • the method further includes:
  • the gateway device receives the confirmation information sent by the second terminal device, where the confirmation information is used to indicate that the second terminal device has received the target hash function and the fingerprint information;
  • the gateway device sends the confirmation information to the first terminal device, so that the first terminal device establishes a DTLS protocol connection with the second terminal device according to the target hash function and the fingerprint information based on the confirmation information.
  • the terminal device #B may encapsulate the confirmation information indicating that the terminal device #B has received the target hash function into the communication system according to the SIP protocol.
  • the message can be transmitted between the terminal device #B and the gateway device and transmitted to the gateway device.
  • the acknowledgment information sent by the second terminal device to the gateway device is carried in the SDP Answer message body in the SIP message sent by the second terminal device to the gateway device.
  • the acknowledgment information can be carried by the message provided in the existing protocol, which improves the versatility and practicability of the present invention.
  • the gateway device can receive the message carrying the confirmation information, and decapsulate the message based on the SIP to obtain the confirmation information, and can encapsulate the confirmation information into the terminal device provided by the communication system based on the H.323 protocol.
  • the acknowledgment information sent by the gateway device to the first terminal device is carried in an open logical channel response message sent by the gateway device to the first terminal device.
  • the logical channel response message is opened, so that the acknowledgement information can be carried by the message provided in the existing protocol, thereby improving the versatility and practicability of the present invention.
  • the terminal device #A can receive the message carrying the confirmation information, and decapsulate the message based on the H.323 protocol to obtain the confirmation information, thereby determining that the terminal device #B has received the target hash function, thereby Perform the above actions to establish a DTLS protocol connection.
  • the terminal device #A After the terminal device #B receives the confirmation information from the gateway device to the terminal device #A after receiving the target hash function and the fingerprint information, the terminal device #A can determine, according to the confirmation information, that the terminal device #B is ready to establish the DTLS protocol. The preparation of the connection, thereby, can further improve the reliability of the method for transmitting data of the embodiment of the present invention.
  • both the terminal device #A and the terminal device #B can know the target hash function and the fingerprint information, and thus, the terminal device #A and the terminal device #B can establish a DTLS protocol connection according to the target hash function and the fingerprint information.
  • the terminal device #A can perform security authentication (also referred to as a DTLS handshake) with the terminal device #A according to the target hash function and the fingerprint information.
  • the terminal device #A can generate the verification information #A according to the target hash function and the fingerprint information (for example, the terminal device #A can encrypt the fingerprint information according to the target hash function to generate a code), and the verification information # A is sent to terminal device #B.
  • the terminal device #B can generate the verification information #B according to the target hash function and the fingerprint information (for example, the terminal device #B can encrypt the fingerprint information according to the target hash function to generate a code), and the verification information # B is sent to terminal device #A.
  • the terminal device #B determines that the above-described verification information #A transmitted by the terminal device #A coincides with the verification information #B generated by it, the terminal device #B can determine that the terminal device #A passes the security verification, and can be associated with the terminal device # A establishes a DTLS connection.
  • the terminal device #A determines that the above-mentioned verification information #B transmitted by the terminal device #B coincides with the verification information #A generated by the terminal device #B, the terminal device #A can determine that the terminal device #B passes the security verification and can communicate with the terminal device.
  • #A Establish a DTLS connection.
  • the process of the above-mentioned DTLS handshake is only an exemplary description, and the present invention is not limited thereto.
  • the terminal device #A and the terminal device #B may also perform authentication authentication exchange according to the procedure specified in RFC 6347, and After the authentication is successful, the logical channel is opened for data transmission.
  • the terminal device #A and the terminal device #B can connect and transmit related data of the video conference through the DTLS protocol.
  • the terminal device #A and the terminal device #B can establish an application layer protocol connection, for example, a Stream Control Transmission Protocol (SCTP) connection, and transmit data through the SCTP connection, based on the DTLS protocol connection.
  • SCTP Stream Control Transmission Protocol
  • SCTP is only an exemplary description of the application layer protocol, and the present invention is not limited thereto, and various other application layer protocols for transmitting data are all within the scope of the present invention.
  • a process of establishing an SCTP connection by using a DTLS protocol connection will be described as an example.
  • the method further includes:
  • the first terminal device sends a first port number to the gateway device, so that the gateway device forwards the first port number to the second terminal device, where the first port number is used by the first terminal device for establishing a port number of a flow control transport protocol SCTP connection connected based on the DTLS protocol;
  • the first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number to transmit data through the SCTP connection.
  • the terminal device #A can determine the port number based on the DTLS protocol connection, and further, can select a port number for establishing an SCTP connection with the terminal device #B (hereinafter, In order to facilitate understanding and distinction, it is recorded as: port number #A), and the terminal device #A can transmit the port number #A to the gateway device according to the H.323 protocol.
  • the gateway device can receive the port number #A from the terminal device #A according to the H.323 protocol, and transmit the port number #A to the terminal device #B according to the SIP.
  • the terminal device #B can determine the port number based on the DTLS protocol connection, and further, the port number for establishing the SCTP connection with the terminal device #A can be selected therefrom (hereinafter, for ease of understanding and distinction, note: port number # B), and the terminal device #B can transmit the port number #B to the gateway device according to the SIP.
  • the gateway device can receive the port number #B from the terminal device #B according to the SIP, and The port number #B is transmitted to the terminal device #A according to the H.323 protocol.
  • the first port number that is sent by the first terminal device to the gateway device is carried in the open logical channel message
  • the second port number sent by the gateway device to the first terminal device is carried in the open logical channel response message
  • the first port number sent by the gateway device to the second terminal device is carried in the SDP Offer message body of the SIP message
  • the second port number sent by the second terminal device to the gateway device is carried in the SDP Answer message body of the SIP message.
  • the terminal device #A and the terminal device #B have been able to confirm the connection of the DTLS protocol to be established, and thus, before establishing the DTLS protocol connection, Select the port number used to establish the SCTP connection and send it to the other party.
  • the terminal device #A can send the selected port number (ie, port number #A) to the gateway device through the above Open Logical Channel message.
  • the gateway device may send the port number selected by the terminal device #B (ie, port number #B) to the terminal device #A through the above Open Logical Channel Ack message.
  • the gateway device can send the port number (ie, port number #A) selected by the terminal device #A to the terminal device #B through the SDP message body of the SIP update message.
  • the terminal device #B can transmit the selected port number (ie, port number #B) to the gateway device through the SDP message body of the SIP update response message described above.
  • the first port number sent by the first terminal device to the gateway device, the target hash function, and the fingerprint information are carried in the same message.
  • the first port number sent by the gateway device to the second terminal device, the target hash function, and the fingerprint information are carried in the same message.
  • the terminal device #A and the gateway device can carry the port number #A, the target hash function, and the fingerprint information in the same message.
  • terminal device #B and the gateway device can carry port number #B and acknowledgment information in the same message.
  • the terminal device #A and the terminal device #B can know each other's use. a port number, so that an SCTP connection can be established according to the port number, and data transmission is performed, and a method and a process for establishing an SCTP connection according to the port number and transmitting data through the SCTP connection can be similar to the prior art, where The details are omitted.
  • the hash function is negotiated between the terminal device #A and the terminal device #B listed above to establish a DTLS connection process, but the present invention is not limited thereto, and other parameters for establishing a DTLS connection may be used. It is determined by a negotiation process between the terminal device #A and the terminal device #B, and the negotiation process is similar to the negotiation process enumerated in the above method 400.
  • a method for transmitting data according to an embodiment of the present invention using a H.323 protocol, a first terminal device, and a second terminal device using SIP to negotiate a hash function and fingerprint information via a gateway device, capable of being in the first terminal device and A DTLS protocol connection based on the hash function and the fingerprint information is established between the two terminal devices, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism.
  • the security of the transmitted data, and the DTLS protocol can be applied to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 5 shows a method for transmitting data according to still another embodiment of the present invention, from the perspective of a second terminal device (a device that communicates with the first terminal device using the H.323 protocol, for example, the above-described terminal device #2) 500 is a schematic flowchart of the method 500 applied to a communication system including a first terminal device and a second terminal device, where the first terminal device communicates with the second terminal device by using an H.323 protocol.
  • the method 500 includes:
  • the first terminal device sends the first hash function list to the first terminal device according to the H.323 protocol, where the first hash function list includes at least one hash function supported by the second terminal device. ;
  • the second terminal device receives, according to the H.323 protocol, a target hash function sent by the first terminal device and fingerprint information corresponding to the target hash function, where the target hash function is the first
  • the terminal device is determined from the first hash function list, and the target hash function belongs to a hash function supported by the first terminal device;
  • the second terminal device establishes a data packet transport layer security protocol DTLS protocol connection with the first terminal device according to the target hash function and the fingerprint information, to transmit data between the second terminal device and the second terminal device through the DTLS protocol connection.
  • the method before the second terminal device receives the target hash function sent by the first terminal device and the fingerprint information corresponding to the target hash function according to the H.323 protocol, the method further include:
  • the second terminal device sends role indication information to the second terminal device according to the H.323 protocol, where the role indication information is used to indicate a role supported by the second terminal device, and the role is “active” or “passive”.
  • the role indication information is used to indicate a role supported by the second terminal device, and the role is “active” or “passive”.
  • At least one of the first terminal device in order to determine that the role supported by the first terminal device includes "active" and the role supported by the second terminal device includes "passive", from the first hash function list Determine the target hash function.
  • the role indication information is carried in the same message as the first hash function list.
  • the target hash function is determined by the first terminal device from the first hash function list according to a hash function supported by the first terminal device.
  • the method further includes:
  • the second terminal device Receiving, by the second terminal device, the second hash function list sent by the first terminal device according to the H.323 protocol, where the second hash function list includes at least one hash function supported by the first terminal device;
  • the second terminal device determines the first hash function list according to the second hash function list, so that the hash function included in the first hash function list belongs to the second hash function list.
  • the method further includes:
  • the confirmation information sent by the second terminal device to the second terminal device according to the H.323 protocol is used to indicate that the second terminal device supports the target hash function and the fingerprint information.
  • the first hash function list is carried in a terminal capability set message
  • the target hash function and the fingerprint information are carried on the open logical channel message.
  • the method further includes:
  • the second terminal device receives the first port number sent by the first terminal device, where the first port number is used by the first terminal device in the port number provided by the DTLS protocol connection to establish a flow control transmission protocol SCTP connection. Port number;
  • the second terminal device sends a second port number to the first terminal device, where the second port number is a port number used by the second terminal device to establish an SCTP connection in the port number provided by the DTLS protocol connection;
  • the second terminal device and the first terminal device according to the first port number and the second port number
  • An SCTP connection is established to transfer data between the first terminal device through the SCTP connection.
  • the first port number is carried in the open logical channel message
  • the second port number is carried in the open logical channel acknowledgement message.
  • the first port number is carried in the same message as the target hash function and the fingerprint information.
  • the action of the second terminal device is similar to the action of the terminal device #2 in the method 200
  • the action of the first terminal device is similar to the action of the terminal device #1 in the method 200, and is omitted in order to avoid redundancy.
  • the first terminal device can negotiate the hash function and the fingerprint information with the second terminal device based on the H.323 protocol, and can be in the first terminal device and the second terminal device.
  • a DTLS protocol connection based on the hash function and the fingerprint information is established, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism to improve the security of the transmission data.
  • And can make the DTLS protocol applicable to terminal devices using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 6 shows a further embodiment according to the present invention from the perspective of a first terminal device (ie, a device that communicates with a terminal device using SIP via a gateway device using a H.323 protocol, eg, the terminal device #X described above)
  • a first terminal device ie, a device that communicates with a terminal device using SIP via a gateway device using a H.323 protocol, eg, the terminal device #X described above
  • a schematic flowchart of a method 600 for transmitting data the method 600 being applied to a communication system including a first terminal device, a second terminal device, and a gateway device, the first terminal device and the gateway device passing the H.323 In the protocol communication, the second terminal device communicates with the gateway device through the session initiation protocol SIP.
  • the method 600 includes:
  • the first terminal device receives the first hash function list sent by the gateway device, where the first hash function list records at least one first hash function sent by the second terminal device to the gateway device.
  • the first hash function belongs to a hash function supported by the second terminal device, and the target first hash function is determined from the first hash function list, and the first hash function corresponding to the target is determined.
  • a first fingerprint information wherein the target first hash function belongs to a hash function supported by the first terminal device, and the target first hash function and the first fingerprint information are used to authenticate the first terminal device, Sending the target first hash function and the first fingerprint information to the gateway device, so that the gateway device sends the target first hash function and the first fingerprint information to the second terminal device;
  • the first terminal device sends a second hash function list to the gateway device, where the second The hash function list includes at least one second hash function supported by the first terminal device, and receives the target second hash function and the second fingerprint information sent by the gateway device, where the target second hash function is the first
  • the second terminal device is determined from part or all of the second hash function sent by the gateway device, and the target second hash function belongs to a hash function supported by the second terminal device, and the second fingerprint information is a fingerprint information corresponding to the target second hash function, where the target second hash function and the second fingerprint information are used to authenticate the second terminal device;
  • the first terminal device performs authentication processing with the second terminal device according to the target first hash function, the first fingerprint information, the target second hash function, and the second fingerprint information, to establish a data packet transmission.
  • the layer security protocol DTLS protocol is connected, and the data is transmitted between the second terminal device through the DTLS protocol connection.
  • the method further includes:
  • the first terminal device sends a first port number to the gateway device, where the first port number is a port number used by the first terminal device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection, so as to facilitate
  • the gateway device sends the first port number to the second terminal device;
  • the first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number, so as to transmit data between the SCTP connection and the second terminal device on the DTLS protocol connection.
  • the method before the first terminal device performs the authentication process with the second terminal device according to the target first hash function, the first fingerprint information, the target second hash function, and the second fingerprint information, the method also includes:
  • the first terminal device sends the first role indication information to the gateway device, where the first role indication information is used to indicate a role supported by the first terminal device, and the role is at least one of “active” and “passive”. So that the gateway device sends the first role indication information to the second terminal device;
  • the first terminal device according to the target first hash function, the first fingerprint information, the target number
  • the second hash function and the second fingerprint information are authenticated by the second terminal device, including:
  • the first terminal device according to the target first hash function, the first fingerprint information, the target second hash function, the second fingerprint information, the role supported by the first terminal device, and the second terminal device support The role performs authentication processing with the second terminal device.
  • the action of the first terminal device is similar to the action of the terminal device #X in the method 300
  • the action of the second terminal device is similar to the action of the terminal device #Y in the method 300
  • the action of the gateway device is as described above.
  • the operations of the gateway device in the method 300 are similar to those described above in order to avoid redundancy, and detailed description thereof will be omitted.
  • a method 600 for transmitting data using a H.323 protocol, a first terminal device, and a second terminal device using SIP, to negotiate a hash function and fingerprint information through a gateway device, capable of being in the first terminal device and A DTLS protocol connection based on the hash function and the fingerprint information is established between the second terminal devices, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism.
  • Improve the security of the transmitted data and without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • FIG. 7 illustrates still another embodiment of the present invention from the perspective of a first terminal device (ie, a device that communicates with a terminal device using SIP via a gateway device using a H.323 protocol, eg, the terminal device #A described above)
  • a first terminal device ie, a device that communicates with a terminal device using SIP via a gateway device using a H.323 protocol, eg, the terminal device #A described above
  • a schematic flowchart of a method 700 for transmitting data the method 700 being applied to a communication system including a first terminal device, a second terminal device, and a gateway device, the first terminal device and the gateway device passing the H.323 In the protocol communication, the second terminal device communicates with the gateway device through the session initiation protocol SIP.
  • the method 700 includes:
  • the first terminal device sends a hash function list to the gateway device, where the hash function list includes at least one hash function supported by the first terminal device, so that the gateway device according to the hash function list and the second
  • the terminal device performs a negotiation process to determine at least one candidate hash function from the hash function list, wherein the candidate hash function belongs to a hash function supported by the second terminal device;
  • the first terminal device determines a target hash function from the candidate hash function, and determines fingerprint information corresponding to the target hash function;
  • the first terminal device sends the target hash function and the fingerprint information to the gateway device, so that the gateway device forwards the target hash function and the fingerprint information to the second terminal;
  • the first terminal device establishes a data packet transport layer security protocol DTLS protocol connection with the second terminal device according to the target hash function and the fingerprint information, to transmit data through the DTLS protocol connection.
  • the candidate hash function is determined by the gateway device according to the verification message sent by the second terminal device, where the verification message is used to indicate whether the to-be-verified hash function sent by the gateway device to the second terminal device is A hash function supported by the second terminal device, the hash function to be verified is any hash function in the hash function list.
  • the candidate hash function is determined by the gateway device according to the to-be-verified hash function when determining that the verification message carries the to-be-verified hash function.
  • the to-be-verified hash function sent by the gateway device to the second terminal device is carried in a session description protocol invitation SDP Offer message body of the SIP message sent by the gateway device to the second terminal device,
  • the verification message sent by the second terminal device to the gateway device is a SIP message
  • the to-be-verified hash function sent by the second terminal device to the gateway device is carried in the SDP response Answer message body of the SIP message.
  • the hash function list sent by the first terminal device to the gateway device is carried in a terminal capability set message sent by the first terminal device to the gateway device,
  • the candidate hash function sent by the gateway device to the first terminal device is carried in the terminal capability set message sent by the gateway device to the first terminal device,
  • the target hash function and the fingerprint information sent by the first terminal device to the gateway device are carried in the open logical channel message sent by the first terminal device to the gateway device.
  • the method further includes:
  • the confirmation information is used to indicate that the second terminal device supports the target hash function and the fingerprint Information
  • the first terminal device establishes a data packet transport layer security protocol DTLS protocol connection with the second terminal device according to the target hash function and the fingerprint information, including:
  • the first terminal device establishes a DTLS protocol connection with the second terminal device according to the target hash function and the fingerprint information based on the confirmation information.
  • the acknowledgment information sent by the gateway device to the first terminal device is carried in an open logical channel response message sent by the gateway device to the first terminal device.
  • the method further includes:
  • the first terminal device sends a first port number to the gateway device, so that the gateway device forwards the first port number to the second terminal device, where the first port number is the port number provided by the DTLS protocol connection.
  • a port number used by a terminal device to establish a flow control transport protocol SCTP connection;
  • the first terminal device establishes an SCTP connection with the second terminal device according to the first port number and the second port number to transmit data through the SCTP connection.
  • the first port number that is sent by the first terminal device to the gateway device is carried in the open logical channel message
  • the second port number sent by the gateway device to the first terminal device is carried in the open logical channel response message.
  • the first port number sent by the first terminal device to the gateway device, the target hash function, and the fingerprint information are carried in the same message.
  • the action of the first terminal device is similar to the action of the terminal device #A in the method 400
  • the action of the second terminal device is similar to the action of the terminal device #B in the method 400
  • the action of the gateway device is as described above.
  • the operations of the gateway device in the method 700 are similar to those described above in order to avoid redundancy, and detailed description thereof is omitted.
  • a method 700 for transmitting data uses a H.323 protocol first terminal device and a second terminal device using SIP to negotiate a hash function and fingerprint information through a gateway device, which can be in the first terminal device and A DTLS protocol connection based on the hash function and the fingerprint information is established between the second terminal devices, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism.
  • Improve the security of the transmitted data and without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • FIG. 8 shows a schematic block diagram of an apparatus 800 for transmitting data in accordance with an embodiment of the present invention.
  • the device 800 is configured in a communication system including the device 800 and the second terminal device, and the device 800 communicates with the second terminal device by using an H.323 protocol, and the device 800 includes:
  • the receiving unit 810 is configured to receive a first hash function list sent by the second terminal device, where the first hash function list includes at least one hash function supported by the second terminal device;
  • the processing unit 820 is configured to determine a first hash function from the first hash function list, and determine first fingerprint information corresponding to the first hash function;
  • the sending unit 830 is configured to send the first hash function and the first fingerprint information to the second terminal device, where the first hash function belongs to a hash function supported by the device, the first hash function and the The first fingerprint information is used for authentication of the device;
  • the sending unit 830 is further configured to send, to the second terminal device, a second hash function list, where the second hash function list includes at least one hash function supported by the device;
  • the receiving unit 810 is further configured to receive the second hash function and the second fingerprint information sent by the second terminal, where the second hash function is determined by the second terminal device from the second hash function list. And the second hash function belongs to a hash function supported by the device, the second fingerprint information is fingerprint information corresponding to the second hash function, and the second hash function and the second fingerprint information are used for The second terminal device performs authentication;
  • the processing unit 820 is further configured to perform authentication processing with the second terminal device according to the first hash function, the first fingerprint information, the second hash function, and the second fingerprint information to establish a data packet transport layer security.
  • the protocol DTLS protocol is connected, and the data is transmitted between the second terminal device through the DTLS protocol connection.
  • the sending unit further sends a first port number to the second terminal device, where the first port number is a port used by the device to establish a flow control transmission protocol SCTP connection based on the DTLS protocol connection. number;
  • the receiving unit further receives and receives a second port number sent by the second terminal device, where the second port number is a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection;
  • the processing unit is further configured to establish an SCTP connection with the second terminal device according to the first port number and the second port number, to transmit data between the SCTP connection and the second terminal device on the DTLS protocol connection.
  • the sending unit is further configured to send, to the second terminal device, first role indication information, where the first role indication information is used to indicate a role supported by the device, where the role is “active” and “passive” At least one
  • the receiving unit is further configured to receive second role indication information that is sent by the second terminal device, where the second role indication information is used to indicate a role supported by the second terminal device;
  • the processing unit is specifically configured to: according to the first hash function, the first fingerprint information, the second hash function, the second fingerprint information, a role supported by the device, and a role supported by the second terminal device
  • the second terminal device performs authentication processing.
  • the apparatus 800 for transmitting data may correspond to a first terminal device (for example, the above-described terminal device # ⁇ ) in the method of the embodiment of the present invention, and in the apparatus 800 for transmitting data
  • a first terminal device for example, the above-described terminal device # ⁇
  • the modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 100 in FIG. 1 , and are not described herein again for brevity.
  • An apparatus for transmitting data by causing a first terminal device and a second terminal device to negotiate a hash function and fingerprint information based on an H.323 protocol, can be in the first terminal device and the second terminal device A DTLS protocol connection based on the hash function and the fingerprint information is established, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism to improve the security of the transmission data. And can make the DTLS protocol applicable to terminal devices using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 9 shows a schematic block diagram of an apparatus 900 for transmitting data in accordance with an embodiment of the present invention.
  • the device 900 is configured in a communication system including the device 900 and the second terminal device, and the device 900 communicates with the second terminal device by using an H.323 protocol, and the device 900 includes:
  • the receiving unit 910 is configured to receive a first hash function list sent by the second terminal device, where the first hash function list includes at least one hash function supported by the second terminal device;
  • the processing unit 920 is configured to determine a target hash function from the first hash function list, and determine fingerprint information corresponding to the target hash function, where the target hash function belongs to a hash supported by the device function;
  • a sending unit 930 configured to send the target hash function and the fingerprint information to the second terminal device
  • the processing unit 940 is further configured to perform an authentication process with the second terminal device according to the target hash function and the fingerprint information, to establish a data packet transport layer security protocol DTLS protocol connection, and Data is transmitted between the DTLS protocol connection and the second terminal device.
  • the receiving unit is further configured to receive role indication information sent by the second terminal device, where the role indication information is used to indicate a role supported by the second terminal device, where the role is “active” and “passive” At least one
  • the processing unit is further configured to determine, according to the role indication information, a role supported by the second terminal device, and when determining that the role supported by the device includes “active” and the role supported by the second terminal device includes “passive”, The target hash function is determined in the first hash function list.
  • the processing unit is specifically configured to determine a target hash function from the first hash function list according to a hash function supported by the processing unit.
  • the sending unit is further configured to send, to the second terminal device, a second hash function list, where the second hash function list includes at least one hash function supported by the device, to facilitate the second terminal device. Determining, according to the second hash function list, the first hash function list, wherein the hash function included in the first hash function list belongs to the second hash function list;
  • the processing unit is specifically configured to determine that any of the hash functions in the first hash function list is a target hash function.
  • the sending unit is further configured to send, to the second terminal device, a first port number, where the first port number is a port used by the device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection. number;
  • the receiving unit is further configured to receive a second port number sent by the second terminal device, where the second port number is a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection;
  • the processing unit further establishes an SCTP connection with the second terminal device according to the first port number and the second port number to transmit data between the SCTP connection and the second terminal device over the DTLS protocol connection.
  • the apparatus 900 for transmitting data may correspond to a first terminal device (for example, the above-described terminal device #1) in the method of the embodiment of the present invention, and in the apparatus 900 for transmitting data
  • a first terminal device for example, the above-described terminal device #1
  • the apparatus 900 for transmitting data The modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 200 in FIG. 2, and are not described herein again for brevity.
  • An apparatus for transmitting data by causing a first terminal device and a second terminal device to negotiate a hash function and fingerprint information based on an H.323 protocol, can be in the first terminal device and the second terminal device Establish a DTLS protocol connection based on the hash function and fingerprint information, The first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism to improve the security of the transmission data, and can make the DTLS protocol applicable to the H.323 protocol.
  • the terminal device further improves the reliability and practicability of the terminal device and improves the user experience.
  • FIG. 10 shows a schematic block diagram of an apparatus 1000 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1000 is configured in a communication system including a first terminal device and the device 1000.
  • the device 1000 communicates with the first terminal device through an H.323 protocol, and the device 1000 includes:
  • a sending unit 1100 configured to send, to the first terminal device, a first hash function list, where the first hash function list includes at least one hash function supported by the device;
  • the receiving unit 1200 is configured to receive a target hash function sent by the first terminal device and fingerprint information corresponding to the target hash function, where the target hash function is the first terminal device from the first hash Determined in the function list, and the target hash function belongs to a hash function supported by the first terminal device;
  • the processing unit 1300 is configured to perform authentication processing with the first terminal device according to the target hash function and the fingerprint information, to establish a data packet transport layer security protocol DTLS protocol connection, and transmit the connection between the device and the device through the DTLS protocol. data.
  • the sending unit is further configured to send, to the first terminal device, role indication information, where the role indication information is used to indicate a role supported by the device, where the role is at least one of “active” or “passive”.
  • the target hash function is determined from the first hash function list, so that the first terminal device determines that the role supported by the first terminal device includes "active” and the role supported by the device includes "passive”.
  • the target hash function is determined by the first terminal device from the first hash function list according to a hash function supported by the first terminal device.
  • the receiving unit is further configured to receive a second hash function list sent by the first terminal device, where the second hash function list includes at least one hash function supported by the first terminal device;
  • the processing unit is further configured to determine the first hash function list according to the second hash function list, so that the hash function included in the first hash function list belongs to the second hash function list.
  • the receiving unit is further configured to receive a first port number sent by the first terminal device, where the first port number is used by the first terminal device to establish a flow control transmission protocol based on the DTLS protocol connection.
  • the sending unit is further configured to send a second port number to the first terminal device, where the second port number is The port number used by the device to establish an SCTP connection based on the DTLS protocol connection;
  • the processing unit is further configured to establish an SCTP connection with the first terminal device according to the first port number and the second port number, to transmit data between the first terminal device and the first terminal device on the DTLS protocol connection.
  • the apparatus 1000 for transmitting data may correspond to a second terminal device (for example, the above-described terminal device #2) in the method of the embodiment of the present invention, and in the apparatus 1000 for transmitting data
  • a second terminal device for example, the above-described terminal device #2
  • the modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 500 in FIG. 5, and are not described herein again for brevity.
  • An apparatus for transmitting data by causing a first terminal device and a second terminal device to negotiate a hash function and fingerprint information based on an H.323 protocol, can be in the first terminal device and the second terminal device A DTLS protocol connection based on the hash function and the fingerprint information is established, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism to improve the security of the transmission data. And can make the DTLS protocol applicable to terminal devices using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 11 shows a schematic block diagram of an apparatus 1100 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1100 is configured in a communication system including a first terminal device, a second terminal device, and the device, where the device 1100 communicates with the first terminal device by using an H.323 protocol, and between the device 1100 and the second terminal device.
  • Communicating via SIP the apparatus 1100 includes:
  • the receiving unit 1110 is configured to receive at least one first hash function sent by the second terminal device, where the first hash function belongs to a hash function supported by the second terminal device, and receives the first terminal device a second hash function list, the second hash function list including at least one second hash function supported by the first terminal device;
  • the sending unit 1120 is configured to send, to the first terminal device, a first hash function list recorded with the first hash function, and send part or all of the second hash function to the second terminal device;
  • the receiving unit 1110 is further configured to receive the target first hash function and the first fingerprint information sent by the second terminal device, and receive the target second hash function and the second fingerprint information sent by the second terminal device, where
  • the target first hash function is determined by the first terminal device from the first hash function list, and the target first hash function belongs to a hash function supported by the first terminal device, and the first fingerprint information is Fingerprint information corresponding to the target first hash function, the target first hash function and the first fingerprint information are used to authenticate the first terminal device, the target second hash function
  • the second terminal device is determined from part or all of the second hash function, and the target second hash function belongs to a hash function supported by the second terminal device, and the second fingerprint information is related to the target a fingerprint information corresponding to the second hash function, where the target second hash function and the second fingerprint information are used to authenticate the second terminal device;
  • the sending unit 1120 is further configured to send the target first hash function and the first fingerprint information to the second terminal device, and send the target second hash function and the second fingerprint information to the first terminal device, So that the first terminal device and the second terminal device perform authentication processing according to the target first hash function, the first fingerprint information, the target second hash function, and the second fingerprint information to establish a data packet transmission.
  • the layer security protocol is connected to the DTLS protocol and transmits data through the DTLS protocol connection.
  • the receiving unit is further configured to receive the first role indication information that is sent by the first terminal device, and the second role indication information that is sent by the second terminal device, where the first role indication information is used to indicate the first terminal.
  • the first role indication information is used to indicate the first terminal.
  • a role supported by the device where the second role indication information is used to indicate a role supported by the second terminal device, where the role is at least one of “active” and “passive”;
  • the sending unit is further configured to send the first role indication information to the second terminal device, and send the second role indication information to the first terminal device, so that the first terminal device and the second terminal device are configured according to the The first hash function, the first fingerprint information, the second hash function, the second fingerprint information, the role supported by the first terminal device, and the role supported by the second terminal device perform authentication processing.
  • the receiving unit is further configured to receive a first port number sent by the first terminal device and a second port number sent by the second terminal device, where the first port number is used by the first terminal device Establishing a port number of the flow control transport protocol SCTP connection based on the DTLS protocol connection, where the second port number is a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection;
  • the sending unit is further configured to forward the first port number to the second terminal device, and forward the second port number to the first terminal device, so that the first terminal device and the second terminal device are configured according to the first
  • the port number establishes an SCTP connection with the second port number, and transmits data through the SCTP connection.
  • the apparatus 1100 for transmitting data may correspond to a gateway device in the method of the embodiment of the present invention, and each unit in the apparatus 1100 for transmitting data, that is, a module and the above other operations and/or The functions are respectively implemented in order to implement the corresponding process of the method 300 in FIG. 3, and are not described herein for brevity.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a DTLS protocol based on the security parameter between the first terminal device and the second terminal device.
  • the connection enables the first terminal device and the second terminal device to transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • the apparatus for transmitting data according to an embodiment of the present invention using the H.323 protocol, the first terminal device, and the second terminal device using the SIP, to negotiate a hash function and fingerprint information via the gateway device, capable of being in the first terminal device Establishing a DTLS protocol connection based on the hash function and the fingerprint information with the second terminal device, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication.
  • the mechanism improves the security of the transmitted data, and can make the DTLS protocol applicable to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 12 shows a schematic block diagram of an apparatus 1200 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1200 is configured in a communication system including the device 1200, the second terminal device, and the gateway device.
  • the device 1200 communicates with the gateway device through the H.323 protocol, and the gateway device and the second terminal device communicate with each other through the SIP.
  • Communication, the device 1200 includes:
  • the receiving unit 1210 is configured to receive a first hash function list sent by the gateway device, where the first hash function list records at least one first hash function sent by the second terminal device to the gateway device, The first hash function belongs to a hash function supported by the second terminal device;
  • the processing unit 1220 is configured to determine a target first hash function from the first hash function list, and determine first fingerprint information corresponding to the target first hash function, where the target first hash function a hash function supported by the device, the target first hash function and the first fingerprint information being used for authentication of the device;
  • the sending unit 1230 is configured to send the target first hash function and the first fingerprint information to the gateway device, so that the gateway device sends the target first hash function and the first fingerprint information to the second terminal.
  • a device configured to send, to the gateway device, a second hash function list, where the second hash function list includes at least one second hash function supported by the device;
  • the receiving unit 1210 is further configured to receive the target second hash function and the second fingerprint information sent by the gateway device, where the target second hash function is the second hash sent by the second terminal device from the gateway device Determined in part or all of the Greek function, and the target second hash function belongs to a hash function supported by the second terminal device, and the second fingerprint information is related to the target second hash function Corresponding fingerprint information, the target second hash function and the second fingerprint information are used to authenticate the second terminal device;
  • the processing unit 1220 is further configured to perform authentication processing with the second terminal device according to the target first hash function, the first fingerprint information, the target second hash function, and the second fingerprint information, to establish a data packet transmission.
  • the layer security protocol DTLS protocol is connected, and the data is transmitted between the second terminal device through the DTLS protocol connection.
  • the sending unit is further configured to send, to the gateway device, a first port number, where the first port number is a port number used by the device to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection, So that the gateway device sends the first port number to the second terminal device;
  • the receiving unit is further configured to receive a second port number sent by the gateway device, where the second port number is sent by the second terminal device to the gateway device, and the second port number is used by the second terminal device a port number used to establish an SCTP connection based on the DTLS protocol connection;
  • the processing unit is further configured to establish an SCTP connection with the second terminal device according to the first port number and the second port number, to transmit data between the SCTP connection and the second terminal device on the DTLS protocol connection.
  • the sending unit is further configured to send, to the gateway device, first role indication information, where the first role indication information is used to indicate a role supported by the device, where the role is at least one of “active” and “passive” So that the gateway device sends the first role indication information to the second terminal device;
  • the receiving unit is further configured to receive the second role indication information that is sent by the gateway device, where the second role indication information is sent by the second terminal device to the gateway device, and the second role indication information is used to indicate the second The role supported by the terminal device;
  • the processing unit is specifically configured to: according to the target first hash function, the first fingerprint information, the target second hash function, the second fingerprint information, a role supported by the device, and a role supported by the second terminal device
  • the second terminal device performs an authentication process.
  • the apparatus 1200 for transmitting data may correspond to a first terminal device (for example, the above-described terminal device #X) in the method of the embodiment of the present invention, and in the apparatus 1200 for transmitting data
  • a first terminal device for example, the above-described terminal device #X
  • the modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 600 in FIG. 6, and are not described herein again for brevity.
  • a first terminal device and a second terminal The DTLS protocol connection based on the security parameter can be established between the first terminal device and the second terminal device by using the gateway device to negotiate the security parameter, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection. Without the forwarding of the gateway device, the burden on the gateway device can be reduced, the transmission performance of the system can be improved, and the impact on the user experience can be improved.
  • the apparatus for transmitting data according to an embodiment of the present invention using the H.323 protocol, the first terminal device, and the second terminal device using the SIP, to negotiate a hash function and fingerprint information via the gateway device, capable of being in the first terminal device Establishing a DTLS protocol connection based on the hash function and the fingerprint information with the second terminal device, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication.
  • the mechanism improves the security of the transmitted data, and can make the DTLS protocol applicable to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 13 shows a schematic block diagram of an apparatus 1300 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1300 is configured in a communication system including a first terminal device, a second terminal device, and the device, where the device 1300 communicates with the first terminal device by using an H.323 protocol, and between the device 1300 and the second terminal device.
  • Communicating via SIP the apparatus 1300 includes:
  • the receiving unit 1310 is configured to receive a hash function list sent by the first terminal device, where the hash function list includes at least one hash function supported by the first terminal device;
  • the processing unit 1320 is configured to perform a negotiation process with the second terminal device according to the hash function list, to determine at least one candidate hash function from the hash function list, where the candidate hash function belongs to the first a hash function supported by the second terminal device;
  • the sending unit 1330 is configured to send the candidate hash function to the first terminal device, so that the first terminal device determines the target hash function from the candidate hash function, and determines that the target hash function is Corresponding fingerprint information;
  • the receiving unit 1310 is further configured to receive the target hash function and the fingerprint information sent by the first terminal device;
  • the sending unit 1330 is further configured to send the target hash function and the fingerprint information to the second terminal, so that the first terminal device and the second terminal device perform authentication processing according to the target hash function and the fingerprint information,
  • the data packet transmission layer security protocol DTLS protocol connection is established, and the data is transmitted through the DTLS protocol connection.
  • the sending unit is further configured to send, to the second terminal device, a hash function to be verified, where the to-be-verified hash function is any hash function in the hash function list;
  • the receiving unit is further configured to receive a verification message sent by the second terminal device, where the verification message is used to indicate whether the to-be-verified hash function belongs to a hash function supported by the second terminal device;
  • the processing unit is specifically configured to determine, according to the verification message, that the to-be-verified hash function belongs to a hash function supported by the second terminal device, and determine the to-be-verified hash function as an alternate hash function.
  • the processing unit is specifically configured to: when determining that the verification message carries the to-be-verified hash function, determine that the to-be-verified hash function belongs to a hash function supported by the second terminal device, and the to-be-verified The Greek function is determined to be an alternate hash function.
  • the receiving unit is further configured to receive a first port number sent by the first terminal device and a second port number sent by the second terminal device, where the first port number is used by the first terminal device Establishing a port number of the flow control transport protocol SCTP connection based on the DTLS protocol connection, where the second port number is a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection;
  • the sending unit is further configured to forward the first port number to the second terminal device, and forward the second port number to the first terminal device, so that the first terminal device and the second terminal device are configured according to the first
  • the port number establishes an SCTP connection with the second port number, and transmits data through the SCTP connection.
  • the apparatus 1300 for transmitting data may correspond to a gateway device in the method of the embodiment of the present invention, and each unit in the apparatus 1300 for transmitting data, that is, a module and the above other operations and/or The functions are respectively implemented in order to implement the corresponding process of the method 400 in FIG. 4, and are not described herein for brevity.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a DTLS protocol based on the security parameter between the first terminal device and the second terminal device.
  • the connection enables the first terminal device and the second terminal device to transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • the apparatus for transmitting data according to an embodiment of the present invention using the H.323 protocol, the first terminal device, and the second terminal device using the SIP, to negotiate a hash function and fingerprint information via the gateway device, capable of being in the first terminal device Establishing a DTLS protocol connection based on the hash function and the fingerprint information with the second terminal device, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication.
  • the mechanism improves the security of the transmitted data, and enables the DTLS protocol to be applied to the terminal device using the H.323 protocol, thereby improving the terminal design. Reliability and usability to improve the user experience.
  • FIG. 14 shows a schematic block diagram of an apparatus 1400 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1400 is configured in a communication system including the device 1400, the second terminal device, and the gateway device.
  • the device 1400 communicates with the gateway device through the H.323 protocol, and the gateway device and the second terminal device communicate with each other through the SIP.
  • Communication, the device 1400 includes:
  • a sending unit 1410 configured to send, to the gateway device, a hash function list, where the hash function list includes at least one hash function supported by the device, so that the gateway device and the second terminal device according to the hash function list Performing a negotiation process to determine at least one candidate hash function from the hash function list, wherein the candidate hash function belongs to a hash function supported by the second terminal device;
  • the receiving unit 1420 is configured to receive the candidate hash function sent by the gateway device.
  • the processing unit 1430 is configured to determine a target hash function from the candidate hash function, and determine fingerprint information corresponding to the target hash function;
  • the sending unit 1410 is further configured to send the target hash function and the fingerprint information to the gateway device, so that the gateway device forwards the target hash function and the fingerprint information to the second terminal;
  • the processing unit 1430 is further configured to perform an authentication process with the second terminal device according to the target hash function and the fingerprint information to establish a data packet transport layer security protocol DTLS protocol connection, and connect and transmit data through the DTLS protocol.
  • the sending unit is further configured to send the first port number to the gateway device, so that the gateway device forwards the first port number to the second terminal device, where the first port number is used by the device.
  • the receiving unit is further configured to receive a second port number sent by the gateway device, where the second port number is sent by the second terminal device to the gateway device, where the second port number is used by the second terminal device a port number for establishing an SCTP connection based on the DTLS protocol connection;
  • the processing unit is further configured to establish an SCTP connection with the second terminal device according to the first port number and the second port number to transmit data through the SCTP connection.
  • the apparatus 1400 for transmitting data may correspond to a first terminal device (for example, the above-described terminal device #A) in the method of the embodiment of the present invention, and in the apparatus 1400 for transmitting data
  • a first terminal device for example, the above-described terminal device #A
  • the modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 700 in FIG. 7, and are not described herein again for brevity.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can be built between the first terminal device and the second terminal device.
  • the DTLS protocol connection based on the security parameter enables the first terminal device and the second terminal device to transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device and improving the transmission of the system. Performance, improvement affects the user experience.
  • the apparatus for transmitting data according to an embodiment of the present invention using the H.323 protocol, the first terminal device, and the second terminal device using the SIP, to negotiate a hash function and fingerprint information via the gateway device, capable of being in the first terminal device Establishing a DTLS protocol connection based on the hash function and the fingerprint information with the second terminal device, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication.
  • the mechanism improves the security of the transmitted data, and can make the DTLS protocol applicable to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 15 shows a schematic block diagram of an apparatus 1500 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1500 communicates with the second terminal device by using an H.323 protocol, and the device 1500 includes:
  • processor 1520 connected to the bus 1510;
  • a memory 1530 connected to the bus 1510;
  • transceiver 1540 connected to the bus 1510;
  • the processor 1520 by using the bus 1510, invokes a program stored in the memory 1530, for controlling the transceiver to receive a first hash function list sent by the second terminal device, the first hash.
  • the function list includes at least one hash function supported by the second terminal device, and the first hash function is determined from the first hash function list;
  • the transceiver configured to control the transceiver to send the first hash function and the first fingerprint information to the second terminal device, where the first hash function belongs to a hash function supported by the device 1500, and the first hash function and The first fingerprint information is used for authentication of the device 1500;
  • a second hash function list for controlling the transceiver to send to the second terminal device, the second hash function list including at least one hash function supported by the device 1500;
  • the transceiver configured to control the transceiver to receive the second hash function and the second fingerprint sent by the second terminal Information, wherein the second hash function is determined by the second terminal device from the second hash function list, and the second hash function belongs to a hash function supported by the device 1500, and the second fingerprint information is Is the fingerprint information corresponding to the second hash function, where the second hash function and the second fingerprint information are used to authenticate the second terminal device;
  • the processor is further configured to control the transceiver to send a first port number to the second terminal device, where the first port number is used by the device 1500 to establish a flow control transmission based on the DTLS protocol connection.
  • the processor is further configured to control the transceiver to send first role indication information to the second terminal device, where the first role indication information is used to indicate a role supported by the device 1500, and the role is “active” and At least one of "passive";
  • the second terminal device according to the first hash function, the first fingerprint information, the second hash function, the second fingerprint information, the role supported by the device 1500, and the role supported by the second terminal device Perform authentication processing.
  • device 1500 may be embedded or may itself be a terminal device such as a video conferencing terminal, and may also include a carrier that houses the transmitting circuitry and the receiving circuitry to allow for data transmission and reception between device 1500 and a remote location.
  • bus 1510 In addition to the data bus, the bus includes a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are labeled as bus 1510 in the figure.
  • the processor may implement or perform the steps and logic blocks disclosed in the method embodiments of the present invention.
  • the general purpose processor may be a microprocessor or the processor may be any conventional processing , decoder, etc.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented by the hardware processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the processor 1520 may be a central processing unit (“CPU"), and the processor 1520 may also be other general-purpose processors, digital signal processors (DSPs). , an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 1530 can include read only memory and random access memory and provides instructions and data to the processor. A portion of the memory 1530 may also include a non-volatile random access memory. For example, the memory 1530 can also store information of the device type.
  • each step of the above method may be completed by an integrated logic circuit of hardware in the processor 1520 or an instruction in a form of software.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory 1530, and the processor 1520 reads the information in the memory 1530 and performs the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
  • the apparatus 1500 for transmitting data may correspond to a first terminal device (for example, the above-described terminal device # ⁇ ) in the method of the embodiment of the present invention, and in the device 1500 for transmitting data
  • a first terminal device for example, the above-described terminal device # ⁇
  • the modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 100 in FIG. 1 , and are not described herein again for brevity.
  • An apparatus for transmitting data by causing a first terminal device and a second terminal device to negotiate a hash function and fingerprint information based on an H.323 protocol, can be in the first terminal device and the second terminal device A DTLS protocol connection based on the hash function and the fingerprint information is established, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism to improve the security of the transmission data. And can make the DTLS protocol applicable to terminal devices using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 16 shows a schematic block of an apparatus 1600 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1600 communicates with the second terminal device through the H.323 protocol, and the device 1600 includes:
  • processor 1620 connected to the bus 1610;
  • a memory 1630 connected to the bus 1610;
  • transceiver 1640 connected to the bus 1610;
  • the processor 1620 by using the bus 1610, invokes a program stored in the memory 1630, for controlling the transceiver to receive a first hash function list sent by the second terminal device, the first hash.
  • the function list includes at least one hash function supported by the second terminal device;
  • the processor is further configured to control, by the transceiver, role indication information sent by the second terminal device, where the role indication information is used to indicate a role supported by the second terminal device, where the role is “active” and “ At least one of passive;
  • the target hash function is determined in the list of Greek functions.
  • the processor is specifically configured to determine a target hash function from the first hash function list according to a hash function supported by the processor.
  • the processor is further configured to control the transceiver to send a second hash function list to the second terminal device, where the second hash function list includes at least one hash function supported by the device 1600, so as to facilitate Determining, by the second terminal device, the first hash function list according to the second hash function list, wherein the hash function included in the first hash function list belongs to the second hash function list;
  • the processor is further configured to control the transceiver to send a first port number to the second terminal device, where the first port number is used by the device 1600 to establish a flow control transmission based on the DTLS protocol connection.
  • device 1600 may be embedded or may itself be a terminal device such as a video conferencing terminal, and may also include a carrier that houses the transmitting circuitry and the receiving circuitry to allow for data transmission and reception between device 1600 and a remote location.
  • bus 1610 In addition to the data bus, the bus includes a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are labeled as bus 1610 in the figure.
  • the processor may implement or perform the steps and logic blocks disclosed in the method embodiments of the present invention.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor, decoder or the like.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented by the hardware processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the processor 1620 may be a central processing unit (“CPU"), and the processor 1620 may also be other general-purpose processors, digital signal processors (DSPs). , an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 1630 can include read only memory and random access memory and provides instructions and data to the processor. A portion of the memory 1630 can also include a non-volatile random access memory. For example, the memory 1630 can also store information of the device type.
  • each step of the foregoing method may be completed by an integrated logic circuit of hardware in the processor 1620 or an instruction in a form of software.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented as hardware processor execution, or use hardware and software modules in the processor.
  • the combination execution is completed.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory 1630, and the processor 1620 reads the information in the memory 1630 and combines the hardware to perform the steps of the above method. To avoid repetition, it will not be described in detail here.
  • the apparatus 1600 for transmitting data may correspond to a first terminal device (for example, the above-described terminal device #1) in the method of the embodiment of the present invention, and in the device 1600 for transmitting data
  • a first terminal device for example, the above-described terminal device #1
  • the device 1600 for transmitting data The modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 200 in FIG. 2, and are not described herein again for brevity.
  • An apparatus for transmitting data by causing a first terminal device and a second terminal device to negotiate a hash function and fingerprint information based on an H.323 protocol, can be in the first terminal device and the second terminal device A DTLS protocol connection based on the hash function and the fingerprint information is established, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism to improve the security of the transmission data. And can make the DTLS protocol applicable to terminal devices using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 17 shows a schematic block diagram of an apparatus 1700 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1700 communicates with the first terminal device by using an H.323 protocol, and the device 1700 includes:
  • processor 1720 connected to the bus 1710;
  • a memory 1730 connected to the bus 1710;
  • transceiver 1740 connected to the bus 1710;
  • the processor 1720 by using the bus 1710, invokes a program stored in the memory 1730 for controlling a first hash function list sent by the transceiver to the first terminal device, the first hash.
  • the function list includes at least one hash function supported by the device 1700;
  • the transceiver controlling the transceiver to receive the target hash function sent by the first terminal device and the fingerprint information corresponding to the target hash function, wherein the target hash function is the first terminal device from the first hash Determined in the function list, and the target hash function belongs to a hash function supported by the first terminal device;
  • connection transfers data to and from device 1700.
  • the processor is further configured to control the transceiver to send role indication information to the first terminal device, where the role indication information is used to indicate a role supported by the device 1700, where the role is “active” or “passive”. At least one of the first terminal device determining the target from the first hash function list when determining that the role supported by the first terminal device includes "active” and the role supported by the device 1700 includes "passive" Hash function.
  • the target hash function is determined by the first terminal device from the first hash function list according to a hash function supported by the first terminal device.
  • the processor is further configured to control the transceiver to receive a second hash function list sent by the first terminal device, where the second hash function list includes at least one hash function supported by the first terminal device ;
  • the processor is further configured to control the transceiver to receive the first port number sent by the first terminal device, where the first port number is used by the first terminal device to establish a connection based on the DTLS protocol.
  • the device 1700 may be embedded or may itself be a terminal device such as a video conferencing terminal, and may also include a carrier that houses the transmitting circuit and the receiving circuit to allow data transmission and reception between the device 1700 and the remote location.
  • bus 1710 In addition to the data bus, the bus includes a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are labeled as bus 1710 in the figure.
  • the processor may implement or perform the steps and logic blocks disclosed in the method embodiments of the present invention.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor, decoder or the like.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented by the hardware processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • Soft The module can be located in a conventional storage medium such as a random access memory, a flash memory, a read only memory, a programmable read only memory or an electrically erasable programmable memory, a register, or the like.
  • the processor 1720 may be a central processing unit (“CPU"), and the processor 1720 may also be other general-purpose processors, digital signal processors (DSPs). , an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 1730 can include read only memory and random access memory and provides instructions and data to the processor 20. A portion of the memory 1730 can also include a non-volatile random access memory. For example, the memory 1030 can also store information of the device type.
  • each step of the above method may be completed by an integrated logic circuit of hardware in the processor 1720 or an instruction in a form of software.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory 1730, and the processor 1720 reads the information in the memory 1730 and performs the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
  • the apparatus 1700 for transmitting data according to an embodiment of the present invention may correspond to a second terminal device (for example, the above-described terminal device #2) in the method of the embodiment of the present invention, and the device 1700 for transmitting data
  • a second terminal device for example, the above-described terminal device #2
  • the device 1700 for transmitting data The modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 500 in FIG. 5, and are not described herein again for brevity.
  • An apparatus for transmitting data by causing a first terminal device and a second terminal device to negotiate a hash function and fingerprint information based on an H.323 protocol, can be in the first terminal device and the second terminal device A DTLS protocol connection based on the hash function and the fingerprint information is established, so that the first terminal device and the second terminal device can transmit data through the DTLS protocol connection, thereby effectively utilizing the DTLS protocol security authentication mechanism to improve the security of the transmission data. And can make the DTLS protocol applicable to terminal devices using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 18 shows a schematic block diagram of an apparatus 1800 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1800 communicates with the first terminal device through the H.323 protocol, and the device 1800 communicates with the second terminal device through the SIP.
  • the device 1800 includes:
  • processor 1820 connected to the bus 1810;
  • a memory 1830 connected to the bus 1810;
  • transceiver 1840 connected to the bus 1810;
  • the processor 1820 by using the bus 1810, invokes a program stored in the memory 1830, for controlling the transceiver to receive at least one first hash function sent by the second terminal device, where the first The hash function belongs to a hash function supported by the second terminal device;
  • the transceiver configured to control the transceiver to receive the target first hash function and the first fingerprint information sent by the second terminal device, where the target first hash function is that the first terminal device is from the first hash function list Determining, and the target first hash function belongs to a hash function supported by the first terminal device, the first fingerprint information is fingerprint information corresponding to the target first hash function, and the target first hash function And the first fingerprint information is used to authenticate the first terminal device;
  • the transceiver configured to control the transceiver to receive the target second hash function and the second fingerprint information sent by the second terminal device, where the target second hash function is a part of the second terminal device from the second hash function Or all determined, and the target second hash function belongs to a hash function supported by the second terminal device, the second fingerprint information is fingerprint information corresponding to the target second hash function, and the target second The hash function and the second fingerprint information are used to authenticate the second terminal device;
  • the transceiver configured to control the transceiver to send the target first hash function and the first fingerprint information to the second terminal device, and send the target second hash function and the second fingerprint information to the first terminal device, so that The first terminal device and the second terminal device perform authentication processing according to the target first hash function, the first fingerprint information, the target second hash function, and the second fingerprint information to establish a data packet transport layer.
  • the security protocol DTLS protocol connects and transmits data through the DTLS protocol connection.
  • the processor is further configured to: control, by the transceiver, the first role indication information sent by the first terminal device, and the second role indication information sent by the second terminal device, where the first role indication is The information is used to indicate a role supported by the first terminal device, where the second role indication information is used to indicate a role supported by the second terminal device, and the role is at least one of “active” and “passive”;
  • the first hash function, the first fingerprint information, the second hash function, the second fingerprint information, the role supported by the first terminal device, and the role supported by the second terminal device perform authentication processing.
  • the processor is further configured to control the transceiver to receive the first port number sent by the first terminal device and the second port number sent by the second terminal device, where the first port number is the first terminal device a port number used to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection, the second port number being a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection ;
  • the port number establishes an SCTP connection with the second port number, and transmits data through the SCTP connection.
  • device 1800 may be embedded or may itself be a gateway device such as a gateway, and may also include a carrier that houses the transmitting circuitry and the receiving circuitry to allow for data transmission and reception between device 1800 and a remote location.
  • bus 1810 In addition to the data bus, the bus includes a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are labeled as bus 1810 in the figure.
  • the processor may implement or perform the steps and logic blocks disclosed in the method embodiments of the present invention.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor, decoder or the like.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented by the hardware processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the processor 1820 may be a central processing unit (“CPU"), and the processor 1820 may also be another general-purpose processor, a digital signal processor (DSP). , an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 1830 can include read only memory and random access memory and provides instructions and data to the processor 1820.
  • a portion of memory 1830 may also include a non-volatile random access memory.
  • the memory 1830 can also store information of the device type.
  • each step of the above method may be completed by an integrated logic circuit of hardware in the processor 1820 or an instruction in the form of software.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory 1830, and the processor 1820 reads the information in the memory 1830 and, in conjunction with its hardware, performs the steps of the above method. To avoid repetition, it will not be described in detail here.
  • the apparatus 1800 for transmitting data may correspond to a gateway apparatus in the method of the embodiment of the present invention, and each unit in the apparatus 1800 for transmitting data, that is, a module and the above other operations and/or The functions are respectively implemented in order to implement the corresponding process of the method 300 in FIG. 3, and are not described herein for brevity.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a DTLS protocol based on the security parameter between the first terminal device and the second terminal device.
  • the connection enables the first terminal device and the second terminal device to transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • the apparatus for transmitting data according to the embodiment of the present invention uses the H.323 protocol, the first terminal device, and the second terminal device using the SIP to negotiate the hash function and the fingerprint information via the gateway device, and is capable of being in the first terminal device.
  • the mechanism improves the security of the transmitted data, and can make the DTLS protocol applicable to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 19 shows a schematic block diagram of an apparatus 1900 for transmitting data in accordance with an embodiment of the present invention.
  • the device 1900 communicates with the gateway device through the H.323 protocol, and the gateway device communicates with the second terminal device through the SIP.
  • the device 1900 includes:
  • processor 1920 connected to the bus 1910;
  • a memory 1930 connected to the bus 1910;
  • transceiver 1940 connected to the bus 1910;
  • the processor 1920 by using the bus 1910, invokes a program stored in the memory 1930 for controlling the transceiver to receive a first hash function list sent by the gateway device, where the first hash is
  • the function list records at least one first hash function sent by the second terminal device to the gateway device, where the first hash function belongs to a hash function supported by the second terminal device;
  • the target first hash function Used to determine a target first hash function from the first hash function list and determine first fingerprint information corresponding to the target first hash function, wherein the target first hash function belongs to the device 1900 a supported hash function, the target first hash function and the first fingerprint information are used for authentication of the device 1900;
  • the target second hash function is the second hash sent by the second terminal device from the gateway device Determining part or all of the function, and the target second hash function belongs to a hash function supported by the second terminal device, and the second fingerprint information is fingerprint information corresponding to the target second hash function,
  • the target second hash function and the second fingerprint information are used to authenticate the second terminal device;
  • the processor is further configured to control the transceiver to send a first port number to the gateway device, where the first port number is used by the device 1900 to establish a flow control transmission protocol SCTP based on the DTLS protocol connection. a port number of the connection, so that the gateway device sends the first port number to the second terminal device;
  • the processor is further configured to control the transceiver to send first role indication information to the gateway device, where the first role indication information is used to indicate a role supported by the device 1900, and the role is “active” and “passive”. At least one of the foregoing, so that the gateway device sends the first role indication information to the second terminal device;
  • the second role indication information is sent by the second terminal device to the gateway device, and the second role indication information is used to indicate the second The role supported by the terminal device;
  • a second hash function according to the target, the first fingerprint information, the target second hash function, the second fingerprint information, a role supported by the device 1900, and a role supported by the second terminal device and the second The terminal device performs authentication processing.
  • device 1900 may be embedded or may itself be a terminal device such as a video conferencing terminal, and may also include a carrier that houses the transmitting circuitry and the receiving circuitry to allow for data transmission and reception between device 1900 and a remote location.
  • bus 1910 In addition to the data bus, the bus includes a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are labeled as bus 1910 in the figure.
  • the processor may implement or perform the steps and logic blocks disclosed in the method embodiments of the present invention.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor, decoder or the like.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented by the hardware processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the processor 1920 may be a central processing unit (“CPU"), and the processor 1920 may also be other general-purpose processors, digital signal processors (DSPs). , an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 1930 can include read only memory and random access memory and provides instructions and data to the processor 1920.
  • a portion of the memory 1930 may also include a non-volatile random access memory.
  • the memory 1930 can also store information of the device type.
  • each step of the above method may be completed by an integrated logic circuit of hardware in the processor 1920 or an instruction in a form of software.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in memory 1930, and processor 1920 reads the information in memory 1930 and, in conjunction with its hardware, performs the steps of the above method. To avoid repetition, it will not be described in detail here.
  • the apparatus 1900 for transmitting data may correspond to a first terminal device (for example, the above-described terminal device #A) in the method of the embodiment of the present invention, and in the device 1900 for transmitting data
  • a first terminal device for example, the above-described terminal device #A
  • the modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 600 in FIG. 6, and are not described herein again for brevity.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a DTLS protocol based on the security parameter between the first terminal device and the second terminal device.
  • the connection enables the first terminal device and the second terminal device to transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • the apparatus for transmitting data according to the embodiment of the present invention uses the H.323 protocol, the first terminal device, and the second terminal device using the SIP to negotiate the hash function and the fingerprint information via the gateway device, and is capable of being in the first terminal device.
  • the mechanism improves the security of the transmitted data, and can make the DTLS protocol applicable to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 20 shows a schematic block diagram of an apparatus 2000 for transmitting data in accordance with an embodiment of the present invention.
  • the device 2000 communicates with the first terminal device through the H.323 protocol, and the device 2000 communicates with the second terminal device through the SIP.
  • the device 2000 includes:
  • processor 2020 connected to the bus 2010
  • a memory 2030 connected to the bus 2010;
  • transceiver 2040 connected to the bus 2010
  • the processor 2020 by using the bus 2010, invokes a program stored in the memory 2030, for controlling the transceiver to receive a hash function list sent by the first terminal device, where the hash function list includes the At least one hash function supported by the first terminal device;
  • the transceiver controlling the transceiver to send the target hash function and the fingerprint information to the second terminal, so that the first terminal device and the second terminal device perform authentication processing according to the target hash function and the fingerprint information, to Establish a packet transport layer security protocol DTLS protocol connection and transmit data through the DTLS protocol connection.
  • the processor is specifically configured to control the transceiver to send a to-be-verified hash function to the second terminal device, where the to-be-verified hash function is any hash function in the hash function list;
  • the processor is specifically configured to: when determining that the verification message carries the to-be-verified hash function, determine that the to-be-verified hash function belongs to a hash function supported by the second terminal device, and the to-be-verified The Greek function is determined to be an alternate hash function.
  • the processor is further configured to receive, by the transceiver, the first role indication information sent by the first terminal device and the second role indication information sent by the second terminal device, where the first role indication information is used to indicate a role supported by the first terminal device, where the second role indication information is used to indicate a role supported by the second terminal device, where the role is at least one of “active” and “passive”;
  • the first hash function, the first fingerprint information, the second hash function, the second fingerprint information, the role supported by the first terminal device, and the role supported by the second terminal device perform authentication processing.
  • the processor is further configured to control the transceiver to receive the first port number sent by the first terminal device and the second port number sent by the second terminal device, where the first port number is the first terminal device a port number used to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection, the second port number being a port number used by the second terminal device to establish an SCTP connection based on the DTLS protocol connection ;
  • the port number establishes an SCTP connection with the second port number, and transmits data through the SCTP connection.
  • the device 2000 may be embedded or may itself be a gateway device such as a gateway, and may also include a carrier that houses the transmitting circuit and the receiving circuit to allow data transmission and reception between the device 2000 and the remote location.
  • bus 2010 In addition to the data bus, the bus includes a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are labeled as bus 2010 in the figure.
  • the processor may implement or perform the steps and logic blocks disclosed in the method embodiments of the present invention.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor, decoder or the like.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented by the hardware processor, or may be performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the processor 2020 may be a central processing unit (Central Processing Unit (CPU), and the processor 2020 may also be other general-purpose processors, digital signal processors (DSPs). , an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 2030 can include read only memory and random access memory and provides instructions and data to the processor 2020.
  • a portion of the memory 2030 may also include non-volatile random access Memory.
  • the memory 2030 can also store information of the device type.
  • each step of the foregoing method may be completed by an integrated logic circuit of hardware in the processor 2020 or an instruction in a form of software.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory 2030, and the processor 2020 reads the information in the memory 2030 and performs the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
  • the device 2000 for transmitting data may correspond to a gateway device in the method of the embodiment of the present invention, and each unit in the device 2000 for transmitting data, that is, a module and the above other operations and/or The functions are respectively implemented in order to implement the corresponding process of the method 400 in FIG. 4, and are not described herein for brevity.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a DTLS protocol based on the security parameter between the first terminal device and the second terminal device.
  • the connection enables the first terminal device and the second terminal device to transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • the apparatus for transmitting data according to the embodiment of the present invention uses the H.323 protocol, the first terminal device, and the second terminal device using the SIP to negotiate the hash function and the fingerprint information via the gateway device, and is capable of being in the first terminal device.
  • the mechanism improves the security of the transmitted data, and can make the DTLS protocol applicable to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 21 shows a schematic block diagram of an apparatus 2100 for transmitting data in accordance with an embodiment of the present invention.
  • the device 2100 communicates with the gateway device through the H.323 protocol, and the gateway device communicates with the second terminal device through the SIP.
  • the device 2100 includes:
  • processor 2120 connected to the bus 2110;
  • a memory 2130 connected to the bus 2110;
  • transceiver 2140 connected to the bus 2110;
  • the processor 2120 calls, by using the bus 2110, a program stored in the memory 2130, for controlling the transceiver to send a hash function list to the gateway device, where the hash function list includes the device 2100 Supporting at least one hash function, so that the gateway device performs a negotiation process with the second terminal device according to the hash function list to determine at least one candidate hash function from the hash function list, wherein the device The hash function is selected to belong to a hash function supported by the second terminal device;
  • the processor is further configured to control the transceiver to send the first port number to the gateway device, so that the gateway device forwards the first port number to the second terminal device, where the first port number is the device
  • the port number used by the 2100 to establish a flow control transport protocol SCTP connection based on the DTLS protocol connection;
  • the second port number is sent by the second terminal device to the gateway device, where the second port number is used by the second terminal device, where the second port number is sent by the second terminal device.
  • the device 2100 may be embedded or may itself be a terminal device such as a video conferencing terminal, and may further include a carrier that houses the transmitting circuit and the receiving circuit to allow data transmission and reception between the device 2100 and the remote location.
  • bus 2110 In addition to the data bus, the bus includes a power bus, a control bus, and a status signal bus. However, for the sake of clarity, various buses are labeled as bus 2110 in the figure.
  • the processor may implement or perform the steps and logic blocks disclosed in the method embodiments of the present invention.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor, decoder or the like.
  • the steps of the method disclosed in connection with the embodiments of the present invention may be directly embodied as hardware.
  • the processor execution is complete or is performed by a combination of hardware and software modules in the decoding processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the processor 2120 may be a central processing unit (“CPU"), and the processor 2120 may also be other general-purpose processors, digital signal processors (DSPs). , an application specific integrated circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware component, and the like.
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like.
  • the memory 2130 can include read only memory and random access memory and provides instructions and data to the processor 2120. A portion of the memory 2130 may also include a non-volatile random access memory. For example, the memory 2130 can also store information of the device type.
  • each step of the foregoing method may be completed by an integrated logic circuit of hardware in the processor 2120 or an instruction in a form of software.
  • the steps of the method disclosed in the embodiments of the present invention may be directly implemented as a hardware processor, or may be performed by a combination of hardware and software modules in the processor.
  • the software module can be located in a conventional storage medium such as random access memory, flash memory, read only memory, programmable read only memory or electrically erasable programmable memory, registers, and the like.
  • the storage medium is located in the memory 2130, and the processor 2120 reads the information in the memory 2130 and completes the steps of the above method in combination with its hardware. To avoid repetition, it will not be described in detail here.
  • the device 2100 for transmitting data may correspond to a first terminal device (for example, the above-described terminal device #A) in the method of the embodiment of the present invention, and in the device 2100 for transmitting data
  • a first terminal device for example, the above-described terminal device #A
  • the modules and the other operations and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 700 in FIG. 7, and are not described herein again for brevity.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a DTLS protocol based on the security parameter between the first terminal device and the second terminal device.
  • the connection enables the first terminal device and the second terminal device to transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • the apparatus for transmitting data according to the embodiment of the present invention uses the H.323 protocol, the first terminal device, and the second terminal device using the SIP to negotiate the hash function and the fingerprint information via the gateway device, and is capable of being in the first terminal device.
  • the data can effectively utilize the security authentication mechanism of the DTLS protocol to improve the security of the transmitted data, and can make the DTLS protocol applicable to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 22 shows a schematic architectural diagram of a system 2200 for transmitting data in accordance with an embodiment of the present invention.
  • the system 2200 includes a first terminal device 2210, a second terminal device 2220, and a gateway device 2230.
  • the first terminal device 2210 communicates with the gateway device 2230 through an H.323 protocol
  • the second terminal The device 2220 communicates with the gateway device 2230 through a session initiation protocol SIP, where
  • the gateway device 2230 is configured to receive, by the second terminal device, at least one first hash function, where the first hash function belongs to a hash function supported by the second terminal device, and send a record to the first terminal device.
  • a first hash function list having the first hash function, receiving a target first hash function and first fingerprint information sent by the first terminal device, where the target first hash function is the first terminal device Determining from the first hash function list, and the target first hash function belongs to a hash function supported by the first terminal device, and the first fingerprint information is a fingerprint corresponding to the target first hash function.
  • the first hash function and the first fingerprint information are used to authenticate the first terminal device, and are configured to receive a second hash function list sent by the first terminal device, where the second hash function list includes At least one second hash function supported by the first terminal device, sending part or all of the second hash function to the second terminal device, and receiving the target second hash sent by the second terminal device a function and second fingerprint information, wherein the target second hash function is determined by the second terminal device from part or all of the second hash function, and the target second hash function belongs to the second terminal a hash function supported by the device, the second fingerprint information is fingerprint information corresponding to the target second hash function, and the target second hash function and the second fingerprint information are used to authenticate the second terminal device.
  • the terminal device and the second terminal device perform authentication processing according to the target first hash function, the first fingerprint information, the target second hash function, and the second fingerprint information to establish a packet transport layer security protocol DTLS. Protocol connection, and transfer data through the DTLS protocol connection;
  • the first terminal device 2210 is configured to receive a first hash function list sent by the gateway device, where the first hash function list records at least one first hash sent by the second terminal device to the gateway device.
  • a function the first hash function belongs to a hash function supported by the second terminal device Number, determining a target first hash function from the first hash function list, and determining first fingerprint information corresponding to the target first hash function, wherein the target first hash function belongs to the first a hash function supported by the terminal device, the target first hash function and the first fingerprint information are used to authenticate the first terminal device, and send the determined target first hash function and the first to the gateway device Fingerprint information, so that the gateway device sends the target first hash function and the first fingerprint information to the second terminal device, and sends a second hash function list to the gateway device, the second hash function
  • the list includes at least one second hash function supported by the first terminal device, and receives a target second hash function and second fingerprint information sent by the gateway device, where
  • the gateway device 2230 may correspond to the gateway device in the method of the embodiment of the present invention, and each unit in the gateway device 2230, that is, the module and the other operations and/or functions described above are respectively implemented in FIG.
  • the corresponding process of the method 300 is not described here for brevity.
  • the first terminal device 2210 may correspond to the first terminal device (for example, the terminal device #X) in the method of the embodiment of the present invention, and each unit in the first terminal device 2210 is a module.
  • the other processes and/or functions described above are respectively implemented in order to implement the corresponding process of the method 600 in FIG. 6. For brevity, no further details are provided herein.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a DTLS protocol based on the security parameter between the first terminal device and the second terminal device.
  • the connection enables the first terminal device and the second terminal device to transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • the apparatus for transmitting data according to the embodiment of the present invention uses the H.323 protocol, the first terminal device, and the second terminal device using the SIP to negotiate the hash function and the fingerprint information via the gateway device, and is capable of being in the first terminal device.
  • the data can effectively utilize the security authentication mechanism of the DTLS protocol to improve the security of the transmitted data, and can make the DTLS protocol applicable to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • FIG. 23 shows a schematic architectural diagram of a system 2300 for transmitting data in accordance with an embodiment of the present invention.
  • the system 2300 includes a first terminal device 2310, a second terminal device 2320, and a gateway device 2330.
  • the first terminal device 2310 communicates with the gateway device 2330 through an H.323 protocol
  • the second terminal The device 2320 communicates with the gateway device 2330 via a session initiation protocol SIP, where
  • the gateway device 2330 is configured to receive a hash function list sent by the first terminal device, where the hash function list includes at least one hash function supported by the first terminal device, and is configured according to the hash function list
  • the second terminal device performs a negotiation process to determine at least one candidate hash function from the hash function list, wherein the candidate hash function belongs to a hash function supported by the second terminal device, and is used for the Transmitting, by the terminal device, the candidate hash function, so that the first terminal device determines a target hash function from the candidate hash function, and determines fingerprint information corresponding to the target hash function, for receiving the The target hash function and the fingerprint information sent by the first terminal device, and sending the target hash function and the fingerprint information to the second terminal, so that the first terminal device and the second terminal device according to the target
  • the Greek function and the fingerprint information are authenticated to establish a data packet transport layer security protocol DTLS protocol connection, and the data is transmitted through the DTLS protocol connection;
  • the first terminal device 2310 is configured to send, to the gateway device, a hash function list, where the hash function list includes at least one hash function supported by the first terminal device, so that the gateway device is configured according to the hash function list.
  • Negotiating with the second terminal device to determine at least one candidate hash function from the hash function list, wherein the candidate hash function belongs to a hash function supported by the second terminal device for receiving The candidate hash function sent by the gateway device is used to determine a target hash function from the candidate hash function, and determine fingerprint information corresponding to the target hash function, for sending the gateway device to the gateway device a target hash function and the fingerprint information, so that the gateway device forwards the target hash function and the fingerprint information to the second terminal, and is configured to perform, according to the target hash function and the fingerprint information, with the second terminal device.
  • the authentication process is to establish a packet transport layer security protocol DTLS protocol connection and transmit data through the DTLS protocol connection.
  • the gateway device 2330 may correspond to a gateway device in the method of the embodiment of the present invention, and each unit in the gateway device 2330 is a module and the foregoing other operations and/or The functions are respectively implemented in order to implement the corresponding process of the method 400 in FIG. 4, and are not described herein for brevity.
  • the first terminal device 2310 may correspond to the first terminal device (for example, the terminal device #X) in the method of the embodiment of the present invention, and each unit in the first terminal device 2310 is a module.
  • the other processes and/or functions described above are respectively implemented in order to implement the corresponding processes of the method 700 in FIG. 7, and are not described herein again for brevity.
  • the first terminal device and the second terminal device negotiate a security parameter via the gateway device, and can establish a DTLS protocol based on the security parameter between the first terminal device and the second terminal device.
  • the connection enables the first terminal device and the second terminal device to transmit data through the DTLS protocol connection without the forwarding of the gateway device, thereby reducing the burden on the gateway device, improving the transmission performance of the system, and improving the impact on the user experience.
  • the apparatus for transmitting data according to the embodiment of the present invention uses the H.323 protocol, the first terminal device, and the second terminal device using the SIP to negotiate the hash function and the fingerprint information via the gateway device, and is capable of being in the first terminal device.
  • the mechanism improves the security of the transmitted data, and can make the DTLS protocol applicable to the terminal device using the H.323 protocol, thereby improving the reliability and practicability of the terminal device and improving the user experience.
  • the size of the sequence numbers of the above processes does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiments of the present invention.
  • the implementation process constitutes any limitation.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division, and may be implemented in actual implementation.
  • multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present invention which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Abstract

L'invention concerne un procédé, un appareil et un système de transmission de données. Le procédé comprend : un premier dispositif de terminal reçoit une première liste de fonctions de hachage envoyée par un second dispositif de terminal, détermine une première fonction de hachage à partir de la première liste de fonctions de hachage, détermine des premières informations d'empreintes digitales correspondant à la première fonction de hachage, et envoie la première fonction de hachage et les premières informations d'empreintes digitales au second dispositif de terminal ; le premier dispositif de terminal envoie une seconde liste de fonction de hachage au second dispositif de terminal, et reçoit une seconde fonction de hachage déterminée à partir de la seconde liste de fonctions de hachage et les secondes informations d'empreintes digitales correspondant à la seconde fonction de hachage, la seconde fonction de hachage et les secondes informations d'empreintes digitales étant envoyées par le second terminal ; et le premier dispositif terminal exécute un traitement d'authentification avec le second dispositif de terminal selon la première fonction de hachage, les premières informations d'empreintes digitales, la seconde fonction de hachage, et les secondes informations d'empreintes digitales, afin d'établir une connexion de protocole DTLS afin de transmettre des données, de sorte qu'un mécanisme d'authentification de sécurité dans le protocole DTLS peut être efficacement utilisé pour améliorer la sécurité de la transmission de données, ce qui permet d'améliorer la fiabilité et le caractère pratique de la transmission.
PCT/CN2016/071359 2015-01-23 2016-01-19 Procédé, appareil et système de transmission de données WO2016116034A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510036840.8A CN105871790B (zh) 2015-01-23 2015-01-23 用于传输数据的方法、装置和系统
CN201510036840.8 2015-01-23

Publications (1)

Publication Number Publication Date
WO2016116034A1 true WO2016116034A1 (fr) 2016-07-28

Family

ID=56416440

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/071359 WO2016116034A1 (fr) 2015-01-23 2016-01-19 Procédé, appareil et système de transmission de données

Country Status (2)

Country Link
CN (1) CN105871790B (fr)
WO (1) WO2016116034A1 (fr)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1652499A (zh) * 2004-02-07 2005-08-10 华为技术有限公司 一种消息传输的实现方法
CN1783776A (zh) * 2004-11-29 2006-06-07 中兴通讯股份有限公司 在h.323多媒体通信系统节点间产生共享秘密的方法
CN1881869A (zh) * 2005-11-01 2006-12-20 华为技术有限公司 一种实现加密通信的方法
US20100329453A1 (en) * 2009-06-30 2010-12-30 Cisco Technology, Inc. Rounding for security

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103369707B (zh) * 2012-03-27 2016-12-14 华为终端有限公司 无线网络连接的建立方法及终端设备
CN103428818B (zh) * 2012-05-24 2017-02-15 华为技术有限公司 终端设备发现的方法、设备及系统
CN104125654A (zh) * 2013-04-23 2014-10-29 腾讯科技(深圳)有限公司 一种wifi网络的数据传输方法、装置及终端设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1652499A (zh) * 2004-02-07 2005-08-10 华为技术有限公司 一种消息传输的实现方法
CN1783776A (zh) * 2004-11-29 2006-06-07 中兴通讯股份有限公司 在h.323多媒体通信系统节点间产生共享秘密的方法
CN1881869A (zh) * 2005-11-01 2006-12-20 华为技术有限公司 一种实现加密通信的方法
US20100329453A1 (en) * 2009-06-30 2010-12-30 Cisco Technology, Inc. Rounding for security

Also Published As

Publication number Publication date
CN105871790A (zh) 2016-08-17
CN105871790B (zh) 2019-02-01

Similar Documents

Publication Publication Date Title
TWI551112B (zh) 用於電路交換音訊通話及視訊通話間轉變之非暫時性有形機器可讀媒體及用戶端器件
US9628585B2 (en) Systems and methods for cross-layer secure connection set up
US9198040B2 (en) Deploying wireless docking as a service
KR102161715B1 (ko) 도킹 구조에서의 프록시 기반 통신 기법
US9237169B2 (en) Network stream identification for open FaceTime
US20150082021A1 (en) Mobile proxy for webrtc interoperability
US9338410B2 (en) Remote streaming
WO2010020169A1 (fr) Procédé, système et dispositif de dérivation médiatique
TW200835234A (en) Access terminal conditionally opening a data session
WO2011095007A1 (fr) Procédé et système d'établissement actif de visioconférence par terminal radio
KR20100027156A (ko) 고속 패킷 데이터 세션 해제 방법
EP3817321B1 (fr) Procédé et dispositif pour la fourniture d'un service multimédia dans un dispositif électronique
WO2018129876A1 (fr) Procédé de transmission de données en continu, serveur et terminal
WO2016029742A1 (fr) Procédé, dispositif et système d'enregistrement audio
US20090113063A1 (en) Authentication method and apparatus for integrating ticket-granting service into session initiation protocol
JP5002830B2 (ja) 通信モジュール、通信方法、通信プログラム、通信端末、および通信制御装置
JP4472566B2 (ja) 通信システム、及び呼制御方法
WO2020029954A1 (fr) Procédé et appareil de demande de service, de négociation et de réponse, et dispositif de réseau et système
JP5303403B2 (ja) 端末装置、通信方法、及びプログラム
CN114710568B (zh) 音视频数据通信方法、设备及存储介质
WO2016116034A1 (fr) Procédé, appareil et système de transmission de données
CN111683217B (zh) 视频通话方法、系统、设备、网络模组及可读存储介质
CN112398718A (zh) 一种网络传输方法、装置、电子设备及存储介质
JP2004363993A (ja) 通信端末
CN108616494B (zh) 基于多pdn连接的安全通话方法、装置及终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16739781

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16739781

Country of ref document: EP

Kind code of ref document: A1