首页>
外国专利>
Cryptographic computation method for participants of voice over Internet protocol (VoIP) connection involves performing cryptographic computation at least partly in safety module after accomplishing part of key administrative minutes
Cryptographic computation method for participants of voice over Internet protocol (VoIP) connection involves performing cryptographic computation at least partly in safety module after accomplishing part of key administrative minutes
A VoIP connection is established. At least a part of key administrative minutes is accomplished and a cryptographic computation is planned for mutual authentication of the participants and for the production and exchange of keys between the participants. The cryptographic computation is at least partly executed in a safety module (12,22) equipped with a microprocessor chip.
展开▼