Web servers are embedded in the SMC2.0, MCU, RSE recording servers, conference endpoints, and telepresence central control devices for device maintenance and management. Users can log in to the devices by using the HTTPS, preventing the user name, password, and other sensitive information from being stolen.
The H.235 security protocol is used to protect H.323-based conferences. The Secure Real-time Transport Protocol (SRTP) protocol is used to encrypt conference media streams to ensure information security.
The TLS security protocol is used to protect SIP-based conferences. The SRTP protocol is used to encrypt conference media streams to ensure information security.
The sitecall function enables a user to proactively send a conference convening request to the SC through a conference endpoint and to set the related parameters (such as the site name, conference access password, payment user name and password) on the endpoint. To ensure security of sensitive information in the parameters, the sitecall function supports using the HTTPS channel for data transmission, that is, the endpoint sends a sitecall request to the HTTPS server (SC) as the HTTPS client.
Before performing any operations, the videoconference products check the permission of the user who logs in to the system to avoid unauthorized access.
Parameters of all requests from other systems are checked to avoid malformed packet attack.
Conference access and control passwords are used to avoid unauthorized control or access.
In addition to the below, please check the product documentation (CloudECV600R019C10 Enterprise On-premises, Convergent Conference) and check the chapter 'Encryption Principle'.
Encryption Principle
This topic describes the TLS and SRTP transmission principles, facilitating your understanding of the encrypted transmission mechanism.
TLS Protocol PrincipleThis topic describes the TLS and SRTP transmission principles, facilitating your understanding of the encrypted transmission mechanism.SRTP Protocol PrincipleThe use of RTP or SRTP is negotiated by the communicating parties.Encryption Network and SchemeThis topic describes the encryption network and scheme in pure UC scenarios of the CloudEC.
Web servers are embedded in the SMC2.0, MCU, RSE recording servers, conference endpoints, and telepresence central control devices for device maintenance and management. Users can log in to the devices by using the HTTPS, preventing the user name, password, and other sensitive information from being stolen.
The H.235 security protocol is used to protect H.323-based conferences. The Secure Real-time Transport Protocol (SRTP) protocol is used to encrypt conference media streams to ensure information security.
The TLS security protocol is used to protect SIP-based conferences. The SRTP protocol is used to encrypt conference media streams to ensure information security.
The sitecall function enables a user to proactively send a conference convening request to the SC through a conference endpoint and to set the related parameters (such as the site name, conference access password, payment user name and password) on the endpoint. To ensure security of sensitive information in the parameters, the sitecall function supports using the HTTPS channel for data transmission, that is, the endpoint sends a sitecall request to the HTTPS server (SC) as the HTTPS client.
Before performing any operations, the videoconference products check the permission of the user who logs in to the system to avoid unauthorized access.
Parameters of all requests from other systems are checked to avoid malformed packet attack.
Conference access and control passwords are used to avoid unauthorized control or access.
In addition to the below, please check the product documentation (CloudECV600R019C10 Enterprise On-premises, Convergent Conference) and check the chapter 'Encryption Principle'.
Encryption Principle
This topic describes the TLS and SRTP transmission principles, facilitating your understanding of the encrypted transmission mechanism.
TLS Protocol PrincipleThis topic describes the TLS and SRTP transmission principles, facilitating your understanding of the encrypted transmission mechanism.SRTP Protocol PrincipleThe use of RTP or SRTP is negotiated by the communicating parties.Encryption Network and SchemeThis topic describes the encryption network and scheme in pure UC scenarios of the CloudEC.
Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
Politically sensitive content
Content concerning pornography, gambling, and drug abuse
Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."