H.235
   HOME

TheInfoList



OR:

H.235 covers
security Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or ...
and
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
for H.323 and other H.245 based terminals. The standard addresses authentication by means of several
algorithms In mathematics and computer science, an algorithm () is a finite sequence of mathematically rigorous instructions, typically used to solve a class of specific problems or to perform a computation. Algorithms are used as specifications for per ...
, including Diffie-Hellman methods, and privacy. Privacy allows for encryption, also of the media streams. The standardization board agreed on H.235.1 (former H.235 Annex D ITU-T Recommendation H.235.0
(09/05), Appendix IV, page 40) to be the minimum requirement of an H.235 conforming implementation. H.235.1, also known as ''Baseline Security Profile'' defines
Authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
and
Integrity Integrity is the quality of being honest and having a consistent and uncompromising adherence to strong moral and ethical principles and values. In ethics, integrity is regarded as the honesty and Honesty, truthfulness or of one's actions. Integr ...
. An H.235.1 aware
H.323 Gatekeeper An H.323 Gatekeeper serves the purpose of Call Admission Control and translation services from E.164 IDs (commonly a phone number) to IP addresses in an H.323 telephony network. Gatekeepers can be combined with a gateway function to proxy H.323 ...
can thereby assure that only trusted H.323 endpoints are granted access to the Gatekeeper's services.


References

{{reflist


External links


ITU-T Recommendation H.235.1 Baseline security profile
Cryptographic protocols ITU-T recommendations