CN111355921A - Video conference encryption method and system - Google Patents
Video conference encryption method and system Download PDFInfo
- Publication number
- CN111355921A CN111355921A CN202010284647.7A CN202010284647A CN111355921A CN 111355921 A CN111355921 A CN 111355921A CN 202010284647 A CN202010284647 A CN 202010284647A CN 111355921 A CN111355921 A CN 111355921A
- Authority
- CN
- China
- Prior art keywords
- client
- conference
- key
- symmetric key
- participating
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000004590 computer program Methods 0.000 claims description 4
- 230000006854 communication Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/15—Conference systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Telephonic Communication Services (AREA)
Abstract
A video conference encryption method and system comprises the following steps: 1) a client initiates a request for reserving a conference to an conference control server, and the conference control server generates a symmetric key corresponding to the conference; 2) the conference participating client sends a conference joining request to the conference control server; 3) the conference participating client acquires the symmetric key subjected to asymmetric encryption from the conference control server; 4) the participating client carries out asymmetric decryption on the symmetric key subjected to asymmetric encryption to obtain the symmetric key; 5) and the participating client encrypts and/or decrypts the media stream by using the symmetric key. The invention also provides a video conference encryption system, which is used for symmetrically encrypting the conference media stream and asymmetrically encrypting the symmetric key, thereby improving the security of the conference, greatly reducing the possibility of being cracked and reducing the leakage risk.
Description
Technical Field
The invention relates to the technical field of network multimedia, in particular to a video conference encryption method and system.
Background
In the communication process of various video conferences in the current market, in a meeting system, communication is generally carried out through a network when a network video conference is carried out, and because various network security problems exist, such as leakage of account passwords, interception of conference contents and other security risks.
Although there are many encryption methods, many are not suitable for the encryption process of the video conference.
Especially for video communication between organizations related to national security, encryption based on national secrets is required, and no encryption method is available at present in the face of such encryption methods.
Disclosure of Invention
In order to solve the defects in the prior art, the invention aims to provide a video conference encryption method and system, after symmetrically encrypting a conference media stream, asymmetrically encrypting a symmetric key again, and particularly based on a national cryptographic algorithm, so that the security of a conference is improved, the possibility of being cracked is greatly reduced, and the leakage risk is reduced.
In order to achieve the above object, the present invention provides a video conference encryption method, which comprises the following steps:
1) a client initiates a request for reserving a conference to an conference control server, and the conference control server generates a symmetric key corresponding to the conference;
2) the conference participating client sends a conference joining request to the conference control server;
3) the conference participating client acquires the symmetric key subjected to asymmetric encryption from the conference control server;
4) the participating client carries out asymmetric decryption on the symmetric key subjected to asymmetric encryption to obtain the symmetric key;
5) and the participating client encrypts and/or decrypts the media stream by using the symmetric key.
Further, before the step 2), further comprising,
each participating client sends the identity identification and the password of the participating client to an identity authentication server, and the identity authentication server generates a participating client public key and a participating client private key corresponding to the participating client;
and the participating client acquires the participating client private key from the identity authentication server.
Further, after the step 2), further comprising,
and the conference control server acquires the public key of the conference participating client from the identity authentication server according to the identity of the conference participating client, and asymmetrically encrypts the symmetric key.
Further, in the step 4), further comprising,
and the participating client side carries out asymmetric decryption by using the participating client side private key to obtain the symmetric key.
Further, the conference control server adopts a symmetric key randomly generated by a cryptographic algorithm.
Further, the participating clients comprise a master client and a slave client;
the main client encrypts the media stream by using the symmetric key and sends the encrypted media stream to the media stream server,
one or more of the slave clients obtain the symmetrically encrypted media stream from the media stream server and decrypt the media stream using the symmetric key.
Furthermore, the conference control server asymmetrically encrypts the symmetric key by using a public key of the host client acquired from the identity authentication server and sends the symmetric key to the host client;
the host client obtains the symmetric key by performing asymmetric decryption using a host client private key obtained from the authentication server,
the conference control server asymmetrically encrypts the symmetric key by using a slave client public key acquired from the identity authentication server and then sends the symmetric key to the slave client;
the slave client performs asymmetric decryption by using a slave client private key acquired from the identity authentication server to acquire the symmetric key.
In order to achieve the above object, the present invention further provides a video conference encryption system, which comprises an conference control server, an identity authentication server, a media stream server and a client, wherein,
the conference control server receives the conference reservation request of the client, generates a symmetric key corresponding to the conference, and sends the asymmetric encrypted symmetric key to the conference participating client;
the identity authentication server receives the identity and the password of the participation client and generates a participation client public key and a participation client private key corresponding to the participation client;
and the participating client encrypts the media stream by using the symmetric key and then sends the encrypted media stream to the media stream server, and acquires the media stream encrypted by using the symmetric key from the media stream server for decryption.
Furthermore, the conference control server acquires a conference client public key corresponding to the conference client from the identity authentication server according to the conference access request of the conference client, and asymmetrically encrypts the symmetric key;
and the participating client acquires the participating client private key corresponding to the participating client from the identity authentication server and decrypts the symmetric key.
To achieve the above object, the present invention further provides a computer readable storage medium having stored thereon computer instructions which, when executed, perform the steps of the video conference encryption method as described above.
The video conference encryption method and the system have the following beneficial effects:
1) the conference media stream is symmetrically encrypted, and the symmetric key is asymmetrically encrypted, so that the security of the conference is improved.
2) The possibility of being cracked is greatly reduced, and the leakage risk is reduced.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flow chart of a video conference encryption method according to the present invention;
fig. 2 is a schematic structural diagram of a video conference encryption system according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example 1
Fig. 1 is a flowchart of a video conference encryption method according to the present invention, and the video conference encryption method of the present invention will be described in detail with reference to fig. 1.
First, in step 101, the host client 40 of the video conference encryption system initiates a reservation request of a symmetric encrypted conference to the conference control server 10, and applies for generating a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference.
In this embodiment, the reservation request sent by the host client 40 of the video conference encryption system includes the identification ID _ a of the host client 40 and the symmetric encrypted conference type.
In step 102, the conference control server 10 of the video conference encryption system generates a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference according to the reservation request sent by the host client 40.
In this embodiment, the symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference is generated by the conference control server 10 according to the symmetric encrypted conference type in the reservation request of each symmetric encrypted conference, and is only effective for the symmetric encrypted conference process. Preferably, the symmetric KEY (SYM _ KEY) is generated by using a cryptographic algorithm, such as the cryptographic SM4 algorithm, so that the possibility of being cracked is greatly reduced.
In step 103, the host client 40 of the videoconference encryption system sends a request to obtain the asymmetric private KEY (PRI _ KEY _ a) to the authentication server 20, and obtains its corresponding asymmetric private KEY (PRI _ KEY _ a) from the authentication server 20.
In this embodiment, the request for obtaining the asymmetric private KEY (PRI _ KEY _ a) sent by the host client 40 includes an identity (ID _ a) of the host client 40 and a password for identity identification.
The authentication server 20 generates an asymmetric public KEY (PUB _ KEY _ a) and an asymmetric private KEY (PRI _ KEY _ a) corresponding to the host client 40 according to the identity and the password of the host client 40.
In this embodiment, the authentication server 20 generates the asymmetric public KEY (PUB _ KEY _ a) and the asymmetric private KEY (PRI _ KEY _ a) by using a cryptographic algorithm, such as the cryptographic SM9 algorithm.
Preferably, in order to ensure the secure transmission of the asymmetric private key corresponding to the client, the asymmetric private key may be transmitted in a non-network manner.
Preferably, in order to ensure that the sending client receives the corresponding asymmetric private key, when the client obtains the asymmetric private key, the identity authentication server performs identity verification by comparing the identity and the password thereof with information already registered on the identity authentication server.
At step 104, the host client 40 sends a conference entry request and an identification to the conference server 10 of the video conference encryption system.
In this embodiment, the host client 40 sends its own identity (ID _ a) to the conference control server 10 of the video conference encryption system to request for conference entry.
In step 105, the conference control server 10, after receiving the conference joining request from the host client 40, obtains the asymmetric public KEY (PUB _ KEY _ a) corresponding to the host client 40 from the authentication server 20 by using the identification (ID _ a) of the host client 40.
In step 106, the conference control server 10 encrypts the symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference by using the asymmetric public KEY (PUB _ KEY _ a) corresponding to the host client 40 and sends the encrypted symmetric KEY (SYM _ KEY) to the host client 40.
In this embodiment, the symmetric KEY is encrypted according to the corresponding asymmetric public KEY (PUB _ KEY _ a) of the client that makes the request after being generated, which ensures that the symmetric KEY is not leaked during transmission, and even if the corresponding public KEY is leaked, the corresponding private KEY cannot be decrypted without the corresponding private KEY.
In step 107, the host client 40 receives the encrypted symmetric KEY, and decrypts the encrypted symmetric KEY using the asymmetric private KEY (PRI _ KEY _ a) obtained in step 103 to obtain the original symmetric KEY (SYM _ KEY).
In step 108, the host client 40 encrypts the media stream of the symmetric encrypted conference using the symmetric KEY (SYM KEY) and transmits the encrypted media stream to the media stream server 30 of the symmetric encrypted conference.
In this embodiment, the host client 40 directly encrypts the media stream after obtaining the symmetric KEY (SYM _ KEY).
In step 109, a get asymmetric private KEY (PRI _ KEY _ B) request is sent from the client 50 to the authentication server 20, and the corresponding asymmetric private KEY (PRI _ KEY _ B) is obtained from the authentication server 20.
In this embodiment, the request for obtaining the asymmetric private KEY (PRI _ KEY _ B) sent from the client 50 to the authentication server 20 includes the identity (ID _ B) of the client 50 and the password used for identification from the client 50.
In this embodiment, the slave client 50 applies for joining the symmetric encrypted conference initiated by the master client 40, sends its own ID _ B and password to the authentication server 20 of the video conference encryption system, and obtains its corresponding asymmetric private KEY PRI _ KEY _ B. In this step, the step is the same as the step in which the host client 40 obtains its corresponding asymmetric private KEY (PRI _ KEY _ a) in step 203.
In step 110, a conference entry request and an identification (ID _ B) are sent from the client 50 to the conference server 10 of the videoconference encryption system.
In this embodiment, the client 50 sends its own identification (ID _ B) to the conference control server 10 of the video conference encryption system to request for conference entry.
In step 111, after receiving the conference entry request from the client 50, the conference control server 10 of the video conference encryption system obtains the asymmetric public KEY PUB _ KEY _ B corresponding to the slave client 50 from the authentication server 20 by using the identification ID _ B and the password of the slave client 50.
In step 112, the conference control server 10 of the video conference encryption system encrypts the symmetric KEY SYM _ KEY of the conference using the asymmetric public KEY PUB _ KEY _ B and sends the encrypted symmetric KEY SYM _ KEY to the slave client 50. In this step, the encrypted symmetric key is obtained from the client 50.
In step 113, the encrypted symmetric KEY is received from the client 50, and decrypted by using the asymmetric private KEY (PRI _ KEY _ B) obtained in step 109 to obtain the original symmetric KEY SYM _ KEY, in which the symmetric KEY is obtained from the client 50.
In step 114, the slave client 50 receives the media stream of the video conference encrypted by the master client 40 from the video conference media stream server 30, and decrypts the media stream using the symmetric KEY SYM _ KEY. In this step, the process of decrypting the symmetric key from the client 50 further reduces the risk of leakage.
Example 2
Fig. 2 is a schematic structural diagram of a video conference encryption system according to the present invention, and as shown in fig. 2, the video conference encryption system of the present invention includes a conference control server 10, an authentication server 20, a media streaming server 30, a master client 40, and a slave client 50, wherein,
the conference control server 10 receives a reservation request of the main client 40 requesting the symmetric encrypted conference, and generates a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference; receiving a conference joining request of the host client 40, and acquiring an asymmetric public KEY (PUB _ KEY _ a) corresponding to the host client 40 from the authentication server 20 by using the identification (ID _ a) of the host client 40; receiving a conference-in request from the client 50, acquiring an asymmetric public KEY (PUB _ KEY _ B) corresponding to the slave client 50 from the authentication server 20 using the identification (ID _ B) of the slave client 50; encrypting a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference by using an asymmetric public KEY (PUB _ KEY _ A) corresponding to the host client 40 and sending the encrypted symmetric KEY (SYM _ KEY) to the host client 40; encrypting a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference by using an asymmetric public KEY (PUB _ KEY _ B) corresponding to the slave client 50 and transmitting the encrypted symmetric KEY (SYM _ KEY) to the slave client 50;
in this embodiment, the conference control server 10 generates a symmetric KEY (SYM _ KEY) by using a cryptographic algorithm (e.g., the cryptographic SM4 algorithm).
The identity authentication server 20 receives a request for acquiring an asymmetric private KEY (PRI _ KEY _ a) sent by the primary client 40, and generates an asymmetric private KEY (PRI _ KEY _ a) corresponding to the primary client 40 according to the identity and the password of the primary client 40; receiving a request for obtaining the asymmetric private KEY (PRI _ KEY _ B) from the client 50, and generating the asymmetric private KEY (PRI _ KEY _ B) corresponding to the client 50 according to the identity and the password of the client 50.
In this embodiment, the request for obtaining the asymmetric private KEY (PRI _ KEY _ a) sent by the primary client 40 includes the identity (ID _ a) of the primary client 40 and the corresponding password that has been registered on the authentication server for identity identification; the request for obtaining the asymmetric private KEY (PRI _ KEY _ B) sent from the client 50 includes the identity (ID _ B) of the client 50 and the corresponding password that has been registered to the authentication server for identification.
In this embodiment, the asymmetric private key method generated by the identity authentication server 20 is generated by using a cryptographic algorithm, such as the cryptographic SM9 algorithm.
A media stream server 30 for storing the media stream encrypted by using a symmetric KEY (SYM _ KEY) transmitted by the host client 40; the media stream encrypted using the symmetric KEY (SYM KEY) is transmitted to the slave client 50.
A master client 40, which sends a symmetric encrypted conference reservation request to the conference control server 10, and applies for generating a symmetric KEY (SYM _ KEY); acquiring a corresponding asymmetric private KEY (PRI _ KEY _ a) from the authentication server 20; sending a conference entering request to the conference control server 10, and receiving a symmetric KEY (SYM _ KEY) encrypted by the conference control server 10 by using an asymmetric public KEY (PUB _ KEY _ a) corresponding to the host client 40; decrypting the symmetric KEY (SYM _ KEY) by using the corresponding asymmetric private KEY (PRI _ KEY _ A) to obtain the symmetric KEY (SYM _ KEY); the media stream is encrypted using a symmetric KEY (SYM KEY) and transmitted to the media streaming server 30.
Acquiring a corresponding asymmetric private KEY (PRI _ KEY _ B) from the authentication server 20 from the client 50; sending a conference entry request to the conference control server 10, and receiving a symmetric KEY (SYM _ KEY) encrypted by the conference control server 10 using a corresponding asymmetric public KEY (PUB _ KEY _ B) from the client 50; decrypting the symmetric KEY (SYM _ KEY) by using the corresponding asymmetric private KEY (PRI _ KEY _ B) to obtain the symmetric KEY (SYM _ KEY); the media stream encrypted using the symmetric KEY (SYM KEY) sent by the media stream server 30 is received and decrypted.
Example 3
In an embodiment of the present invention, a computer-readable storage medium is further provided, on which a computer program is stored, where the computer program executes the steps of the video conference encryption method described above.
Those of ordinary skill in the art will understand that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A video conference encryption method, comprising the steps of:
1) a client initiates a request for reserving a conference to an conference control server, and the conference control server generates a symmetric key corresponding to the conference;
2) the conference participating client sends a conference joining request to the conference control server;
3) the conference participating client acquires the symmetric key subjected to asymmetric encryption from the conference control server;
4) the participating client carries out asymmetric decryption on the symmetric key subjected to asymmetric encryption to obtain the symmetric key;
5) and the participating client encrypts and/or decrypts the media stream by using the symmetric key.
2. The video conference encryption method according to claim 1, further comprising, before step 2),
each participating client sends the identity identification and the password of the participating client to an identity authentication server, and the identity authentication server generates a participating client public key and a participating client private key corresponding to the participating client;
and the participating client acquires the participating client private key from the identity authentication server.
3. The video conference encryption method of claim 2, further comprising, after step 2),
and the conference control server acquires the public key of the conference participating client from the identity authentication server according to the identity of the conference participating client, and asymmetrically encrypts the symmetric key.
4. The video conference encryption method according to claim 3, further comprising, in step 4),
and the participating client side carries out asymmetric decryption by using the participating client side private key to obtain the symmetric key.
5. The video conference encryption method according to any one of claims 1 to 4,
and the conference control server adopts a symmetric key randomly generated by a national cryptographic algorithm.
6. The video conference encryption method according to any one of claims 2 to 4,
the participating clients comprise a master client and a slave client;
the main client encrypts the media stream by using the symmetric key and sends the encrypted media stream to the media stream server,
one or more of the slave clients obtain the symmetrically encrypted media stream from the media stream server and decrypt the media stream using the symmetric key.
7. The video conference encryption method of claim 6,
the conference control server asymmetrically encrypts the symmetric key by using a public key of the host client acquired from the identity authentication server and sends the symmetric key to the host client;
the host client obtains the symmetric key by performing asymmetric decryption using a host client private key obtained from the authentication server,
the conference control server asymmetrically encrypts the symmetric key by using a slave client public key acquired from the identity authentication server and then sends the symmetric key to the slave client;
the slave client performs asymmetric decryption by using a slave client private key acquired from the identity authentication server to acquire the symmetric key.
8. A video conference encryption system is characterized by comprising a conference control server, an identity authentication server, a media stream server and a client, wherein,
the conference control server receives the conference reservation request of the client, generates a symmetric key corresponding to the conference, and sends the asymmetric encrypted symmetric key to the conference participating client;
the identity authentication server receives the identity and the password of the participation client and generates a participation client public key and a participation client private key corresponding to the participation client;
and the participating client encrypts the media stream by using the symmetric key and then sends the encrypted media stream to the media stream server, and acquires the media stream encrypted by using the symmetric key from the media stream server for decryption.
9. The video conference encryption system of claim 8,
the conference control server acquires a conference client public key corresponding to the conference client from the identity authentication server according to the conference access request of the conference client, and asymmetrically encrypts the symmetric key;
and the participating client acquires the participating client private key corresponding to the participating client from the identity authentication server and decrypts the symmetric key.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program performs the steps of the video conference encryption method according to any one of claims 1 to 7 when running.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010284647.7A CN111355921A (en) | 2020-04-13 | 2020-04-13 | Video conference encryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010284647.7A CN111355921A (en) | 2020-04-13 | 2020-04-13 | Video conference encryption method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111355921A true CN111355921A (en) | 2020-06-30 |
Family
ID=71194888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010284647.7A Pending CN111355921A (en) | 2020-04-13 | 2020-04-13 | Video conference encryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111355921A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112260832A (en) * | 2020-12-17 | 2021-01-22 | 南京易科腾信息技术有限公司 | Information encryption, decryption and control method and device and electronic equipment |
CN112672098A (en) * | 2020-12-30 | 2021-04-16 | 北京弈天诚达科技有限公司 | Cloud video conference encryption method, device and system |
CN112804058A (en) * | 2021-03-17 | 2021-05-14 | 浙江华创视讯科技有限公司 | Conference data encryption and decryption method and device, storage medium and electronic equipment |
CN113347215A (en) * | 2021-08-09 | 2021-09-03 | 北京电信易通信息技术股份有限公司 | Encryption method for mobile video conference |
WO2023141864A1 (en) * | 2022-01-27 | 2023-08-03 | 京东方科技集团股份有限公司 | Conference data transmission method, apparatus and system, electronic device and readable medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070079145A1 (en) * | 1994-10-27 | 2007-04-05 | Intarsia Software Llc | Data copyright management |
US20110264742A1 (en) * | 1999-06-30 | 2011-10-27 | Silverbrook Research Pty Ltd | Method of conferencing using forms |
CN104065487A (en) * | 2014-07-08 | 2014-09-24 | 华南理工大学 | Random secret value IBC identity authentication method based on digital fingerprint |
CN106850520A (en) * | 2016-04-18 | 2017-06-13 | 中国科学院信息工程研究所 | A kind of implementation method for encrypting voice conferencing |
-
2020
- 2020-04-13 CN CN202010284647.7A patent/CN111355921A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070079145A1 (en) * | 1994-10-27 | 2007-04-05 | Intarsia Software Llc | Data copyright management |
US20110264742A1 (en) * | 1999-06-30 | 2011-10-27 | Silverbrook Research Pty Ltd | Method of conferencing using forms |
CN104065487A (en) * | 2014-07-08 | 2014-09-24 | 华南理工大学 | Random secret value IBC identity authentication method based on digital fingerprint |
CN106850520A (en) * | 2016-04-18 | 2017-06-13 | 中国科学院信息工程研究所 | A kind of implementation method for encrypting voice conferencing |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112260832A (en) * | 2020-12-17 | 2021-01-22 | 南京易科腾信息技术有限公司 | Information encryption, decryption and control method and device and electronic equipment |
CN112672098A (en) * | 2020-12-30 | 2021-04-16 | 北京弈天诚达科技有限公司 | Cloud video conference encryption method, device and system |
CN112672098B (en) * | 2020-12-30 | 2022-09-20 | 北京真视通数字科技有限公司 | Cloud video conference encryption method, device and system |
CN112804058A (en) * | 2021-03-17 | 2021-05-14 | 浙江华创视讯科技有限公司 | Conference data encryption and decryption method and device, storage medium and electronic equipment |
CN113347215A (en) * | 2021-08-09 | 2021-09-03 | 北京电信易通信息技术股份有限公司 | Encryption method for mobile video conference |
CN113347215B (en) * | 2021-08-09 | 2021-10-01 | 北京电信易通信息技术股份有限公司 | Encryption method for mobile video conference |
WO2023141864A1 (en) * | 2022-01-27 | 2023-08-03 | 京东方科技集团股份有限公司 | Conference data transmission method, apparatus and system, electronic device and readable medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111355921A (en) | Video conference encryption method and system | |
US9923877B2 (en) | External indexing and search for a secure cloud collaboration system | |
CN109218825B (en) | Video encryption system | |
US20080285756A1 (en) | Random shared key | |
CN112751821B (en) | Data transmission method, electronic equipment and storage medium | |
CN109151508B (en) | Video encryption method | |
JP2008516476A (en) | Method and system for allowing multimedia group broadcast | |
CN108809633B (en) | Identity authentication method, device and system | |
CN110933484A (en) | Management method and device of wireless screen projection equipment | |
CN109981271B (en) | Network multimedia safety protection encryption method | |
CN110808829A (en) | SSH authentication method based on key distribution center | |
US20230132485A1 (en) | System for Thin Client Devices in Hybrid Edge Cloud Systems | |
CN112332986A (en) | Private encryption communication method and system based on authority control | |
CN113347143A (en) | Identity authentication method, device, equipment and storage medium | |
CN116709325B (en) | Mobile equipment security authentication method based on high-speed encryption algorithm | |
CN111224968B (en) | Secure communication method for randomly selecting transfer server | |
JP7208383B2 (en) | Video data transmission system, method and apparatus | |
CN113079155B (en) | File encryption processing method based on mixed password | |
CN112235320B (en) | Cipher-based video networking multicast communication method and device | |
CN113839786B (en) | Key distribution method and system based on SM9 key algorithm | |
CN112437436B (en) | Identity authentication method and device | |
KR101760718B1 (en) | System and method for managing mobile device based on pairing | |
CN112383392A (en) | Video conference alternate encryption method and device and computer readable storage medium | |
WO2021109998A1 (en) | Media content transmission method and apparatus, and storage medium | |
CN110365661B (en) | Network security authentication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200630 |
|
RJ01 | Rejection of invention patent application after publication |