CN111787271A - Video conference control method, device, equipment and computer readable storage medium - Google Patents

Video conference control method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN111787271A
CN111787271A CN202010765752.2A CN202010765752A CN111787271A CN 111787271 A CN111787271 A CN 111787271A CN 202010765752 A CN202010765752 A CN 202010765752A CN 111787271 A CN111787271 A CN 111787271A
Authority
CN
China
Prior art keywords
video conference
cache space
software
key
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010765752.2A
Other languages
Chinese (zh)
Inventor
龙健
李江波
刘国龙
叶兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Trust Co Ltd
Original Assignee
Ping An Trust Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Trust Co Ltd filed Critical Ping An Trust Co Ltd
Priority to CN202010765752.2A priority Critical patent/CN111787271A/en
Publication of CN111787271A publication Critical patent/CN111787271A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys

Abstract

The invention relates to the technical field of safety protection, is applied to the field of intelligent security protection of intelligent cities, and discloses a video conference control method, a device, equipment and a computer readable storage medium, wherein the method comprises the following steps: when detecting that video conference software in a terminal is started, determining whether a data cache space of the video conference software in the terminal is an encrypted cache space; if so, acquiring a key corresponding to the video conference software, and decrypting the encrypted cache space according to the key to acquire a decrypted cache space; and audio and video data sent by a server corresponding to the video conference software are acquired, stored in the decryption cache space and output. The invention improves the safety of the video conference information.

Description

Video conference control method, device, equipment and computer readable storage medium
Technical Field
The present invention relates to the field of security protection technologies, and in particular, to a video conference control method, apparatus, device, and computer-readable storage medium.
Background
With the development of information technology and network technology, the technology of video conferences has been developed, and fluency is increasing day by day. Moreover, most conference communication is in a video conference form at present, but the video conference has a disadvantage that if the conference relates to company sensitive information or business secrets, employees may copy video pictures and voices during the video conference, so that the company sensitive information is leaked, that is, the video conference information is low in safety and is not suitable for scenes with high information safety.
Disclosure of Invention
The invention mainly aims to provide a video conference control method, a video conference control device, video conference control equipment and a computer readable storage medium, and aims to solve the technical problem that the safety of video conference information is low in the prior art.
In order to achieve the above object, the present invention provides a video conference control method, including:
when detecting that video conference software in a terminal is started, determining whether a data cache space of the video conference software in the terminal is an encrypted cache space;
if so, acquiring a key corresponding to the video conference software, and decrypting the encrypted cache space according to the key to acquire a decrypted cache space;
and audio and video data sent by a server corresponding to the video conference software are acquired, stored in the decryption cache space and output.
Optionally, when detecting that the video conference software in the terminal is started, before the step of determining whether the data cache space of the video conference software in the terminal is the encrypted cache space, the method includes:
determining whether video conference software in the terminal meets a preset encryption requirement;
and if so, giving an independent data cache space to the video conference software, and encrypting the data cache space based on a key corresponding to the video conference software to obtain an encrypted cache space.
Optionally, the step of encrypting the data cache space based on the key corresponding to the video conference software to obtain an encrypted cache space includes:
acquiring a first key sent by a server corresponding to the video conference software, and encrypting the data cache space according to the first key to acquire a primary data cache space, wherein the key corresponding to the video conference software comprises the first key;
and carrying out secondary encryption on the primary data cache space according to the video conference software to obtain an encrypted cache space.
Optionally, the step of performing secondary encryption on the primary data cache space according to the video conference software to obtain an encrypted cache space includes:
and acquiring software information of the video conference software, forming a second key according to the software information, and performing secondary encryption on the primary data cache space according to the second key to acquire an encrypted cache space, wherein the key corresponding to the video conference software comprises the second key.
Optionally, the step of obtaining the key corresponding to the video conference software includes:
acquiring a face image of a participant participating in a video conference based on the video conference software, performing feature recognition on the face image, and detecting whether a recognition result of the feature recognition is matched with account information corresponding to the video conference software;
and if so, acquiring a key corresponding to the video conference software.
Optionally, after the step of outputting the audio/video data in the decryption buffer space, the method includes:
detecting whether third-party software reads the audio and video data in the decryption cache space or not;
and if the decryption cache space exists, and the third-party software does not carry the key corresponding to the video conference software, prohibiting the third-party software from reading the audio and video data in the decryption cache space.
Optionally, after the step of detecting whether third-party software performs a reading operation on the audio/video data in the decryption cache space, the method includes:
if the third-party software exists and carries the key corresponding to the video conference software, sending verification information of a request reading operation to a server corresponding to the video conference software;
and if the verification failing information fed back by the server corresponding to the video conference software based on the verification information is received, prohibiting the third-party software from reading the audio and video data in the decryption cache space.
In addition, to achieve the above object, the present invention also provides a video conference control apparatus including:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining whether a data cache space of video conference software in a terminal is an encrypted cache space when the video conference software in the terminal is detected to be started;
the acquisition module is used for acquiring a key corresponding to the video conference software if the encryption cache space is the decrypted cache space, and decrypting the encrypted cache space according to the key to acquire a decrypted cache space;
and the output module is used for acquiring the audio and video data sent by the server corresponding to the video conference software, storing the audio and video data into the decryption cache space and outputting the audio and video data in the decryption cache space.
In addition, in order to achieve the above object, the present invention also provides a video conference control apparatus;
the video conference control apparatus includes: a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein:
which computer program, when being executed by said processor, realizes the steps of the video conference control method as described above.
In addition, to achieve the above object, the present invention also provides a computer-readable storage medium;
the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the video conference control method as described above.
When detecting that video conference software in a terminal is started, determining whether a data cache space of the video conference software in the terminal is an encrypted cache space; if so, acquiring a key corresponding to the video conference software, and decrypting the encrypted cache space according to the key to acquire a decrypted cache space; and audio and video data sent by a server corresponding to the video conference software are acquired, stored in the decryption cache space and output. When the video conference software is started and the data cache space in the terminal is the encryption cache space, the key is required to be acquired first to decrypt the encryption cache space to obtain the decryption cache space, then the acquired audio and video data are stored in the decryption cache space, and the audio and video data in the decryption cache space are output, so that the phenomenon that information leakage occurs due to the fact that information exchange is directly performed by a video conference in the prior art is avoided, and the safety of video conference information is improved.
Drawings
Fig. 1 is a schematic structural diagram of a video conference control device in a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a video conference control method according to a first embodiment of the present invention;
fig. 3 is a functional block diagram of the video conference control apparatus according to the present invention.
The objects, features and advantages of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, fig. 1 is a schematic structural diagram of a video conference control device in a hardware operating environment according to an embodiment of the present invention.
As shown in fig. 1, the video conference control apparatus may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the video conference control device may further include a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, and the like. Such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display screen according to the brightness of ambient light. Of course, the terminal device may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are not described herein again.
Those skilled in the art will appreciate that the configuration of the video conference control device shown in fig. 1 does not constitute a limitation of the video conference control device and may include more or fewer components than shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a video conference control program.
In the video conference control apparatus shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call the video conference control program stored in the memory 1005 and execute the video conference control method provided by the embodiment of the present invention.
Referring to fig. 2, the present invention provides a video conference control method, in an embodiment of the video conference control method, the video conference control method includes the following steps:
step S10, when detecting that the video conference software in the terminal is started, determining whether the data cache space of the video conference software in the terminal is an encrypted cache space;
in this embodiment, the terminal may include a mobile phone, a tablet computer, a personal computer, and the like. However, in order to improve the security included in the video conference information, at least one piece of video conference software needs to be installed in the terminal, and when the video conference software is installed on the terminal device of the user, such as an office computer, a personal computer, a mobile terminal, and the like, it needs to determine whether the video conference software is the video conference software with a higher importance level, if so, an individual and encrypted data cache space is allocated to the video conference software, and the data cache space is encrypted by using a key to obtain the encrypted data cache space.
That is, before the video conference, whether the installed video conference software in the terminal meets the preset encryption requirement is detected, that is, whether the importance level of the video conference software (which can be determined according to the number of times of use by the user or the level degree set by the user) is higher than the preset value is determined, if so, the video conference software meets the preset encryption requirement is determined, at this time, the video conference software is considered to be important, a separate data cache space needs to be given to the video conference software for distinguishing from the data of other software, a first secret key (namely, a secret key containing server information) sent by a server corresponding to the video conference software is obtained, the data cache space is encrypted for the first time according to the secret key, and the data cache space after the first encryption is encrypted for the second time according to the software information of the video conference software itself, and using the data cache space after twice encryption as an encryption cache space.
Therefore, when detecting that the video conference software is triggered and started in the terminal, it may be determined whether the started video conference software is the video conference software with the importance level higher than the preset value, and if so, it may be determined that the data cache space of the started video conference software in the terminal is the encrypted data cache space, and the started video conference software may be continuously used only by decrypting the encrypted cache space. However, if the importance level of the video conference software which is sent is lower than or equal to the preset value, it is determined that the data cache space of the video conference software which is sent is not the encrypted data cache space, and the video conference software can be directly adopted to carry out the video conference operation without carrying out the decryption operation.
Step S20, if yes, a key corresponding to the video conference software is obtained, and the encrypted cache space is decrypted according to the key to obtain a decrypted cache space;
when the data cache space of the video conference software in the terminal is found to be the encryption cache space through judgment, the key of the video conference software during encryption needs to be acquired, that is, the first key and the second key need to be obtained, the first key may be obtained by the way that the videoconference software sends a key request instruction to the server, the server performs authentication according to the key request instruction, when the verification is passed, the first secret key is sent to the video conference software, the video conference software decrypts the encrypted cache space according to the first secret key and a second secret key of the video conference software to obtain a decrypted cache space, the method comprises the steps of firstly decrypting an encrypted cache space according to a second key of video conference software to obtain a primary data cache space, and then decrypting an initial data cache space according to a first key to obtain a decrypted data cache space, namely a decrypted cache space. That is, when receiving an instruction of a user to run the video conference software, that is, when the user opens the video conference software, the key used in the previous encryption and the decryption algorithm corresponding to the encryption algorithm are loaded first, and the encrypted data cache space is decrypted. The video conferencing software can use this buffer space normally, including reading and writing data to the buffer space.
It should be noted that before the key of the video conference software is obtained during encryption, the participants participating in the video conference need to be verified, that is, the camera function of the terminal is started through the video conference software, the face images of the participants participating in the video conference are collected through the camera, then the face images are subjected to feature recognition, that is, the face images are subjected to face recognition, the recognized face features are compared with the account information preset in the video conference software, whether the target account information is matched with the face features is determined, that is, whether the recognition result of the feature recognition is matched with the account information corresponding to the video conference software is detected, if the recognition result is matched with the account information, the key corresponding to the video conference software can be directly obtained, but if the recognition result is not matched with the target account information, prompt information of a verification error is output, and the operation of obtaining the key is stopped.
And step S30, acquiring the audio and video data sent by the server corresponding to the video conference software, storing the audio and video data in the decryption cache space, and outputting the audio and video data in the decryption cache space.
After the encrypted cache space is decrypted, audio and video data (namely, audio data and video data) transmitted by a server corresponding to video conference software are obtained, the audio and video data are stored in the decrypted cache space, a terminal can actively acquire the audio and video data from the decrypted cache space to output, namely, after the video conference software carries out a video conference, the audio and video data pulled from a network (namely, the server) by the terminal are stored in the decrypted cache space, and the terminal can call a display and a loudspeaker to play the audio and video data, so that a normal video conference is realized. And other third-party screen recording software cannot decrypt the audio and video data in the cache space, cannot read the audio and video data in the decrypted cache space, and cannot store the audio and video data additionally because of no secret key, so that the video conference is prevented from being recorded.
When the video conference software carries out a video conference, whether third-party software reads audio and video data in the decryption cache space needs to be detected in real time, when the third-party software reads the audio and video data through judgment, whether the third-party software carries a secret key for unlocking the encryption cache space needs to be determined, and if the third-party software does not read the audio and video data in the decryption cache space, the third-party software is directly forbidden to read the audio and video data. And this embodiment can be applied to in the wisdom security protection field, carries out safety protection through the audio and video data when carrying out the videoconference to video conferencing software to also promoted the construction in wisdom city, this embodiment belongs to the wisdom security protection field moreover, can promote the construction in wisdom city through this embodiment.
In this embodiment, when detecting that video conference software in a terminal is started, determining whether a data cache space of the video conference software in the terminal is an encrypted cache space; if so, acquiring a key corresponding to the video conference software, and decrypting the encrypted cache space according to the key to acquire a decrypted cache space; and audio and video data sent by a server corresponding to the video conference software are acquired, stored in the decryption cache space and output. When the video conference software is started and the data cache space in the terminal is the encryption cache space, the key is required to be acquired first to decrypt the encryption cache space to obtain the decryption cache space, then the acquired audio and video data are stored in the decryption cache space, and the audio and video data in the decryption cache space are output, so that the phenomenon that information leakage occurs due to the fact that information exchange is directly performed by a video conference in the prior art is avoided, and the safety of video conference information is improved.
Further, on the basis of the first embodiment of the present invention, a second embodiment of the video conference control method of the present invention is provided, where this embodiment is step S10 of the first embodiment of the present invention, and when detecting that the video conference software in the terminal is started, before the step of determining whether the data cache space of the video conference software in the terminal is the encrypted cache space, the method includes:
step a, determining whether video conference software in a terminal meets a preset encryption requirement;
before detecting the start of the video conference software, it is necessary to determine the installed video conference software in the terminal, and if there are multiple installed video conference software, it is necessary to detect whether the installed video conference software meets the preset encryption requirement, that is, it is detected whether the importance level of each installed video conference software is greater than the preset value, and the determination of the importance level of the installed video conference software may be the importance level set in the terminal in advance according to the user, or the importance level of the installed video conference software may be determined by self-adjusting according to the use frequency and the use time of the video conference software scheduled by the user. Wherein, the importance level may include three gears of high level, middle level and low level, the preset value may be set to middle level or low level, and when determining the importance level, the importance level set in the terminal by the user in advance is preferred.
And b, if the requirements are met, giving an independent data cache space to the video conference software, and encrypting the data cache space based on a key corresponding to the video conference software to obtain an encrypted cache space.
When the video conference software in the terminal meets the preset encryption requirement is found through judgment, an independent data cache space can be directly given to the video conference software, namely, data generated by the subsequent video conference software can be directly stored into the independent data cache space without sharing one data cache space with other software, the data cache space given to the video conference software can be encrypted according to a key corresponding to the video conference software, and the encrypted data cache space is used as an encryption cache space.
In this embodiment, when it is determined that the video conference software in the terminal meets the preset encryption requirement, an individual data cache space is given to the video conference software, and the data cache space is encrypted to obtain the encrypted cache space, so that the accuracy of the obtained encrypted cache space is ensured, and a protection basis is provided for information security in a subsequent video conference.
Further, the step of encrypting the data cache space based on the key corresponding to the video conference software to obtain an encrypted cache space includes:
step c, acquiring a first key sent by a server corresponding to the video conference software, and encrypting the data cache space according to the first key to acquire a primary data cache space, wherein the key corresponding to the video conference software comprises the first key;
in this embodiment, when encrypting the data cache space, a first key sent by a server corresponding to the video conference software needs to be obtained first. The server and the terminal are connected in a communication mode, and the video conference software is connected with other terminals in a video conference mode through the server. The first key may be a key formed by the server from its own server information. And the data cache space is encrypted through a first key to obtain a data cache space after the first encryption, namely a primary data cache space. The key corresponding to the video conference software may include the first key.
And d, carrying out secondary encryption on the primary data cache space according to the video conference software to obtain an encrypted cache space.
After the primary data cache space subjected to the primary encryption is obtained, in order to improve the safety of information generated by the video conference software, a second key can be formed according to the information of the video conference software, and the primary data cache space is subjected to secondary encryption through the second key to obtain a cache space subjected to secondary encryption, namely an encrypted cache space.
In this embodiment, the effectiveness of the obtained encrypted cache space is ensured by obtaining the first key sent by the server corresponding to the video conference software, encrypting the data cache space according to the first key to obtain a primary data cache space, and then performing secondary encryption on the primary data cache space to obtain the encrypted cache space.
Further, the step of performing secondary encryption on the primary data cache space according to the video conference software to obtain an encrypted cache space includes:
and e, acquiring software information of the video conference software, forming a second key according to the software information, and performing secondary encryption on the primary data cache space according to the second key to acquire an encrypted cache space, wherein the key corresponding to the video conference software comprises the second key.
In this embodiment, after the primary data cache space is obtained, software information (such as a name, meeting time, and the like) of video conference software started in a terminal needs to be obtained, a second key is formed according to the software information, the primary data cache space is encrypted by the second key in the same manner, and an encrypted data cache space is obtained, where the encrypted data cache space is a data cache space that is encrypted twice, and data leakage in the data cache space can be effectively prevented. Wherein, the key corresponding to the video conference software may include the second key.
In this embodiment, the second key is formed according to the software information of the video conference software, and the primary data cache space is encrypted for the second time according to the second key to obtain the encrypted cache space, so that the validity of the obtained encrypted cache space is ensured.
Further, the step of obtaining the key corresponding to the video conference software includes:
step f, acquiring a face image of a participant participating in the video conference based on the video conference software, performing feature recognition on the face image, and detecting whether a recognition result of the feature recognition is matched with account information corresponding to the video conference software;
in this embodiment, when the key corresponding to the video conference software is obtained, the participants participating in the video conference need to be verified, that is, the camera function of the terminal is started through the video conference software, the face images of the participants participating in the video conference are collected through the camera, then, the face images are subjected to feature recognition, that is, face recognition is performed on the face images, the recognized face features are compared with account information preset in the video conference software, whether target account information and face feature matching exist or not is determined, that is, whether the recognition result of the feature recognition matches the account information corresponding to the video conference software or not is detected, and different operations are executed according to different detection results.
And g, if the key is matched with the key, acquiring a key corresponding to the video conference software.
And when the identification result of the feature identification is judged to be matched with the account information corresponding to the video conference software, directly acquiring the key corresponding to the video conference software, but if the identification result is not matched with the account information corresponding to the video conference software, outputting prompt information of verification error, and stopping the operation of acquiring the key.
In the embodiment, the obtained face image of the participant is subjected to feature recognition according to the video conference software, and when the recognition result of the feature recognition is matched with the account information corresponding to the video conference software, the key corresponding to the video conference software is obtained, so that the effective running of the video conference software is ensured, and the phenomenon of information leakage caused by the use of the video conference software by people without permission is avoided.
Further, after the step of outputting the audio/video data in the decrypted buffer space, the method includes:
h, detecting whether third-party software reads the audio and video data in the decryption cache space or not;
when the video conference software carries out a video conference, whether third-party software (such as recording software) is required to carry out reading operation (such as copying, cutting and the like) on the audio and video data in the decryption cache space or not is detected in real time, and different operations are executed according to different detection results.
And k, if the third-party software does not carry the key corresponding to the video conference software, forbidding the third-party software to read the audio and video data in the decryption cache space.
When it is found that the third-party software reads the audio and video data in the decryption cache space through judgment, whether the third-party software carries the secret key for unlocking the encryption cache space needs to be determined, and if the third-party software does not carry the secret key, the third-party software is directly prohibited from reading the audio and video data in the decryption cache space. If the third-party software carries the key, subsequent detection is required to be carried out continuously, and the third-party software is allowed to read the audio and video data in the decryption cache space until the detection is qualified. However, if the third-party software does not read the audio and video data in the decryption cache space, the detection is continued to avoid information leakage when the user adopts the video conference software to carry out the video conference.
In this embodiment, when it is determined that third-party software performs a reading operation on the audio and video data in the decryption cache space and the third-party software does not carry a key corresponding to the video conference software, the reading operation of the third-party software is prohibited, so that the security of the audio and video data in the decryption cache space is ensured.
Further, after the step of detecting whether third-party software reads the audio/video data in the decryption cache space, the method includes:
step m, if the third-party software exists and carries the key corresponding to the video conference software, sending verification information of a request reading operation to a server corresponding to the video conference software;
and when the third-party software is found to exist through judgment, whether the third-party software carries the key corresponding to the video conference software needs to be detected, and if the third-party software carries the key corresponding to the video conference software, verification information requesting for reading operation needs to be sent to a server corresponding to the video conference software. And when the server corresponding to the video conference software receives the verification information, verifying the verification information, such as detecting whether the third-party software is safe, detecting whether account information logged in the video conference software which sends the verification information has corresponding authority and the like, and when the verification is qualified, sending prompt information that the verification is passed to the video conference software, and if some verification is unqualified, sending verification failing information to the video conference software.
And n, if the verification failing information fed back by the server corresponding to the video conference software based on the verification information is received, forbidding the third-party software to read the audio and video data in the decryption cache space.
When receiving verification failure information fed back by a server corresponding to the video conference software based on the verification information, prohibiting the third-party software from reading the audio and video data in the decryption cache space, but if receiving prompt information that the verification is passed, allowing the third-party software to read the audio and video data in the decryption cache space.
In this embodiment, when it is determined that third-party software exists and the third-party software carries a key, verification information requesting a reading operation is sent to a server corresponding to the video conference software, and when verification failure information fed back by the server is received, the reading operation of the third-party software is prohibited, so that the security of decrypting the audio and video data in the cache space is ensured.
In addition, referring to fig. 3, an embodiment of the present invention further provides a video conference control apparatus, where the video conference control apparatus includes:
a determining module a10, configured to, when detecting that video conference software in a terminal is started, determine whether a data cache space of the video conference software in the terminal is an encrypted cache space;
an obtaining module a20, configured to, if yes, obtain a key corresponding to the video conference software, and decrypt the encrypted cache space according to the key to obtain a decrypted cache space;
and the output module A30 is used for acquiring the audio and video data sent by the server corresponding to the video conference software, storing the audio and video data in the decryption cache space, and outputting the audio and video data in the decryption cache space.
Optionally, the determining module a10 is further configured to:
determining whether video conference software in the terminal meets a preset encryption requirement;
and if so, giving an independent data cache space to the video conference software, and encrypting the data cache space based on a key corresponding to the video conference software to obtain an encrypted cache space.
Optionally, the determining module a10 is further configured to:
acquiring a first key sent by a server corresponding to the video conference software, and encrypting the data cache space according to the first key to acquire a primary data cache space, wherein the key corresponding to the video conference software comprises the first key;
and carrying out secondary encryption on the primary data cache space according to the video conference software to obtain an encrypted cache space.
Optionally, the determining module a10 is further configured to:
and acquiring software information of the video conference software, forming a second key according to the software information, and performing secondary encryption on the primary data cache space according to the second key to acquire an encrypted cache space, wherein the key corresponding to the video conference software comprises the second key.
Optionally, the obtaining module a20 is further configured to:
acquiring a face image of a participant participating in a video conference based on the video conference software, performing feature recognition on the face image, and detecting whether a recognition result of the feature recognition is matched with account information corresponding to the video conference software;
and if so, acquiring a key corresponding to the video conference software.
Optionally, the output module a30 is further configured to:
detecting whether third-party software reads the audio and video data in the decryption cache space or not;
and if the decryption cache space exists, and the third-party software does not carry the key corresponding to the video conference software, prohibiting the third-party software from reading the audio and video data in the decryption cache space.
Optionally, the output module a40 is further configured to:
if the third-party software exists and carries the key corresponding to the video conference software, sending verification information of a request reading operation to a server corresponding to the video conference software;
and if the verification failing information fed back by the server corresponding to the video conference software based on the verification information is received, prohibiting the third-party software from reading the audio and video data in the decryption cache space.
The steps implemented by the functional modules of the video conference control apparatus may refer to the embodiments of the video conference control method of the present invention, and are not described herein again.
The present invention also provides a video conference control apparatus, including: a memory, a processor, and a video conference control program stored on the memory; the processor is configured to execute the video conference control program to implement the steps of the embodiments of the video conference control method.
The present invention also provides a computer readable storage medium storing one or more programs which are also executable by one or more processors for implementing the steps of the above-described embodiments of the video conference control method.
The specific implementation of the computer-readable storage medium of the present invention is substantially the same as the embodiments of the video conference control method described above, and is not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A video conference control method is characterized by comprising the following steps:
when detecting that video conference software in a terminal is started, determining whether a data cache space of the video conference software in the terminal is an encrypted cache space;
if so, acquiring a key corresponding to the video conference software, and decrypting the encrypted cache space according to the key to acquire a decrypted cache space;
and audio and video data sent by a server corresponding to the video conference software are acquired, stored in the decryption cache space and output.
2. The video conference control method according to claim 1, wherein said determining, when the start of the video conference software in the terminal is detected, whether the data buffer space in the terminal is the encrypted buffer space by the video conference software comprises:
determining whether video conference software in the terminal meets a preset encryption requirement;
and if so, giving an independent data cache space to the video conference software, and encrypting the data cache space based on a key corresponding to the video conference software to obtain an encrypted cache space.
3. The video conference control method according to claim 2, wherein the step of encrypting the data cache space based on the key corresponding to the video conference software to obtain an encrypted cache space comprises:
acquiring a first key sent by a server corresponding to the video conference software, and encrypting the data cache space according to the first key to acquire a primary data cache space, wherein the key corresponding to the video conference software comprises the first key;
and carrying out secondary encryption on the primary data cache space according to the video conference software to obtain an encrypted cache space.
4. The video conference control method according to claim 3, wherein said step of secondarily encrypting the primary data buffer space according to the video conference software to obtain an encrypted buffer space comprises:
and acquiring software information of the video conference software, forming a second key according to the software information, and performing secondary encryption on the primary data cache space according to the second key to acquire an encrypted cache space, wherein the key corresponding to the video conference software comprises the second key.
5. The video conference control method according to claim 1, wherein the step of obtaining the key corresponding to the video conference software comprises:
acquiring a face image of a participant participating in a video conference based on the video conference software, performing feature recognition on the face image, and detecting whether a recognition result of the feature recognition is matched with account information corresponding to the video conference software;
and if so, acquiring a key corresponding to the video conference software.
6. The video conference control method according to any one of claims 1 to 5, wherein said step of outputting said audio-video data in said decrypted buffer space is followed by:
detecting whether third-party software reads the audio and video data in the decryption cache space or not;
and if the decryption cache space exists, and the third-party software does not carry the key corresponding to the video conference software, prohibiting the third-party software from reading the audio and video data in the decryption cache space.
7. The video conference control method according to claim 6, wherein after the step of detecting whether third-party software reads the audio/video data in the decryption cache space, the method comprises:
if the third-party software exists and carries the key corresponding to the video conference software, sending verification information of a request reading operation to a server corresponding to the video conference software;
and if the verification failing information fed back by the server corresponding to the video conference software based on the verification information is received, prohibiting the third-party software from reading the audio and video data in the decryption cache space.
8. A video conference control apparatus, characterized in that the video conference control apparatus comprises:
the device comprises a determining module, a judging module and a judging module, wherein the determining module is used for determining whether a data cache space of video conference software in a terminal is an encrypted cache space when the video conference software in the terminal is detected to be started;
the acquisition module is used for acquiring a key corresponding to the video conference software if the encryption cache space is the decrypted cache space, and decrypting the encrypted cache space according to the key to acquire a decrypted cache space;
and the output module is used for acquiring the audio and video data sent by the server corresponding to the video conference software, storing the audio and video data into the decryption cache space and outputting the audio and video data in the decryption cache space.
9. A video conference control apparatus characterized by comprising: memory, a processor and a video conference control program stored on the memory and executable on the processor, the video conference control program when executed by the processor implementing the steps of the video conference control method according to any one of claims 1 to 7.
10. A computer-readable storage medium, having stored thereon a video conference control program which, when executed by a processor, implements the steps of the video conference control method according to any one of claims 1 to 7.
CN202010765752.2A 2020-07-31 2020-07-31 Video conference control method, device, equipment and computer readable storage medium Pending CN111787271A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010765752.2A CN111787271A (en) 2020-07-31 2020-07-31 Video conference control method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010765752.2A CN111787271A (en) 2020-07-31 2020-07-31 Video conference control method, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN111787271A true CN111787271A (en) 2020-10-16

Family

ID=72765705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010765752.2A Pending CN111787271A (en) 2020-07-31 2020-07-31 Video conference control method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111787271A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007213467A (en) * 2006-02-13 2007-08-23 Fuji Xerox Co Ltd Conference support apparatus
JP2008236553A (en) * 2007-03-22 2008-10-02 Omron Corp Terminal device in video conference system, control method of terminal device, and control program for terminal device
US20120005475A1 (en) * 2009-03-18 2012-01-05 Brother Kogyo Kabushiki Kaisha Terminal Device, Computer Program Product, and Communication Control Method
US20150249858A1 (en) * 2012-11-16 2015-09-03 Kabushiki Kaisha Toshiba Image receiving apparatus, mobile terminal, server, image receiving method and storing method
CN104951408A (en) * 2015-05-25 2015-09-30 小米科技有限责任公司 Data protection method, storage device and terminal device
WO2016011874A1 (en) * 2014-07-25 2016-01-28 中兴通讯股份有限公司 Video conferencing system, right control method and apparatus therefor and computer storage medium
CN105354507A (en) * 2015-10-23 2016-02-24 浙江远望软件有限公司 Data security confidentiality method under cloud environment
CN107566397A (en) * 2017-09-28 2018-01-09 深圳市汉普电子技术开发有限公司 Video conference information transferring method, terminal device, server and storage medium
CN107704402A (en) * 2017-10-13 2018-02-16 浪潮(北京)电子信息产业有限公司 A kind of method, apparatus for protecting data, computer-readable recording medium
CN108270916A (en) * 2017-12-01 2018-07-10 南京嘉谷初成通信科技有限公司 A kind of encryption method of smart mobile phone
CN108881801A (en) * 2018-06-29 2018-11-23 苏州科达科技股份有限公司 Code stream transmission method, system, electronic equipment, the storage medium of video conference
CN108965222A (en) * 2017-12-08 2018-12-07 翟红鹰 Identity identifying method, system and computer readable storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007213467A (en) * 2006-02-13 2007-08-23 Fuji Xerox Co Ltd Conference support apparatus
JP2008236553A (en) * 2007-03-22 2008-10-02 Omron Corp Terminal device in video conference system, control method of terminal device, and control program for terminal device
US20120005475A1 (en) * 2009-03-18 2012-01-05 Brother Kogyo Kabushiki Kaisha Terminal Device, Computer Program Product, and Communication Control Method
US20150249858A1 (en) * 2012-11-16 2015-09-03 Kabushiki Kaisha Toshiba Image receiving apparatus, mobile terminal, server, image receiving method and storing method
WO2016011874A1 (en) * 2014-07-25 2016-01-28 中兴通讯股份有限公司 Video conferencing system, right control method and apparatus therefor and computer storage medium
CN104951408A (en) * 2015-05-25 2015-09-30 小米科技有限责任公司 Data protection method, storage device and terminal device
CN105354507A (en) * 2015-10-23 2016-02-24 浙江远望软件有限公司 Data security confidentiality method under cloud environment
CN107566397A (en) * 2017-09-28 2018-01-09 深圳市汉普电子技术开发有限公司 Video conference information transferring method, terminal device, server and storage medium
CN107704402A (en) * 2017-10-13 2018-02-16 浪潮(北京)电子信息产业有限公司 A kind of method, apparatus for protecting data, computer-readable recording medium
CN108270916A (en) * 2017-12-01 2018-07-10 南京嘉谷初成通信科技有限公司 A kind of encryption method of smart mobile phone
CN108965222A (en) * 2017-12-08 2018-12-07 翟红鹰 Identity identifying method, system and computer readable storage medium
CN108881801A (en) * 2018-06-29 2018-11-23 苏州科达科技股份有限公司 Code stream transmission method, system, electronic equipment, the storage medium of video conference

Similar Documents

Publication Publication Date Title
US9813247B2 (en) Authenticator device facilitating file security
US20160155465A1 (en) Video masking processing method and apparatus
US20190065790A1 (en) Method Of Displaying Content On A Screen Of An Electronic Processing Device
CN110380864B (en) Method, device and system for acquiring and verifying face data
WO2021169776A1 (en) Sharing password analysis method and device
US20230252123A1 (en) Method of Displaying Content On A Screen Of An Electronic Processing Device
US11405193B2 (en) Encrypted photographing method and system based on fingerprint recognition
WO2016169267A1 (en) Image sharing method and device
CN113422679B (en) Key generation method, device and system, encryption method, electronic device and computer readable storage medium
CN111400745A (en) Picture management method and device and electronic equipment
CN110677551B (en) Image encryption method, device, equipment and storage medium
KR101754014B1 (en) Information Leakage Prevention Apparatus Based Face Recognition And Method of Threof
CN111400768A (en) Face and behavior recognition-based encryption sharing platform and encryption sharing method
CN111581622A (en) Information processing method and device and electronic equipment
WO2023061262A1 (en) Image processing method and apparatus, and device and storage medium
CN111787271A (en) Video conference control method, device, equipment and computer readable storage medium
KR102555680B1 (en) Method, Apparatus and System for Image Processing For Protecting Portrait Rights
US20220053123A1 (en) Method and apparatus for independent authentication of video
JP2008059575A (en) System and method for monitoring seat-leaving of user
Liu et al. Vronicle: verifiable provenance for videos from mobile devices
KR20170138853A (en) Method and system for protecting shared information
CN111371563A (en) Password verification method and device, electronic equipment and storage medium
EP3384632B1 (en) Apparatus and method for camera-based user authentication for content access
GB2566043A (en) A method of displaying content on a screen of an electronic processing device
KR102469380B1 (en) Method and system for de-identifying and restoring personal information of image data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20230915

AD01 Patent right deemed abandoned