CN105847238A - Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections - Google Patents

Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections Download PDF

Info

Publication number
CN105847238A
CN105847238A CN201610150356.2A CN201610150356A CN105847238A CN 105847238 A CN105847238 A CN 105847238A CN 201610150356 A CN201610150356 A CN 201610150356A CN 105847238 A CN105847238 A CN 105847238A
Authority
CN
China
Prior art keywords
key
server
byte
aes
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610150356.2A
Other languages
Chinese (zh)
Other versions
CN105847238B (en
Inventor
彭勇
陈勇
赵云锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Shishuo Education Technology Co Ltd
Original Assignee
Hangzhou Shishuo Education Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Shishuo Education Technology Co Ltd filed Critical Hangzhou Shishuo Education Technology Co Ltd
Priority to CN201610150356.2A priority Critical patent/CN105847238B/en
Publication of CN105847238A publication Critical patent/CN105847238A/en
Application granted granted Critical
Publication of CN105847238B publication Critical patent/CN105847238B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/65Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections. The method has the advantages that functional extensions of the RTMP are carried out, and through a key negotiation process between a client and a server, an encryption algorithm and a key adopted by each connection are random, so that external cracking analysis of encrypted data is much more difficult; the symmetrical encryption algorithms are adopted for encryption processing, so that the encryption and decryption processing efficiencies are high, real-time performance of data transmission and user experience are not obviously affected, and the effects on the processing load of the server are small; meanwhile, the server can flexibly select an encryption mode, and, according to a user type or a resource type requested by a user, can determine whether encrypted transmission is needed or not or select one specific encryption algorithm and a key length (the keys with a length of 64 bytes or more can be provided, and the number of the encryption algorithms can reach 255).

Description

A kind of data safe transmission method connected based on RTMP
Technical field
The invention belongs to Security Data Transmission technical field, particularly relate to a kind of data safe transmission method connected based on RTMP.
Background technology
Along with the fast development of the Internet, people are also faced with information security side while enjoying the convenient service that the Internet brings The problem in face, and the high speed development in the fields such as teleconference, online transaction, Web bank, cause the importance of data safety also More and more prominent.Data Encryption Transmission is technological means extremely important and conventional in information security field, is to pass by transmitting terminal Key data is encrypted by certain algorithm, becomes unrecognizable ciphertext data and is arrived at by the Internet, by Ciphertext data deciphering is reduced to readable data by receiving terminal manner of decryption according to a preconcerted arrangement.Data Encryption Transmission can greatly improve Data, by third-party analysis, the difficulty stolen, can effectively prevent the leakage of important information.
RTMP real-time messages transportation protocol has extraordinary Consumer's Experience, it is achieved easily, resource occupation few, the most extensive It is applied to the aspects such as news briefing, the most live, video request program, video conference, the web advertisement, long-distance education, tele-medicine. Due to RTMP agreement itself do not have data safety protection mechanism, data on the passage that receiving-transmitting sides is set up with plaintext shape Formula is transmitted, and adds the opening of this agreement, and data can be obtained easily by third party and analyze in data in transmitting procedure Hold, therefore use the RTMP agreement of standard to carry out data transmission in terms of information security and there is the highest risk, it is difficult to avoid The malicious attack such as distorting from outside data theft, information, not having under the scene that data transmission is had security requirement can The property used.
Summary of the invention
Present invention aims to the deficiencies in the prior art, it is provided that a kind of data safe transmission method connected based on RTMP, After client is connected with server foundation, user end to server queued session key information, server randomly chooses encryption Algorithm also generates random key information and sends jointly to client.Client after receiving key information just to server request Resource data, if server does not sends key information, the resource request refusal sending client processes.
It is an object of the invention to be achieved through the following technical solutions: a kind of data safe transmission method connected based on RTMP, The method comprises the following steps:
(1) client actively initiates RTMP connection request to server, and server receives the RTMP connection request of client, The connection with client is set up after checking request is legal.
(2) after setting up connection, user end to server request key information.Client increases a kind of message body asking key newly, Named AskKeys, is used for the AES to server request current sessions and the key information of correspondence.AskKeys disappears The composition of breath body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length;Value is 4, represents the message that current message is user's Control Cooling, Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number, value is 2.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 10, represents client Hold the event type to server requests key information, distinguish mutually with existing event type in standard RTMP agreement.
(3), after server receives the AskKeys request of client, AES is randomly choosed according to server for encrypting strategy And generate random key, then these information unification are returned to client.
Server increases a kind of message body for customer in response end key request, named Keys newly.When key information length sets When being 16 byte, the composition of Keys message body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length, value is 4, represents the message that current message is user's Control Cooling, Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number (2 byte), key interval byte number (16 Byte), AES coded word joint number (1 byte), the summation of confounding factors byte number (2 byte), value is 21.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 9, represents server The key information event type of customer in response end.
Key interval Key: storage length is the key information of 16 bytes, if transmitting data in unencrypted mode, and 16 words The key of joint is interval all fills with 0.
AES coding Alg: be used for representing cryptography information, be encoded to 0 expression and do not do the encryption process, with plaintext transmission, It is encoded to the corresponding different AES of different digital of non-zero.
Confounding factors Confusion:2 byte length, content stochastic generation, it is used for obscuring session key and algorithm information, logical Critical data is obscured process by the mode crossing XOR so that key is interval encodes information with ciphertext state transfer with AES To client, contribute to improving further safety.
The generation strategy of described key, particularly as follows: the random value of server elder generation stochastic generation 2 byte length, is used for obscuring session close Key and cryptography information, subsequently for the key of each session stochastic generation 16 byte length, the most each byte is 0-255 Between different random number, and according to security strategy dynamic Choice encryption algorithm, then add with corresponding AES coding filling Close algorithm is interval, finally to key is interval and the unification of AES interval carries out XOR with confounding factors and obscures process.Server exists This session stores cryptography information and key information, for data resource waiting for transmission is encrypted transmission.Service Device all has randomness for each session, the selection of AES and the generation of key.
(4), after client receives the Keys message body of server response, the information of the AES in Alg district is extracted, if algorithm Coding region is 0, then it represents that be currently connected as unsecured connections, i.e. takes mode transmitting video data in plain text, otherwise it is assumed that be Secure connection, Bing Cong Key district extracts key information as decruption key.Coding according to Alg district determines the decipherment algorithm of correspondence, The deciphering of the ciphertext data for the later stage is received.
(5) user end to server request data resource.
(6) transmit after critical data is encrypted by server by the AES in session and encryption key.
(7) client is after receiving data resource, first judges whether current connection is secure connection, if secure connection, then It is decrypted with the decipherment algorithm in session and data key and obtains clear data, otherwise, read directly as clear data.
The present invention has several advantages that compared with transmitting with the RTMP data of standard
(1) RTMP RTP has been carried out functional extension, by the cipher key agreement process of client Yu server, AES and key that each connection is used have randomness, can improve outside broken to ciphertext data to a great extent Solve the difficulty analyzed.
(2) using symmetrical AES to be encrypted, encryption and decryption treatment effeciency is high, to the real-time of data transmission and Consumer's Experience has no significant effect, little to the process load effect of server.
(3) server can Choice encryption mode neatly, can determine according to the resource type that user type or user ask and be No encrypted transmission, or select specific AES and key length, the present invention can support 64 bytes or more byte length Key, can support 255 kinds of AESs simultaneously.
(4) in cipher key agreement process, carried out obscuring process to key and AES, concealed key information, obscure Factor completely random, adds outside and video data is cracked difficulty.
The most also can connected applications scene need use asymmetrical AES to carry out Data Encryption Transmission, at it Reason mode is identical with the mode using symmetric encipherment algorithm, is all that user end to server asks key information, and server selects at random Selecting AES, and generate random key, be then encapsulated in Keys message body being sent to client, client disappears from Keys Breath extracts decipherment algorithm and decruption key, for by the data deciphering in later stage.
Accompanying drawing explanation
Fig. 1 is that AskKeys message body forms schematic diagram;
Fig. 2 is that Keys message body forms schematic diagram;
Fig. 3 is that client asks key, and server generates key and is transferred to the flow chart of client;
Fig. 4 be server to Data Encryption Transmission and client the flow chart to data decryption processing.
Detailed description of the invention
With specific embodiment, the present invention is described in further detail below in conjunction with the accompanying drawings.
A kind of data safe transmission method connected based on RTMP that the present invention provides, the method comprises the following steps:
(1) client actively initiates RTMP connection request to server, and server receives the RTMP connection request of client, The connection with client is set up after checking request is legal.
(2) after setting up connection, user end to server request key information.Client increases a kind of message body asking key newly, Named AskKeys, is used for the AES to server request current sessions and the key information of correspondence.As it is shown in figure 1, The composition of AskKeys message body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length;Value is 4, represents the message that current message is user's Control Cooling, Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number, value is 2.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 10, represents client Hold the event type to server requests key information, distinguish mutually with existing event type in standard RTMP agreement.
(3), after server receives the AskKeys request of client, AES is randomly choosed according to server for encrypting strategy And generate random key, then these information unification are returned to client.
Server increases a kind of message body for customer in response end key request, named Keys newly.As in figure 2 it is shown, work as key When message length is set as 16 byte, the composition of Keys message body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length, value is 4, represents the message that current message is user's Control Cooling, Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number (2 byte), key interval byte number (16 Byte), AES coded word joint number (1 byte), the summation of confounding factors byte number (2 byte), value is 21.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 9, represents server The key information event type of customer in response end.
Key interval Key: storage length is the key information of 16 bytes, if transmitting data in unencrypted mode, and 16 words The key of joint is interval all fills with 0.
AES coding Alg: be used for representing cryptography information, be encoded to 0 expression and do not do the encryption process, with plaintext transmission, Being encoded to the corresponding different AES of different digital of non-zero, AES and the coding corresponding relation of support of the present invention are shown in Table 1。
Confounding factors Confusion:2 byte length, content stochastic generation, it is used for obscuring session key and algorithm information, logical Critical data is obscured process by the mode crossing XOR so that key is interval encodes information with ciphertext state transfer with AES To client, contribute to improving further safety.
Table 1
AES title AES encodes 16 hex value
Do not encrypt 0 0x00
RC4-MD5 1 0x01
SALSA20 2 0x02
CHACHA20 3 0x03
AES256-CFB 4 0x04
AES-192-CFB 5 0x05
AES-128-CFB 6 0x06
RC4 7 0x07
The generation strategy of described key, particularly as follows: the random value of server elder generation stochastic generation 2 byte length, is used for obscuring session close Key and cryptography information, subsequently for the key of each session stochastic generation 16 byte length, the most each byte is 0-255 Between different random number, and according to security strategy dynamic Choice encryption algorithm, then add with corresponding AES coding filling Close algorithm is interval, finally to key is interval and the unification of AES interval carries out XOR with confounding factors and obscures process.Server exists This session stores cryptography information and key information, for data resource waiting for transmission is encrypted transmission.Service Device all has randomness for each session, the selection of AES and the generation of key.
(4), after client receives the Keys message body of server response, the information of the AES in Alg district is extracted, if algorithm Coding region is 0, then it represents that be currently connected as unsecured connections, otherwise it is assumed that be secure connection, Bing Cong Key district extracts key letter Breath is as decruption key.Coding according to Alg district determines the decipherment algorithm of correspondence, for the ciphertext data that receive the later stage Deciphering.
(5) user end to server request data resource.
(6) transmit after critical data is encrypted by server by the AES in session and encryption key.
(7) client is after receiving data resource, first judges whether current connection is secure connection, if secure connection, then It is decrypted with the decipherment algorithm in session and data key and obtains clear data, otherwise, read directly as clear data.

Claims (2)

1. the data safe transmission method connected based on RTMP, it is characterised in that the method comprises the following steps:
(1) client actively initiates RTMP connection request to server, and server receives the RTMP connection request of client, The connection with client is set up after checking request is legal.
(2) after setting up connection, user end to server request key information.Client increases a kind of message body asking key newly, Named AskKeys, is used for the AES to server request current sessions and the key information of correspondence.AskKeys disappears The composition of breath body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length;Value is 4, represents the message that current message is user's Control Cooling, Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number, value is 2.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 10, represents client Hold the event type to server requests key information, distinguish mutually with existing event type in standard RTMP agreement.
(3), after server receives the AskKeys request of client, AES is randomly choosed according to server for encrypting strategy And generate random key, then these information unification are returned to client.
Server increases a kind of message body for customer in response end key request, named Keys newly.When key information length sets When being 16 byte, the composition of Keys message body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length, value is 4, represents the message that current message is user's Control Cooling, Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number (2 byte), key interval byte number (16 Byte), AES coded word joint number (1 byte), the summation of confounding factors byte number (2 byte), value is 21.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 9, represents server The key information event type of customer in response end.
Key interval Key: storage length is the key information of 16 bytes, if transmitting data in unencrypted mode, and 16 words The key of joint is interval all fills with 0.
AES coding Alg: be used for representing cryptography information, be encoded to 0 expression and do not do the encryption process, with plaintext transmission, It is encoded to the corresponding different AES of different digital of non-zero.
Confounding factors Confusion:2 byte length, content stochastic generation, it is used for obscuring session key and algorithm information, logical Critical data is obscured process by the mode crossing XOR so that key is interval encodes information with ciphertext state transfer with AES To client, contribute to improving further safety.
The generation strategy of described key, particularly as follows: the random value of server elder generation stochastic generation 2 byte length, is used for obscuring session close Key and cryptography information, subsequently for the key of each session stochastic generation 16 byte length, the most each byte is 0-255 Between different random number, and according to security strategy dynamic Choice encryption algorithm, then add with corresponding AES coding filling Close algorithm is interval, finally to key is interval and the unification of AES interval carries out XOR with confounding factors and obscures process.Server exists This session stores cryptography information and key information, for data resource waiting for transmission is encrypted transmission.Service Device all has randomness for each session, the selection of AES and the generation of key.
(4), after client receives the Keys message body of server response, the information of the AES in Alg district is extracted, if algorithm Coding region is 0, then it represents that be currently connected as unsecured connections, otherwise it is assumed that be secure connection, Bing Cong Key district extracts key letter Breath is as decruption key.
(5) user end to server request data resource.
(6) transmit after critical data is encrypted by server by the AES in session and encryption key.
(7) client is after receiving data resource, first judges whether current connection is secure connection, if secure connection, then It is decrypted with the decipherment algorithm in session and data key and obtains clear data, otherwise, read directly as clear data.
A kind of data safe transmission method connected based on RTMP the most according to claim 1, it is characterised in that institute State AES can be selected for RC4-MD5, SALSA20, CHACHA20, AES256-CFB, AES-192-CFB, AES-128-CFB, RC4。
CN201610150356.2A 2016-03-16 2016-03-16 A kind of data safe transmission method based on RTMP connections Active CN105847238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610150356.2A CN105847238B (en) 2016-03-16 2016-03-16 A kind of data safe transmission method based on RTMP connections

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610150356.2A CN105847238B (en) 2016-03-16 2016-03-16 A kind of data safe transmission method based on RTMP connections

Publications (2)

Publication Number Publication Date
CN105847238A true CN105847238A (en) 2016-08-10
CN105847238B CN105847238B (en) 2018-07-17

Family

ID=56587285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610150356.2A Active CN105847238B (en) 2016-03-16 2016-03-16 A kind of data safe transmission method based on RTMP connections

Country Status (1)

Country Link
CN (1) CN105847238B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789040A (en) * 2017-02-10 2017-05-31 广西柳工机械股份有限公司 The method to set up of CAN communication encryption key
CN106850191A (en) * 2017-02-19 2017-06-13 郑州云海信息技术有限公司 The encryption and decryption method and device of distributed memory system communication protocol
CN108390860A (en) * 2018-01-24 2018-08-10 北京奇艺世纪科技有限公司 A kind of encryption and decryption method and device of data packet
CN108809940A (en) * 2018-05-04 2018-11-13 四川理工学院 Network system server interacts encryption method with client
CN109067517A (en) * 2018-06-22 2018-12-21 成都卫士通信息产业股份有限公司 Encryption, the communication means for decrypting device, encryption and decryption method and secrete key
CN109194905A (en) * 2018-11-05 2019-01-11 苏州科达科技股份有限公司 Video conference connects encryption, method for building up, terminal, server and system
CN109410396A (en) * 2018-10-14 2019-03-01 浙江鸿利锁业有限公司 A kind of smart lock data encryption and transmission method and the leased equipment using it
CN111093097A (en) * 2019-12-20 2020-05-01 北京云享智胜科技有限公司 Stream media data encryption and decryption method and device, electronic equipment and storage medium
CN111294361A (en) * 2020-03-16 2020-06-16 广州天辰信息科技有限公司 Workflow data encryption method and system
WO2021072878A1 (en) * 2019-10-15 2021-04-22 平安科技(深圳)有限公司 Audio/video data encryption and decryption method and apparatus employing rtmp, and readable storage medium
CN113221146A (en) * 2021-05-26 2021-08-06 中国人民银行数字货币研究所 Method and device for data transmission between block chain nodes
CN113595980A (en) * 2021-06-25 2021-11-02 杭州天宽科技有限公司 Configuration method based on TCP communication custom protocol

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101861721A (en) * 2007-10-15 2010-10-13 奥多比公司 Imparting cryptographic information in network communications
CN102546824A (en) * 2012-02-20 2012-07-04 沈文策 Flash data transmission method and system, as well as server and client
US20120275597A1 (en) * 2010-12-31 2012-11-01 Akamai Technologies, Inc. Extending data confidentiality into a player application

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101861721A (en) * 2007-10-15 2010-10-13 奥多比公司 Imparting cryptographic information in network communications
US20120275597A1 (en) * 2010-12-31 2012-11-01 Akamai Technologies, Inc. Extending data confidentiality into a player application
CN102546824A (en) * 2012-02-20 2012-07-04 沈文策 Flash data transmission method and system, as well as server and client

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
冯勋: "《基于RTMP协议的轻量级视频服务器的设计与实现》", 《中国优秀硕士学位论文全文数据库》 *
黄斌杰: "《基于云平台的移动视频播放系统的设计与实现》", 《中国优秀硕士学位论文全文数据库》 *

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789040A (en) * 2017-02-10 2017-05-31 广西柳工机械股份有限公司 The method to set up of CAN communication encryption key
CN106850191A (en) * 2017-02-19 2017-06-13 郑州云海信息技术有限公司 The encryption and decryption method and device of distributed memory system communication protocol
CN108390860A (en) * 2018-01-24 2018-08-10 北京奇艺世纪科技有限公司 A kind of encryption and decryption method and device of data packet
CN108390860B (en) * 2018-01-24 2021-09-14 北京奇艺世纪科技有限公司 Data packet encryption and decryption method and device
CN108809940B (en) * 2018-05-04 2020-10-23 四川理工学院 Interactive encryption method for power grid system server and client
CN108809940A (en) * 2018-05-04 2018-11-13 四川理工学院 Network system server interacts encryption method with client
CN109067517A (en) * 2018-06-22 2018-12-21 成都卫士通信息产业股份有限公司 Encryption, the communication means for decrypting device, encryption and decryption method and secrete key
CN109410396A (en) * 2018-10-14 2019-03-01 浙江鸿利锁业有限公司 A kind of smart lock data encryption and transmission method and the leased equipment using it
CN109410396B (en) * 2018-10-14 2021-01-01 浙江鸿利锁业有限公司 Intelligent lock data encryption transmission method and leasing equipment applying same
CN109194905A (en) * 2018-11-05 2019-01-11 苏州科达科技股份有限公司 Video conference connects encryption, method for building up, terminal, server and system
WO2021072878A1 (en) * 2019-10-15 2021-04-22 平安科技(深圳)有限公司 Audio/video data encryption and decryption method and apparatus employing rtmp, and readable storage medium
CN111093097A (en) * 2019-12-20 2020-05-01 北京云享智胜科技有限公司 Stream media data encryption and decryption method and device, electronic equipment and storage medium
CN111294361B (en) * 2020-03-16 2020-09-08 广州天辰信息科技有限公司 Workflow data encryption method and system
CN111294361A (en) * 2020-03-16 2020-06-16 广州天辰信息科技有限公司 Workflow data encryption method and system
CN113221146A (en) * 2021-05-26 2021-08-06 中国人民银行数字货币研究所 Method and device for data transmission between block chain nodes
CN113221146B (en) * 2021-05-26 2023-11-03 中国人民银行数字货币研究所 Method and device for data transmission among block chain nodes
CN113595980A (en) * 2021-06-25 2021-11-02 杭州天宽科技有限公司 Configuration method based on TCP communication custom protocol
CN113595980B (en) * 2021-06-25 2023-05-23 杭州天宽科技有限公司 Configuration method based on TCP communication custom protocol

Also Published As

Publication number Publication date
CN105847238B (en) 2018-07-17

Similar Documents

Publication Publication Date Title
CN105847238A (en) Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections
CN101729854B (en) Method for distributing code stream encrypting and decrypting keys in SIP video monitoring system
CN104821944A (en) Hybrid encrypted network data security method and system
CN107342977A (en) Suitable for the information security method of point-to-point instant messaging
CN113612605A (en) Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology
CN106936788A (en) A kind of cryptographic key distribution method suitable for VOIP voice encryptions
CN113079022B (en) Secure transmission method and system based on SM2 key negotiation mechanism
JPH07325785A (en) Network user identifying method, ciphering communication method, application client and server
CN109104278A (en) A kind of encrypting and decrypting method
CN116614599B (en) Video monitoring method, device and storage medium for secure encryption
CN111355921A (en) Video conference encryption method and system
CN111988299A (en) Method for establishing trusted link between client and server
CN111756726A (en) SIP security authentication method supporting State cipher algorithm
CN110071863A (en) A kind of instant communication users group's encryption method based on id password
CN107493283B (en) Method and system for realizing message security encryption based on live broadcast platform
CN108768920A (en) A kind of recorded broadcast data processing method and device
Setiawan Securing data communication through MQTT protocol with AES-256 encryption algorithm CBC mode on ESP32-based smart homes
CN110430203A (en) A kind of improved safety JSON transmission method towards sensitive data
CN112532384B (en) Method for quickly encrypting and decrypting transmission key based on packet key mode
CN109905376A (en) A kind of method and system preventing unauthorized access server
CN106788997B (en) A kind of real-time multimedia encryption method based on id password
CN111224968B (en) Secure communication method for randomly selecting transfer server
CN108616536A (en) Encrypt a kind of method and its application of socks agreements
KR20040007417A (en) Transaction certification
Jung et al. Securing rtp packets using per-packet selective encryption scheme for real-time multimedia applications

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant