CN105847238A - Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections - Google Patents
Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections Download PDFInfo
- Publication number
- CN105847238A CN105847238A CN201610150356.2A CN201610150356A CN105847238A CN 105847238 A CN105847238 A CN 105847238A CN 201610150356 A CN201610150356 A CN 201610150356A CN 105847238 A CN105847238 A CN 105847238A
- Authority
- CN
- China
- Prior art keywords
- key
- server
- byte
- aes
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/65—Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections. The method has the advantages that functional extensions of the RTMP are carried out, and through a key negotiation process between a client and a server, an encryption algorithm and a key adopted by each connection are random, so that external cracking analysis of encrypted data is much more difficult; the symmetrical encryption algorithms are adopted for encryption processing, so that the encryption and decryption processing efficiencies are high, real-time performance of data transmission and user experience are not obviously affected, and the effects on the processing load of the server are small; meanwhile, the server can flexibly select an encryption mode, and, according to a user type or a resource type requested by a user, can determine whether encrypted transmission is needed or not or select one specific encryption algorithm and a key length (the keys with a length of 64 bytes or more can be provided, and the number of the encryption algorithms can reach 255).
Description
Technical field
The invention belongs to Security Data Transmission technical field, particularly relate to a kind of data safe transmission method connected based on RTMP.
Background technology
Along with the fast development of the Internet, people are also faced with information security side while enjoying the convenient service that the Internet brings
The problem in face, and the high speed development in the fields such as teleconference, online transaction, Web bank, cause the importance of data safety also
More and more prominent.Data Encryption Transmission is technological means extremely important and conventional in information security field, is to pass by transmitting terminal
Key data is encrypted by certain algorithm, becomes unrecognizable ciphertext data and is arrived at by the Internet, by
Ciphertext data deciphering is reduced to readable data by receiving terminal manner of decryption according to a preconcerted arrangement.Data Encryption Transmission can greatly improve
Data, by third-party analysis, the difficulty stolen, can effectively prevent the leakage of important information.
RTMP real-time messages transportation protocol has extraordinary Consumer's Experience, it is achieved easily, resource occupation few, the most extensive
It is applied to the aspects such as news briefing, the most live, video request program, video conference, the web advertisement, long-distance education, tele-medicine.
Due to RTMP agreement itself do not have data safety protection mechanism, data on the passage that receiving-transmitting sides is set up with plaintext shape
Formula is transmitted, and adds the opening of this agreement, and data can be obtained easily by third party and analyze in data in transmitting procedure
Hold, therefore use the RTMP agreement of standard to carry out data transmission in terms of information security and there is the highest risk, it is difficult to avoid
The malicious attack such as distorting from outside data theft, information, not having under the scene that data transmission is had security requirement can
The property used.
Summary of the invention
Present invention aims to the deficiencies in the prior art, it is provided that a kind of data safe transmission method connected based on RTMP,
After client is connected with server foundation, user end to server queued session key information, server randomly chooses encryption
Algorithm also generates random key information and sends jointly to client.Client after receiving key information just to server request
Resource data, if server does not sends key information, the resource request refusal sending client processes.
It is an object of the invention to be achieved through the following technical solutions: a kind of data safe transmission method connected based on RTMP,
The method comprises the following steps:
(1) client actively initiates RTMP connection request to server, and server receives the RTMP connection request of client,
The connection with client is set up after checking request is legal.
(2) after setting up connection, user end to server request key information.Client increases a kind of message body asking key newly,
Named AskKeys, is used for the AES to server request current sessions and the key information of correspondence.AskKeys disappears
The composition of breath body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length;Value is 4, represents the message that current message is user's Control Cooling,
Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number, value is 2.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 10, represents client
Hold the event type to server requests key information, distinguish mutually with existing event type in standard RTMP agreement.
(3), after server receives the AskKeys request of client, AES is randomly choosed according to server for encrypting strategy
And generate random key, then these information unification are returned to client.
Server increases a kind of message body for customer in response end key request, named Keys newly.When key information length sets
When being 16 byte, the composition of Keys message body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length, value is 4, represents the message that current message is user's Control Cooling,
Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number (2 byte), key interval byte number (16
Byte), AES coded word joint number (1 byte), the summation of confounding factors byte number (2 byte), value is 21.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 9, represents server
The key information event type of customer in response end.
Key interval Key: storage length is the key information of 16 bytes, if transmitting data in unencrypted mode, and 16 words
The key of joint is interval all fills with 0.
AES coding Alg: be used for representing cryptography information, be encoded to 0 expression and do not do the encryption process, with plaintext transmission,
It is encoded to the corresponding different AES of different digital of non-zero.
Confounding factors Confusion:2 byte length, content stochastic generation, it is used for obscuring session key and algorithm information, logical
Critical data is obscured process by the mode crossing XOR so that key is interval encodes information with ciphertext state transfer with AES
To client, contribute to improving further safety.
The generation strategy of described key, particularly as follows: the random value of server elder generation stochastic generation 2 byte length, is used for obscuring session close
Key and cryptography information, subsequently for the key of each session stochastic generation 16 byte length, the most each byte is 0-255
Between different random number, and according to security strategy dynamic Choice encryption algorithm, then add with corresponding AES coding filling
Close algorithm is interval, finally to key is interval and the unification of AES interval carries out XOR with confounding factors and obscures process.Server exists
This session stores cryptography information and key information, for data resource waiting for transmission is encrypted transmission.Service
Device all has randomness for each session, the selection of AES and the generation of key.
(4), after client receives the Keys message body of server response, the information of the AES in Alg district is extracted, if algorithm
Coding region is 0, then it represents that be currently connected as unsecured connections, i.e. takes mode transmitting video data in plain text, otherwise it is assumed that be
Secure connection, Bing Cong Key district extracts key information as decruption key.Coding according to Alg district determines the decipherment algorithm of correspondence,
The deciphering of the ciphertext data for the later stage is received.
(5) user end to server request data resource.
(6) transmit after critical data is encrypted by server by the AES in session and encryption key.
(7) client is after receiving data resource, first judges whether current connection is secure connection, if secure connection, then
It is decrypted with the decipherment algorithm in session and data key and obtains clear data, otherwise, read directly as clear data.
The present invention has several advantages that compared with transmitting with the RTMP data of standard
(1) RTMP RTP has been carried out functional extension, by the cipher key agreement process of client Yu server,
AES and key that each connection is used have randomness, can improve outside broken to ciphertext data to a great extent
Solve the difficulty analyzed.
(2) using symmetrical AES to be encrypted, encryption and decryption treatment effeciency is high, to the real-time of data transmission and
Consumer's Experience has no significant effect, little to the process load effect of server.
(3) server can Choice encryption mode neatly, can determine according to the resource type that user type or user ask and be
No encrypted transmission, or select specific AES and key length, the present invention can support 64 bytes or more byte length
Key, can support 255 kinds of AESs simultaneously.
(4) in cipher key agreement process, carried out obscuring process to key and AES, concealed key information, obscure
Factor completely random, adds outside and video data is cracked difficulty.
The most also can connected applications scene need use asymmetrical AES to carry out Data Encryption Transmission, at it
Reason mode is identical with the mode using symmetric encipherment algorithm, is all that user end to server asks key information, and server selects at random
Selecting AES, and generate random key, be then encapsulated in Keys message body being sent to client, client disappears from Keys
Breath extracts decipherment algorithm and decruption key, for by the data deciphering in later stage.
Accompanying drawing explanation
Fig. 1 is that AskKeys message body forms schematic diagram;
Fig. 2 is that Keys message body forms schematic diagram;
Fig. 3 is that client asks key, and server generates key and is transferred to the flow chart of client;
Fig. 4 be server to Data Encryption Transmission and client the flow chart to data decryption processing.
Detailed description of the invention
With specific embodiment, the present invention is described in further detail below in conjunction with the accompanying drawings.
A kind of data safe transmission method connected based on RTMP that the present invention provides, the method comprises the following steps:
(1) client actively initiates RTMP connection request to server, and server receives the RTMP connection request of client,
The connection with client is set up after checking request is legal.
(2) after setting up connection, user end to server request key information.Client increases a kind of message body asking key newly,
Named AskKeys, is used for the AES to server request current sessions and the key information of correspondence.As it is shown in figure 1,
The composition of AskKeys message body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length;Value is 4, represents the message that current message is user's Control Cooling,
Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number, value is 2.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 10, represents client
Hold the event type to server requests key information, distinguish mutually with existing event type in standard RTMP agreement.
(3), after server receives the AskKeys request of client, AES is randomly choosed according to server for encrypting strategy
And generate random key, then these information unification are returned to client.
Server increases a kind of message body for customer in response end key request, named Keys newly.As in figure 2 it is shown, work as key
When message length is set as 16 byte, the composition of Keys message body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length, value is 4, represents the message that current message is user's Control Cooling,
Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number (2 byte), key interval byte number (16
Byte), AES coded word joint number (1 byte), the summation of confounding factors byte number (2 byte), value is 21.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 9, represents server
The key information event type of customer in response end.
Key interval Key: storage length is the key information of 16 bytes, if transmitting data in unencrypted mode, and 16 words
The key of joint is interval all fills with 0.
AES coding Alg: be used for representing cryptography information, be encoded to 0 expression and do not do the encryption process, with plaintext transmission,
Being encoded to the corresponding different AES of different digital of non-zero, AES and the coding corresponding relation of support of the present invention are shown in Table
1。
Confounding factors Confusion:2 byte length, content stochastic generation, it is used for obscuring session key and algorithm information, logical
Critical data is obscured process by the mode crossing XOR so that key is interval encodes information with ciphertext state transfer with AES
To client, contribute to improving further safety.
Table 1
AES title | AES encodes | 16 hex value |
Do not encrypt | 0 | 0x00 |
RC4-MD5 | 1 | 0x01 |
SALSA20 | 2 | 0x02 |
CHACHA20 | 3 | 0x03 |
AES256-CFB | 4 | 0x04 |
AES-192-CFB | 5 | 0x05 |
AES-128-CFB | 6 | 0x06 |
RC4 | 7 | 0x07 |
The generation strategy of described key, particularly as follows: the random value of server elder generation stochastic generation 2 byte length, is used for obscuring session close
Key and cryptography information, subsequently for the key of each session stochastic generation 16 byte length, the most each byte is 0-255
Between different random number, and according to security strategy dynamic Choice encryption algorithm, then add with corresponding AES coding filling
Close algorithm is interval, finally to key is interval and the unification of AES interval carries out XOR with confounding factors and obscures process.Server exists
This session stores cryptography information and key information, for data resource waiting for transmission is encrypted transmission.Service
Device all has randomness for each session, the selection of AES and the generation of key.
(4), after client receives the Keys message body of server response, the information of the AES in Alg district is extracted, if algorithm
Coding region is 0, then it represents that be currently connected as unsecured connections, otherwise it is assumed that be secure connection, Bing Cong Key district extracts key letter
Breath is as decruption key.Coding according to Alg district determines the decipherment algorithm of correspondence, for the ciphertext data that receive the later stage
Deciphering.
(5) user end to server request data resource.
(6) transmit after critical data is encrypted by server by the AES in session and encryption key.
(7) client is after receiving data resource, first judges whether current connection is secure connection, if secure connection, then
It is decrypted with the decipherment algorithm in session and data key and obtains clear data, otherwise, read directly as clear data.
Claims (2)
1. the data safe transmission method connected based on RTMP, it is characterised in that the method comprises the following steps:
(1) client actively initiates RTMP connection request to server, and server receives the RTMP connection request of client,
The connection with client is set up after checking request is legal.
(2) after setting up connection, user end to server request key information.Client increases a kind of message body asking key newly,
Named AskKeys, is used for the AES to server request current sessions and the key information of correspondence.AskKeys disappears
The composition of breath body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length;Value is 4, represents the message that current message is user's Control Cooling,
Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number, value is 2.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 10, represents client
Hold the event type to server requests key information, distinguish mutually with existing event type in standard RTMP agreement.
(3), after server receives the AskKeys request of client, AES is randomly choosed according to server for encrypting strategy
And generate random key, then these information unification are returned to client.
Server increases a kind of message body for customer in response end key request, named Keys newly.When key information length sets
When being 16 byte, the composition of Keys message body and the implication of each ingredient are as follows:
Type of message MessageType:1 byte length, value is 4, represents the message that current message is user's Control Cooling,
Keep consistent with standard RTMP agreement.
Payload length Payload length: be event type interval byte number (2 byte), key interval byte number (16
Byte), AES coded word joint number (1 byte), the summation of confounding factors byte number (2 byte), value is 21.
Time stamp T imestamp:4 byte length, deposits current timestamp.
Stream identification Stream ID:3 byte length, in message body, this value is 0, represents non-resource data.
Event type Event Type:2 byte length, represents that user controls the event type of class, and value is 9, represents server
The key information event type of customer in response end.
Key interval Key: storage length is the key information of 16 bytes, if transmitting data in unencrypted mode, and 16 words
The key of joint is interval all fills with 0.
AES coding Alg: be used for representing cryptography information, be encoded to 0 expression and do not do the encryption process, with plaintext transmission,
It is encoded to the corresponding different AES of different digital of non-zero.
Confounding factors Confusion:2 byte length, content stochastic generation, it is used for obscuring session key and algorithm information, logical
Critical data is obscured process by the mode crossing XOR so that key is interval encodes information with ciphertext state transfer with AES
To client, contribute to improving further safety.
The generation strategy of described key, particularly as follows: the random value of server elder generation stochastic generation 2 byte length, is used for obscuring session close
Key and cryptography information, subsequently for the key of each session stochastic generation 16 byte length, the most each byte is 0-255
Between different random number, and according to security strategy dynamic Choice encryption algorithm, then add with corresponding AES coding filling
Close algorithm is interval, finally to key is interval and the unification of AES interval carries out XOR with confounding factors and obscures process.Server exists
This session stores cryptography information and key information, for data resource waiting for transmission is encrypted transmission.Service
Device all has randomness for each session, the selection of AES and the generation of key.
(4), after client receives the Keys message body of server response, the information of the AES in Alg district is extracted, if algorithm
Coding region is 0, then it represents that be currently connected as unsecured connections, otherwise it is assumed that be secure connection, Bing Cong Key district extracts key letter
Breath is as decruption key.
(5) user end to server request data resource.
(6) transmit after critical data is encrypted by server by the AES in session and encryption key.
(7) client is after receiving data resource, first judges whether current connection is secure connection, if secure connection, then
It is decrypted with the decipherment algorithm in session and data key and obtains clear data, otherwise, read directly as clear data.
A kind of data safe transmission method connected based on RTMP the most according to claim 1, it is characterised in that institute
State AES can be selected for RC4-MD5, SALSA20, CHACHA20, AES256-CFB, AES-192-CFB, AES-128-CFB,
RC4。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610150356.2A CN105847238B (en) | 2016-03-16 | 2016-03-16 | A kind of data safe transmission method based on RTMP connections |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610150356.2A CN105847238B (en) | 2016-03-16 | 2016-03-16 | A kind of data safe transmission method based on RTMP connections |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105847238A true CN105847238A (en) | 2016-08-10 |
CN105847238B CN105847238B (en) | 2018-07-17 |
Family
ID=56587285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610150356.2A Active CN105847238B (en) | 2016-03-16 | 2016-03-16 | A kind of data safe transmission method based on RTMP connections |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105847238B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789040A (en) * | 2017-02-10 | 2017-05-31 | 广西柳工机械股份有限公司 | The method to set up of CAN communication encryption key |
CN106850191A (en) * | 2017-02-19 | 2017-06-13 | 郑州云海信息技术有限公司 | The encryption and decryption method and device of distributed memory system communication protocol |
CN108390860A (en) * | 2018-01-24 | 2018-08-10 | 北京奇艺世纪科技有限公司 | A kind of encryption and decryption method and device of data packet |
CN108809940A (en) * | 2018-05-04 | 2018-11-13 | 四川理工学院 | Network system server interacts encryption method with client |
CN109067517A (en) * | 2018-06-22 | 2018-12-21 | 成都卫士通信息产业股份有限公司 | Encryption, the communication means for decrypting device, encryption and decryption method and secrete key |
CN109194905A (en) * | 2018-11-05 | 2019-01-11 | 苏州科达科技股份有限公司 | Video conference connects encryption, method for building up, terminal, server and system |
CN109410396A (en) * | 2018-10-14 | 2019-03-01 | 浙江鸿利锁业有限公司 | A kind of smart lock data encryption and transmission method and the leased equipment using it |
CN111093097A (en) * | 2019-12-20 | 2020-05-01 | 北京云享智胜科技有限公司 | Stream media data encryption and decryption method and device, electronic equipment and storage medium |
CN111294361A (en) * | 2020-03-16 | 2020-06-16 | 广州天辰信息科技有限公司 | Workflow data encryption method and system |
WO2021072878A1 (en) * | 2019-10-15 | 2021-04-22 | 平安科技(深圳)有限公司 | Audio/video data encryption and decryption method and apparatus employing rtmp, and readable storage medium |
CN113221146A (en) * | 2021-05-26 | 2021-08-06 | 中国人民银行数字货币研究所 | Method and device for data transmission between block chain nodes |
CN113595980A (en) * | 2021-06-25 | 2021-11-02 | 杭州天宽科技有限公司 | Configuration method based on TCP communication custom protocol |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101861721A (en) * | 2007-10-15 | 2010-10-13 | 奥多比公司 | Imparting cryptographic information in network communications |
CN102546824A (en) * | 2012-02-20 | 2012-07-04 | 沈文策 | Flash data transmission method and system, as well as server and client |
US20120275597A1 (en) * | 2010-12-31 | 2012-11-01 | Akamai Technologies, Inc. | Extending data confidentiality into a player application |
-
2016
- 2016-03-16 CN CN201610150356.2A patent/CN105847238B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101861721A (en) * | 2007-10-15 | 2010-10-13 | 奥多比公司 | Imparting cryptographic information in network communications |
US20120275597A1 (en) * | 2010-12-31 | 2012-11-01 | Akamai Technologies, Inc. | Extending data confidentiality into a player application |
CN102546824A (en) * | 2012-02-20 | 2012-07-04 | 沈文策 | Flash data transmission method and system, as well as server and client |
Non-Patent Citations (2)
Title |
---|
冯勋: "《基于RTMP协议的轻量级视频服务器的设计与实现》", 《中国优秀硕士学位论文全文数据库》 * |
黄斌杰: "《基于云平台的移动视频播放系统的设计与实现》", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789040A (en) * | 2017-02-10 | 2017-05-31 | 广西柳工机械股份有限公司 | The method to set up of CAN communication encryption key |
CN106850191A (en) * | 2017-02-19 | 2017-06-13 | 郑州云海信息技术有限公司 | The encryption and decryption method and device of distributed memory system communication protocol |
CN108390860A (en) * | 2018-01-24 | 2018-08-10 | 北京奇艺世纪科技有限公司 | A kind of encryption and decryption method and device of data packet |
CN108390860B (en) * | 2018-01-24 | 2021-09-14 | 北京奇艺世纪科技有限公司 | Data packet encryption and decryption method and device |
CN108809940B (en) * | 2018-05-04 | 2020-10-23 | 四川理工学院 | Interactive encryption method for power grid system server and client |
CN108809940A (en) * | 2018-05-04 | 2018-11-13 | 四川理工学院 | Network system server interacts encryption method with client |
CN109067517A (en) * | 2018-06-22 | 2018-12-21 | 成都卫士通信息产业股份有限公司 | Encryption, the communication means for decrypting device, encryption and decryption method and secrete key |
CN109410396A (en) * | 2018-10-14 | 2019-03-01 | 浙江鸿利锁业有限公司 | A kind of smart lock data encryption and transmission method and the leased equipment using it |
CN109410396B (en) * | 2018-10-14 | 2021-01-01 | 浙江鸿利锁业有限公司 | Intelligent lock data encryption transmission method and leasing equipment applying same |
CN109194905A (en) * | 2018-11-05 | 2019-01-11 | 苏州科达科技股份有限公司 | Video conference connects encryption, method for building up, terminal, server and system |
WO2021072878A1 (en) * | 2019-10-15 | 2021-04-22 | 平安科技(深圳)有限公司 | Audio/video data encryption and decryption method and apparatus employing rtmp, and readable storage medium |
CN111093097A (en) * | 2019-12-20 | 2020-05-01 | 北京云享智胜科技有限公司 | Stream media data encryption and decryption method and device, electronic equipment and storage medium |
CN111294361B (en) * | 2020-03-16 | 2020-09-08 | 广州天辰信息科技有限公司 | Workflow data encryption method and system |
CN111294361A (en) * | 2020-03-16 | 2020-06-16 | 广州天辰信息科技有限公司 | Workflow data encryption method and system |
CN113221146A (en) * | 2021-05-26 | 2021-08-06 | 中国人民银行数字货币研究所 | Method and device for data transmission between block chain nodes |
CN113221146B (en) * | 2021-05-26 | 2023-11-03 | 中国人民银行数字货币研究所 | Method and device for data transmission among block chain nodes |
CN113595980A (en) * | 2021-06-25 | 2021-11-02 | 杭州天宽科技有限公司 | Configuration method based on TCP communication custom protocol |
CN113595980B (en) * | 2021-06-25 | 2023-05-23 | 杭州天宽科技有限公司 | Configuration method based on TCP communication custom protocol |
Also Published As
Publication number | Publication date |
---|---|
CN105847238B (en) | 2018-07-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105847238A (en) | Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections | |
CN101729854B (en) | Method for distributing code stream encrypting and decrypting keys in SIP video monitoring system | |
CN104821944A (en) | Hybrid encrypted network data security method and system | |
CN107342977A (en) | Suitable for the information security method of point-to-point instant messaging | |
CN113612605A (en) | Method, system and equipment for enhancing MQTT protocol identity authentication by using symmetric cryptographic technology | |
CN106936788A (en) | A kind of cryptographic key distribution method suitable for VOIP voice encryptions | |
CN113079022B (en) | Secure transmission method and system based on SM2 key negotiation mechanism | |
JPH07325785A (en) | Network user identifying method, ciphering communication method, application client and server | |
CN109104278A (en) | A kind of encrypting and decrypting method | |
CN116614599B (en) | Video monitoring method, device and storage medium for secure encryption | |
CN111355921A (en) | Video conference encryption method and system | |
CN111988299A (en) | Method for establishing trusted link between client and server | |
CN111756726A (en) | SIP security authentication method supporting State cipher algorithm | |
CN110071863A (en) | A kind of instant communication users group's encryption method based on id password | |
CN107493283B (en) | Method and system for realizing message security encryption based on live broadcast platform | |
CN108768920A (en) | A kind of recorded broadcast data processing method and device | |
Setiawan | Securing data communication through MQTT protocol with AES-256 encryption algorithm CBC mode on ESP32-based smart homes | |
CN110430203A (en) | A kind of improved safety JSON transmission method towards sensitive data | |
CN112532384B (en) | Method for quickly encrypting and decrypting transmission key based on packet key mode | |
CN109905376A (en) | A kind of method and system preventing unauthorized access server | |
CN106788997B (en) | A kind of real-time multimedia encryption method based on id password | |
CN111224968B (en) | Secure communication method for randomly selecting transfer server | |
CN108616536A (en) | Encrypt a kind of method and its application of socks agreements | |
KR20040007417A (en) | Transaction certification | |
Jung et al. | Securing rtp packets using per-packet selective encryption scheme for real-time multimedia applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |