CN107426521A - A kind of video call method and terminal - Google Patents

A kind of video call method and terminal Download PDF

Info

Publication number
CN107426521A
CN107426521A CN201610349424.8A CN201610349424A CN107426521A CN 107426521 A CN107426521 A CN 107426521A CN 201610349424 A CN201610349424 A CN 201610349424A CN 107426521 A CN107426521 A CN 107426521A
Authority
CN
China
Prior art keywords
terminal
audio
video
key
random key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610349424.8A
Other languages
Chinese (zh)
Inventor
许玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610349424.8A priority Critical patent/CN107426521A/en
Publication of CN107426521A publication Critical patent/CN107426521A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Multimedia (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a kind of video call method and terminal, methods described is applied to first terminal, including:Establish and communicated to connect with the data of second terminal;Mutual authentication is carried out with the second terminal, and key agreement is carried out by rear to generate random key in mutual authentication;The audio/video information of collection is encrypted based on the random key, and sends the audio/video information after encryption to the second terminal, so that the second terminal is obtained after being decrypted based on the random key and plays the audio/video information.

Description

A kind of video call method and terminal
Technical field
The present invention relates to communication technical field, more particularly to a kind of video call method and terminal.
Background technology
With the rapid development of network and intelligent terminal, the social activity that video calling has progressed into people is raw It is living, but existing vt applications, such as QQ, the video call function of wechat offer, be all with Carry out data transmission in plain text, in communication process, it is easy to be illegally listened, steal call-information, pacify Full property is very poor.
Therefore it provides a kind of video calling scheme, can ensure the security of video calling, improve user's body Test, it has also become urgent problem to be solved.
The content of the invention
The embodiment of the present invention provides a kind of video call method and terminal, solve at least and exists in the prior art The problem of, the security of video calling can be ensured, improve Consumer's Experience.
What the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of video call method, and applied to first terminal, methods described includes:
Establish and communicated to connect with the data of second terminal;
Mutual authentication is carried out with the second terminal, and key agreement is carried out by rear to generate in mutual authentication Random key;
The audio/video information of collection is encrypted based on the random key, and sends the audio frequency and video after encryption Information gives the second terminal, so that the second terminal is obtained simultaneously after being decrypted based on the random key Play the audio/video information.
In such scheme, methods described also includes:
Audio/video information after receive that the second terminal sends encrypted based on the random key, and be based on Audio/video information after the encryption of reception is decrypted the random key, is regarded with obtaining corresponding sound Frequency information simultaneously plays.
It is described that mutual authentication is carried out with the second terminal in such scheme, and pass through in mutual authentication laggard Row key agreement to generate random key, including:
Random number R is generated, is entered based on the random number R using default AES with the second terminal The mutual digital certificate authentication of row, and in the certification by rear, key agreement is carried out with the second terminal To generate random key;The random key and the random number R positive correlation.
In such scheme, the foundation and the data of second terminal communicate to connect, including:
Send video calling to ask to the second terminal, and lead in the data for receiving the second terminal transmission During letter request, establish and communicated to connect with the data of the second terminal;Wherein, the data communications requests are Sent after the second terminal receives the video calling request.
In such scheme, methods described also includes:
Determine that the video calling terminates, remove the random key.
The embodiment of the present invention additionally provides a kind of terminal, and the terminal includes:Data communication module, authentication mould Block and processing module;Wherein,
The data communication module, communicated to connect for establishing with the data of second terminal;
The authentication module, for carrying out mutual authentication with the second terminal, and pass through in mutual authentication rear Key agreement is carried out to generate random key;
The processing module, for the audio/video information of collection to be encrypted based on the random key, and The audio/video information after encryption is sent to the second terminal so that the second terminal be based on it is described with secret Key obtains after being decrypted and plays the audio/video information.
In such scheme, the data communication module is additionally operable to receive that the second terminal sends based on institute State the audio/video information after random key encryption;
The processing module, it is additionally operable to believe the audio frequency and video after the encryption of reception based on the random key Breath is decrypted, to obtain corresponding audio/video information and play.
In such scheme, the authentication module, it is additionally operable to generate random number R, is adopted based on the random number R Mutual digital certificate authentication is carried out with default AES and the second terminal, and is led in the certification Later, key agreement is carried out with the second terminal to generate random key;The random key with it is described with Machine number R positive correlations.
In such scheme, the data communication module, it is additionally operable to transmission video calling and asks to described second eventually End, and when receiving the data communications requests that the second terminal is sent, establish the number with the second terminal According to communication connection;Wherein, the data communications requests are to receive the video calling in the second terminal to ask Sent after asking.
In such scheme, the processing module, it is additionally operable at the end of determining the video calling, described in removing Random key.
In embodiments of the present invention, first terminal is established communicates to connect with the data of second terminal, with described the Two terminals carry out mutual authentication, and carry out key agreement by rear to generate random key, base in mutual authentication The audio/video information of collection is encrypted in the random key, and send encryption after audio/video information to The second terminal, so that the second terminal is obtained after being decrypted based on the random key and plays institute State audio/video information;In this way, the video call data between first terminal and second terminal passes through random key It is encrypted, ensure that the security of video calling, meets the use higher to Content of Communication security requirement The demand at family, improves Consumer's Experience.
Brief description of the drawings
Fig. 1 is video call method schematic flow sheet one in the embodiment of the present invention;
Fig. 2 is video call system schematic diagram in the embodiment of the present invention;
Fig. 3 is video call method schematic flow sheet two in the embodiment of the present invention;
Fig. 4 is video calling signaling time-sequence figure in the embodiment of the present invention;
Fig. 5 is that first terminal carries out mutual authentication with second terminal and led in mutual authentication in the embodiment of the present invention Later the method flow schematic diagram of key agreement is carried out;
Fig. 6 is the composition structural representation of terminal in the embodiment of the present invention.
Embodiment
In embodiments of the present invention, first terminal is established communicates to connect with the data of second terminal, with described the Two terminals carry out mutual authentication, and carry out key agreement by rear to generate random key, base in mutual authentication The audio/video information of collection is encrypted in the random key, and send encryption after audio/video information to The second terminal, so that the second terminal is obtained after being decrypted based on the random key and plays institute State audio/video information.
In various embodiments of the present invention, the first terminal and second terminal include but is not limited to such as intelligent hand Machine, PAD (tablet personal computer) etc. mobile terminal, and the fixed terminal of such as desktop computer, with reference to The drawings and specific embodiments are described in further detail to the present invention.
Embodiment one
Fig. 1 is video call method schematic flow sheet in the embodiment of the present invention, and methods described is applied to first eventually End, as shown in figure 1, video call method includes in the embodiment of the present invention:
Step 101:Establish and communicated to connect with the data of second terminal.
Here, first terminal send video calling request after, second terminal receive the video calling please After asking, jingle bell is returned to before user connects the video calling to first terminal, when described in second terminal receiving Data communications requests are sent after video calling request to first terminal, to establish between first terminal and second terminal Data communication connection, and then carry out follow-up authentication and key agreement.
When actually implementing, this step foregoing description method also includes:First terminal and second terminal exist respectively User's registration is carried out on service server, and the service server is logged on to based on user's registration information;
The service server, is additionally operable to first terminal and second terminal is communicated in video call process Data forwarding.
Step 102:Mutual authentication is carried out with the second terminal, and passes through rear carry out key in mutual authentication Consult to generate random key.
Here, when first terminal and second terminal mutual authentication by after, consult generation and be only used for regarding this The random key that the content of frequency call is encrypted, in this way, ensureing that video calling both sides are legal terminal In the case of, randomness, the uniqueness for the key for carrying out video calling content-encrypt every time are ensure that, significantly The security of video calling is improved, improves Consumer's Experience.
When actually implementing, the mutual authentication process of first terminal and second terminal can be to mutual numeral The verification process of certificate;The digital certificate can be the user certificate that authentication center issues, the digital certificate In can include at least one of:User's mark, client public key, certificate authority time and certificate validity Deng;And first terminal and certification and cipher key agreement process of the second terminal to digital certificate can use it is any can To realize the certification and obtain the AES of the random key.
In one embodiment, first terminal carries out mutual authentication with the second terminal, and leads in mutual authentication Later carrying out key agreement can be included with generating the detailed process of random key:
First terminal generates random number R, based on the random number R using default AES and described the Two terminals carry out mutual digital certificate authentication, and in the certification by rear, are carried out with the second terminal Key agreement is to generate random key;The random key and the random number R positive correlation.
Step 103:The audio/video information of collection is encrypted based on the random key, and sends encryption Audio/video information afterwards gives the second terminal, so that the second terminal is solved based on the random key Obtained after close and play the audio/video information.
When actually implementing, first terminal is consulted after obtaining the random key with second terminal, can pass through letter Breath acquisition module realizes that audio/video information (audio frequency and video analog signal) gathers, then by coding module to adopting The audio/video information of collection is encoded, and audio, video data is compressed using digital compression technology, to reduce Transmission bandwidth, the encryption to the audio/video information after processing is then realized by encrypting module, and then improved Security of the audio/video information in transmitting procedure, the sound after encryption is regarded finally by service server Frequency information is transmitted to second terminal, accordingly, after second terminal receives the audio/video information after the encryption, It can be decrypted by deciphering module using the random key, after then being realized by decoder module to coding Audio, video data decoding, the broadcasting of audio frequency and video is realized finally by playing module;Realize that above-mentioned video leads to A kind of system schematic of words is as shown in Figure 2.
Here, audio, video data can be encrypted and decrypted using symmetry algorithm, realizes that security video is conversed.
Sent it should be noted that first terminal and second terminal are both information in video call process is carried out End and information receiving end, first terminal also carry out sound while carrying out audio/video information encryption and sending Reception and decryption, the broadcasting of video information.
In actual application, first terminal, can be to for this video after it is determined that video calling terminates The random key of call is purged, and is more prevented while memory space is saved to establishing video next time The interference of call, because encryption key is randomly generated used by video calling each time, possess only One property and disposable.
Embodiment two
Fig. 3 is video call method schematic flow sheet in the embodiment of the present invention, and Fig. 4 is in the embodiment of the present invention Video calling signaling time-sequence figure;Methods described is applied to first terminal, as shown in Figure 3, Figure 4, the present invention Video call method includes in embodiment:
Step 301:First terminal sends video calling and asked to second terminal, and is receiving second terminal hair During the data communications requests sent, establish and communicated to connect with the data of second terminal.
Here, the data communications requests are sent after the second terminal receives the video calling request , the data communications requests establish data communication channel for negotiation, and when actually implementing, second Before terminal receives the video calling request, sustainable jingle bell.
Based on embodiment of the present invention, in actual applications, establish and communicated to connect with the data of second terminal Before, methods described also includes:
First terminal and second terminal carry out user's registration on service server, and are based on user's registration information Log on to the service server;The server preserves user's registration information;
In the present embodiment, the service server, first terminal and second terminal are additionally operable in video calling During carry out communication data forwarding.
Step 302:First terminal carries out mutual authentication with second terminal, and passes through rear progress in mutual authentication Key agreement is to generate random key.
Here, if first terminal and second terminal mutual authentication are by the way that is, second terminal authenticates to first terminal Not by or first terminal to the authentication of second terminal not by just terminating this handling process;When the first end With second terminal mutual authentication by rear, negotiation generation is only used for adding the content of this video calling at end Close random key, in this way, in the case where ensureing that video calling both sides are legal terminal, it ensure that every Randomness, the uniqueness of the secondary key for carrying out video calling content-encrypt, substantially increase the peace of video calling Quan Xing, improve Consumer's Experience;
First terminal and second terminal carry out mutual authentication, and mutual authentication by rear progress key agreement with A specific embodiment for generating random key can be with as shown in figure 5, comprise the following steps:
Step 501:First terminal generates random number R, and elliptic curve is used based on the random number R Y is calculated in (ECC, Elliptic Curves Cryptography)1=RP, and send M1=Y1||CertA To second terminal.
Here, P is prime number, and CertA is the digital certificate of first terminal.
In embodiments of the present invention, it may each comprise following letter in first terminal and the digital certificate of second terminal At least one breath:User's mark, client public key, certificate authority time and certificate validity etc..
Step 502:Second terminal is verified to the digital certificate of first terminal, is calculated when being verified And send M2=Y2||CertB||h(CertB||Y1b||Y2a) give first terminal.
Here, second terminal is by verifying that the digital certificate of first terminal judges the legitimacy of the first terminal, It is obstructed out-of-date when verifying, terminate handling process, it is whole to second to continue follow-up first terminal when being verified Hold the checking of legitimacy;
Wherein, the random number that R ' generate for second terminal, RbFor the private key of second terminal.
Y is calculated when second terminal is verified to first terminal2=R ' P, Y1b=Rb Y1、Y2a=R ' Ya、 And h (CertB | | Y1b||Y2a), and then obtain M2=Y2||CertB||h(CertB||Y1b||Y2a);
Wherein, CertB is the digital certificate of second terminal.
Step 503:First terminal is verified to the digital certificate of second terminal, is calculated when being verified And send h (CertB | | Y1b' | | Y2a') give second terminal.
Here, when first terminal to the legitimate verification of second terminal by after, carry out cipher key agreement process; Wherein, RaFor the private key of second terminal;First terminal and the private key of second terminal are equal in embodiments of the present invention Prestore.
Y is calculated when first terminal is verified to second terminal1b'=RYb、Y2a'=Ra Y2, and then obtain h(CertB||Y1b' | | Y2a').
Step 504:H that second terminal is sent based on first terminal (CertB | | Y1b' | | Y2a') obtain close Key K=Y1b'=RYb=Y1b=RbY1=RRbP。
Here, first terminal is sent when second terminal h (CertB | | Y1b' | | Y2aAfter ') being verified, The calculating of key can be carried out, passes through the calculation formula K=RR of keybP understands that key is produced by first terminal Random number R and second terminal private key RbDetermine, and the two is not transmitted in a network, attacker passes through The public key transmitted in network, it is difficult to release, in this way, the encryption of video call data is carried out using the key, The security of video calling is considerably increased, and due to random number caused by each video calling first terminal not It is different with the random key that result in progress video calling every time, it ensure again that the safety of user video call Property, meet the demand that higher user is required call privacy significantly.
Step 303:First terminal carries out audio/video information collection, and using the random key to collection Audio/video information be encrypted, and send encryption after audio/video information to the second terminal.
When actually implementing, after first terminal collection audio/video information, based on the random key pair for consulting to obtain The information of collection is encrypted, and the audio/video information after encryption then is sent into second eventually through service server End;Here, audio, video data can be encrypted and decrypted using symmetry algorithm, realizes that security video is conversed.
Step 304:Second terminal obtains after entering row information decryption based on the random key and plays the sound Video information.
Sent it should be noted that first terminal and second terminal are both information in video call process is carried out End and information receiving end, first terminal also carry out sound while carrying out audio/video information encryption and sending Reception and decryption, the broadcasting of video information, likewise, connecing for audio/video information is being encrypted in second terminal While receiving, decrypt and play, the process of collection, encryption and the transmission of audio/video information is also carried out.
Step 305:First terminal determines that video calling terminates, and removes the random key.
Here, first terminal is only used for this video calling after it is determined that video calling terminates described in removing Random key, done in this way, more being prevented while memory space is saved to establishing video calling next time Disturb.
Embodiment three
Fig. 6 is the composition structural representation of terminal in the embodiment of the present invention, and the terminal is first terminal, such as Shown in Fig. 6, the composition of terminal includes in the embodiment of the present invention:Data communication module 61, authentication module 62 And processing module 63;Wherein,
The data communication module 61, communicated to connect for establishing with the data of second terminal;
The authentication module 62, for carrying out mutual authentication with the second terminal, and pass through in mutual authentication Key agreement is carried out afterwards to generate random key;
The processing module 63, for the audio/video information of collection to be encrypted based on the random key, And the audio/video information after encryption is sent to the second terminal, so that the second terminal is based on described random Key obtains after being decrypted and plays the audio/video information.
In one embodiment, the data communication module 61, it is additionally operable to carry out user's note on service server Volume, and the service server is logged on to based on user's registration information.
In one embodiment, the data communication module 61, it is additionally operable to receive the base that the second terminal is sent Audio/video information after random key encryption;
The processing module 63, it is additionally operable to based on the random key to the audio frequency and video after the encryption of reception Information is decrypted, to obtain corresponding audio/video information and play.
In one embodiment, the authentication module 62, it is additionally operable to generate random number R, based on the random number R carries out mutual digital certificate authentication using default AES and the second terminal, and recognizes described After card passes through, key agreement is carried out with the second terminal to generate random key;The random key and institute State random number R positive correlation.
In one embodiment, the data communication module 61, it is additionally operable to send video calling and asks to described the Two terminals, and when receiving the data communications requests that the second terminal is sent, establish and the second terminal Data communication connection;Wherein, the data communications requests are to receive the video in the second terminal to lead to Sent after words request.
In one embodiment, the processing module 63, it is additionally operable at the end of determining the video calling, removes The random key, in this way, more being prevented while memory space is saved to establishing video calling next time Interference.
In embodiments of the present invention, the data communication module 61 in the terminal, authentication module 62 and processing Module 63, can be by the central processing unit (CPU, Central Processing Unit) or numeral in terminal Signal processor (DSP, Digital Signal Processor) or field programmable gate array (FPGA, Field Programmable Gate Array) or integrated circuit (ASIC, Application Specific Integrated Circuit) realize.
It need to be noted that be:Above is referred to the description of terminal, be with above method description it is similar, together The beneficial effect description of method, is not repeated.For the technology not disclosed in terminal embodiment of the present invention Details, it refer to the description of the inventive method embodiment.
It will be appreciated by those skilled in the art that:Realize that all or part of step of above method embodiment can be with Completed by the related hardware of programmed instruction, foregoing program can be stored in a computer-readable storage In medium, the program upon execution, execution the step of including above method embodiment;And foregoing storage is situated between Matter includes:Movable storage device, random access memory (RAM, Random Access Memory), Read-only storage (ROM, Read-Only Memory), magnetic disc or CD etc. are various can be with storage program The medium of code.
Or if the above-mentioned integrated unit of the present invention is realized in the form of software function module and as independently Production marketing or in use, can also be stored in a computer read/write memory medium.Based on so Understanding, the part that the technical scheme of the embodiment of the present invention substantially contributes to correlation technique in other words can To be embodied in the form of software product, the computer software product is stored in a storage medium, bag Some instructions are included to so that a computer equipment (can be personal computer, server or network Equipment etc.) perform all or part of each embodiment methods described of the present invention.And foregoing storage medium bag Include:Movable storage device, RAM, ROM, magnetic disc or CD etc. are various can be with Jie of store program codes Matter.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited to This, any one skilled in the art the invention discloses technical scope in, can readily occur in Change or replacement, it should all be included within the scope of the present invention.Therefore, protection scope of the present invention should It is defined by the scope of the claims.

Claims (10)

1. a kind of video call method, it is characterised in that applied to first terminal, methods described includes:
Establish and communicated to connect with the data of second terminal;
Mutual authentication is carried out with the second terminal, and key agreement is carried out by rear to generate in mutual authentication Random key;
The audio/video information of collection is encrypted based on the random key, and sends the audio frequency and video after encryption Information gives the second terminal, so that the second terminal is obtained simultaneously after being decrypted based on the random key Play the audio/video information.
2. according to the method for claim 1, it is characterised in that methods described also includes:
Audio/video information after receive that the second terminal sends encrypted based on the random key, and be based on Audio/video information after the encryption of reception is decrypted the random key, is regarded with obtaining corresponding sound Frequency information simultaneously plays.
3. method according to claim 1 or 2, it is characterised in that described to enter with the second terminal Row mutual authentication, and key agreement is carried out to generate random key by rear in mutual authentication, including:
Random number R is generated, is entered based on the random number R using default AES with the second terminal The mutual digital certificate authentication of row, and in the certification by rear, key agreement is carried out with the second terminal To generate random key;The random key and the random number R positive correlation.
4. method according to claim 1 or 2, it is characterised in that the foundation and second terminal Data communicate to connect, including:
Send video calling to ask to the second terminal, and lead in the data for receiving the second terminal transmission During letter request, establish and communicated to connect with the data of the second terminal;Wherein, the data communications requests are Sent after the second terminal receives the video calling request.
5. method according to claim 1 or 2, it is characterised in that methods described also includes:
Determine that the video calling terminates, remove the random key.
6. a kind of terminal, it is characterised in that the terminal includes:Data communication module, authentication module and place Manage module;Wherein,
The data communication module, communicated to connect for establishing with the data of second terminal;
The authentication module, for carrying out mutual authentication with the second terminal, and pass through in mutual authentication rear Key agreement is carried out to generate random key;
The processing module, for the audio/video information of collection to be encrypted based on the random key, and The audio/video information after encryption is sent to the second terminal so that the second terminal be based on it is described with secret Key obtains after being decrypted and plays the audio/video information.
7. terminal according to claim 6, it is characterised in that the data communication module, be additionally operable to Audio/video information after receive that the second terminal sends encrypted based on the random key;
The processing module, it is additionally operable to believe the audio frequency and video after the encryption of reception based on the random key Breath is decrypted, to obtain corresponding audio/video information and play.
8. the terminal according to claim 6 or 7, it is characterised in that the authentication module, be additionally operable to Random number R is generated, phase is carried out using default AES and the second terminal based on the random number R Mutual digital certificate authentication, and in the certification by rear, key agreement is carried out with life with the second terminal Into random key;The random key and the random number R positive correlation.
9. the terminal according to claim 6 or 7, it is characterised in that the data communication module, also Ask to the second terminal for sending video calling, and lead in the data for receiving the second terminal transmission During letter request, establish and communicated to connect with the data of the second terminal;Wherein, the data communications requests are Sent after the second terminal receives the video calling request.
10. the terminal according to claim 6 or 7, it is characterised in that the processing module, also use In it is determined that at the end of the video calling, the random key is removed.
CN201610349424.8A 2016-05-24 2016-05-24 A kind of video call method and terminal Pending CN107426521A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610349424.8A CN107426521A (en) 2016-05-24 2016-05-24 A kind of video call method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610349424.8A CN107426521A (en) 2016-05-24 2016-05-24 A kind of video call method and terminal

Publications (1)

Publication Number Publication Date
CN107426521A true CN107426521A (en) 2017-12-01

Family

ID=60422617

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610349424.8A Pending CN107426521A (en) 2016-05-24 2016-05-24 A kind of video call method and terminal

Country Status (1)

Country Link
CN (1) CN107426521A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109359472A (en) * 2018-09-19 2019-02-19 腾讯科技(深圳)有限公司 A kind of data encrypting and deciphering processing method, device and relevant device
CN112565656A (en) * 2020-11-27 2021-03-26 Oppo广东移动通信有限公司 Video call method, device, system, electronic equipment and storage medium
CN112929679A (en) * 2021-01-18 2021-06-08 广州虎牙科技有限公司 Method and device for detecting legality of live client and identifying plug-in behavior
CN113132666A (en) * 2019-12-30 2021-07-16 Tcl新技术(惠州)有限公司 Audio and video sending method, receiving method, terminal and audio and video transmission system
CN114760500A (en) * 2022-03-24 2022-07-15 海南乾唐视联信息技术有限公司 Audio and video data encryption method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1921669A (en) * 2005-08-22 2007-02-28 索尼爱立信移动通信日本株式会社 Mobile phone, communication terminal, phone call method and phone call program
US20080307225A1 (en) * 2005-02-01 2008-12-11 Jens-Uwe Busser Method For Locking on to Encrypted Communication Connections in a Packet-Oriented Network
US20090319770A1 (en) * 2006-04-21 2009-12-24 Nokia Siemens Networks Gmbh & Co., Kg. Method, devices and computer program product for encoding and decoding media data
CN101635823A (en) * 2009-08-27 2010-01-27 中兴通讯股份有限公司 Method and system of terminal for encrypting videoconference data
CN102035646A (en) * 2010-12-24 2011-04-27 北京工业大学 Mixed key agreement method for enhancing protection
CN103974241A (en) * 2013-02-05 2014-08-06 东南大学常州研究院 Voice end-to-end encryption method aiming at mobile terminal with Android system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080307225A1 (en) * 2005-02-01 2008-12-11 Jens-Uwe Busser Method For Locking on to Encrypted Communication Connections in a Packet-Oriented Network
CN1921669A (en) * 2005-08-22 2007-02-28 索尼爱立信移动通信日本株式会社 Mobile phone, communication terminal, phone call method and phone call program
US20090319770A1 (en) * 2006-04-21 2009-12-24 Nokia Siemens Networks Gmbh & Co., Kg. Method, devices and computer program product for encoding and decoding media data
CN101635823A (en) * 2009-08-27 2010-01-27 中兴通讯股份有限公司 Method and system of terminal for encrypting videoconference data
CN102035646A (en) * 2010-12-24 2011-04-27 北京工业大学 Mixed key agreement method for enhancing protection
CN103974241A (en) * 2013-02-05 2014-08-06 东南大学常州研究院 Voice end-to-end encryption method aiming at mobile terminal with Android system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109359472A (en) * 2018-09-19 2019-02-19 腾讯科技(深圳)有限公司 A kind of data encrypting and deciphering processing method, device and relevant device
CN109359472B (en) * 2018-09-19 2021-06-25 腾讯科技(深圳)有限公司 Data encryption and decryption processing method and device and related equipment
CN113132666A (en) * 2019-12-30 2021-07-16 Tcl新技术(惠州)有限公司 Audio and video sending method, receiving method, terminal and audio and video transmission system
CN112565656A (en) * 2020-11-27 2021-03-26 Oppo广东移动通信有限公司 Video call method, device, system, electronic equipment and storage medium
CN112929679A (en) * 2021-01-18 2021-06-08 广州虎牙科技有限公司 Method and device for detecting legality of live client and identifying plug-in behavior
CN112929679B (en) * 2021-01-18 2024-03-01 广州虎牙科技有限公司 Method and device for detecting validity of live client and identifying plug-in behavior
CN114760500A (en) * 2022-03-24 2022-07-15 海南乾唐视联信息技术有限公司 Audio and video data encryption method and device

Similar Documents

Publication Publication Date Title
WO2017097041A1 (en) Data transmission method and device
JP4263384B2 (en) Improved method for authentication of user subscription identification module
CN103763356B (en) A kind of SSL establishment of connection method, apparatus and system
CN107358441B (en) Payment verification method and system, mobile device and security authentication device
CN107426521A (en) A kind of video call method and terminal
KR101556654B1 (en) Method for processing video telecommunication and apparatus for the same
CN111756529B (en) Quantum session key distribution method and system
JP2005102163A (en) Equipment authentication system, server, method and program, terminal and storage medium
EP3844990A1 (en) Method and device to establish a wireless secure link while maintaining privacy against tracking
JP2007529162A (en) Cryptographic communication system, communication device
CN111552270B (en) Safety authentication and data transmission method and device for vehicle-mounted diagnosis
US8230218B2 (en) Mobile station authentication in tetra networks
CN112602290B (en) Identity authentication method and device and readable storage medium
WO2016095473A1 (en) Security call method, terminal and system, and computer storage medium
CN111756528B (en) Quantum session key distribution method, device and communication architecture
CN107094156A (en) A kind of safety communicating method and system based on P2P patterns
CN103974255A (en) System and method for vehicle access
CN112165386B (en) Data encryption method and system based on ECDSA
CN103973696A (en) Data processing method of voice communication
CN107483429A (en) A kind of data ciphering method and device
CN104243452A (en) Method and system for cloud computing access control
CN114331456A (en) Communication method, device, system and readable storage medium
CN102916810A (en) Method, system and apparatus for authenticating sensor
WO2019037422A1 (en) Key and key handle generation method and system, and smart key security device
CN114696999A (en) Identity authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171201