CN107426521A - A kind of video call method and terminal - Google Patents
A kind of video call method and terminal Download PDFInfo
- Publication number
- CN107426521A CN107426521A CN201610349424.8A CN201610349424A CN107426521A CN 107426521 A CN107426521 A CN 107426521A CN 201610349424 A CN201610349424 A CN 201610349424A CN 107426521 A CN107426521 A CN 107426521A
- Authority
- CN
- China
- Prior art keywords
- terminal
- audio
- video
- key
- random key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/14—Systems for two-way working
- H04N7/141—Systems for two-way working between two video terminals, e.g. videophone
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses a kind of video call method and terminal, methods described is applied to first terminal, including:Establish and communicated to connect with the data of second terminal;Mutual authentication is carried out with the second terminal, and key agreement is carried out by rear to generate random key in mutual authentication;The audio/video information of collection is encrypted based on the random key, and sends the audio/video information after encryption to the second terminal, so that the second terminal is obtained after being decrypted based on the random key and plays the audio/video information.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of video call method and terminal.
Background technology
With the rapid development of network and intelligent terminal, the social activity that video calling has progressed into people is raw
It is living, but existing vt applications, such as QQ, the video call function of wechat offer, be all with
Carry out data transmission in plain text, in communication process, it is easy to be illegally listened, steal call-information, pacify
Full property is very poor.
Therefore it provides a kind of video calling scheme, can ensure the security of video calling, improve user's body
Test, it has also become urgent problem to be solved.
The content of the invention
The embodiment of the present invention provides a kind of video call method and terminal, solve at least and exists in the prior art
The problem of, the security of video calling can be ensured, improve Consumer's Experience.
What the technical scheme of the embodiment of the present invention was realized in:
The embodiments of the invention provide a kind of video call method, and applied to first terminal, methods described includes:
Establish and communicated to connect with the data of second terminal;
Mutual authentication is carried out with the second terminal, and key agreement is carried out by rear to generate in mutual authentication
Random key;
The audio/video information of collection is encrypted based on the random key, and sends the audio frequency and video after encryption
Information gives the second terminal, so that the second terminal is obtained simultaneously after being decrypted based on the random key
Play the audio/video information.
In such scheme, methods described also includes:
Audio/video information after receive that the second terminal sends encrypted based on the random key, and be based on
Audio/video information after the encryption of reception is decrypted the random key, is regarded with obtaining corresponding sound
Frequency information simultaneously plays.
It is described that mutual authentication is carried out with the second terminal in such scheme, and pass through in mutual authentication laggard
Row key agreement to generate random key, including:
Random number R is generated, is entered based on the random number R using default AES with the second terminal
The mutual digital certificate authentication of row, and in the certification by rear, key agreement is carried out with the second terminal
To generate random key;The random key and the random number R positive correlation.
In such scheme, the foundation and the data of second terminal communicate to connect, including:
Send video calling to ask to the second terminal, and lead in the data for receiving the second terminal transmission
During letter request, establish and communicated to connect with the data of the second terminal;Wherein, the data communications requests are
Sent after the second terminal receives the video calling request.
In such scheme, methods described also includes:
Determine that the video calling terminates, remove the random key.
The embodiment of the present invention additionally provides a kind of terminal, and the terminal includes:Data communication module, authentication mould
Block and processing module;Wherein,
The data communication module, communicated to connect for establishing with the data of second terminal;
The authentication module, for carrying out mutual authentication with the second terminal, and pass through in mutual authentication rear
Key agreement is carried out to generate random key;
The processing module, for the audio/video information of collection to be encrypted based on the random key, and
The audio/video information after encryption is sent to the second terminal so that the second terminal be based on it is described with secret
Key obtains after being decrypted and plays the audio/video information.
In such scheme, the data communication module is additionally operable to receive that the second terminal sends based on institute
State the audio/video information after random key encryption;
The processing module, it is additionally operable to believe the audio frequency and video after the encryption of reception based on the random key
Breath is decrypted, to obtain corresponding audio/video information and play.
In such scheme, the authentication module, it is additionally operable to generate random number R, is adopted based on the random number R
Mutual digital certificate authentication is carried out with default AES and the second terminal, and is led in the certification
Later, key agreement is carried out with the second terminal to generate random key;The random key with it is described with
Machine number R positive correlations.
In such scheme, the data communication module, it is additionally operable to transmission video calling and asks to described second eventually
End, and when receiving the data communications requests that the second terminal is sent, establish the number with the second terminal
According to communication connection;Wherein, the data communications requests are to receive the video calling in the second terminal to ask
Sent after asking.
In such scheme, the processing module, it is additionally operable at the end of determining the video calling, described in removing
Random key.
In embodiments of the present invention, first terminal is established communicates to connect with the data of second terminal, with described the
Two terminals carry out mutual authentication, and carry out key agreement by rear to generate random key, base in mutual authentication
The audio/video information of collection is encrypted in the random key, and send encryption after audio/video information to
The second terminal, so that the second terminal is obtained after being decrypted based on the random key and plays institute
State audio/video information;In this way, the video call data between first terminal and second terminal passes through random key
It is encrypted, ensure that the security of video calling, meets the use higher to Content of Communication security requirement
The demand at family, improves Consumer's Experience.
Brief description of the drawings
Fig. 1 is video call method schematic flow sheet one in the embodiment of the present invention;
Fig. 2 is video call system schematic diagram in the embodiment of the present invention;
Fig. 3 is video call method schematic flow sheet two in the embodiment of the present invention;
Fig. 4 is video calling signaling time-sequence figure in the embodiment of the present invention;
Fig. 5 is that first terminal carries out mutual authentication with second terminal and led in mutual authentication in the embodiment of the present invention
Later the method flow schematic diagram of key agreement is carried out;
Fig. 6 is the composition structural representation of terminal in the embodiment of the present invention.
Embodiment
In embodiments of the present invention, first terminal is established communicates to connect with the data of second terminal, with described the
Two terminals carry out mutual authentication, and carry out key agreement by rear to generate random key, base in mutual authentication
The audio/video information of collection is encrypted in the random key, and send encryption after audio/video information to
The second terminal, so that the second terminal is obtained after being decrypted based on the random key and plays institute
State audio/video information.
In various embodiments of the present invention, the first terminal and second terminal include but is not limited to such as intelligent hand
Machine, PAD (tablet personal computer) etc. mobile terminal, and the fixed terminal of such as desktop computer, with reference to
The drawings and specific embodiments are described in further detail to the present invention.
Embodiment one
Fig. 1 is video call method schematic flow sheet in the embodiment of the present invention, and methods described is applied to first eventually
End, as shown in figure 1, video call method includes in the embodiment of the present invention:
Step 101:Establish and communicated to connect with the data of second terminal.
Here, first terminal send video calling request after, second terminal receive the video calling please
After asking, jingle bell is returned to before user connects the video calling to first terminal, when described in second terminal receiving
Data communications requests are sent after video calling request to first terminal, to establish between first terminal and second terminal
Data communication connection, and then carry out follow-up authentication and key agreement.
When actually implementing, this step foregoing description method also includes:First terminal and second terminal exist respectively
User's registration is carried out on service server, and the service server is logged on to based on user's registration information;
The service server, is additionally operable to first terminal and second terminal is communicated in video call process
Data forwarding.
Step 102:Mutual authentication is carried out with the second terminal, and passes through rear carry out key in mutual authentication
Consult to generate random key.
Here, when first terminal and second terminal mutual authentication by after, consult generation and be only used for regarding this
The random key that the content of frequency call is encrypted, in this way, ensureing that video calling both sides are legal terminal
In the case of, randomness, the uniqueness for the key for carrying out video calling content-encrypt every time are ensure that, significantly
The security of video calling is improved, improves Consumer's Experience.
When actually implementing, the mutual authentication process of first terminal and second terminal can be to mutual numeral
The verification process of certificate;The digital certificate can be the user certificate that authentication center issues, the digital certificate
In can include at least one of:User's mark, client public key, certificate authority time and certificate validity
Deng;And first terminal and certification and cipher key agreement process of the second terminal to digital certificate can use it is any can
To realize the certification and obtain the AES of the random key.
In one embodiment, first terminal carries out mutual authentication with the second terminal, and leads in mutual authentication
Later carrying out key agreement can be included with generating the detailed process of random key:
First terminal generates random number R, based on the random number R using default AES and described the
Two terminals carry out mutual digital certificate authentication, and in the certification by rear, are carried out with the second terminal
Key agreement is to generate random key;The random key and the random number R positive correlation.
Step 103:The audio/video information of collection is encrypted based on the random key, and sends encryption
Audio/video information afterwards gives the second terminal, so that the second terminal is solved based on the random key
Obtained after close and play the audio/video information.
When actually implementing, first terminal is consulted after obtaining the random key with second terminal, can pass through letter
Breath acquisition module realizes that audio/video information (audio frequency and video analog signal) gathers, then by coding module to adopting
The audio/video information of collection is encoded, and audio, video data is compressed using digital compression technology, to reduce
Transmission bandwidth, the encryption to the audio/video information after processing is then realized by encrypting module, and then improved
Security of the audio/video information in transmitting procedure, the sound after encryption is regarded finally by service server
Frequency information is transmitted to second terminal, accordingly, after second terminal receives the audio/video information after the encryption,
It can be decrypted by deciphering module using the random key, after then being realized by decoder module to coding
Audio, video data decoding, the broadcasting of audio frequency and video is realized finally by playing module;Realize that above-mentioned video leads to
A kind of system schematic of words is as shown in Figure 2.
Here, audio, video data can be encrypted and decrypted using symmetry algorithm, realizes that security video is conversed.
Sent it should be noted that first terminal and second terminal are both information in video call process is carried out
End and information receiving end, first terminal also carry out sound while carrying out audio/video information encryption and sending
Reception and decryption, the broadcasting of video information.
In actual application, first terminal, can be to for this video after it is determined that video calling terminates
The random key of call is purged, and is more prevented while memory space is saved to establishing video next time
The interference of call, because encryption key is randomly generated used by video calling each time, possess only
One property and disposable.
Embodiment two
Fig. 3 is video call method schematic flow sheet in the embodiment of the present invention, and Fig. 4 is in the embodiment of the present invention
Video calling signaling time-sequence figure;Methods described is applied to first terminal, as shown in Figure 3, Figure 4, the present invention
Video call method includes in embodiment:
Step 301:First terminal sends video calling and asked to second terminal, and is receiving second terminal hair
During the data communications requests sent, establish and communicated to connect with the data of second terminal.
Here, the data communications requests are sent after the second terminal receives the video calling request
, the data communications requests establish data communication channel for negotiation, and when actually implementing, second
Before terminal receives the video calling request, sustainable jingle bell.
Based on embodiment of the present invention, in actual applications, establish and communicated to connect with the data of second terminal
Before, methods described also includes:
First terminal and second terminal carry out user's registration on service server, and are based on user's registration information
Log on to the service server;The server preserves user's registration information;
In the present embodiment, the service server, first terminal and second terminal are additionally operable in video calling
During carry out communication data forwarding.
Step 302:First terminal carries out mutual authentication with second terminal, and passes through rear progress in mutual authentication
Key agreement is to generate random key.
Here, if first terminal and second terminal mutual authentication are by the way that is, second terminal authenticates to first terminal
Not by or first terminal to the authentication of second terminal not by just terminating this handling process;When the first end
With second terminal mutual authentication by rear, negotiation generation is only used for adding the content of this video calling at end
Close random key, in this way, in the case where ensureing that video calling both sides are legal terminal, it ensure that every
Randomness, the uniqueness of the secondary key for carrying out video calling content-encrypt, substantially increase the peace of video calling
Quan Xing, improve Consumer's Experience;
First terminal and second terminal carry out mutual authentication, and mutual authentication by rear progress key agreement with
A specific embodiment for generating random key can be with as shown in figure 5, comprise the following steps:
Step 501:First terminal generates random number R, and elliptic curve is used based on the random number R
Y is calculated in (ECC, Elliptic Curves Cryptography)1=RP, and send M1=Y1||CertA
To second terminal.
Here, P is prime number, and CertA is the digital certificate of first terminal.
In embodiments of the present invention, it may each comprise following letter in first terminal and the digital certificate of second terminal
At least one breath:User's mark, client public key, certificate authority time and certificate validity etc..
Step 502:Second terminal is verified to the digital certificate of first terminal, is calculated when being verified
And send M2=Y2||CertB||h(CertB||Y1b||Y2a) give first terminal.
Here, second terminal is by verifying that the digital certificate of first terminal judges the legitimacy of the first terminal,
It is obstructed out-of-date when verifying, terminate handling process, it is whole to second to continue follow-up first terminal when being verified
Hold the checking of legitimacy;
Wherein, the random number that R ' generate for second terminal, RbFor the private key of second terminal.
Y is calculated when second terminal is verified to first terminal2=R ' P, Y1b=Rb Y1、Y2a=R ' Ya、
And h (CertB | | Y1b||Y2a), and then obtain M2=Y2||CertB||h(CertB||Y1b||Y2a);
Wherein, CertB is the digital certificate of second terminal.
Step 503:First terminal is verified to the digital certificate of second terminal, is calculated when being verified
And send h (CertB | | Y1b' | | Y2a') give second terminal.
Here, when first terminal to the legitimate verification of second terminal by after, carry out cipher key agreement process;
Wherein, RaFor the private key of second terminal;First terminal and the private key of second terminal are equal in embodiments of the present invention
Prestore.
Y is calculated when first terminal is verified to second terminal1b'=RYb、Y2a'=Ra Y2, and then obtain
h(CertB||Y1b' | | Y2a').
Step 504:H that second terminal is sent based on first terminal (CertB | | Y1b' | | Y2a') obtain close
Key K=Y1b'=RYb=Y1b=RbY1=RRbP。
Here, first terminal is sent when second terminal h (CertB | | Y1b' | | Y2aAfter ') being verified,
The calculating of key can be carried out, passes through the calculation formula K=RR of keybP understands that key is produced by first terminal
Random number R and second terminal private key RbDetermine, and the two is not transmitted in a network, attacker passes through
The public key transmitted in network, it is difficult to release, in this way, the encryption of video call data is carried out using the key,
The security of video calling is considerably increased, and due to random number caused by each video calling first terminal not
It is different with the random key that result in progress video calling every time, it ensure again that the safety of user video call
Property, meet the demand that higher user is required call privacy significantly.
Step 303:First terminal carries out audio/video information collection, and using the random key to collection
Audio/video information be encrypted, and send encryption after audio/video information to the second terminal.
When actually implementing, after first terminal collection audio/video information, based on the random key pair for consulting to obtain
The information of collection is encrypted, and the audio/video information after encryption then is sent into second eventually through service server
End;Here, audio, video data can be encrypted and decrypted using symmetry algorithm, realizes that security video is conversed.
Step 304:Second terminal obtains after entering row information decryption based on the random key and plays the sound
Video information.
Sent it should be noted that first terminal and second terminal are both information in video call process is carried out
End and information receiving end, first terminal also carry out sound while carrying out audio/video information encryption and sending
Reception and decryption, the broadcasting of video information, likewise, connecing for audio/video information is being encrypted in second terminal
While receiving, decrypt and play, the process of collection, encryption and the transmission of audio/video information is also carried out.
Step 305:First terminal determines that video calling terminates, and removes the random key.
Here, first terminal is only used for this video calling after it is determined that video calling terminates described in removing
Random key, done in this way, more being prevented while memory space is saved to establishing video calling next time
Disturb.
Embodiment three
Fig. 6 is the composition structural representation of terminal in the embodiment of the present invention, and the terminal is first terminal, such as
Shown in Fig. 6, the composition of terminal includes in the embodiment of the present invention:Data communication module 61, authentication module 62
And processing module 63;Wherein,
The data communication module 61, communicated to connect for establishing with the data of second terminal;
The authentication module 62, for carrying out mutual authentication with the second terminal, and pass through in mutual authentication
Key agreement is carried out afterwards to generate random key;
The processing module 63, for the audio/video information of collection to be encrypted based on the random key,
And the audio/video information after encryption is sent to the second terminal, so that the second terminal is based on described random
Key obtains after being decrypted and plays the audio/video information.
In one embodiment, the data communication module 61, it is additionally operable to carry out user's note on service server
Volume, and the service server is logged on to based on user's registration information.
In one embodiment, the data communication module 61, it is additionally operable to receive the base that the second terminal is sent
Audio/video information after random key encryption;
The processing module 63, it is additionally operable to based on the random key to the audio frequency and video after the encryption of reception
Information is decrypted, to obtain corresponding audio/video information and play.
In one embodiment, the authentication module 62, it is additionally operable to generate random number R, based on the random number
R carries out mutual digital certificate authentication using default AES and the second terminal, and recognizes described
After card passes through, key agreement is carried out with the second terminal to generate random key;The random key and institute
State random number R positive correlation.
In one embodiment, the data communication module 61, it is additionally operable to send video calling and asks to described the
Two terminals, and when receiving the data communications requests that the second terminal is sent, establish and the second terminal
Data communication connection;Wherein, the data communications requests are to receive the video in the second terminal to lead to
Sent after words request.
In one embodiment, the processing module 63, it is additionally operable at the end of determining the video calling, removes
The random key, in this way, more being prevented while memory space is saved to establishing video calling next time
Interference.
In embodiments of the present invention, the data communication module 61 in the terminal, authentication module 62 and processing
Module 63, can be by the central processing unit (CPU, Central Processing Unit) or numeral in terminal
Signal processor (DSP, Digital Signal Processor) or field programmable gate array (FPGA,
Field Programmable Gate Array) or integrated circuit (ASIC, Application Specific
Integrated Circuit) realize.
It need to be noted that be:Above is referred to the description of terminal, be with above method description it is similar, together
The beneficial effect description of method, is not repeated.For the technology not disclosed in terminal embodiment of the present invention
Details, it refer to the description of the inventive method embodiment.
It will be appreciated by those skilled in the art that:Realize that all or part of step of above method embodiment can be with
Completed by the related hardware of programmed instruction, foregoing program can be stored in a computer-readable storage
In medium, the program upon execution, execution the step of including above method embodiment;And foregoing storage is situated between
Matter includes:Movable storage device, random access memory (RAM, Random Access Memory),
Read-only storage (ROM, Read-Only Memory), magnetic disc or CD etc. are various can be with storage program
The medium of code.
Or if the above-mentioned integrated unit of the present invention is realized in the form of software function module and as independently
Production marketing or in use, can also be stored in a computer read/write memory medium.Based on so
Understanding, the part that the technical scheme of the embodiment of the present invention substantially contributes to correlation technique in other words can
To be embodied in the form of software product, the computer software product is stored in a storage medium, bag
Some instructions are included to so that a computer equipment (can be personal computer, server or network
Equipment etc.) perform all or part of each embodiment methods described of the present invention.And foregoing storage medium bag
Include:Movable storage device, RAM, ROM, magnetic disc or CD etc. are various can be with Jie of store program codes
Matter.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited to
This, any one skilled in the art the invention discloses technical scope in, can readily occur in
Change or replacement, it should all be included within the scope of the present invention.Therefore, protection scope of the present invention should
It is defined by the scope of the claims.
Claims (10)
1. a kind of video call method, it is characterised in that applied to first terminal, methods described includes:
Establish and communicated to connect with the data of second terminal;
Mutual authentication is carried out with the second terminal, and key agreement is carried out by rear to generate in mutual authentication
Random key;
The audio/video information of collection is encrypted based on the random key, and sends the audio frequency and video after encryption
Information gives the second terminal, so that the second terminal is obtained simultaneously after being decrypted based on the random key
Play the audio/video information.
2. according to the method for claim 1, it is characterised in that methods described also includes:
Audio/video information after receive that the second terminal sends encrypted based on the random key, and be based on
Audio/video information after the encryption of reception is decrypted the random key, is regarded with obtaining corresponding sound
Frequency information simultaneously plays.
3. method according to claim 1 or 2, it is characterised in that described to enter with the second terminal
Row mutual authentication, and key agreement is carried out to generate random key by rear in mutual authentication, including:
Random number R is generated, is entered based on the random number R using default AES with the second terminal
The mutual digital certificate authentication of row, and in the certification by rear, key agreement is carried out with the second terminal
To generate random key;The random key and the random number R positive correlation.
4. method according to claim 1 or 2, it is characterised in that the foundation and second terminal
Data communicate to connect, including:
Send video calling to ask to the second terminal, and lead in the data for receiving the second terminal transmission
During letter request, establish and communicated to connect with the data of the second terminal;Wherein, the data communications requests are
Sent after the second terminal receives the video calling request.
5. method according to claim 1 or 2, it is characterised in that methods described also includes:
Determine that the video calling terminates, remove the random key.
6. a kind of terminal, it is characterised in that the terminal includes:Data communication module, authentication module and place
Manage module;Wherein,
The data communication module, communicated to connect for establishing with the data of second terminal;
The authentication module, for carrying out mutual authentication with the second terminal, and pass through in mutual authentication rear
Key agreement is carried out to generate random key;
The processing module, for the audio/video information of collection to be encrypted based on the random key, and
The audio/video information after encryption is sent to the second terminal so that the second terminal be based on it is described with secret
Key obtains after being decrypted and plays the audio/video information.
7. terminal according to claim 6, it is characterised in that the data communication module, be additionally operable to
Audio/video information after receive that the second terminal sends encrypted based on the random key;
The processing module, it is additionally operable to believe the audio frequency and video after the encryption of reception based on the random key
Breath is decrypted, to obtain corresponding audio/video information and play.
8. the terminal according to claim 6 or 7, it is characterised in that the authentication module, be additionally operable to
Random number R is generated, phase is carried out using default AES and the second terminal based on the random number R
Mutual digital certificate authentication, and in the certification by rear, key agreement is carried out with life with the second terminal
Into random key;The random key and the random number R positive correlation.
9. the terminal according to claim 6 or 7, it is characterised in that the data communication module, also
Ask to the second terminal for sending video calling, and lead in the data for receiving the second terminal transmission
During letter request, establish and communicated to connect with the data of the second terminal;Wherein, the data communications requests are
Sent after the second terminal receives the video calling request.
10. the terminal according to claim 6 or 7, it is characterised in that the processing module, also use
In it is determined that at the end of the video calling, the random key is removed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610349424.8A CN107426521A (en) | 2016-05-24 | 2016-05-24 | A kind of video call method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610349424.8A CN107426521A (en) | 2016-05-24 | 2016-05-24 | A kind of video call method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107426521A true CN107426521A (en) | 2017-12-01 |
Family
ID=60422617
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610349424.8A Pending CN107426521A (en) | 2016-05-24 | 2016-05-24 | A kind of video call method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107426521A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109359472A (en) * | 2018-09-19 | 2019-02-19 | 腾讯科技(深圳)有限公司 | A kind of data encrypting and deciphering processing method, device and relevant device |
CN112565656A (en) * | 2020-11-27 | 2021-03-26 | Oppo广东移动通信有限公司 | Video call method, device, system, electronic equipment and storage medium |
CN112929679A (en) * | 2021-01-18 | 2021-06-08 | 广州虎牙科技有限公司 | Method and device for detecting legality of live client and identifying plug-in behavior |
CN113132666A (en) * | 2019-12-30 | 2021-07-16 | Tcl新技术(惠州)有限公司 | Audio and video sending method, receiving method, terminal and audio and video transmission system |
CN114760500A (en) * | 2022-03-24 | 2022-07-15 | 海南乾唐视联信息技术有限公司 | Audio and video data encryption method and device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1921669A (en) * | 2005-08-22 | 2007-02-28 | 索尼爱立信移动通信日本株式会社 | Mobile phone, communication terminal, phone call method and phone call program |
US20080307225A1 (en) * | 2005-02-01 | 2008-12-11 | Jens-Uwe Busser | Method For Locking on to Encrypted Communication Connections in a Packet-Oriented Network |
US20090319770A1 (en) * | 2006-04-21 | 2009-12-24 | Nokia Siemens Networks Gmbh & Co., Kg. | Method, devices and computer program product for encoding and decoding media data |
CN101635823A (en) * | 2009-08-27 | 2010-01-27 | 中兴通讯股份有限公司 | Method and system of terminal for encrypting videoconference data |
CN102035646A (en) * | 2010-12-24 | 2011-04-27 | 北京工业大学 | Mixed key agreement method for enhancing protection |
CN103974241A (en) * | 2013-02-05 | 2014-08-06 | 东南大学常州研究院 | Voice end-to-end encryption method aiming at mobile terminal with Android system |
-
2016
- 2016-05-24 CN CN201610349424.8A patent/CN107426521A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080307225A1 (en) * | 2005-02-01 | 2008-12-11 | Jens-Uwe Busser | Method For Locking on to Encrypted Communication Connections in a Packet-Oriented Network |
CN1921669A (en) * | 2005-08-22 | 2007-02-28 | 索尼爱立信移动通信日本株式会社 | Mobile phone, communication terminal, phone call method and phone call program |
US20090319770A1 (en) * | 2006-04-21 | 2009-12-24 | Nokia Siemens Networks Gmbh & Co., Kg. | Method, devices and computer program product for encoding and decoding media data |
CN101635823A (en) * | 2009-08-27 | 2010-01-27 | 中兴通讯股份有限公司 | Method and system of terminal for encrypting videoconference data |
CN102035646A (en) * | 2010-12-24 | 2011-04-27 | 北京工业大学 | Mixed key agreement method for enhancing protection |
CN103974241A (en) * | 2013-02-05 | 2014-08-06 | 东南大学常州研究院 | Voice end-to-end encryption method aiming at mobile terminal with Android system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109359472A (en) * | 2018-09-19 | 2019-02-19 | 腾讯科技(深圳)有限公司 | A kind of data encrypting and deciphering processing method, device and relevant device |
CN109359472B (en) * | 2018-09-19 | 2021-06-25 | 腾讯科技(深圳)有限公司 | Data encryption and decryption processing method and device and related equipment |
CN113132666A (en) * | 2019-12-30 | 2021-07-16 | Tcl新技术(惠州)有限公司 | Audio and video sending method, receiving method, terminal and audio and video transmission system |
CN112565656A (en) * | 2020-11-27 | 2021-03-26 | Oppo广东移动通信有限公司 | Video call method, device, system, electronic equipment and storage medium |
CN112929679A (en) * | 2021-01-18 | 2021-06-08 | 广州虎牙科技有限公司 | Method and device for detecting legality of live client and identifying plug-in behavior |
CN112929679B (en) * | 2021-01-18 | 2024-03-01 | 广州虎牙科技有限公司 | Method and device for detecting validity of live client and identifying plug-in behavior |
CN114760500A (en) * | 2022-03-24 | 2022-07-15 | 海南乾唐视联信息技术有限公司 | Audio and video data encryption method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017097041A1 (en) | Data transmission method and device | |
JP4263384B2 (en) | Improved method for authentication of user subscription identification module | |
CN103763356B (en) | A kind of SSL establishment of connection method, apparatus and system | |
CN107358441B (en) | Payment verification method and system, mobile device and security authentication device | |
CN107426521A (en) | A kind of video call method and terminal | |
KR101556654B1 (en) | Method for processing video telecommunication and apparatus for the same | |
CN111756529B (en) | Quantum session key distribution method and system | |
JP2005102163A (en) | Equipment authentication system, server, method and program, terminal and storage medium | |
EP3844990A1 (en) | Method and device to establish a wireless secure link while maintaining privacy against tracking | |
JP2007529162A (en) | Cryptographic communication system, communication device | |
CN111552270B (en) | Safety authentication and data transmission method and device for vehicle-mounted diagnosis | |
US8230218B2 (en) | Mobile station authentication in tetra networks | |
CN112602290B (en) | Identity authentication method and device and readable storage medium | |
WO2016095473A1 (en) | Security call method, terminal and system, and computer storage medium | |
CN111756528B (en) | Quantum session key distribution method, device and communication architecture | |
CN107094156A (en) | A kind of safety communicating method and system based on P2P patterns | |
CN103974255A (en) | System and method for vehicle access | |
CN112165386B (en) | Data encryption method and system based on ECDSA | |
CN103973696A (en) | Data processing method of voice communication | |
CN107483429A (en) | A kind of data ciphering method and device | |
CN104243452A (en) | Method and system for cloud computing access control | |
CN114331456A (en) | Communication method, device, system and readable storage medium | |
CN102916810A (en) | Method, system and apparatus for authenticating sensor | |
WO2019037422A1 (en) | Key and key handle generation method and system, and smart key security device | |
CN114696999A (en) | Identity authentication method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20171201 |