CN107566397A - Video conference information transferring method, terminal device, server and storage medium - Google Patents
Video conference information transferring method, terminal device, server and storage medium Download PDFInfo
- Publication number
- CN107566397A CN107566397A CN201710905670.1A CN201710905670A CN107566397A CN 107566397 A CN107566397 A CN 107566397A CN 201710905670 A CN201710905670 A CN 201710905670A CN 107566397 A CN107566397 A CN 107566397A
- Authority
- CN
- China
- Prior art keywords
- video conference
- server
- ciphertext
- terminal device
- solicited message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of video conference information transferring method, terminal device, server and storage medium, methods described includes:Terminal device obtains video conference solicited message, and the default symmetric key that video conference solicited message is from a locally generated is as data to be transmitted;Data to be transmitted is encrypted asymmetric public key according to locally prestoring, generates the first ciphertext;First ciphertext is sent to server, the first ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for server, target video conferencing information is searched according to the video conference solicited message after decryption, the target video conferencing information found is encrypted according to the default symmetric key after decryption, obtains the second ciphertext;The second ciphertext is decrypted by default symmetric key for terminal device, obtains target video conferencing information.The present invention is by the way of Hybrid Encryption, so as to ensure the efficiency of video conference information encryption.
Description
Technical field
The present invention relates to video conference field, more particularly to a kind of video conference information transferring method, terminal device, service
Device and storage medium.
Background technology
Invite other people to participate in video conference in the prior art, meeting critical information, such as Conference ID, meeting can be carried
Room password etc., generally the progress usual transmission security of video conference is low, and conferencing information may be obtained by other people.Pass through
Video conference is encrypted the mode of encryption, ensure that the security of video conference, and existing cipher mode mainly passes through list
Solely it is encrypted using Advanced Encryption Standard (Advanced Encryption Standard, AES), but is entered by this mode
The security of the video conference information of row encryption is relatively low, and also can be used alone asymmetric encryption (Rivest Shamir
Adleman, RSA) it is encrypted, although asymmetric encryption is safe, encryption efficiency is low, and the number encrypted every time
According to limited length, the situation of time delay often occurs during encryption.
The content of the invention
It is a primary object of the present invention to propose a kind of video conference information transferring method, terminal device, server and
Storage medium, it is intended to which solution can not improve encryption efficiency in the case of the encryption method high using security performance in the prior art
Technical problem.
To achieve the above object, a kind of video conference information transferring method provided by the invention, methods described include following
Step:
Terminal device obtains video conference solicited message, default pair that the video conference solicited message is from a locally generated
Claim key as data to be transmitted;
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for the terminal device, generation first
Ciphertext;
First ciphertext is sent to server by the terminal device, so that the server is non-according to what is locally prestored
First ciphertext is decrypted asymmetric private key, the video conference solicited message and default symmetric key is obtained, according to institute
State video conference solicited message and search target video conferencing information, according to the default symmetric key to the target video that finds
Conferencing information is encrypted, and obtains and feeds back the second ciphertext;
The terminal device receives the second ciphertext of the server feedback, by the default symmetric key to described the
Two ciphertexts are decrypted, and obtain the target video conferencing information.
Preferably, after the terminal device obtains video conference solicited message, methods described also includes:
The first summary info of generation is encrypted according to the video conference solicited message in the terminal device, and by described in
First summary info is sent to server with the data to be transmitted after encryption, so that the server is non-right according to what is locally prestored
Claim private key that first ciphertext is decrypted, the video conference solicited message is obtained, by the video conference solicited message
Be encrypted generation the second summary info, first summary info is matched with second summary info, according to
The step of target video conferencing information is searched according to the video conference solicited message is performed with result.
Preferably, after the terminal device obtains video conference solicited message, methods described also includes:
The terminal device triggers key generation instruction according to the video conference solicited message, is generated according to the key
Instruction generates the default symmetric key, and the default symmetric key is stored in into local.
In addition, to achieve the above object, the present invention also provides a kind of terminal device, and the terminal device includes:Memory,
Processor and the video conference message transmission procedure that can be run on the memory and on the processor is stored in, it is described to regard
The step of frequency conferencing information transmission program is arranged for carrying out video conference information transferring method as described above.
In addition, to achieve the above object, the present invention also proposes a kind of storage medium, and video is stored with the storage medium
Conferencing information transmits program, and video council as described above is realized when the video conference message transmission procedure is executed by processor
The step of discussing information transferring method.
In addition, to achieve the above object, the present invention also provides a kind of video conference information transferring method, methods described bag
Include:
The first ciphertext that server receiving terminal equipment is sent;
First ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains video conference
Solicited message and default symmetric key;
The server searches target video conferencing information according to the video conference solicited message, according to described default pair
Claim key that the target video conferencing information found is encrypted, obtain and feed back the second ciphertext, so that the terminal device
The second ciphertext of the server feedback is received, second ciphertext is solved by the default symmetric key locally generated
It is close, obtain the target video conferencing information.
Preferably, first ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains
After video conference solicited message and default symmetric key, methods described also includes:
The server video conference solicited message is encrypted the second summary info of generation;
The server receives the first summary info that the terminal device is sent, by first summary info with it is described
Second summary info is matched, and perform the server according to matching result searches mesh according to the video conference solicited message
Video conference information is marked, the target video conferencing information found is encrypted according to the default symmetric key, is obtained simultaneously
The step of feeding back the second ciphertext.
Preferably, first ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains
Before video conference solicited message and default symmetric key, methods described also includes:
The server receives store instruction, and the asymmetric privacy keys are stored in into local according to the store instruction.
In addition, to achieve the above object, the present invention also provides a kind of storage device, and the storage device includes:Memory,
Processor and the video conference message transmission procedure that can be run on the memory and on the processor is stored in, it is described to regard
The step of frequency conferencing information transmission program is arranged for carrying out video conference information transferring method as described above.
In addition, to achieve the above object, the present invention also proposes a kind of storage medium, and video is stored with the storage medium
Conferencing information transmits program, and video council as described above is realized when the video conference message transmission procedure is executed by processor
The step of discussing information transferring method.
The present invention is by the way of Hybrid Encryption, on the premise of data high security is ensured, improves video conference information
The efficiency of encryption.
Brief description of the drawings
Fig. 1 is the terminal device structural representation for the hardware running environment that scheme of the embodiment of the present invention is related to;
Fig. 2 is the schematic flow sheet of video conference information transferring method first embodiment of the present invention;
Fig. 3 is the schematic flow sheet of video conference information transfer of the present invention;
Fig. 4 is the schematic flow sheet of video conference information transferring method second embodiment of the present invention;
Fig. 5 is the schematic flow sheet of video conference information transferring method 3rd embodiment of the present invention;
Fig. 6 is the server architecture schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to;
Fig. 7 is the schematic flow sheet of video conference information transferring method fourth embodiment of the present invention;
Fig. 8 is the schematic flow sheet of the embodiment of video conference information transferring method the 5th of the present invention;
Fig. 9 is the schematic flow sheet of video conference information transferring method sixth embodiment of the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Reference picture 1, Fig. 1 are the terminal device structural representation for the hardware running environment that scheme of the embodiment of the present invention is related to.
As shown in figure 1, the terminal device can include:Processor 1001, such as CPU, communication bus 1002, user interface
1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is used to realize the connection communication between these components.
User interface 1003 can include display screen (Display), input block such as keyboard (Keyboard), optional user interface
1003 can also include wireline interface, the wave point of standard.Network interface 1004 can optionally connect including the wired of standard
Mouth, wave point (such as WIFI interface).Memory 1005 can be high-speed RAM memory or stable memory
(non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor
1001 storage device.
It will be understood by those skilled in the art that the terminal device structure shown in Fig. 1 does not form the limit to terminal device
It is fixed, it can include than illustrating more or less parts, either combine some parts or different parts arrangement.
As shown in figure 1, as in a kind of memory 1005 of storage medium can include operating system, network service mould
Block, Subscriber Interface Module SIM and video conference message transmission procedure.
In the terminal device shown in Fig. 1, network interface 1004 is mainly used in connecting storage device, is carried out with storage device
Data communicate;User interface 1003 is mainly used in connecting storage device, enters row data communication with terminal;Terminal device of the present invention leads to
Cross processor 1001 and call the video conference message transmission procedure stored in memory 1005, and perform following operate:
Terminal device obtains video conference solicited message, default pair that the video conference solicited message is from a locally generated
Claim key as data to be transmitted;
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for the terminal device, generation first
Ciphertext;
First ciphertext is sent to server by the terminal device, so that the server is non-according to what is locally prestored
First ciphertext is decrypted asymmetric private key, the video conference solicited message and default symmetric key is obtained, according to institute
State video conference solicited message and search target video conferencing information, according to the default symmetric key to the target video that finds
Conferencing information is encrypted, and obtains and feeds back the second ciphertext;
The terminal device receives the second ciphertext of the server feedback, by the default symmetric key to described the
Two ciphertexts are decrypted, and obtain the target video conferencing information.
Further, processor 1001 can call the video conference message transmission procedure stored in memory 1005, also
Perform following operate:
The first summary info of generation is encrypted according to the video conference solicited message in the terminal device, and by described in
First summary info is sent to server with the data to be transmitted after encryption, so that the server is non-right according to what is locally prestored
Claim private key that first ciphertext is decrypted, the video conference solicited message is obtained, by the video conference solicited message
Be encrypted generation the second summary info, first summary info is matched with second summary info, according to
The step of target video conferencing information is searched according to the video conference solicited message is performed with result.
Further, processor 1001 can call the video conference message transmission procedure stored in memory 1005, also
Perform following operate:
The terminal device triggers key generation instruction according to the video conference solicited message, is generated according to the key
Instruction generates the default symmetric key, and the default symmetric key is stored in into local.
The present embodiment is by the way of Hybrid Encryption, on the premise of data high security is ensured, improves video conference letter
The efficiency of encryption for information.
Based on Fig. 1 hardware configurations, video conference information transferring method embodiment of the present invention is proposed.
Reference picture 2, Fig. 2 are the schematic flow sheet of video conference information transferring method first embodiment of the present invention.
In the first embodiment, the video conference information transferring method comprises the following steps:
Step S10, terminal device obtain video conference solicited message, the video conference solicited message are from a locally generated
Default symmetric key as data to be transmitted;
It should be noted that executive agent in the present embodiment is terminal device, user's using terminal equipment is regarded
When frequency meeting connects, by sending video conference solicited message, the video conference solicited message includes ID and account
Information etc..
In the specific implementation, the random string of each communication request of client, at random one 8-16 bit length of generation, word
Symbol string composition is digital 0-9, alphabetical a-z, A-Z, and afterwards just using the character string as AES key, such as terminal device receives
The video conference solicited message of user, random AES key can be generated according to high video conference solicited message, by above-mentioned close
The create-rule of key, 12ASSGkjp AES key can be generated, the generation of key, the present embodiment can be also realized by other rules
This is not restricted.
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for step S20, the terminal device,
Generate the first ciphertext;
It should be noted that RSA public keys are previously stored with device end, can be to the data in local by RSA public keys
Rsa encryption is carried out, ciphertext is generated, so as to improve the security of data.
In order to improve the security of data encryption, in general, data are encrypted by RSA cipher mode
The security of data can be improved, because safe class of the asymmetrical cipher mode in all cipher modes is highest, is passed through
Asymmetrical encryption key locally is being pre-set, so as to improve the security of data, is being advantageous to prevent the leakage of data message.
In the specific implementation, in order to improve the efficiency of encryption, sent by being locally generated symmetric key, and by the key
To server, so as to make server that data be encrypted by the symmetric key received, and the data of encryption are sent to
Terminal device, so as to avoid server from needing being locally generated key to enter encryption, so as to reduce the encryption efficiency of data.
In order to improve the security of data, in the information transmission process of video conference, the data of transmission can be added
Close, i.e. data are in transmit process, and the ciphertext for the encryption that can all pass through carries out the transmission of data, so as to improve the peace of data transfer
Quan Xing.
Step S30, first ciphertext is sent to server by the terminal device, so that the server is according to local
First ciphertext is decrypted the asymmetric privacy keys to prestore, and it is symmetrical close with presetting to obtain the video conference solicited message
Key, target video conferencing information is searched according to the video conference solicited message, according to the default symmetric key to finding
Target video conferencing information be encrypted, obtain and feed back the second ciphertext;
It should be noted that first ciphertext can be that the solicited message of video conference and symmetrical encryption key etc. are more
Data carry out the first ciphertext of asymmetric encryption generation, and first ciphertext is sent into server, so as to make server pair
First ciphertext is decrypted.
In the specific implementation, the first ciphertext is sent to server by the terminal device by way of network, can also lead to
Cross other modes and be sent to server, the present embodiment is not restricted to this.
In order to further improve the security of data transfer, unsymmetrical key is previously provided with server end, by this
First ciphertext is decrypted unsymmetrical key, so as to the video conference solicited message after being decrypted and in terminal device
Hold the symmetric key of generation.Server end can carry out request results symmetric cryptography, and asking encryption by the symmetric key
Result is asked to be sent to terminal device.
In the present embodiment, the target video conferencing information can be corresponding to be made for video conference information request
Request results, request results corresponding with the solicited message are found according to the solicited message of video conference, such as terminal is set
The standby video request information according to user, the video request information is sent to corresponding server, server is according to the video
Solicited message establishes the connectivity port of connection corresponding to finding, and the port is sent into terminal device, so as to the end
End equipment is successfully established video conference, and the symmetric key sent in transmitting procedure by terminal device is encrypted, so as to
On the premise of the safety of video conference information is ensured, the encryption efficiency of video conference is improved.
The schematic flow sheet of video conference information transfer as shown in Figure 3, terminal device receive video conference request letter
Breath, symmetric key is generated according to video conference solicited message, solicited message and symmetric key are entered into RSA public key encryptions generation first
Ciphertext, and first ciphertext is sent to server, server is decrypted according to RSA private keys according to the first ciphertext of reception, obtained
Solicited message and symmetric key are taken, and will be encrypted according to the request results of solicited message by symmetric key, and will encryption
Information afterwards is sent to terminal device.
Step S40, the terminal device receive the second ciphertext of the server feedback, pass through the default symmetric key
Second ciphertext is decrypted, obtains the target video conferencing information.
It should be noted that second ciphertext can be the request knot that server is judged according to video conference information
Fruit, the request results is carried out the ciphertext of symmetric cryptography, or the video conference port of matching is encrypted, and by port
Information is sent to the terminal device, so as to make terminal device establish video conference according to the port information.
In the present embodiment terminal device by using Hybrid Encryption mode, on the premise of data high security is ensured,
Improve the efficiency of video conference information encryption.
Further, as shown in figure 4, proposing that video conference information transferring method second of the present invention is real based on first embodiment
Example is applied, in the present embodiment, after the step S10, methods described also includes:
Step S101, the summary of generation first, which is encrypted, according to the video conference solicited message in the terminal device believes
Breath, and first summary info and the data to be transmitted after encryption are sent to server, so that the server is according to this
First ciphertext is decrypted the asymmetric privacy keys that ground prestores, and obtains the video conference solicited message, by the video
The second summary info of generation is encrypted in request for conference information, and first summary info and second summary info are carried out
Matching, the step of searching target video conferencing information according to the video conference solicited message is performed according to matching result.
It should be noted that the summary info can be to be generated to make a summary according to AES, in the present embodiment, can pass through
MD5 algorithms generate MD5 values, are judged by the MD5 values of calculating with the MD5 values received, so as to ensure the complete of the data of transmission
Whole property.
It is understood that in terminal device according to the video conference solicited message of reception, by the solicited message according to MD5
Algorithm carries out calculating one MD5 of generation, and the MD5 values ensure that the uniqueness of data, and the MD5 values are sent into server, clothes
Business device is decrypted according to asymmetric privacy keys, gets the video conference solicited message that transmission obtains, and according to the video conference
Solicited message generates current MD5 values, and current MD5 values compared with the MD5 values of the transmission obtained after decryption, judge
Whether two MD5 are consistent, if two values are consistent, then it represents that the video conference information of reception and the video of terminal device before
Conferencing information is consistent, ensure that the integrality of data, then carries out the processing of next step, if two values are inconsistent, table
Registration is according to being changed, so as to judge that data are distorted, in this case, then without following processing.
After continuing as shown in figure 3, getting video conference solicited message, video conference solicited message is subjected to calculating life
Into summary, the summary, solicited message and symmetric key are subjected to rsa encryption, generation ciphertext is sent to the server, serviced
Device is decrypted according to RSA private keys, obtains video conference solicited message, and solicited message is generated and made a summary, by the summary info
Compared with the summary info after decryption, so as to ensure the video conference information that terminal device sends over and the decryption received
The integrality of video conference information afterwards.
In the specific implementation, after request results are encrypted server end according to symmetric key, after encryption
Ciphertext is sent to terminal device, in addition to request results are calculated into MD5 values according to MD5, also sends the summary to terminal
Equipment, so as to ensure integrality of the request results in transmitting procedure, determine whether data are tampered in transmitting procedure.
The present embodiment carries out digest algorithm calculating by terminal device to video conference solicited message, generates digest value, and
By server generate digest value judged, so as to ensure data transmitted between terminal device and server it is complete
Property.
Further, as shown in figure 5, proposing that video conference information transferring method the 3rd of the present invention is real based on second embodiment
Example is applied, in the present embodiment, after the step S10, methods described also includes:
Step S102, the terminal device triggers key generation instruction according to the video conference solicited message, according to institute
State key generation instruction and generate the default symmetric key, and the default symmetric key is stored in local.
It should be noted that the default symmetric key can be according to local key create-rule, the symmetric key of generation,
In the specific implementation, the random string of one 8-16 bit length of generation at random, character string composition is digital 0-9, alphabetical a-z,
A-Z, just obtained afterwards using the character string as AES key in terminal device after video conference solicited message, can be according to this
Video conference solicited message generates symmetric key, and the symmetric key is preserved locally, so as to by the symmetric key
The information for carrying out symmetric cryptography is decrypted.
In order to further realize Hybrid Encryption, on the premise of Information Security is improved, ensure the efficiency of data encryption,
In the specific implementation, terminal device gets video conference information, and key generation is triggered by the video conference solicited message and referred to
Order, instruction generation symmetric key is generated by the key.
It is understood that in the present embodiment, the key generation instruction can refer to the generation instruction of generation symmetric key,
Server is sent to by the symmetric key locally generated, and by the symmetric key, server can be made to enter by the symmetric key
Row encryption, so as to improve encryption efficiency.
The symmetric key that the present embodiment is generated by terminal device, and the symmetric key is sent to server, clothes can be made
Business device is encrypted by the symmetric key, so as to improve encryption efficiency.
Reference picture 6, Fig. 6 are the server architecture schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to.
As shown in fig. 6, the server can include:Processor 2001, such as CPU, communication bus 2002, user interface
2003, network interface 2004, memory 2005.Wherein, communication bus 2002 is used to realize the connection communication between these components.
User interface 2003 can include display screen (Display), input block such as keyboard (Keyboard), optional user interface
1003 can also include wireline interface, the wave point of standard.Network interface 2004 can optionally connect including the wired of standard
Mouth, wave point (such as WI-FI interfaces).Memory 2005 can be high-speed RAM memory or stable memory
(non-volatile memory), such as magnetic disk storage.Memory 2005 optionally can also be independently of aforementioned processor
1001 storage device.
It will be understood by those skilled in the art that the server architecture shown in Fig. 6 does not form the restriction to server, can
With including than illustrating more or less parts, either combining some parts or different parts arrangement.
As shown in fig. 6, as in a kind of memory 2005 of storage medium can include operating system, network service mould
Block, Subscriber Interface Module SIM and video conference message transmission procedure.
In the server shown in Fig. 6, network interface 2004 is mainly used in connecting network, and carrying out data with internet leads to
Letter;User interface 2003 is mainly used in connecting terminal, enters row data communication with terminal;Server of the present invention passes through processor 2001
The video conference message transmission procedure stored in memory 2005 is called, and performs following operate:
The first ciphertext that server receiving terminal equipment is sent;
First ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains video conference
Solicited message and default symmetric key;
The server searches target video conferencing information according to the video conference solicited message, according to described default pair
Claim key that the target video conferencing information found is encrypted, obtain and feed back the second ciphertext, so that the terminal device
The second ciphertext of the server feedback is received, second ciphertext is solved by the default symmetric key locally generated
It is close, obtain the target video conferencing information.
Further, processor 2001 can call the video conference message transmission procedure stored in memory 2005, also
Perform following operate:
The server video conference solicited message is encrypted the second summary info of generation;
The server receives the first summary info that the terminal device is sent, by first summary info with it is described
Second summary info is matched, and perform the server according to matching result searches mesh according to the video conference solicited message
Video conference information is marked, the target video conferencing information found is encrypted according to the default symmetric key, is obtained simultaneously
The step of feeding back the second ciphertext.
Further, processor 2001 can call the video conference message transmission procedure stored in memory 2005, also
Perform following operate:
The server receives store instruction, and the asymmetric privacy keys are stored in into local according to the store instruction.
The present embodiment server end is by the way of Hybrid Encryption, and on the premise of data high security is ensured, raising regards
The efficiency of frequency conferencing information encryption.
Based on above-mentioned Fig. 6 hardware configurations, video conference information transferring method embodiment of the present invention is proposed.
Reference picture 7, Fig. 7 are the schematic flow sheet of video conference information transferring method fourth embodiment of the present invention.
In the present embodiment, methods described includes step:
Step S10', the first ciphertext that server receiving terminal equipment is sent;
It should be noted that executive agent in the present embodiment is server, first ciphertext can be video conference
Solicited message and symmetric key, the video conference information and symmetric key that the server is sent by receiving terminal apparatus, and
It is transmitted by the form of ciphertext, so as to ensure the security of data transfer.
Step S20', the server are decrypted to first ciphertext according to the asymmetric privacy keys locally to prestore, obtained
Take video conference solicited message and default symmetric key;
In the present embodiment, asymmetric privacy keys can be prestored in advance in server end, by the asymmetric privacy keys to described
First ciphertext is decrypted, so as to get the video conference solicited message and symmetric key of terminal device transmission.
In order to realize the encryption efficiency of server, by generating symmetric key in terminal device, and the symmetric key is sent out
Server is given, server gets symmetric key by decryption, and the encryption of data is completed by the symmetric key, so as to not
Symmetric key need to be locally generated, so as to improve the efficiency of encryption.
Continue as shown in figure 3, in the server, server obtain terminal device carry out the solicited message of rsa encryption with
And symmetric key, server are decrypted by the RSA private keys of local, the video conference request letter of terminal device transmission is got
Breath and symmetric key, so as to be encrypted using the symmetric key, improve data encryption efficiency.
Step S30', the server search target video conferencing information according to the video conference solicited message, according to
The target video conferencing information found is encrypted the default symmetric key, obtains and feeds back the second ciphertext, so that institute
The second ciphertext that terminal device receives the server feedback is stated, it is close to described second by the default symmetric key locally generated
Text is decrypted, and obtains the target video conferencing information.
In the present embodiment, the target video conferencing information can be corresponding to be made for video conference information request
Request results, request results corresponding with the solicited message are found according to the solicited message of video conference, such as terminal is set
The standby video request information according to user, the video request information is sent to corresponding server, server is according to the video
Solicited message establishes the connectivity port of connection corresponding to finding, and the port is sent into terminal device, so as to the end
End equipment is successfully established video conference, and the symmetric key sent in transmitting procedure by terminal device is encrypted, so as to
On the premise of the safety of video conference information is ensured, the encryption efficiency of video conference is improved.
Continue as shown in figure 3, terminal device receives video conference solicited message, according to the generation of video conference solicited message
Symmetric key, solicited message and symmetric key are entered into RSA public key encryptions and generate the first ciphertext, and first ciphertext is sent to
Server, server are decrypted according to the first ciphertext of reception according to RSA private keys, obtain solicited message and symmetric key, and by root
It is encrypted according to the request results of solicited message by symmetric key, and the information after encryption is sent to terminal device.
In order to improve the security of data transfer, terminal device receives the second ciphertext of server feedback, and described second
Ciphertext can be request results, and request results are transmitted by way of ciphertext, terminal device receive the second ciphertext it
Afterwards, second ciphertext is decrypted by the symmetric key locally to prestore, so as to get target video conferencing information, so as to
Video conference can be established.
In the specific implementation, second ciphertext can also be the request knot that server is judged according to video conference information
Fruit, the request results is carried out the ciphertext of symmetric cryptography, or the video conference port of matching is encrypted, and by port
Information is sent to the terminal device, so as to make terminal device establish video conference according to the port information.
Server on the premise of data high security is ensured, carries by using the mode of Hybrid Encryption in the present embodiment
The efficiency of high video conference information encryption.
Further, as shown in figure 8, proposing that video conference information transferring method the 5th of the present invention is real based on fourth embodiment
Example is applied, in the present embodiment, after the step S20', methods described also includes:
Step S201', the server video conference solicited message are encrypted the second summary info of generation;
It should be noted that second summary info can be server generates summary according to AES, in this implementation
In example, MD5 values can be generated by MD5 algorithms, be judged by the MD5 values of calculating with the MD5 values received, so as to ensure to transmit
Data integrality.
Step S202', the server receive the first summary info that the terminal device is sent, described first are made a summary
Information is matched with second summary info, and perform the server according to matching result asks according to the video conference
Information searching target video conferencing information, the target video conferencing information found is added according to the default symmetric key
It is close, the step of obtaining and feed back the second ciphertext.
It is understood that in terminal device according to the video conference solicited message of reception, by the solicited message according to MD5
Algorithm carries out calculating one MD5 of generation, and the MD5 values ensure that the uniqueness of data, and the MD5 values are sent into server, clothes
Business device is decrypted according to asymmetric privacy keys, gets the video conference solicited message that transmission obtains, and according to the video conference
Solicited message generates current MD5 values, and current MD5 values compared with the MD5 values of the transmission obtained after decryption, judge
Whether two MD5 are consistent, if two values are consistent, then it represents that the video conference information of reception and the video of terminal device before
Conferencing information is consistent, ensure that the integrality of data, then carries out the processing of next step, if two values are inconsistent, table
Registration is according to being changed, so as to judge that data are distorted, in this case, then without following processing.
After continuing as shown in figure 3, getting video conference solicited message, video conference solicited message is subjected to calculating life
Into summary, the summary, solicited message and symmetric key are subjected to rsa encryption, generation ciphertext is sent to the server, serviced
Device is decrypted according to RSA private keys, obtains video conference solicited message, and solicited message is generated and made a summary, by the summary info
Compared with the summary info after decryption, so as to ensure the video conference information that terminal device sends over and the decryption received
The integrality of video conference information afterwards.
In the specific implementation, after request results are encrypted server end according to symmetric key, after encryption
Ciphertext is sent to terminal device, in addition to request results are calculated into MD5 values according to MD5, also sends the summary to terminal
Equipment, so as to ensure integrality of the request results in transmitting procedure, determine whether data are tampered in transmitting procedure.
The present embodiment carries out digest algorithm calculating by server to video conference solicited message, generates digest value, and lead to
Cross server generation digest value judged, so as to ensure data transmitted between terminal device and server it is complete
Property.
Further, as shown in figure 9, proposing that video conference information transferring method the 6th of the present invention is real based on the 5th embodiment
Example is applied, in the present embodiment, before the step S20', methods described also includes:
Step S203', the server receive store instruction, are stored the asymmetric privacy keys according to the store instruction
In local.
It should be noted that in the technology of data encryption, need to be provided with public key and private key for asymmetric encryption mode,
And during AES encryption, as long as there is AES key to carry out plus decode to data, and in unsymmetrical key, then must have
Public key could carry out encryption and decryption with private key, it is seen that for unsymmetrical key, the encryption that data are completed by two sets of keys shows
So than only needing the cryptographic security that a set of key is completed high.
In order to realize the cipher mode of high security, prestore asymmetric public key in terminal device, is prestored in server end
Asymmetric privacy keys, so as to complete the asymmetric encryption of data, improve security of the data in transmitting procedure.
In the specific implementation, the server by receiving store instruction, in the present embodiment, the store instruction be
The command information of asymmetric privacy keys is stored in local, asymmetric privacy keys can be stored in server end by the command information, so as to
It can be achieved that the ciphertext that terminal device is sent is decrypted, so as to obtain the video conference solicited message after decryption.
The present embodiment receives store instruction by server, is prestored by the store instruction in local asymmetric privacy keys,
So as to realize to data plus decoding, the security of data transfer is improved.
In addition, the embodiment of the present invention also proposes a kind of storage medium, video conference information is stored with the storage medium
Program is transmitted, following operation is realized when the video conference message transmission procedure is performed by first processor:
Terminal device obtains video conference solicited message, default pair that the video conference solicited message is from a locally generated
Claim key as data to be transmitted;
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for the terminal device, generation first
Ciphertext;
First ciphertext is sent to server by the terminal device, so that the server is non-according to what is locally prestored
First ciphertext is decrypted asymmetric private key, the video conference solicited message and default symmetric key is obtained, according to institute
State video conference solicited message and search target video conferencing information, according to the default symmetric key to the target video that finds
Conferencing information is encrypted, and obtains and feeds back the second ciphertext;
The terminal device receives the second ciphertext of the server feedback, by the default symmetric key to described the
Two ciphertexts are decrypted, and obtain the target video conferencing information.
Further, following operation is also realized when the video conference message transmission procedure is performed by first processor:
The first summary info of generation is encrypted according to the video conference solicited message in the terminal device, and by described in
First summary info is sent to server with the data to be transmitted after encryption, so that the server is non-right according to what is locally prestored
Claim private key that first ciphertext is decrypted, the video conference solicited message is obtained, by the video conference solicited message
Be encrypted generation the second summary info, first summary info is matched with second summary info, according to
The step of target video conferencing information is searched according to the video conference solicited message is performed with result.
Further, following operation is also realized when the video conference message transmission procedure is performed by first processor:
The terminal device triggers key generation instruction according to the video conference solicited message, is generated according to the key
Instruction generates the default symmetric key, and the default symmetric key is stored in into local.
In the present embodiment terminal device by using Hybrid Encryption mode, on the premise of data high security is ensured,
Improve the efficiency of video conference information encryption.
In addition, the embodiment of the present invention also proposes a kind of storage medium, video conference information is stored with the storage medium
Program is transmitted, following operation is realized when the video conference message transmission procedure is performed by second processor:
The first ciphertext that server receiving terminal equipment is sent;
First ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains video conference
Solicited message and default symmetric key;
The server searches target video conferencing information according to the video conference solicited message, according to described default pair
Claim key that the target video conferencing information found is encrypted, obtain and feed back the second ciphertext, so that the terminal device
The second ciphertext of the server feedback is received, second ciphertext is solved by the default symmetric key locally generated
It is close, obtain the target video conferencing information.
Further, following operation is also realized when the video conference message transmission procedure is performed by second processor:
The server video conference solicited message is encrypted the second summary info of generation;
The server receives the first summary info that the terminal device is sent, by first summary info with it is described
Second summary info is matched, and perform the server according to matching result searches mesh according to the video conference solicited message
Video conference information is marked, the target video conferencing information found is encrypted according to the default symmetric key, is obtained simultaneously
The step of feeding back the second ciphertext.
Further, following operation is also realized when the video conference message transmission procedure is performed by second processor:
The server receives store instruction, and the asymmetric privacy keys are stored in into local according to the store instruction.
Server on the premise of data high security is ensured, carries by using the mode of Hybrid Encryption in the present embodiment
The efficiency of high video conference information encryption.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or system including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or system institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
In if the unit claim of equipment for drying is listed, several in these devices can be by same hard
Part item embodies.The use of word first, second, and third does not indicate that any order.These words can be explained
For title.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone,
Computer, server, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair
The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills
Art field, is included within the scope of the present invention.
The equivalent structure or equivalent flow conversion that specification and accompanying drawing content are made, or directly or indirectly it is used in other phases
The technical field of pass, is included within the scope of the present invention.
Claims (10)
1. a kind of video conference information transferring method, it is characterised in that the video conference information transferring method includes following step
Suddenly:
Terminal device obtains video conference solicited message, the video conference solicited message is from a locally generated default symmetrical close
Key is as data to be transmitted;
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for the terminal device, and generation first is close
Text;
First ciphertext is sent to server by the terminal device, so that the server is asymmetric according to what is locally prestored
First ciphertext is decrypted private key, obtains the video conference solicited message and default symmetric key, is regarded according to described
Frequency request for conference information searching target video conferencing information, according to target video meeting of the default symmetric key to finding
Information is encrypted, and obtains and feeds back the second ciphertext;
The terminal device receives the second ciphertext of the server feedback, close to described second by the default symmetric key
Text is decrypted, and obtains the target video conferencing information.
2. video conference information transferring method as claimed in claim 1, it is characterised in that the terminal device obtains video council
After discussing solicited message, methods described also includes:
The first summary info of generation is encrypted according to the video conference solicited message in the terminal device, and by described first
Summary info is sent to server with the data to be transmitted after encryption, so that the server is according to the asymmetric private locally to prestore
First ciphertext is decrypted key, obtains the video conference solicited message, and the video conference solicited message is carried out
Encryption the second summary info of generation, first summary info is matched with second summary info, tied according to matching
Fruit performs the step of searching target video conferencing information according to the video conference solicited message.
3. video conference information transferring method as claimed in claim 1 or 2, it is characterised in that the terminal device is obtained and regarded
After frequency request for conference information, methods described also includes:
The terminal device triggers key generation instruction according to the video conference solicited message, is generated and instructed according to the key
The default symmetric key is generated, and the default symmetric key is stored in local.
4. a kind of terminal device, it is characterised in that the terminal device includes:Memory, processor and it is stored in the storage
On device and the video conference message transmission procedure that can run on the processor, the video conference message transmission procedure configuration
The step of to realize video conference information transferring method as claimed any one in claims 1 to 3.
A kind of 5. storage medium, it is characterised in that video conference message transmission procedure is stored with the storage medium, it is described to regard
Frequency conferencing information transmission program realizes video conference information as claimed any one in claims 1 to 3 when being executed by processor
The step of transmission method.
6. a kind of video conference information transferring method, it is characterised in that the video conference information transferring method includes following step
Suddenly:
The first ciphertext that server receiving terminal equipment is sent;
First ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains video conference request
Information and default symmetric key;
The server searches target video conferencing information according to the video conference solicited message, according to described default symmetrical close
The target video conferencing information found is encrypted key, obtains and feeds back the second ciphertext, so that the terminal device receives
Second ciphertext of the server feedback, second ciphertext is decrypted by the default symmetric key locally generated, obtained
Obtain the target video conferencing information.
7. video conference information transferring method as claimed in claim 6, it is characterised in that the server prestores according to local
Asymmetric privacy keys first ciphertext is decrypted, after obtaining video conference solicited message and default symmetric key, institute
Stating method also includes:
The server video conference solicited message is encrypted the second summary info of generation;
The server receives the first summary info that the terminal device is sent, by first summary info and described second
Summary info is matched, and perform the server according to matching result regards according to video conference solicited message lookup target
Frequency conferencing information, the target video conferencing information found is encrypted according to the default symmetric key, obtains and feeds back
The step of second ciphertext.
8. video conference information transferring method as claimed in claims 6 or 7, it is characterised in that the server is according to local
First ciphertext is decrypted the asymmetric privacy keys to prestore, obtain video conference solicited message and default symmetric key it
Before, methods described also includes:
The server receives store instruction, and the asymmetric privacy keys are stored in into local according to the store instruction.
9. a kind of server, it is characterised in that the server includes:Memory, processor and it is stored on the memory
And the video conference message transmission procedure that can be run on the processor, the video conference message transmission procedure are configured to reality
Now the step of video conference information transferring method as any one of claim 6 to 8.
A kind of 10. storage medium, it is characterised in that video conference message transmission procedure is stored with the storage medium, it is described
The video conference letter as any one of claim 6 to 8 is realized when video conference message transmission procedure is executed by processor
The step of ceasing transmission method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710905670.1A CN107566397A (en) | 2017-09-28 | 2017-09-28 | Video conference information transferring method, terminal device, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710905670.1A CN107566397A (en) | 2017-09-28 | 2017-09-28 | Video conference information transferring method, terminal device, server and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107566397A true CN107566397A (en) | 2018-01-09 |
Family
ID=60984499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710905670.1A Pending CN107566397A (en) | 2017-09-28 | 2017-09-28 | Video conference information transferring method, terminal device, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107566397A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109484723A (en) * | 2018-11-07 | 2019-03-19 | 广州凯晟信息科技有限公司 | Endowed control method, device and storage medium |
CN110430194A (en) * | 2019-08-06 | 2019-11-08 | 腾讯科技(深圳)有限公司 | A kind of method of Information Authentication, the method and device of chess and card Information Authentication |
CN110475095A (en) * | 2019-08-21 | 2019-11-19 | 苏州科达科技股份有限公司 | A kind of conference control method, device, equipment and readable storage medium storing program for executing |
CN110995669A (en) * | 2019-11-19 | 2020-04-10 | 拉扎斯网络科技(上海)有限公司 | Information processing method, information processing device, electronic equipment and computer readable storage medium |
CN111787271A (en) * | 2020-07-31 | 2020-10-16 | 平安信托有限责任公司 | Video conference control method, device, equipment and computer readable storage medium |
CN112099742A (en) * | 2020-08-13 | 2020-12-18 | 深圳奇迹智慧网络有限公司 | Asynchronous display control method, asynchronous display control terminal and asynchronous display system |
CN112383392A (en) * | 2020-11-13 | 2021-02-19 | 随锐科技集团股份有限公司 | Video conference alternate encryption method and device and computer readable storage medium |
CN112468477A (en) * | 2020-11-20 | 2021-03-09 | 中国建设银行股份有限公司 | Data docking method, device and storage medium based on service desk gateway |
CN115865540A (en) * | 2023-03-03 | 2023-03-28 | 北京和升达信息安全技术有限公司 | Information secure transmission method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005361A (en) * | 2007-01-22 | 2007-07-25 | 北京飞天诚信科技有限公司 | Server and software protection method and system |
US20140075188A1 (en) * | 2012-09-11 | 2014-03-13 | Verizon Patent And Licensing Inc. | Trusted third party client authentication |
CN105245340A (en) * | 2015-09-07 | 2016-01-13 | 天地融科技股份有限公司 | Identity authentication method based on remote account opening and system |
CN105915342A (en) * | 2016-07-01 | 2016-08-31 | 广州爱九游信息技术有限公司 | Application program communication processing system, an application program communication processing device, an application program communication processing apparatus and an application program communication processing method |
WO2016206018A1 (en) * | 2015-06-24 | 2016-12-29 | 冯旋宇 | Data encryption method and system for set top box |
-
2017
- 2017-09-28 CN CN201710905670.1A patent/CN107566397A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101005361A (en) * | 2007-01-22 | 2007-07-25 | 北京飞天诚信科技有限公司 | Server and software protection method and system |
US20140075188A1 (en) * | 2012-09-11 | 2014-03-13 | Verizon Patent And Licensing Inc. | Trusted third party client authentication |
WO2016206018A1 (en) * | 2015-06-24 | 2016-12-29 | 冯旋宇 | Data encryption method and system for set top box |
CN105245340A (en) * | 2015-09-07 | 2016-01-13 | 天地融科技股份有限公司 | Identity authentication method based on remote account opening and system |
CN105915342A (en) * | 2016-07-01 | 2016-08-31 | 广州爱九游信息技术有限公司 | Application program communication processing system, an application program communication processing device, an application program communication processing apparatus and an application program communication processing method |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109484723A (en) * | 2018-11-07 | 2019-03-19 | 广州凯晟信息科技有限公司 | Endowed control method, device and storage medium |
CN110430194A (en) * | 2019-08-06 | 2019-11-08 | 腾讯科技(深圳)有限公司 | A kind of method of Information Authentication, the method and device of chess and card Information Authentication |
CN110430194B (en) * | 2019-08-06 | 2022-04-15 | 腾讯科技(深圳)有限公司 | Information verification method, chess and card information verification method and device |
CN110475095A (en) * | 2019-08-21 | 2019-11-19 | 苏州科达科技股份有限公司 | A kind of conference control method, device, equipment and readable storage medium storing program for executing |
CN110995669A (en) * | 2019-11-19 | 2020-04-10 | 拉扎斯网络科技(上海)有限公司 | Information processing method, information processing device, electronic equipment and computer readable storage medium |
CN111787271A (en) * | 2020-07-31 | 2020-10-16 | 平安信托有限责任公司 | Video conference control method, device, equipment and computer readable storage medium |
CN112099742A (en) * | 2020-08-13 | 2020-12-18 | 深圳奇迹智慧网络有限公司 | Asynchronous display control method, asynchronous display control terminal and asynchronous display system |
CN112383392A (en) * | 2020-11-13 | 2021-02-19 | 随锐科技集团股份有限公司 | Video conference alternate encryption method and device and computer readable storage medium |
CN112383392B (en) * | 2020-11-13 | 2024-03-15 | 随锐科技集团股份有限公司 | Video conference rotation encryption method, video conference rotation encryption equipment and computer readable storage medium |
CN112468477A (en) * | 2020-11-20 | 2021-03-09 | 中国建设银行股份有限公司 | Data docking method, device and storage medium based on service desk gateway |
CN115865540A (en) * | 2023-03-03 | 2023-03-28 | 北京和升达信息安全技术有限公司 | Information secure transmission method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107566397A (en) | Video conference information transferring method, terminal device, server and storage medium | |
US20190268314A1 (en) | Sharing resources across multiple devices in online meetings | |
US8898455B2 (en) | System and method for authentication of a communication device | |
US20150135240A1 (en) | Video display terminal, video transmission terminal, video communication system, video display method, video transmission method, and computer-readable recording medium recording program | |
US20150089220A1 (en) | Technique For Bypassing an IP PBX | |
WO2015180654A1 (en) | Method and apparatus for achieving secret communications | |
US10791124B2 (en) | Method and terminal device for encrypting message | |
US9872175B2 (en) | Packet processing method, apparatus, and system | |
CN112104454B (en) | Data secure transmission method and system | |
KR102433939B1 (en) | Methods for fast, secure and privacy-friendly internet connection discovery in wireless networks | |
CN112398651A (en) | Quantum secret communication method and device, electronic equipment and storage medium | |
CN105376261A (en) | Encryption method and system for instant communication message | |
CN113347215B (en) | Encryption method for mobile video conference | |
CN111884802B (en) | Media stream encryption transmission method, system, terminal and electronic equipment | |
CN107196918B (en) | Data matching method and device | |
CN107820242A (en) | A kind of machinery of consultation of authentication mechanism and device | |
US20190149326A1 (en) | Key obtaining method and apparatus | |
WO2017197968A1 (en) | Data transmission method and device | |
CN107508814A (en) | Data ciphering method, decryption method, apparatus and system | |
CN114866234B (en) | Voice communication method, device, equipment and storage based on quantum key encryption and decryption | |
KR102358965B1 (en) | Communication device, communication method, and program | |
CN107529159B (en) | Access layer encryption, decryption and integrity protection method and device for broadband cluster downlink shared channel and security implementation method | |
CN114826591A (en) | Cross-device data transmission method, system and terminal | |
US20180183741A1 (en) | Multimedia file adaption across different communication platforms | |
WO2020147602A1 (en) | Authentication method, apparatus and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180109 |