CN107566397A - Video conference information transferring method, terminal device, server and storage medium - Google Patents

Video conference information transferring method, terminal device, server and storage medium Download PDF

Info

Publication number
CN107566397A
CN107566397A CN201710905670.1A CN201710905670A CN107566397A CN 107566397 A CN107566397 A CN 107566397A CN 201710905670 A CN201710905670 A CN 201710905670A CN 107566397 A CN107566397 A CN 107566397A
Authority
CN
China
Prior art keywords
video conference
server
ciphertext
terminal device
solicited message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710905670.1A
Other languages
Chinese (zh)
Inventor
田林雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Hamp Science & Technology Co Ltd
Original Assignee
Shenzhen Hamp Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Hamp Science & Technology Co Ltd filed Critical Shenzhen Hamp Science & Technology Co Ltd
Priority to CN201710905670.1A priority Critical patent/CN107566397A/en
Publication of CN107566397A publication Critical patent/CN107566397A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a kind of video conference information transferring method, terminal device, server and storage medium, methods described includes:Terminal device obtains video conference solicited message, and the default symmetric key that video conference solicited message is from a locally generated is as data to be transmitted;Data to be transmitted is encrypted asymmetric public key according to locally prestoring, generates the first ciphertext;First ciphertext is sent to server, the first ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for server, target video conferencing information is searched according to the video conference solicited message after decryption, the target video conferencing information found is encrypted according to the default symmetric key after decryption, obtains the second ciphertext;The second ciphertext is decrypted by default symmetric key for terminal device, obtains target video conferencing information.The present invention is by the way of Hybrid Encryption, so as to ensure the efficiency of video conference information encryption.

Description

Video conference information transferring method, terminal device, server and storage medium
Technical field
The present invention relates to video conference field, more particularly to a kind of video conference information transferring method, terminal device, service Device and storage medium.
Background technology
Invite other people to participate in video conference in the prior art, meeting critical information, such as Conference ID, meeting can be carried Room password etc., generally the progress usual transmission security of video conference is low, and conferencing information may be obtained by other people.Pass through Video conference is encrypted the mode of encryption, ensure that the security of video conference, and existing cipher mode mainly passes through list Solely it is encrypted using Advanced Encryption Standard (Advanced Encryption Standard, AES), but is entered by this mode The security of the video conference information of row encryption is relatively low, and also can be used alone asymmetric encryption (Rivest Shamir Adleman, RSA) it is encrypted, although asymmetric encryption is safe, encryption efficiency is low, and the number encrypted every time According to limited length, the situation of time delay often occurs during encryption.
The content of the invention
It is a primary object of the present invention to propose a kind of video conference information transferring method, terminal device, server and Storage medium, it is intended to which solution can not improve encryption efficiency in the case of the encryption method high using security performance in the prior art Technical problem.
To achieve the above object, a kind of video conference information transferring method provided by the invention, methods described include following Step:
Terminal device obtains video conference solicited message, default pair that the video conference solicited message is from a locally generated Claim key as data to be transmitted;
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for the terminal device, generation first Ciphertext;
First ciphertext is sent to server by the terminal device, so that the server is non-according to what is locally prestored First ciphertext is decrypted asymmetric private key, the video conference solicited message and default symmetric key is obtained, according to institute State video conference solicited message and search target video conferencing information, according to the default symmetric key to the target video that finds Conferencing information is encrypted, and obtains and feeds back the second ciphertext;
The terminal device receives the second ciphertext of the server feedback, by the default symmetric key to described the Two ciphertexts are decrypted, and obtain the target video conferencing information.
Preferably, after the terminal device obtains video conference solicited message, methods described also includes:
The first summary info of generation is encrypted according to the video conference solicited message in the terminal device, and by described in First summary info is sent to server with the data to be transmitted after encryption, so that the server is non-right according to what is locally prestored Claim private key that first ciphertext is decrypted, the video conference solicited message is obtained, by the video conference solicited message Be encrypted generation the second summary info, first summary info is matched with second summary info, according to The step of target video conferencing information is searched according to the video conference solicited message is performed with result.
Preferably, after the terminal device obtains video conference solicited message, methods described also includes:
The terminal device triggers key generation instruction according to the video conference solicited message, is generated according to the key Instruction generates the default symmetric key, and the default symmetric key is stored in into local.
In addition, to achieve the above object, the present invention also provides a kind of terminal device, and the terminal device includes:Memory, Processor and the video conference message transmission procedure that can be run on the memory and on the processor is stored in, it is described to regard The step of frequency conferencing information transmission program is arranged for carrying out video conference information transferring method as described above.
In addition, to achieve the above object, the present invention also proposes a kind of storage medium, and video is stored with the storage medium Conferencing information transmits program, and video council as described above is realized when the video conference message transmission procedure is executed by processor The step of discussing information transferring method.
In addition, to achieve the above object, the present invention also provides a kind of video conference information transferring method, methods described bag Include:
The first ciphertext that server receiving terminal equipment is sent;
First ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains video conference Solicited message and default symmetric key;
The server searches target video conferencing information according to the video conference solicited message, according to described default pair Claim key that the target video conferencing information found is encrypted, obtain and feed back the second ciphertext, so that the terminal device The second ciphertext of the server feedback is received, second ciphertext is solved by the default symmetric key locally generated It is close, obtain the target video conferencing information.
Preferably, first ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains After video conference solicited message and default symmetric key, methods described also includes:
The server video conference solicited message is encrypted the second summary info of generation;
The server receives the first summary info that the terminal device is sent, by first summary info with it is described Second summary info is matched, and perform the server according to matching result searches mesh according to the video conference solicited message Video conference information is marked, the target video conferencing information found is encrypted according to the default symmetric key, is obtained simultaneously The step of feeding back the second ciphertext.
Preferably, first ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains Before video conference solicited message and default symmetric key, methods described also includes:
The server receives store instruction, and the asymmetric privacy keys are stored in into local according to the store instruction.
In addition, to achieve the above object, the present invention also provides a kind of storage device, and the storage device includes:Memory, Processor and the video conference message transmission procedure that can be run on the memory and on the processor is stored in, it is described to regard The step of frequency conferencing information transmission program is arranged for carrying out video conference information transferring method as described above.
In addition, to achieve the above object, the present invention also proposes a kind of storage medium, and video is stored with the storage medium Conferencing information transmits program, and video council as described above is realized when the video conference message transmission procedure is executed by processor The step of discussing information transferring method.
The present invention is by the way of Hybrid Encryption, on the premise of data high security is ensured, improves video conference information The efficiency of encryption.
Brief description of the drawings
Fig. 1 is the terminal device structural representation for the hardware running environment that scheme of the embodiment of the present invention is related to;
Fig. 2 is the schematic flow sheet of video conference information transferring method first embodiment of the present invention;
Fig. 3 is the schematic flow sheet of video conference information transfer of the present invention;
Fig. 4 is the schematic flow sheet of video conference information transferring method second embodiment of the present invention;
Fig. 5 is the schematic flow sheet of video conference information transferring method 3rd embodiment of the present invention;
Fig. 6 is the server architecture schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to;
Fig. 7 is the schematic flow sheet of video conference information transferring method fourth embodiment of the present invention;
Fig. 8 is the schematic flow sheet of the embodiment of video conference information transferring method the 5th of the present invention;
Fig. 9 is the schematic flow sheet of video conference information transferring method sixth embodiment of the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Reference picture 1, Fig. 1 are the terminal device structural representation for the hardware running environment that scheme of the embodiment of the present invention is related to.
As shown in figure 1, the terminal device can include:Processor 1001, such as CPU, communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is used to realize the connection communication between these components. User interface 1003 can include display screen (Display), input block such as keyboard (Keyboard), optional user interface 1003 can also include wireline interface, the wave point of standard.Network interface 1004 can optionally connect including the wired of standard Mouth, wave point (such as WIFI interface).Memory 1005 can be high-speed RAM memory or stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
It will be understood by those skilled in the art that the terminal device structure shown in Fig. 1 does not form the limit to terminal device It is fixed, it can include than illustrating more or less parts, either combine some parts or different parts arrangement.
As shown in figure 1, as in a kind of memory 1005 of storage medium can include operating system, network service mould Block, Subscriber Interface Module SIM and video conference message transmission procedure.
In the terminal device shown in Fig. 1, network interface 1004 is mainly used in connecting storage device, is carried out with storage device Data communicate;User interface 1003 is mainly used in connecting storage device, enters row data communication with terminal;Terminal device of the present invention leads to Cross processor 1001 and call the video conference message transmission procedure stored in memory 1005, and perform following operate:
Terminal device obtains video conference solicited message, default pair that the video conference solicited message is from a locally generated Claim key as data to be transmitted;
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for the terminal device, generation first Ciphertext;
First ciphertext is sent to server by the terminal device, so that the server is non-according to what is locally prestored First ciphertext is decrypted asymmetric private key, the video conference solicited message and default symmetric key is obtained, according to institute State video conference solicited message and search target video conferencing information, according to the default symmetric key to the target video that finds Conferencing information is encrypted, and obtains and feeds back the second ciphertext;
The terminal device receives the second ciphertext of the server feedback, by the default symmetric key to described the Two ciphertexts are decrypted, and obtain the target video conferencing information.
Further, processor 1001 can call the video conference message transmission procedure stored in memory 1005, also Perform following operate:
The first summary info of generation is encrypted according to the video conference solicited message in the terminal device, and by described in First summary info is sent to server with the data to be transmitted after encryption, so that the server is non-right according to what is locally prestored Claim private key that first ciphertext is decrypted, the video conference solicited message is obtained, by the video conference solicited message Be encrypted generation the second summary info, first summary info is matched with second summary info, according to The step of target video conferencing information is searched according to the video conference solicited message is performed with result.
Further, processor 1001 can call the video conference message transmission procedure stored in memory 1005, also Perform following operate:
The terminal device triggers key generation instruction according to the video conference solicited message, is generated according to the key Instruction generates the default symmetric key, and the default symmetric key is stored in into local.
The present embodiment is by the way of Hybrid Encryption, on the premise of data high security is ensured, improves video conference letter The efficiency of encryption for information.
Based on Fig. 1 hardware configurations, video conference information transferring method embodiment of the present invention is proposed.
Reference picture 2, Fig. 2 are the schematic flow sheet of video conference information transferring method first embodiment of the present invention.
In the first embodiment, the video conference information transferring method comprises the following steps:
Step S10, terminal device obtain video conference solicited message, the video conference solicited message are from a locally generated Default symmetric key as data to be transmitted;
It should be noted that executive agent in the present embodiment is terminal device, user's using terminal equipment is regarded When frequency meeting connects, by sending video conference solicited message, the video conference solicited message includes ID and account Information etc..
In the specific implementation, the random string of each communication request of client, at random one 8-16 bit length of generation, word Symbol string composition is digital 0-9, alphabetical a-z, A-Z, and afterwards just using the character string as AES key, such as terminal device receives The video conference solicited message of user, random AES key can be generated according to high video conference solicited message, by above-mentioned close The create-rule of key, 12ASSGkjp AES key can be generated, the generation of key, the present embodiment can be also realized by other rules This is not restricted.
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for step S20, the terminal device, Generate the first ciphertext;
It should be noted that RSA public keys are previously stored with device end, can be to the data in local by RSA public keys Rsa encryption is carried out, ciphertext is generated, so as to improve the security of data.
In order to improve the security of data encryption, in general, data are encrypted by RSA cipher mode The security of data can be improved, because safe class of the asymmetrical cipher mode in all cipher modes is highest, is passed through Asymmetrical encryption key locally is being pre-set, so as to improve the security of data, is being advantageous to prevent the leakage of data message.
In the specific implementation, in order to improve the efficiency of encryption, sent by being locally generated symmetric key, and by the key To server, so as to make server that data be encrypted by the symmetric key received, and the data of encryption are sent to Terminal device, so as to avoid server from needing being locally generated key to enter encryption, so as to reduce the encryption efficiency of data.
In order to improve the security of data, in the information transmission process of video conference, the data of transmission can be added Close, i.e. data are in transmit process, and the ciphertext for the encryption that can all pass through carries out the transmission of data, so as to improve the peace of data transfer Quan Xing.
Step S30, first ciphertext is sent to server by the terminal device, so that the server is according to local First ciphertext is decrypted the asymmetric privacy keys to prestore, and it is symmetrical close with presetting to obtain the video conference solicited message Key, target video conferencing information is searched according to the video conference solicited message, according to the default symmetric key to finding Target video conferencing information be encrypted, obtain and feed back the second ciphertext;
It should be noted that first ciphertext can be that the solicited message of video conference and symmetrical encryption key etc. are more Data carry out the first ciphertext of asymmetric encryption generation, and first ciphertext is sent into server, so as to make server pair First ciphertext is decrypted.
In the specific implementation, the first ciphertext is sent to server by the terminal device by way of network, can also lead to Cross other modes and be sent to server, the present embodiment is not restricted to this.
In order to further improve the security of data transfer, unsymmetrical key is previously provided with server end, by this First ciphertext is decrypted unsymmetrical key, so as to the video conference solicited message after being decrypted and in terminal device Hold the symmetric key of generation.Server end can carry out request results symmetric cryptography, and asking encryption by the symmetric key Result is asked to be sent to terminal device.
In the present embodiment, the target video conferencing information can be corresponding to be made for video conference information request Request results, request results corresponding with the solicited message are found according to the solicited message of video conference, such as terminal is set The standby video request information according to user, the video request information is sent to corresponding server, server is according to the video Solicited message establishes the connectivity port of connection corresponding to finding, and the port is sent into terminal device, so as to the end End equipment is successfully established video conference, and the symmetric key sent in transmitting procedure by terminal device is encrypted, so as to On the premise of the safety of video conference information is ensured, the encryption efficiency of video conference is improved.
The schematic flow sheet of video conference information transfer as shown in Figure 3, terminal device receive video conference request letter Breath, symmetric key is generated according to video conference solicited message, solicited message and symmetric key are entered into RSA public key encryptions generation first Ciphertext, and first ciphertext is sent to server, server is decrypted according to RSA private keys according to the first ciphertext of reception, obtained Solicited message and symmetric key are taken, and will be encrypted according to the request results of solicited message by symmetric key, and will encryption Information afterwards is sent to terminal device.
Step S40, the terminal device receive the second ciphertext of the server feedback, pass through the default symmetric key Second ciphertext is decrypted, obtains the target video conferencing information.
It should be noted that second ciphertext can be the request knot that server is judged according to video conference information Fruit, the request results is carried out the ciphertext of symmetric cryptography, or the video conference port of matching is encrypted, and by port Information is sent to the terminal device, so as to make terminal device establish video conference according to the port information.
In the present embodiment terminal device by using Hybrid Encryption mode, on the premise of data high security is ensured, Improve the efficiency of video conference information encryption.
Further, as shown in figure 4, proposing that video conference information transferring method second of the present invention is real based on first embodiment Example is applied, in the present embodiment, after the step S10, methods described also includes:
Step S101, the summary of generation first, which is encrypted, according to the video conference solicited message in the terminal device believes Breath, and first summary info and the data to be transmitted after encryption are sent to server, so that the server is according to this First ciphertext is decrypted the asymmetric privacy keys that ground prestores, and obtains the video conference solicited message, by the video The second summary info of generation is encrypted in request for conference information, and first summary info and second summary info are carried out Matching, the step of searching target video conferencing information according to the video conference solicited message is performed according to matching result.
It should be noted that the summary info can be to be generated to make a summary according to AES, in the present embodiment, can pass through MD5 algorithms generate MD5 values, are judged by the MD5 values of calculating with the MD5 values received, so as to ensure the complete of the data of transmission Whole property.
It is understood that in terminal device according to the video conference solicited message of reception, by the solicited message according to MD5 Algorithm carries out calculating one MD5 of generation, and the MD5 values ensure that the uniqueness of data, and the MD5 values are sent into server, clothes Business device is decrypted according to asymmetric privacy keys, gets the video conference solicited message that transmission obtains, and according to the video conference Solicited message generates current MD5 values, and current MD5 values compared with the MD5 values of the transmission obtained after decryption, judge Whether two MD5 are consistent, if two values are consistent, then it represents that the video conference information of reception and the video of terminal device before Conferencing information is consistent, ensure that the integrality of data, then carries out the processing of next step, if two values are inconsistent, table Registration is according to being changed, so as to judge that data are distorted, in this case, then without following processing.
After continuing as shown in figure 3, getting video conference solicited message, video conference solicited message is subjected to calculating life Into summary, the summary, solicited message and symmetric key are subjected to rsa encryption, generation ciphertext is sent to the server, serviced Device is decrypted according to RSA private keys, obtains video conference solicited message, and solicited message is generated and made a summary, by the summary info Compared with the summary info after decryption, so as to ensure the video conference information that terminal device sends over and the decryption received The integrality of video conference information afterwards.
In the specific implementation, after request results are encrypted server end according to symmetric key, after encryption Ciphertext is sent to terminal device, in addition to request results are calculated into MD5 values according to MD5, also sends the summary to terminal Equipment, so as to ensure integrality of the request results in transmitting procedure, determine whether data are tampered in transmitting procedure.
The present embodiment carries out digest algorithm calculating by terminal device to video conference solicited message, generates digest value, and By server generate digest value judged, so as to ensure data transmitted between terminal device and server it is complete Property.
Further, as shown in figure 5, proposing that video conference information transferring method the 3rd of the present invention is real based on second embodiment Example is applied, in the present embodiment, after the step S10, methods described also includes:
Step S102, the terminal device triggers key generation instruction according to the video conference solicited message, according to institute State key generation instruction and generate the default symmetric key, and the default symmetric key is stored in local.
It should be noted that the default symmetric key can be according to local key create-rule, the symmetric key of generation, In the specific implementation, the random string of one 8-16 bit length of generation at random, character string composition is digital 0-9, alphabetical a-z, A-Z, just obtained afterwards using the character string as AES key in terminal device after video conference solicited message, can be according to this Video conference solicited message generates symmetric key, and the symmetric key is preserved locally, so as to by the symmetric key The information for carrying out symmetric cryptography is decrypted.
In order to further realize Hybrid Encryption, on the premise of Information Security is improved, ensure the efficiency of data encryption, In the specific implementation, terminal device gets video conference information, and key generation is triggered by the video conference solicited message and referred to Order, instruction generation symmetric key is generated by the key.
It is understood that in the present embodiment, the key generation instruction can refer to the generation instruction of generation symmetric key, Server is sent to by the symmetric key locally generated, and by the symmetric key, server can be made to enter by the symmetric key Row encryption, so as to improve encryption efficiency.
The symmetric key that the present embodiment is generated by terminal device, and the symmetric key is sent to server, clothes can be made Business device is encrypted by the symmetric key, so as to improve encryption efficiency.
Reference picture 6, Fig. 6 are the server architecture schematic diagram for the hardware running environment that scheme of the embodiment of the present invention is related to.
As shown in fig. 6, the server can include:Processor 2001, such as CPU, communication bus 2002, user interface 2003, network interface 2004, memory 2005.Wherein, communication bus 2002 is used to realize the connection communication between these components. User interface 2003 can include display screen (Display), input block such as keyboard (Keyboard), optional user interface 1003 can also include wireline interface, the wave point of standard.Network interface 2004 can optionally connect including the wired of standard Mouth, wave point (such as WI-FI interfaces).Memory 2005 can be high-speed RAM memory or stable memory (non-volatile memory), such as magnetic disk storage.Memory 2005 optionally can also be independently of aforementioned processor 1001 storage device.
It will be understood by those skilled in the art that the server architecture shown in Fig. 6 does not form the restriction to server, can With including than illustrating more or less parts, either combining some parts or different parts arrangement.
As shown in fig. 6, as in a kind of memory 2005 of storage medium can include operating system, network service mould Block, Subscriber Interface Module SIM and video conference message transmission procedure.
In the server shown in Fig. 6, network interface 2004 is mainly used in connecting network, and carrying out data with internet leads to Letter;User interface 2003 is mainly used in connecting terminal, enters row data communication with terminal;Server of the present invention passes through processor 2001 The video conference message transmission procedure stored in memory 2005 is called, and performs following operate:
The first ciphertext that server receiving terminal equipment is sent;
First ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains video conference Solicited message and default symmetric key;
The server searches target video conferencing information according to the video conference solicited message, according to described default pair Claim key that the target video conferencing information found is encrypted, obtain and feed back the second ciphertext, so that the terminal device The second ciphertext of the server feedback is received, second ciphertext is solved by the default symmetric key locally generated It is close, obtain the target video conferencing information.
Further, processor 2001 can call the video conference message transmission procedure stored in memory 2005, also Perform following operate:
The server video conference solicited message is encrypted the second summary info of generation;
The server receives the first summary info that the terminal device is sent, by first summary info with it is described Second summary info is matched, and perform the server according to matching result searches mesh according to the video conference solicited message Video conference information is marked, the target video conferencing information found is encrypted according to the default symmetric key, is obtained simultaneously The step of feeding back the second ciphertext.
Further, processor 2001 can call the video conference message transmission procedure stored in memory 2005, also Perform following operate:
The server receives store instruction, and the asymmetric privacy keys are stored in into local according to the store instruction.
The present embodiment server end is by the way of Hybrid Encryption, and on the premise of data high security is ensured, raising regards The efficiency of frequency conferencing information encryption.
Based on above-mentioned Fig. 6 hardware configurations, video conference information transferring method embodiment of the present invention is proposed.
Reference picture 7, Fig. 7 are the schematic flow sheet of video conference information transferring method fourth embodiment of the present invention.
In the present embodiment, methods described includes step:
Step S10', the first ciphertext that server receiving terminal equipment is sent;
It should be noted that executive agent in the present embodiment is server, first ciphertext can be video conference Solicited message and symmetric key, the video conference information and symmetric key that the server is sent by receiving terminal apparatus, and It is transmitted by the form of ciphertext, so as to ensure the security of data transfer.
Step S20', the server are decrypted to first ciphertext according to the asymmetric privacy keys locally to prestore, obtained Take video conference solicited message and default symmetric key;
In the present embodiment, asymmetric privacy keys can be prestored in advance in server end, by the asymmetric privacy keys to described First ciphertext is decrypted, so as to get the video conference solicited message and symmetric key of terminal device transmission.
In order to realize the encryption efficiency of server, by generating symmetric key in terminal device, and the symmetric key is sent out Server is given, server gets symmetric key by decryption, and the encryption of data is completed by the symmetric key, so as to not Symmetric key need to be locally generated, so as to improve the efficiency of encryption.
Continue as shown in figure 3, in the server, server obtain terminal device carry out the solicited message of rsa encryption with And symmetric key, server are decrypted by the RSA private keys of local, the video conference request letter of terminal device transmission is got Breath and symmetric key, so as to be encrypted using the symmetric key, improve data encryption efficiency.
Step S30', the server search target video conferencing information according to the video conference solicited message, according to The target video conferencing information found is encrypted the default symmetric key, obtains and feeds back the second ciphertext, so that institute The second ciphertext that terminal device receives the server feedback is stated, it is close to described second by the default symmetric key locally generated Text is decrypted, and obtains the target video conferencing information.
In the present embodiment, the target video conferencing information can be corresponding to be made for video conference information request Request results, request results corresponding with the solicited message are found according to the solicited message of video conference, such as terminal is set The standby video request information according to user, the video request information is sent to corresponding server, server is according to the video Solicited message establishes the connectivity port of connection corresponding to finding, and the port is sent into terminal device, so as to the end End equipment is successfully established video conference, and the symmetric key sent in transmitting procedure by terminal device is encrypted, so as to On the premise of the safety of video conference information is ensured, the encryption efficiency of video conference is improved.
Continue as shown in figure 3, terminal device receives video conference solicited message, according to the generation of video conference solicited message Symmetric key, solicited message and symmetric key are entered into RSA public key encryptions and generate the first ciphertext, and first ciphertext is sent to Server, server are decrypted according to the first ciphertext of reception according to RSA private keys, obtain solicited message and symmetric key, and by root It is encrypted according to the request results of solicited message by symmetric key, and the information after encryption is sent to terminal device.
In order to improve the security of data transfer, terminal device receives the second ciphertext of server feedback, and described second Ciphertext can be request results, and request results are transmitted by way of ciphertext, terminal device receive the second ciphertext it Afterwards, second ciphertext is decrypted by the symmetric key locally to prestore, so as to get target video conferencing information, so as to Video conference can be established.
In the specific implementation, second ciphertext can also be the request knot that server is judged according to video conference information Fruit, the request results is carried out the ciphertext of symmetric cryptography, or the video conference port of matching is encrypted, and by port Information is sent to the terminal device, so as to make terminal device establish video conference according to the port information.
Server on the premise of data high security is ensured, carries by using the mode of Hybrid Encryption in the present embodiment The efficiency of high video conference information encryption.
Further, as shown in figure 8, proposing that video conference information transferring method the 5th of the present invention is real based on fourth embodiment Example is applied, in the present embodiment, after the step S20', methods described also includes:
Step S201', the server video conference solicited message are encrypted the second summary info of generation;
It should be noted that second summary info can be server generates summary according to AES, in this implementation In example, MD5 values can be generated by MD5 algorithms, be judged by the MD5 values of calculating with the MD5 values received, so as to ensure to transmit Data integrality.
Step S202', the server receive the first summary info that the terminal device is sent, described first are made a summary Information is matched with second summary info, and perform the server according to matching result asks according to the video conference Information searching target video conferencing information, the target video conferencing information found is added according to the default symmetric key It is close, the step of obtaining and feed back the second ciphertext.
It is understood that in terminal device according to the video conference solicited message of reception, by the solicited message according to MD5 Algorithm carries out calculating one MD5 of generation, and the MD5 values ensure that the uniqueness of data, and the MD5 values are sent into server, clothes Business device is decrypted according to asymmetric privacy keys, gets the video conference solicited message that transmission obtains, and according to the video conference Solicited message generates current MD5 values, and current MD5 values compared with the MD5 values of the transmission obtained after decryption, judge Whether two MD5 are consistent, if two values are consistent, then it represents that the video conference information of reception and the video of terminal device before Conferencing information is consistent, ensure that the integrality of data, then carries out the processing of next step, if two values are inconsistent, table Registration is according to being changed, so as to judge that data are distorted, in this case, then without following processing.
After continuing as shown in figure 3, getting video conference solicited message, video conference solicited message is subjected to calculating life Into summary, the summary, solicited message and symmetric key are subjected to rsa encryption, generation ciphertext is sent to the server, serviced Device is decrypted according to RSA private keys, obtains video conference solicited message, and solicited message is generated and made a summary, by the summary info Compared with the summary info after decryption, so as to ensure the video conference information that terminal device sends over and the decryption received The integrality of video conference information afterwards.
In the specific implementation, after request results are encrypted server end according to symmetric key, after encryption Ciphertext is sent to terminal device, in addition to request results are calculated into MD5 values according to MD5, also sends the summary to terminal Equipment, so as to ensure integrality of the request results in transmitting procedure, determine whether data are tampered in transmitting procedure.
The present embodiment carries out digest algorithm calculating by server to video conference solicited message, generates digest value, and lead to Cross server generation digest value judged, so as to ensure data transmitted between terminal device and server it is complete Property.
Further, as shown in figure 9, proposing that video conference information transferring method the 6th of the present invention is real based on the 5th embodiment Example is applied, in the present embodiment, before the step S20', methods described also includes:
Step S203', the server receive store instruction, are stored the asymmetric privacy keys according to the store instruction In local.
It should be noted that in the technology of data encryption, need to be provided with public key and private key for asymmetric encryption mode, And during AES encryption, as long as there is AES key to carry out plus decode to data, and in unsymmetrical key, then must have Public key could carry out encryption and decryption with private key, it is seen that for unsymmetrical key, the encryption that data are completed by two sets of keys shows So than only needing the cryptographic security that a set of key is completed high.
In order to realize the cipher mode of high security, prestore asymmetric public key in terminal device, is prestored in server end Asymmetric privacy keys, so as to complete the asymmetric encryption of data, improve security of the data in transmitting procedure.
In the specific implementation, the server by receiving store instruction, in the present embodiment, the store instruction be The command information of asymmetric privacy keys is stored in local, asymmetric privacy keys can be stored in server end by the command information, so as to It can be achieved that the ciphertext that terminal device is sent is decrypted, so as to obtain the video conference solicited message after decryption.
The present embodiment receives store instruction by server, is prestored by the store instruction in local asymmetric privacy keys, So as to realize to data plus decoding, the security of data transfer is improved.
In addition, the embodiment of the present invention also proposes a kind of storage medium, video conference information is stored with the storage medium Program is transmitted, following operation is realized when the video conference message transmission procedure is performed by first processor:
Terminal device obtains video conference solicited message, default pair that the video conference solicited message is from a locally generated Claim key as data to be transmitted;
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for the terminal device, generation first Ciphertext;
First ciphertext is sent to server by the terminal device, so that the server is non-according to what is locally prestored First ciphertext is decrypted asymmetric private key, the video conference solicited message and default symmetric key is obtained, according to institute State video conference solicited message and search target video conferencing information, according to the default symmetric key to the target video that finds Conferencing information is encrypted, and obtains and feeds back the second ciphertext;
The terminal device receives the second ciphertext of the server feedback, by the default symmetric key to described the Two ciphertexts are decrypted, and obtain the target video conferencing information.
Further, following operation is also realized when the video conference message transmission procedure is performed by first processor:
The first summary info of generation is encrypted according to the video conference solicited message in the terminal device, and by described in First summary info is sent to server with the data to be transmitted after encryption, so that the server is non-right according to what is locally prestored Claim private key that first ciphertext is decrypted, the video conference solicited message is obtained, by the video conference solicited message Be encrypted generation the second summary info, first summary info is matched with second summary info, according to The step of target video conferencing information is searched according to the video conference solicited message is performed with result.
Further, following operation is also realized when the video conference message transmission procedure is performed by first processor:
The terminal device triggers key generation instruction according to the video conference solicited message, is generated according to the key Instruction generates the default symmetric key, and the default symmetric key is stored in into local.
In the present embodiment terminal device by using Hybrid Encryption mode, on the premise of data high security is ensured, Improve the efficiency of video conference information encryption.
In addition, the embodiment of the present invention also proposes a kind of storage medium, video conference information is stored with the storage medium Program is transmitted, following operation is realized when the video conference message transmission procedure is performed by second processor:
The first ciphertext that server receiving terminal equipment is sent;
First ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains video conference Solicited message and default symmetric key;
The server searches target video conferencing information according to the video conference solicited message, according to described default pair Claim key that the target video conferencing information found is encrypted, obtain and feed back the second ciphertext, so that the terminal device The second ciphertext of the server feedback is received, second ciphertext is solved by the default symmetric key locally generated It is close, obtain the target video conferencing information.
Further, following operation is also realized when the video conference message transmission procedure is performed by second processor:
The server video conference solicited message is encrypted the second summary info of generation;
The server receives the first summary info that the terminal device is sent, by first summary info with it is described Second summary info is matched, and perform the server according to matching result searches mesh according to the video conference solicited message Video conference information is marked, the target video conferencing information found is encrypted according to the default symmetric key, is obtained simultaneously The step of feeding back the second ciphertext.
Further, following operation is also realized when the video conference message transmission procedure is performed by second processor:
The server receives store instruction, and the asymmetric privacy keys are stored in into local according to the store instruction.
Server on the premise of data high security is ensured, carries by using the mode of Hybrid Encryption in the present embodiment The efficiency of high video conference information encryption.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or system institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
In if the unit claim of equipment for drying is listed, several in these devices can be by same hard Part item embodies.The use of word first, second, and third does not indicate that any order.These words can be explained For title.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, Computer, server, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.
The equivalent structure or equivalent flow conversion that specification and accompanying drawing content are made, or directly or indirectly it is used in other phases The technical field of pass, is included within the scope of the present invention.

Claims (10)

1. a kind of video conference information transferring method, it is characterised in that the video conference information transferring method includes following step Suddenly:
Terminal device obtains video conference solicited message, the video conference solicited message is from a locally generated default symmetrical close Key is as data to be transmitted;
The data to be transmitted is encrypted according to the asymmetric public key locally to prestore for the terminal device, and generation first is close Text;
First ciphertext is sent to server by the terminal device, so that the server is asymmetric according to what is locally prestored First ciphertext is decrypted private key, obtains the video conference solicited message and default symmetric key, is regarded according to described Frequency request for conference information searching target video conferencing information, according to target video meeting of the default symmetric key to finding Information is encrypted, and obtains and feeds back the second ciphertext;
The terminal device receives the second ciphertext of the server feedback, close to described second by the default symmetric key Text is decrypted, and obtains the target video conferencing information.
2. video conference information transferring method as claimed in claim 1, it is characterised in that the terminal device obtains video council After discussing solicited message, methods described also includes:
The first summary info of generation is encrypted according to the video conference solicited message in the terminal device, and by described first Summary info is sent to server with the data to be transmitted after encryption, so that the server is according to the asymmetric private locally to prestore First ciphertext is decrypted key, obtains the video conference solicited message, and the video conference solicited message is carried out Encryption the second summary info of generation, first summary info is matched with second summary info, tied according to matching Fruit performs the step of searching target video conferencing information according to the video conference solicited message.
3. video conference information transferring method as claimed in claim 1 or 2, it is characterised in that the terminal device is obtained and regarded After frequency request for conference information, methods described also includes:
The terminal device triggers key generation instruction according to the video conference solicited message, is generated and instructed according to the key The default symmetric key is generated, and the default symmetric key is stored in local.
4. a kind of terminal device, it is characterised in that the terminal device includes:Memory, processor and it is stored in the storage On device and the video conference message transmission procedure that can run on the processor, the video conference message transmission procedure configuration The step of to realize video conference information transferring method as claimed any one in claims 1 to 3.
A kind of 5. storage medium, it is characterised in that video conference message transmission procedure is stored with the storage medium, it is described to regard Frequency conferencing information transmission program realizes video conference information as claimed any one in claims 1 to 3 when being executed by processor The step of transmission method.
6. a kind of video conference information transferring method, it is characterised in that the video conference information transferring method includes following step Suddenly:
The first ciphertext that server receiving terminal equipment is sent;
First ciphertext is decrypted according to the asymmetric privacy keys locally to prestore for the server, obtains video conference request Information and default symmetric key;
The server searches target video conferencing information according to the video conference solicited message, according to described default symmetrical close The target video conferencing information found is encrypted key, obtains and feeds back the second ciphertext, so that the terminal device receives Second ciphertext of the server feedback, second ciphertext is decrypted by the default symmetric key locally generated, obtained Obtain the target video conferencing information.
7. video conference information transferring method as claimed in claim 6, it is characterised in that the server prestores according to local Asymmetric privacy keys first ciphertext is decrypted, after obtaining video conference solicited message and default symmetric key, institute Stating method also includes:
The server video conference solicited message is encrypted the second summary info of generation;
The server receives the first summary info that the terminal device is sent, by first summary info and described second Summary info is matched, and perform the server according to matching result regards according to video conference solicited message lookup target Frequency conferencing information, the target video conferencing information found is encrypted according to the default symmetric key, obtains and feeds back The step of second ciphertext.
8. video conference information transferring method as claimed in claims 6 or 7, it is characterised in that the server is according to local First ciphertext is decrypted the asymmetric privacy keys to prestore, obtain video conference solicited message and default symmetric key it Before, methods described also includes:
The server receives store instruction, and the asymmetric privacy keys are stored in into local according to the store instruction.
9. a kind of server, it is characterised in that the server includes:Memory, processor and it is stored on the memory And the video conference message transmission procedure that can be run on the processor, the video conference message transmission procedure are configured to reality Now the step of video conference information transferring method as any one of claim 6 to 8.
A kind of 10. storage medium, it is characterised in that video conference message transmission procedure is stored with the storage medium, it is described The video conference letter as any one of claim 6 to 8 is realized when video conference message transmission procedure is executed by processor The step of ceasing transmission method.
CN201710905670.1A 2017-09-28 2017-09-28 Video conference information transferring method, terminal device, server and storage medium Pending CN107566397A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710905670.1A CN107566397A (en) 2017-09-28 2017-09-28 Video conference information transferring method, terminal device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710905670.1A CN107566397A (en) 2017-09-28 2017-09-28 Video conference information transferring method, terminal device, server and storage medium

Publications (1)

Publication Number Publication Date
CN107566397A true CN107566397A (en) 2018-01-09

Family

ID=60984499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710905670.1A Pending CN107566397A (en) 2017-09-28 2017-09-28 Video conference information transferring method, terminal device, server and storage medium

Country Status (1)

Country Link
CN (1) CN107566397A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109484723A (en) * 2018-11-07 2019-03-19 广州凯晟信息科技有限公司 Endowed control method, device and storage medium
CN110430194A (en) * 2019-08-06 2019-11-08 腾讯科技(深圳)有限公司 A kind of method of Information Authentication, the method and device of chess and card Information Authentication
CN110475095A (en) * 2019-08-21 2019-11-19 苏州科达科技股份有限公司 A kind of conference control method, device, equipment and readable storage medium storing program for executing
CN110995669A (en) * 2019-11-19 2020-04-10 拉扎斯网络科技(上海)有限公司 Information processing method, information processing device, electronic equipment and computer readable storage medium
CN111787271A (en) * 2020-07-31 2020-10-16 平安信托有限责任公司 Video conference control method, device, equipment and computer readable storage medium
CN112099742A (en) * 2020-08-13 2020-12-18 深圳奇迹智慧网络有限公司 Asynchronous display control method, asynchronous display control terminal and asynchronous display system
CN112383392A (en) * 2020-11-13 2021-02-19 随锐科技集团股份有限公司 Video conference alternate encryption method and device and computer readable storage medium
CN112468477A (en) * 2020-11-20 2021-03-09 中国建设银行股份有限公司 Data docking method, device and storage medium based on service desk gateway
CN115865540A (en) * 2023-03-03 2023-03-28 北京和升达信息安全技术有限公司 Information secure transmission method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005361A (en) * 2007-01-22 2007-07-25 北京飞天诚信科技有限公司 Server and software protection method and system
US20140075188A1 (en) * 2012-09-11 2014-03-13 Verizon Patent And Licensing Inc. Trusted third party client authentication
CN105245340A (en) * 2015-09-07 2016-01-13 天地融科技股份有限公司 Identity authentication method based on remote account opening and system
CN105915342A (en) * 2016-07-01 2016-08-31 广州爱九游信息技术有限公司 Application program communication processing system, an application program communication processing device, an application program communication processing apparatus and an application program communication processing method
WO2016206018A1 (en) * 2015-06-24 2016-12-29 冯旋宇 Data encryption method and system for set top box

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101005361A (en) * 2007-01-22 2007-07-25 北京飞天诚信科技有限公司 Server and software protection method and system
US20140075188A1 (en) * 2012-09-11 2014-03-13 Verizon Patent And Licensing Inc. Trusted third party client authentication
WO2016206018A1 (en) * 2015-06-24 2016-12-29 冯旋宇 Data encryption method and system for set top box
CN105245340A (en) * 2015-09-07 2016-01-13 天地融科技股份有限公司 Identity authentication method based on remote account opening and system
CN105915342A (en) * 2016-07-01 2016-08-31 广州爱九游信息技术有限公司 Application program communication processing system, an application program communication processing device, an application program communication processing apparatus and an application program communication processing method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109484723A (en) * 2018-11-07 2019-03-19 广州凯晟信息科技有限公司 Endowed control method, device and storage medium
CN110430194A (en) * 2019-08-06 2019-11-08 腾讯科技(深圳)有限公司 A kind of method of Information Authentication, the method and device of chess and card Information Authentication
CN110430194B (en) * 2019-08-06 2022-04-15 腾讯科技(深圳)有限公司 Information verification method, chess and card information verification method and device
CN110475095A (en) * 2019-08-21 2019-11-19 苏州科达科技股份有限公司 A kind of conference control method, device, equipment and readable storage medium storing program for executing
CN110995669A (en) * 2019-11-19 2020-04-10 拉扎斯网络科技(上海)有限公司 Information processing method, information processing device, electronic equipment and computer readable storage medium
CN111787271A (en) * 2020-07-31 2020-10-16 平安信托有限责任公司 Video conference control method, device, equipment and computer readable storage medium
CN112099742A (en) * 2020-08-13 2020-12-18 深圳奇迹智慧网络有限公司 Asynchronous display control method, asynchronous display control terminal and asynchronous display system
CN112383392A (en) * 2020-11-13 2021-02-19 随锐科技集团股份有限公司 Video conference alternate encryption method and device and computer readable storage medium
CN112383392B (en) * 2020-11-13 2024-03-15 随锐科技集团股份有限公司 Video conference rotation encryption method, video conference rotation encryption equipment and computer readable storage medium
CN112468477A (en) * 2020-11-20 2021-03-09 中国建设银行股份有限公司 Data docking method, device and storage medium based on service desk gateway
CN115865540A (en) * 2023-03-03 2023-03-28 北京和升达信息安全技术有限公司 Information secure transmission method and device

Similar Documents

Publication Publication Date Title
CN107566397A (en) Video conference information transferring method, terminal device, server and storage medium
US20190268314A1 (en) Sharing resources across multiple devices in online meetings
US8898455B2 (en) System and method for authentication of a communication device
US20150135240A1 (en) Video display terminal, video transmission terminal, video communication system, video display method, video transmission method, and computer-readable recording medium recording program
US20150089220A1 (en) Technique For Bypassing an IP PBX
WO2015180654A1 (en) Method and apparatus for achieving secret communications
US10791124B2 (en) Method and terminal device for encrypting message
US9872175B2 (en) Packet processing method, apparatus, and system
CN112104454B (en) Data secure transmission method and system
KR102433939B1 (en) Methods for fast, secure and privacy-friendly internet connection discovery in wireless networks
CN112398651A (en) Quantum secret communication method and device, electronic equipment and storage medium
CN105376261A (en) Encryption method and system for instant communication message
CN113347215B (en) Encryption method for mobile video conference
CN111884802B (en) Media stream encryption transmission method, system, terminal and electronic equipment
CN107196918B (en) Data matching method and device
CN107820242A (en) A kind of machinery of consultation of authentication mechanism and device
US20190149326A1 (en) Key obtaining method and apparatus
WO2017197968A1 (en) Data transmission method and device
CN107508814A (en) Data ciphering method, decryption method, apparatus and system
CN114866234B (en) Voice communication method, device, equipment and storage based on quantum key encryption and decryption
KR102358965B1 (en) Communication device, communication method, and program
CN107529159B (en) Access layer encryption, decryption and integrity protection method and device for broadband cluster downlink shared channel and security implementation method
CN114826591A (en) Cross-device data transmission method, system and terminal
US20180183741A1 (en) Multimedia file adaption across different communication platforms
WO2020147602A1 (en) Authentication method, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180109