CN108965227A - A kind of data processing method and view networking Conference server - Google Patents

A kind of data processing method and view networking Conference server Download PDF

Info

Publication number
CN108965227A
CN108965227A CN201711445200.8A CN201711445200A CN108965227A CN 108965227 A CN108965227 A CN 108965227A CN 201711445200 A CN201711445200 A CN 201711445200A CN 108965227 A CN108965227 A CN 108965227A
Authority
CN
China
Prior art keywords
encryption information
meeting
control terminal
conference
conference terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711445200.8A
Other languages
Chinese (zh)
Other versions
CN108965227B (en
Inventor
古明敏
王艳辉
亓娜
杨春晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Visionvera International Information Technology Co Ltd
Original Assignee
Beijing Visionvera International Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Visionvera International Information Technology Co Ltd filed Critical Beijing Visionvera International Information Technology Co Ltd
Priority to CN201711445200.8A priority Critical patent/CN108965227B/en
Publication of CN108965227A publication Critical patent/CN108965227A/en
Application granted granted Critical
Publication of CN108965227B publication Critical patent/CN108965227B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/61Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/403Arrangements for multi-party communication, e.g. for conferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Medical Informatics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses a kind of data processing method and a kind of view networking Conference server, which comprises obtains encryption information, and is identified using the encryption information verifying meeting control terminal;When the meeting control terminal identity verification success, conference terminal mark is obtained, and using the encryption information verifying conference terminal mark;When conference terminal identity verification success, sends meeting and initiate request to view networking Conference server;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.According to embodiments of the present invention, it is convenient for view networking conference management, solving the problems, such as the prior art, there is be difficult to carry out view networking conference management.

Description

A kind of data processing method and view networking Conference server
Technical field
The present embodiments relate to the communications field more particularly to a kind of data processing methods, and, a kind of view networking meeting Server.
Background technique
Currently, with the fast development of the network technology, the two-way communications such as video conference, video teaching user life, Work, study etc. are widely available, are increasingly used in each technical field depending on networking technology, join especially with view Network technology carries out video conference.
It is carried out in the technology of video conference using view networking technology, needs to be arranged a view networking meeting control terminal and one Depending on conference terminal of networking.It can be the personal mobile phone for being equipped with Conference control software of user, computer etc. depending on networking meeting control terminal Terminal, user can control terminal control view networking conference terminals by view networking.And it then can be depending on networking conference terminal and include Camera function, projecting function, the terminal for regarding combined network communication function, for acquiring conferencing data, by view networking and view networking meeting Discuss server connection and interactive video data.
When user needs to carry out video conference by view networking, it is only necessary to which view is networked can control terminal access view networking meeting Terminal is discussed, and by view networking conference terminal access view networking Conference server, a view networking meeting can be initiated.
However, user optionally can initiate to regard networking meeting using any view networking meeting control terminal and view networking conference terminal View is easy to cause the confusion of view networking meeting, it is difficult to carry out the management of view networking meeting.
Therefore, there is be difficult to the problem of carrying out view networking conference management for the prior art.
Summary of the invention
The present invention provides a kind of data processing method and a kind of view networking Conference server, are deposited with solving the prior art Be difficult to carry out view networking conference management the problem of.
In order to solve the above technical problems, the invention discloses a kind of data processing methods, can control applied to depending on networking Terminal, it is described to be stored with meeting control terminal mark depending on networking meeting control terminal, which comprises
Encryption information is obtained, and using the encryption information verifying meeting control terminal mark;
When the meeting control terminal identity verification success, conference terminal mark is obtained, and using encryption information verifying institute State conference terminal mark;
When conference terminal identity verification success, sends meeting and initiate request to view networking Conference server;The view Conference server of networking, which is used to initiate request according to the meeting to execute meeting, initiates operation.
Optionally, the step of acquisition conference terminal identifies, comprising:
Conference terminal identification request is sent to view networking conference terminal;
Receive the conference terminal mark that the view networking conference terminal returns.
Optionally, the step of meeting control terminal mark described using encryption information verifying, comprising:
Extracting from the encryption information can control terminal mark encryption information;
Generate the first encryption information to be verified of the meeting control terminal mark;
Judge whether the described first encryption information to be verified and the meeting control terminal mark encryption information are consistent;
If so, determining the meeting control terminal identity verification success;
If it is not, then determining the meeting control terminal identity verification failure.
Optionally, described the step of conference terminal mark is verified using the encryption information, comprising:
Conference terminal is extracted from the encryption information identifies encryption information;
Generate the second encryption information to be verified of the conference terminal mark;
Judge whether the described second encryption information to be verified and conference terminal mark encryption information are consistent;
If so, determining the conference terminal identity verification success;
If it is not, then determining the conference terminal identity verification failure.
In order to solve the above technical problems, the invention also discloses a kind of data processing methods, are applied to view networking meeting Discuss server, which comprises
Obtaining can control terminal mark and conference terminal mark;
Encryption information is identified using the meeting control terminal mark meeting of the generation control terminal, and, using the conference terminal mark Know and generates conference terminal mark encryption information;
Merge the meeting control terminal mark encryption information and conference terminal mark encryption information, obtains encryption information;
Send the encryption information.
In order to solve the above technical problems, the invention also discloses a kind of view networking meeting control terminal, the view networking meetings Control terminal is stored with meeting control terminal mark, and the terminal includes:
Meeting control terminal identity verification module can be controlled for obtaining encryption information, and using encryption information verifying is described Terminal iidentification;
Conference terminal identity verification module, for obtaining conference terminal mark when the meeting control terminal identity verification success, And the conference terminal mark is verified using the encryption information;
Request sending module, for sending meeting and initiating request to view networking when conference terminal identity verification success Conference server;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
Optionally, the conference terminal identity verification module, comprising:
Identification request sending submodule, for sending conference terminal identification request to view networking conference terminal;
Receiving submodule is identified, the conference terminal mark returned for receiving the view networking conference terminal.
Optionally, the meeting control terminal identity verification module, comprising:
Encryption information extracting sub-module can be controlled, it can control terminal mark encryption information for being extracted from the encryption information;
First encryption information to be verified generates submodule, for generating the first encryption to be verified of the meeting control terminal mark Information;
First judging submodule, for judging the described first encryption information to be verified and the meeting control terminal mark encryption letter It whether consistent ceases;If so, identity verification success decision sub-module can be controlled by executing, if it is not, identity verification failure can be controlled by then executing Decision sub-module;
Identity verification success decision sub-module can be controlled, for determining the meeting control terminal identity verification success;
Identity verification failure decision sub-module can be controlled, for determining the meeting control terminal identity verification failure.
Optionally, the conference terminal identity verification module, comprising:
Session encryption information extraction submodule identifies encryption information for extracting conference terminal from the encryption information;
Second encryption information to be verified generates submodule, for generating the second encryption to be verified of the conference terminal mark Information;
Second judgment submodule, for judging the described second encryption information to be verified and conference terminal mark encryption letter It whether consistent ceases;If so, executing meeting identification is proved to be successful decision sub-module, if it is not, then executing meeting identification authentication failed Decision sub-module
Meeting identification is proved to be successful decision sub-module, for determining the conference terminal identity verification success;
Meeting identification authentication failed decision sub-module, for determining the conference terminal identity verification failure.
In order to solve the above technical problems, the invention also discloses view networking Conference server, the server includes:
Identifier acquisition module, can control terminal mark and conference terminal mark for obtaining;
Encryption information generation module is identified, is used to encrypt letter using the meeting control terminal mark meeting of the generation control terminal mark Breath, and, it is identified using the conference terminal and generates conference terminal mark encryption information;
Encryption information merging module adds for merging the meeting control terminal mark encryption information and conference terminal mark Confidential information obtains encryption information;
Encryption information sending module, for sending the encryption information.
According to embodiments of the present invention, login authentication is carried out by the inputted encryption information of user, in encryption information and company of institute When the terminal iidentification for regarding networking meeting control terminal, regarding networking conference terminal connect matches, the view meeting of networking control terminal and view could be used Conference terminal of networking logs in view networking Conference server, consequently facilitating carrying out view networking conference management, solves the prior art and deposits It is being difficult to the problem of carrying out view networking conference management.
Detailed description of the invention
Fig. 1 is the flow chart for the data processing method that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of data processing method provided by Embodiment 2 of the present invention;
Fig. 3 is the structural block diagram for the view networking meeting control terminal that the embodiment of the present invention three provides;
Fig. 4 is the structural block diagram for the view networking Conference server that the embodiment of the present invention four provides;
Fig. 5 is a kind of networking schematic diagram of view networking of the invention;
Fig. 6 is a kind of hardware structural diagram of node server of the invention;
Fig. 7 is a kind of hardware structural diagram of access switch of the invention;
Fig. 8 is the hardware structural diagram that a kind of Ethernet association of the invention turns gateway.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Embodiment one
Fig. 1 is the flow chart for the data processing method that the embodiment of the present invention one provides, and is applied to view networking meeting control terminal, institute It states and is stored with meeting control terminal mark depending on networking meeting control terminal, the method can specifically include:
Step 110, encryption information is obtained, and using the encryption information verifying meeting control terminal mark.
It should be noted that the data processing method of the embodiment of the present invention can be applied on view networking meeting control terminal.
In the concrete realization, when user carries out view networking meeting, Shen can be carried out to view networking conference management side Please, certain view networking meeting control terminal and view networking conference terminal can be specified, as this according to application depending on networking conference management side The view networking of secondary view networking meeting can control terminal and view networking conference terminal.More specifically, can be to depending on networking conference management side Sending depending on networking Conference server can control terminal mark and conference terminal mark.
Wherein, meeting control terminal mark corresponds to specified view networking meeting control terminal, and conference terminal, which identifies, corresponds to meaning Fixed view networking conference terminal.
Wherein, each to have can store corresponding meeting control terminal mark on control terminal depending on networking.For example, if view networking Meeting control terminal is a PC, and meeting control terminal mark may include the MAC Address etc. of the computer network interface card.
Wherein, each depending on can store corresponding conference terminal mark on networking conference terminal.For example, view networking meeting The Termination ID etc. of terminal.
Meeting control terminal mark and conference terminal mark are received depending on networking Conference server, it can be using meeting control terminal mark The meeting of generation control terminal identifies encryption information, and, generation conference terminal is identified using conference terminal and identifies encryption information.Then, Merge meeting control terminal mark encryption information and conference terminal identifies encryption information, obtains an encryption information, and the encryption is believed Breath is sent to view networking conference management side, by providing the encryption information to the use for applying for regarding networking meeting depending on networking conference management side Family.
In practical application, one can be generated for meeting control terminal mark and conference terminal mark by Key Core Generator Key, as above-mentioned encryption information.
Appointed view networking meeting control terminal can be accessed appointed view networking conference terminal by user.Then, user Can star view networking can meeting control software on control terminal, software can be controlled and accordingly pop up a user input interface, user can be with In the user input interface, encryption information is inputted.Encryption information is got depending on networking meeting control terminal as a result,.
, can be according to the encryption information after getting encryption information depending on networking meeting control terminal, verifying view networking can control terminal The meeting control terminal of upper storage identifies, to judge that whether this regards networking meeting control terminal as legal view networking meeting control terminal.
Optionally, the step of meeting control terminal mark described using encryption information verifying, comprising:
Extracting from the encryption information can control terminal mark encryption information;
Generate the first encryption information to be verified of the meeting control terminal mark;
Judge whether the described first encryption information to be verified and the meeting control terminal mark encryption information are consistent;
If so, determining the meeting control terminal identity verification success;
If it is not, then determining the meeting control terminal identity verification failure.
The meeting control terminal that view networking is verified according to the encryption information can be stored on control terminal identify in the specific implementation, can With the extraction meeting control terminal mark encryption information first from encryption information, meanwhile, for meeting control terminal mark, generation one is to be tested Demonstrate,prove encryption information.
In order to distinguish explanation, meeting control terminal identifies corresponding encryption information to be verified, is named as the first encryption letter to be verified Breath.
Then, judge whether the first encryption information to be verified and meeting control terminal mark encryption information are consistent.It, can if consistent To determine meeting control terminal identity verification success, otherwise, then can be determined that can the failure of control terminal identity verification.
For example, encryption information is a Key, which is identified by meeting control terminal mark encryption information Key_1 and conference terminal Encryption information Key_2 composition, can be to extract meeting control terminal mark encryption information Key_1 in Key.Meanwhile for as can control The MAC Address of terminal iidentification generates the first encryption information Key_1` to be verified, Key_1 is compared with Key_1`, judges it Between consistency.
Step 120, when the meeting control terminal identity verification success, conference terminal mark is obtained, and using encryption letter Breath verifies the conference terminal mark.
In the specific implementation, then can further network from view can control terminal institute when determining meeting control terminal identity verification success In the view networking conference terminal of connection, conference terminal mark is obtained, and according to encryption information, verify conference terminal mark.
Optionally, the step of acquisition conference terminal identifies, comprising:
Conference terminal identification request is sent to view networking conference terminal;
Receive the conference terminal mark that the view networking conference terminal returns.
Obtain conference terminal mark in the specific implementation, due to view network can control terminal with view network conference terminal Therefore connection can send conference terminal identification request to view networking conference terminal, can be asked according to this depending on networking conference terminal It asks, returns to the conference terminal mark of its storage.View networking meeting control terminal is available as a result, arrives meeting terminal iidentification.
Optionally, described the step of conference terminal mark is verified using the encryption information, comprising:
Conference terminal is extracted from the encryption information identifies encryption information;
Generate the second encryption information to be verified of the conference terminal mark;
Judge whether the described second encryption information to be verified and conference terminal mark encryption information are consistent;
If so, determining the conference terminal identity verification success;
If it is not, then determining the conference terminal identity verification failure.
On verifying view networking conference terminal according to encryption information the conference terminal that stores identify in the specific implementation, can be with Conference terminal is extracted first from encryption information identifies encryption information, meanwhile, it is identified for conference terminal, generation one is to be verified Encryption information.
In order to distinguish explanation, conference terminal identifies corresponding encryption information to be verified, is named as the second encryption letter to be verified Breath.
Then, judge whether the second encryption information to be verified and meeting terminal iidentification encryption information are consistent.It, can if consistent To determine the success of conference terminal identity verification, otherwise, then it can be determined that conference terminal identity verification fails.
Based on above-mentioned example, conference terminal mark encryption information Key_2 can be extracted from encryption information Key.Meanwhile For the Termination ID identified as conference terminal, the second encryption information Key_2` to be verified is generated, Key_2 and Key_2` is carried out Compare, the consistency between judgement.
Step 130, it when conference terminal identity verification success, sends meeting and initiates request to view networking conference service Device;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
In the specific implementation, showing it is currently that view networking can control terminal and view networking meeting when the success of conference terminal identity verification View terminal is matched with specified view networking meeting control terminal and view networking conference terminal, therefore login authentication success, user are permitted Permitted to log on to view networking Conference server.Correspondingly, it can be networked by view networking conference terminal to view depending on networking meeting control terminal Conference server sends meeting and initiates request.It then can initiate to request according to the meeting depending on networking Conference server, execute meeting Initiate operation.
In practical applications, in addition to verifying meeting control terminal mark and conference terminal mark, can also verify service life is No legal, for example, being preset with corresponding frequency threshold value for encryption information, whether verifying access times are more than the preset threshold.
According to embodiments of the present invention, login authentication is carried out by the inputted encryption information of user, in encryption information and company of institute When the terminal iidentification for regarding networking meeting control terminal, regarding networking conference terminal connect matches, the view meeting of networking control terminal and view could be used Conference terminal of networking logs in view networking Conference server, consequently facilitating carrying out view networking conference management, solves the prior art and deposits It is being difficult to the problem of carrying out view networking conference management.
Embodiment two
Fig. 2 is the flow chart of data processing method provided by Embodiment 2 of the present invention, is applied to view networking Conference server, The method can specifically include:
Step 210, obtaining can control terminal mark and conference terminal mark.
In the specific implementation, can specify certain the view meeting of networking control terminal and view networking meeting end depending on networking conference management side End, and the specified mark being directed to is sent to view networking Conference server.View networking Conference server is available as a result, Meeting control terminal to the view meeting of networking control terminal identifies, and, get the conference terminal mark of view networking conference terminal.
Step 220, encryption information is identified using the meeting control terminal mark meeting of the generation control terminal, and, using the meeting It discusses terminal iidentification and generates conference terminal mark encryption information.
In the specific implementation, encryption information can be identified for meeting control terminal mark, the meeting of generation control terminal, meanwhile, for meeting Terminal iidentification is discussed, conference terminal is generated and identifies encryption information.
Step 230, merge the meeting control terminal mark encryption information and the conference terminal identifies encryption information, added Confidential information.
In the specific implementation, can will control terminal mark encryption information and conference terminal mark encryption information merge, Using the information after merging as encryption information.
Step 240, the encryption information is sent.
In the specific implementation, the encryption information can be supplied to view networking conference management side, or it is supplied to application and carries out Depending on the user for meeting of networking.
According to embodiments of the present invention, by that will be bound depending on networking meeting control terminal with depending on networking conference terminal, and it is corresponding Generate encryption information, user need according to the encryption information carry out login authentication, encryption information with connect view networking meeting When control terminal, the terminal iidentification for regarding networking conference terminal match, view networking meeting control terminal could be used and regard networking conference terminal View networking Conference server is logged in, consequently facilitating carrying out view networking conference management, solving the prior art, there is be difficult to carry out The problem of depending on networking conference management.
Embodiment three
Fig. 3 is the structural block diagram for the view networking meeting control terminal that the embodiment of the present invention three provides, and the view networking can control terminal It is stored with meeting control terminal mark, the view networking meeting control terminal 300 can be specifically included with lower module:
Meeting control terminal identity verification module 310 verifies the meeting for obtaining encryption information, and using the encryption information Control terminal mark;
Conference terminal identity verification module 320, for obtaining conference terminal mark when the meeting control terminal identity verification success Know, and the conference terminal mark is verified using the encryption information;
Request sending module 330, for sending meeting and initiating request to view connection when conference terminal identity verification success Net Conference server;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
Optionally, the conference terminal identity verification module 320, comprising:
Identification request sending submodule, for sending conference terminal identification request to view networking conference terminal;
Receiving submodule is identified, the conference terminal mark returned for receiving the view networking conference terminal.
Optionally, the meeting control terminal identity verification module 310, comprising:
Encryption information extracting sub-module can be controlled, it can control terminal mark encryption information for being extracted from the encryption information;
First encryption information to be verified generates submodule, for generating the first encryption to be verified of the meeting control terminal mark Information;
First judging submodule, for judging the described first encryption information to be verified and the meeting control terminal mark encryption letter It whether consistent ceases;If so, identity verification success decision sub-module can be controlled by executing, if it is not, identity verification failure can be controlled by then executing Decision sub-module;
Identity verification success decision sub-module can be controlled, for determining the meeting control terminal identity verification success;
Identity verification failure decision sub-module can be controlled, for determining the meeting control terminal identity verification failure.
Optionally, the conference terminal identity verification module 310, comprising:
Session encryption information extraction submodule identifies encryption information for extracting conference terminal from the encryption information;
Second encryption information to be verified generates submodule, for generating the second encryption to be verified of the conference terminal mark Information;
Second judgment submodule, for judging the described second encryption information to be verified and conference terminal mark encryption letter It whether consistent ceases;If so, executing meeting identification is proved to be successful decision sub-module, if it is not, then executing meeting identification authentication failed Decision sub-module
Meeting identification is proved to be successful decision sub-module, for determining the conference terminal identity verification success;
Meeting identification authentication failed decision sub-module, for determining the conference terminal identity verification failure.
According to embodiments of the present invention, login authentication is carried out by the inputted encryption information of user, in encryption information and company of institute When the terminal iidentification for regarding networking meeting control terminal, regarding networking conference terminal connect matches, the view meeting of networking control terminal and view could be used Conference terminal of networking logs in view networking Conference server, consequently facilitating carrying out view networking conference management, solves the prior art and deposits It is being difficult to the problem of carrying out view networking conference management.
Example IV
Fig. 4 is the structural block diagram for the view networking Conference server that the embodiment of the present invention four provides, the view networking meeting clothes Business device 400, can specifically include with lower module:
Identifier acquisition module 410, can control terminal mark and conference terminal mark for obtaining;
Encryption information generation module 420 is identified, is used to encrypt using the meeting control terminal mark meeting of the generation control terminal mark Information, and, it is identified using the conference terminal and generates conference terminal mark encryption information;
Encryption information merging module 430, for merging the meeting control terminal mark encryption information and the conference terminal mark Know encryption information, obtains encryption information;
Encryption information sending module 440, for sending the encryption information.
According to embodiments of the present invention, by that will be bound depending on networking meeting control terminal with depending on networking conference terminal, and it is corresponding Generate encryption information, user need according to the encryption information carry out login authentication, encryption information with connect view networking meeting When control terminal, the terminal iidentification for regarding networking conference terminal match, view networking meeting control terminal could be used and regard networking conference terminal View networking Conference server is logged in, consequently facilitating carrying out view networking conference management, solving the prior art, there is be difficult to carry out The problem of depending on networking conference management.
The treatment process as described in terminal embodiment and server example has specifically in embodiment of the method Bright, therefore, details are not described herein.
It should be added that the above embodiment of the present invention, can be applied in the communication network of view networking.Depending on connection Net is the important milestone of network Development, is a real-time network, can be realized HD video real-time Transmission, by numerous internets Using HD video is pushed to, high definition is face-to-face.
Real-time high-definition video switching technology is used depending on networking, it can be such as high in a network platform by required service Clear video conference, Intellectualized monitoring analysis, emergency command, digital broadcast television, delay TV, the Web-based instruction, shows video monitoring Field live streaming, VOD program request, TV Mail, individual character records (PVR), Intranet (manages) channel by oneself, intelligent video Broadcast Control, information publication All be incorporated into a system platform etc. services such as tens of kinds of videos, voice, picture, text, communication, data, by TV or Computer realizes that high-definition quality video plays.
Embodiment in order to enable those skilled in the art to better understand the present invention is introduced to depending on networking below:
Depending on networking, applied portion of techniques is as described below:
Network technology (Network Technology)
Traditional ethernet (Ethernet) is improved depending on the network technology innovation networked, with potential huge on network Video flow.(Circuit is exchanged different from simple network packet packet switch (Packet Switching) or lattice network Switching), Streaming demand is met using Packet Switching depending on networking technology.Has grouping depending on networking technology Flexible, the simple and low price of exchange, is provided simultaneously with the quality and safety assurance of circuit switching, it is virtually electric to realize the whole network switch type The seamless connection of road and data format.
Switching technology (Switching Technology)
Two advantages of asynchronous and packet switch that Ethernet is used depending on networking eliminate Ethernet under the premise of complete compatible and lack It falls into, has the end-to-end seamless connection of the whole network, direct user terminal, directly carrying IP data packet.User data is in network-wide basis It is not required to any format conversion.It is the more advanced form of Ethernet depending on networking, is a real-time exchange platform, can be realized at present mutually The whole network large-scale high-definition realtime video transmission that networking cannot achieve pushes numerous network video applications to high Qinghua, unitizes.
Server technology (Server Technology)
It is different from traditional server, its Streaming Media depending on the server technology in networking and unified video platform Transmission be built upon it is connection-oriented on the basis of, data-handling capacity is unrelated with flow, communication time, single network layer energy Enough transmitted comprising signaling and data.For voice and video business, handled depending on networking and unified video platform Streaming Media Complexity many simpler than data processing, efficiency substantially increase hundred times or more than traditional server.
Reservoir technology (Storage Technology)
The ultrahigh speed reservoir technology of unified video platform in order to adapt to the media content of vast capacity and super-flow and Using state-of-the-art real time operating system, the programme information in server instruction is mapped to specific hard drive space, media Content is no longer pass through server, and moment is directly delivered to user terminal, and user waits typical time less than 0.2 second.It optimizes Sector distribution greatly reduces the mechanical movement of hard disc magnetic head tracking, and resource consumption only accounts for the 20% of the internet ad eundem IP, but The concurrent flow greater than 3 times of traditional disk array is generated, overall efficiency promotes 10 times or more.
Network security technology (Network Security Technology)
Depending on the structural design networked by servicing independent licence system, equipment and the modes such as user data is completely isolated every time The network security problem that puzzlement internet has thoroughly been eradicated from structure, does not need antivirus applet, firewall generally, has prevented black The attack of visitor and virus, structural carefree secure network is provided for user.
It services innovative technology (Service Innovation Technology)
Business and transmission are fused together by unified video platform, whether single user, private user or a net The sum total of network is all only primary automatic connection.User terminal, set-top box or PC are attached directly to unified video platform, obtain rich The multimedia video service of rich colorful various forms.Unified video platform is traditional to substitute with table schema using " menu type " Complicated applications programming, considerably less code, which can be used, can be realized complicated application, realize the new business innovation of " endless ".
Networking depending on networking is as described below:
It is a kind of central controlled network structure depending on networking, which can be Tree Network, Star network, ring network etc. class Type, but centralized control node is needed to control whole network in network on this basis.
As shown in figure 5, being divided into access net and Metropolitan Area Network (MAN) two parts depending on networking.
The equipment of access mesh portions can be mainly divided into 3 classes: node server, access switch, terminal (including various machines Top box, encoding board, memory etc.).Node server is connected with access switch, and access switch can be with multiple terminal phases Even, and it can connect Ethernet.
Wherein, node server is the node that centralized control functions are played in access net, can control access switch and terminal. Node server can directly be connected with access switch, can also directly be connected with terminal.
Similar, the equipment of metropolitan area mesh portions can also be divided into 3 classes: metropolitan area server, node switch, node serve Device.Metropolitan area server is connected with node switch, and node switch can be connected with multiple node servers.
Wherein, node server is the node server for accessing mesh portions, i.e. node server had both belonged to access wet end Point, and belong to metropolitan area mesh portions.
Metropolitan area server is the node that centralized control functions are played in Metropolitan Area Network (MAN), can control node switch and node serve Device.Metropolitan area server can be directly connected to node switch, can also be directly connected to node server.
It can be seen that be entirely a kind of central controlled network structure of layering depending on networking network, and node server and metropolitan area The network controlled under server can be the various structures such as tree-shaped, star-like, cyclic annular.
Visually claim, access mesh portions can form unified video platform (part in virtual coil), and multiple unified videos are flat Platform can form view networking;Each unified video platform can be interconnected by metropolitan area and wide area depending on networking.
Classify depending on networked devices
1.1 embodiment of the present invention can be mainly divided into 3 classes: server depending on the equipment in networking, interchanger (including ether Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).Depending on networking can be divided on the whole Metropolitan Area Network (MAN) (or National net, World Wide Web etc.) and access net.
1.2 equipment for wherein accessing mesh portions can be mainly divided into 3 classes: node server, access switch (including ether Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).
The specific hardware structure of each access network equipment are as follows:
Node server:
As shown in fig. 6, mainly including Network Interface Module 601, switching engine module 602, CPU module 603, disk array Module 604;
Wherein, Network Interface Module 601, the Bao Jun that CPU module 603, disk array module 604 are come in enter switching engine Module 602;Switching engine module 602 look into the operation of address table 605 to the packet come in, to obtain the navigation information of packet; And the packet is stored according to the navigation information of packet the queue of corresponding pack buffer 606;If the queue of pack buffer 606 is close It is full, then it abandons;All pack buffer queues of 602 poll of switching engine mould, are forwarded: 1) port if meeting the following conditions It is less than to send caching;2) the queue package counting facility is greater than zero.Disk array module 604 mainly realizes the control to hard disk, including The operation such as initialization, read-write to hard disk;CPU module 603 is mainly responsible between access switch, terminal (not shown) Protocol processes, to address table 605 (including descending protocol packet address table, uplink protocol package address table, data packet addressed table) Configuration, and, the configuration to disk array module 604.
Access switch:
As shown in fig. 7, mainly including Network Interface Module (downstream network interface module 701, uplink network interface module 702), switching engine module 703 and CPU module 704;
Wherein, the packet (upstream data) that downstream network interface module 701 is come in enters packet detection module 705;Packet detection mould Whether mesh way address (DA), source address (SA), type of data packet and the packet length of the detection packet of block 705 meet the requirements, if met, It then distributes corresponding flow identifier (stream-id), and enters switching engine module 703, otherwise abandon;Uplink network interface mould The packet (downlink data) that block 702 is come in enters switching engine module 703;The data packet that CPU module 704 is come in enters switching engine Module 703;Switching engine module 703 look into the operation of address table 706 to the packet come in, to obtain the navigation information of packet; If the packet into switching engine module 703 is that downstream network interface is gone toward uplink network interface, in conjunction with flow identifier (stream-id) packet is stored in the queue of corresponding pack buffer 707;If the queue of the pack buffer 707 is close full, It abandons;If the packet into switching engine module 703 is not that downstream network interface is gone toward uplink network interface, according to packet Navigation information is stored in the data packet queue of corresponding pack buffer 707;If the queue of the pack buffer 707 is close full, Then abandon.
All pack buffer queues of 703 poll of switching engine module, are divided to two kinds of situations in embodiments of the present invention:
If the queue is that downstream network interface is gone toward uplink network interface, meets the following conditions and be forwarded: 1) It is less than that the port sends caching;2) the queue package counting facility is greater than zero;3) token that rate control module generates is obtained;
If the queue is not that downstream network interface is gone toward uplink network interface, meets the following conditions and is forwarded: 1) it is less than to send caching for the port;2) the queue package counting facility is greater than zero.
Rate control module 708 is configured by CPU module 704, to all downlink networks in programmable interval Interface generates token toward the pack buffer queue that uplink network interface is gone, to control the code rate of forwarded upstream.
CPU module 704 is mainly responsible for the protocol processes between node server, the configuration to address table 706, and, Configuration to rate control module 708.
Ethernet association turns gateway:
As shown in figure 8, mainly including Network Interface Module (downstream network interface module 801, uplink network interface module 802), switching engine module 803, CPU module 804, packet detection module 805, rate control module 808, address table 806, Bao Huan Storage 807 and MAC adding module 809, MAC removing module 810.
Wherein, the data packet that downstream network interface module 801 is come in enters packet detection module 805;Packet detection module 805 is examined Ethernet mac DA, ethernet mac SA, Ethernet length or frame type, the view networking mesh way address of measured data packet DA, whether meet the requirements depending on networking source address SA, depending on networking data Packet type and packet length, corresponding stream is distributed if meeting Identifier (stream-id);Then, MAC DA, MAC SA, length or frame type are subtracted by MAC removing module 810 (2byte), and enter corresponding receive and cache, otherwise abandon;
Downstream network interface module 801 detects the transmission caching of the port, according to the view of packet networking mesh if there is Bao Ze Address D A knows the ethernet mac DA of corresponding terminal, adds the ethernet mac DA of terminal, Ethernet assists the MAC for turning gateway SA, Ethernet length or frame type, and send.
The function that Ethernet association turns other modules in gateway is similar with access switch.
Terminal:
It mainly include Network Interface Module, Service Processing Module and CPU module;For example, set-top box mainly connects including network Mouth mold block, video/audio encoding and decoding engine modules, CPU module;Encoding board mainly includes Network Interface Module, video encoding engine Module, CPU module;Memory mainly includes Network Interface Module, CPU module and disk array module.
The equipment of 1.3 metropolitan area mesh portions can be mainly divided into 2 classes: node server, node switch, metropolitan area server. Wherein, node switch mainly includes Network Interface Module, switching engine module and CPU module;Metropolitan area server mainly includes Network Interface Module, switching engine module and CPU module are constituted.
2, networking data package definition is regarded
2.1 access network data package definitions
Access net data packet mainly include following sections: destination address (DA), source address (SA), reserve bytes, payload(PDU)、CRC。
As shown in the table, the data packet for accessing net mainly includes following sections:
Wherein:
Destination address (DA) is made of 8 bytes (byte), and first character section indicates type (such as the various associations of data packet Discuss packet, multicast packet, unicast packet etc.), be up to 256 kinds of possibility, the second byte to the 6th byte is metropolitan area net address, Seven, the 8th bytes are access net address;
Source address (SA) is also to be made of 8 bytes (byte), is defined identical as destination address (DA);
Reserve bytes are made of 2 bytes;
The part payload has different length according to the type of different datagrams, is if it is various protocol packages 64 bytes are 32+1024=1056 bytes if it is single group unicast packets words, are not restricted to above 2 kinds certainly;
CRC is made of 4 bytes, and calculation method follows the Ethernet CRC algorithm of standard.
2.2 Metropolitan Area Network (MAN) packet definitions
The topology of Metropolitan Area Network (MAN) is pattern, may there is 2 kinds, connection even of more than two kinds, i.e. node switching between two equipment It can all can exceed that 2 kinds between machine and node server, node switch and node switch, node switch and node server Connection.But the metropolitan area net address of metropolitan area network equipment is uniquely, to close to accurately describe the connection between metropolitan area network equipment System, introduces parameter in embodiments of the present invention: label, uniquely to describe a metropolitan area network equipment.
(Multi-Protocol Label Switch, multiprotocol label are handed over by the definition of label and MPLS in this specification Change) label definition it is similar, it is assumed that between equipment A and equipment B there are two connection, then data packet from equipment A to equipment B just There are 2 labels, data packet also there are 2 labels from equipment B to equipment A.Label is divided into label, outgoing label, it is assumed that data packet enters The label (entering label) of equipment A is 0x0000, and the label (outgoing label) when this data packet leaves equipment A may reform into 0x0001.The networking process of Metropolitan Area Network (MAN) is to enter network process under centralized control, also means that address distribution, the label of Metropolitan Area Network (MAN) Distribution be all to be dominated by metropolitan area server, node switch, node server be all passively execute, this point with The label distribution of MPLS is different, and the distribution of the label of MPLS is the result that interchanger, server are negotiated mutually.
As shown in the table, the data packet of Metropolitan Area Network (MAN) mainly includes following sections:
That is destination address (DA), source address (SA), reserve bytes (Reserved), label, payload (PDU), CRC.Its In, the format of label, which can refer to, such as gives a definition: label is 32bit, wherein high 16bit retains, only with low 16bit, its area Domain is between the reserve bytes and payload of data packet.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP) come realize server according to an embodiment of the present invention, some in terminal or The some or all functions of person's whole component.The present invention is also implemented as one for executing method as described herein Point or whole device or device programs (for example, computer program and computer program product).Such this hair of realization Bright program can store on a computer-readable medium, or may be in the form of one or more signals.It is such Signal can be downloaded from an internet website to obtain, and is perhaps provided on the carrier signal or is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.

Claims (10)

1. a kind of data processing method is applied to view networking meeting control terminal, which is characterized in that the view networking can control terminal storage There is meeting control terminal mark, which comprises
Encryption information is obtained, and using the encryption information verifying meeting control terminal mark;
When the meeting control terminal identity verification success, conference terminal mark is obtained, and using the encryption information verifying meeting Discuss terminal iidentification;
When conference terminal identity verification success, sends meeting and initiate request to view networking Conference server;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
2. the method according to claim 1, wherein the step of acquisition conference terminal identifies, comprising:
Conference terminal identification request is sent to view networking conference terminal;
Receive the conference terminal mark that the view networking conference terminal returns.
3. the method according to claim 1, wherein described using the encryption information verifying meeting control terminal The step of mark, comprising:
Extracting from the encryption information can control terminal mark encryption information;
Generate the first encryption information to be verified of the meeting control terminal mark;
Judge whether the described first encryption information to be verified and the meeting control terminal mark encryption information are consistent;
If so, determining the meeting control terminal identity verification success;
If it is not, then determining the meeting control terminal identity verification failure.
4. the method according to claim 1, wherein described verify the conference terminal using the encryption information The step of mark, comprising:
Conference terminal is extracted from the encryption information identifies encryption information;
Generate the second encryption information to be verified of the conference terminal mark;
Judge whether the described second encryption information to be verified and conference terminal mark encryption information are consistent;
If so, determining the conference terminal identity verification success;
If it is not, then determining the conference terminal identity verification failure.
5. a kind of data processing method is applied to view networking Conference server, which is characterized in that the described method includes:
Obtaining can control terminal mark and conference terminal mark;
Encryption information is identified using the meeting control terminal mark meeting of the generation control terminal, and, it is given birth to using conference terminal mark Encryption information is identified at conference terminal;
Merge the meeting control terminal mark encryption information and conference terminal mark encryption information, obtains encryption information;
Send the encryption information.
6. a kind of view networking meeting control terminal, which is characterized in that it is described to be stored with meeting control terminal mark depending on networking meeting control terminal, it is described Terminal includes:
Meeting control terminal identity verification module, for obtaining encryption information, and using the encryption information verifying meeting control terminal Mark;
Conference terminal identity verification module, for obtaining conference terminal mark, and adopt when the meeting control terminal identity verification success The conference terminal mark is verified with the encryption information;
Request sending module, for sending meeting and initiating request to view networking meeting when conference terminal identity verification success Server;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
7. terminal according to claim 6, which is characterized in that the conference terminal identity verification module, comprising:
Identification request sending submodule, for sending conference terminal identification request to view networking conference terminal;
Receiving submodule is identified, the conference terminal mark returned for receiving the view networking conference terminal.
8. terminal according to claim 6, which is characterized in that the meeting control terminal identity verification module, comprising:
Encryption information extracting sub-module can be controlled, it can control terminal mark encryption information for being extracted from the encryption information;
First encryption information to be verified generates submodule, the encryption letter to be verified of first for generating the meeting control terminal mark Breath;
First judging submodule, for judge the described first encryption information to be verified with it is described can control terminal mark encryption information be It is no consistent;If so, identity verification success decision sub-module can be controlled by executing, unsuccessfully determine if it is not, then executing and can control identity verification Submodule;
Identity verification success decision sub-module can be controlled, for determining the meeting control terminal identity verification success;
Identity verification failure decision sub-module can be controlled, for determining the meeting control terminal identity verification failure.
9. terminal according to claim 6, which is characterized in that the conference terminal identity verification module, comprising:
Session encryption information extraction submodule identifies encryption information for extracting conference terminal from the encryption information;
Second encryption information to be verified generates submodule, the encryption letter to be verified of second for generating the conference terminal mark Breath;
Second judgment submodule, for judge the described second encryption information to be verified and the conference terminal mark encryption information be It is no consistent;If so, executing meeting identification is proved to be successful decision sub-module, if it is not, then executing the judgement of meeting identification authentication failed Submodule
Meeting identification is proved to be successful decision sub-module, for determining the conference terminal identity verification success;
Meeting identification authentication failed decision sub-module, for determining the conference terminal identity verification failure.
The Conference server 10. a kind of view is networked, which is characterized in that the server includes:
Identifier acquisition module, can control terminal mark and conference terminal mark for obtaining;
Encryption information generation module is identified, is used to identify encryption information using the meeting control terminal mark meeting of the generation control terminal, with And it is identified using the conference terminal and generates conference terminal mark encryption information;
Encryption information merging module, for merging the meeting control terminal mark encryption information and conference terminal mark encryption letter Breath, obtains encryption information;
Encryption information sending module, for sending the encryption information.
CN201711445200.8A 2017-12-27 2017-12-27 Data processing method and video networking conference server Active CN108965227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711445200.8A CN108965227B (en) 2017-12-27 2017-12-27 Data processing method and video networking conference server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711445200.8A CN108965227B (en) 2017-12-27 2017-12-27 Data processing method and video networking conference server

Publications (2)

Publication Number Publication Date
CN108965227A true CN108965227A (en) 2018-12-07
CN108965227B CN108965227B (en) 2021-03-05

Family

ID=64495723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711445200.8A Active CN108965227B (en) 2017-12-27 2017-12-27 Data processing method and video networking conference server

Country Status (1)

Country Link
CN (1) CN108965227B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109803159A (en) * 2018-12-17 2019-05-24 视联动力信息技术股份有限公司 A kind of verification method and system of terminal
CN111143607A (en) * 2019-11-18 2020-05-12 视联动力信息技术股份有限公司 Information acquisition method and device
CN111260331A (en) * 2020-02-07 2020-06-09 北京字节跳动网络技术有限公司 Conference system, conference apparatus, conference system management method, and storage medium
CN112291592A (en) * 2020-12-29 2021-01-29 视联动力信息技术股份有限公司 Control plane protocol-based secure video communication method, device, equipment and medium
CN114615459A (en) * 2022-05-10 2022-06-10 全时云商务服务股份有限公司 Video conference joining method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196436A (en) * 2010-03-11 2011-09-21 华为技术有限公司 Security authentication method, device and system
CN104202440A (en) * 2014-09-02 2014-12-10 腾讯科技(深圳)有限公司 Method for identifying terminal, server and system
US20150067777A1 (en) * 2013-09-04 2015-03-05 Facebook, Inc. Systems and methods for authenticating nodes
CN104993961A (en) * 2015-06-30 2015-10-21 广州华多网络科技有限公司 Equipment control methods, devices and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196436A (en) * 2010-03-11 2011-09-21 华为技术有限公司 Security authentication method, device and system
US20150067777A1 (en) * 2013-09-04 2015-03-05 Facebook, Inc. Systems and methods for authenticating nodes
CN104202440A (en) * 2014-09-02 2014-12-10 腾讯科技(深圳)有限公司 Method for identifying terminal, server and system
CN104993961A (en) * 2015-06-30 2015-10-21 广州华多网络科技有限公司 Equipment control methods, devices and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109803159A (en) * 2018-12-17 2019-05-24 视联动力信息技术股份有限公司 A kind of verification method and system of terminal
CN111143607A (en) * 2019-11-18 2020-05-12 视联动力信息技术股份有限公司 Information acquisition method and device
CN111143607B (en) * 2019-11-18 2024-05-24 视联动力信息技术股份有限公司 Information acquisition method and device
CN111260331A (en) * 2020-02-07 2020-06-09 北京字节跳动网络技术有限公司 Conference system, conference apparatus, conference system management method, and storage medium
CN111260331B (en) * 2020-02-07 2024-01-12 北京字节跳动网络技术有限公司 Conference system, conference apparatus, conference method, and conference program management device and storage medium
CN112291592A (en) * 2020-12-29 2021-01-29 视联动力信息技术股份有限公司 Control plane protocol-based secure video communication method, device, equipment and medium
CN112291592B (en) * 2020-12-29 2021-03-26 视联动力信息技术股份有限公司 Control plane protocol-based secure video communication method, device, equipment and medium
CN114615459A (en) * 2022-05-10 2022-06-10 全时云商务服务股份有限公司 Video conference joining method and device

Also Published As

Publication number Publication date
CN108965227B (en) 2021-03-05

Similar Documents

Publication Publication Date Title
CN108023910B (en) A kind of terminal monitoring method and system based on view networking
CN108012106B (en) A kind of method and system regarding networking monitoring source synchronous
CN108881799B (en) A kind of system and method carrying out view networked video meeting
CN109451264A (en) A kind of method and system of monitoring device membership
CN108965227A (en) A kind of data processing method and view networking Conference server
CN108023858B (en) A kind of view networking network management safety certifying method and its system
CN108965225A (en) Data processing method turns server and view networked terminals depending on networking association
CN108965224A (en) A kind of method and apparatus of video on demand
CN107888401B (en) A kind of method and system of real time monitoring view networked terminals cpu busy percentage
CN108616549A (en) A kind of file uploading method and file server
CN108810579A (en) A kind of video data requesting method, association turn server and regard networked server
CN110062195A (en) A kind of video conference cut-in method and system
CN109766753A (en) A kind of finger print information acquisition methods and device
CN109729184A (en) A kind of method and apparatus of view networking service processing
CN108881940A (en) A kind of data processing method and view networked server
CN108965783A (en) A kind of video data handling procedure and view networking recording/playing terminal
CN108880853A (en) A kind of configuration information recovery method and configuration information server regarding networked server
CN108965941A (en) A kind of data capture method and view networking management system
CN108881791B (en) A kind of conference control method and Conference control device based on view networking
CN110149497A (en) A kind of view networked data transmission method, apparatus, system and readable storage medium storing program for executing
CN109586851A (en) Data transmission method and device based on view networking
CN109951726A (en) Long-range control method and device
CN110049009A (en) A kind of identity information acquisition system and method
CN109376507A (en) A kind of data safety control method and system
CN109698859A (en) A kind of date storage method and device based on view networking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100000 Dongcheng District, Beijing, Qinglong Hutong 1, 1103 house of Ge Hua building.

Applicant after: VISIONVERA INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 100000 Beijing Dongcheng District Qinglong Hutong 1 Song Hua Building A1103-1113

Applicant before: BEIJING VISIONVERA INTERNATIONAL INFORMATION TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant