CN108965227A - A kind of data processing method and view networking Conference server - Google Patents
A kind of data processing method and view networking Conference server Download PDFInfo
- Publication number
- CN108965227A CN108965227A CN201711445200.8A CN201711445200A CN108965227A CN 108965227 A CN108965227 A CN 108965227A CN 201711445200 A CN201711445200 A CN 201711445200A CN 108965227 A CN108965227 A CN 108965227A
- Authority
- CN
- China
- Prior art keywords
- encryption information
- meeting
- control terminal
- conference
- conference terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/61—Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
- H04L65/403—Arrangements for multi-party communication, e.g. for conferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Medical Informatics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses a kind of data processing method and a kind of view networking Conference server, which comprises obtains encryption information, and is identified using the encryption information verifying meeting control terminal;When the meeting control terminal identity verification success, conference terminal mark is obtained, and using the encryption information verifying conference terminal mark;When conference terminal identity verification success, sends meeting and initiate request to view networking Conference server;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.According to embodiments of the present invention, it is convenient for view networking conference management, solving the problems, such as the prior art, there is be difficult to carry out view networking conference management.
Description
Technical field
The present embodiments relate to the communications field more particularly to a kind of data processing methods, and, a kind of view networking meeting
Server.
Background technique
Currently, with the fast development of the network technology, the two-way communications such as video conference, video teaching user life,
Work, study etc. are widely available, are increasingly used in each technical field depending on networking technology, join especially with view
Network technology carries out video conference.
It is carried out in the technology of video conference using view networking technology, needs to be arranged a view networking meeting control terminal and one
Depending on conference terminal of networking.It can be the personal mobile phone for being equipped with Conference control software of user, computer etc. depending on networking meeting control terminal
Terminal, user can control terminal control view networking conference terminals by view networking.And it then can be depending on networking conference terminal and include
Camera function, projecting function, the terminal for regarding combined network communication function, for acquiring conferencing data, by view networking and view networking meeting
Discuss server connection and interactive video data.
When user needs to carry out video conference by view networking, it is only necessary to which view is networked can control terminal access view networking meeting
Terminal is discussed, and by view networking conference terminal access view networking Conference server, a view networking meeting can be initiated.
However, user optionally can initiate to regard networking meeting using any view networking meeting control terminal and view networking conference terminal
View is easy to cause the confusion of view networking meeting, it is difficult to carry out the management of view networking meeting.
Therefore, there is be difficult to the problem of carrying out view networking conference management for the prior art.
Summary of the invention
The present invention provides a kind of data processing method and a kind of view networking Conference server, are deposited with solving the prior art
Be difficult to carry out view networking conference management the problem of.
In order to solve the above technical problems, the invention discloses a kind of data processing methods, can control applied to depending on networking
Terminal, it is described to be stored with meeting control terminal mark depending on networking meeting control terminal, which comprises
Encryption information is obtained, and using the encryption information verifying meeting control terminal mark;
When the meeting control terminal identity verification success, conference terminal mark is obtained, and using encryption information verifying institute
State conference terminal mark;
When conference terminal identity verification success, sends meeting and initiate request to view networking Conference server;The view
Conference server of networking, which is used to initiate request according to the meeting to execute meeting, initiates operation.
Optionally, the step of acquisition conference terminal identifies, comprising:
Conference terminal identification request is sent to view networking conference terminal;
Receive the conference terminal mark that the view networking conference terminal returns.
Optionally, the step of meeting control terminal mark described using encryption information verifying, comprising:
Extracting from the encryption information can control terminal mark encryption information;
Generate the first encryption information to be verified of the meeting control terminal mark;
Judge whether the described first encryption information to be verified and the meeting control terminal mark encryption information are consistent;
If so, determining the meeting control terminal identity verification success;
If it is not, then determining the meeting control terminal identity verification failure.
Optionally, described the step of conference terminal mark is verified using the encryption information, comprising:
Conference terminal is extracted from the encryption information identifies encryption information;
Generate the second encryption information to be verified of the conference terminal mark;
Judge whether the described second encryption information to be verified and conference terminal mark encryption information are consistent;
If so, determining the conference terminal identity verification success;
If it is not, then determining the conference terminal identity verification failure.
In order to solve the above technical problems, the invention also discloses a kind of data processing methods, are applied to view networking meeting
Discuss server, which comprises
Obtaining can control terminal mark and conference terminal mark;
Encryption information is identified using the meeting control terminal mark meeting of the generation control terminal, and, using the conference terminal mark
Know and generates conference terminal mark encryption information;
Merge the meeting control terminal mark encryption information and conference terminal mark encryption information, obtains encryption information;
Send the encryption information.
In order to solve the above technical problems, the invention also discloses a kind of view networking meeting control terminal, the view networking meetings
Control terminal is stored with meeting control terminal mark, and the terminal includes:
Meeting control terminal identity verification module can be controlled for obtaining encryption information, and using encryption information verifying is described
Terminal iidentification;
Conference terminal identity verification module, for obtaining conference terminal mark when the meeting control terminal identity verification success,
And the conference terminal mark is verified using the encryption information;
Request sending module, for sending meeting and initiating request to view networking when conference terminal identity verification success
Conference server;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
Optionally, the conference terminal identity verification module, comprising:
Identification request sending submodule, for sending conference terminal identification request to view networking conference terminal;
Receiving submodule is identified, the conference terminal mark returned for receiving the view networking conference terminal.
Optionally, the meeting control terminal identity verification module, comprising:
Encryption information extracting sub-module can be controlled, it can control terminal mark encryption information for being extracted from the encryption information;
First encryption information to be verified generates submodule, for generating the first encryption to be verified of the meeting control terminal mark
Information;
First judging submodule, for judging the described first encryption information to be verified and the meeting control terminal mark encryption letter
It whether consistent ceases;If so, identity verification success decision sub-module can be controlled by executing, if it is not, identity verification failure can be controlled by then executing
Decision sub-module;
Identity verification success decision sub-module can be controlled, for determining the meeting control terminal identity verification success;
Identity verification failure decision sub-module can be controlled, for determining the meeting control terminal identity verification failure.
Optionally, the conference terminal identity verification module, comprising:
Session encryption information extraction submodule identifies encryption information for extracting conference terminal from the encryption information;
Second encryption information to be verified generates submodule, for generating the second encryption to be verified of the conference terminal mark
Information;
Second judgment submodule, for judging the described second encryption information to be verified and conference terminal mark encryption letter
It whether consistent ceases;If so, executing meeting identification is proved to be successful decision sub-module, if it is not, then executing meeting identification authentication failed
Decision sub-module
Meeting identification is proved to be successful decision sub-module, for determining the conference terminal identity verification success;
Meeting identification authentication failed decision sub-module, for determining the conference terminal identity verification failure.
In order to solve the above technical problems, the invention also discloses view networking Conference server, the server includes:
Identifier acquisition module, can control terminal mark and conference terminal mark for obtaining;
Encryption information generation module is identified, is used to encrypt letter using the meeting control terminal mark meeting of the generation control terminal mark
Breath, and, it is identified using the conference terminal and generates conference terminal mark encryption information;
Encryption information merging module adds for merging the meeting control terminal mark encryption information and conference terminal mark
Confidential information obtains encryption information;
Encryption information sending module, for sending the encryption information.
According to embodiments of the present invention, login authentication is carried out by the inputted encryption information of user, in encryption information and company of institute
When the terminal iidentification for regarding networking meeting control terminal, regarding networking conference terminal connect matches, the view meeting of networking control terminal and view could be used
Conference terminal of networking logs in view networking Conference server, consequently facilitating carrying out view networking conference management, solves the prior art and deposits
It is being difficult to the problem of carrying out view networking conference management.
Detailed description of the invention
Fig. 1 is the flow chart for the data processing method that the embodiment of the present invention one provides;
Fig. 2 is the flow chart of data processing method provided by Embodiment 2 of the present invention;
Fig. 3 is the structural block diagram for the view networking meeting control terminal that the embodiment of the present invention three provides;
Fig. 4 is the structural block diagram for the view networking Conference server that the embodiment of the present invention four provides;
Fig. 5 is a kind of networking schematic diagram of view networking of the invention;
Fig. 6 is a kind of hardware structural diagram of node server of the invention;
Fig. 7 is a kind of hardware structural diagram of access switch of the invention;
Fig. 8 is the hardware structural diagram that a kind of Ethernet association of the invention turns gateway.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
Embodiment one
Fig. 1 is the flow chart for the data processing method that the embodiment of the present invention one provides, and is applied to view networking meeting control terminal, institute
It states and is stored with meeting control terminal mark depending on networking meeting control terminal, the method can specifically include:
Step 110, encryption information is obtained, and using the encryption information verifying meeting control terminal mark.
It should be noted that the data processing method of the embodiment of the present invention can be applied on view networking meeting control terminal.
In the concrete realization, when user carries out view networking meeting, Shen can be carried out to view networking conference management side
Please, certain view networking meeting control terminal and view networking conference terminal can be specified, as this according to application depending on networking conference management side
The view networking of secondary view networking meeting can control terminal and view networking conference terminal.More specifically, can be to depending on networking conference management side
Sending depending on networking Conference server can control terminal mark and conference terminal mark.
Wherein, meeting control terminal mark corresponds to specified view networking meeting control terminal, and conference terminal, which identifies, corresponds to meaning
Fixed view networking conference terminal.
Wherein, each to have can store corresponding meeting control terminal mark on control terminal depending on networking.For example, if view networking
Meeting control terminal is a PC, and meeting control terminal mark may include the MAC Address etc. of the computer network interface card.
Wherein, each depending on can store corresponding conference terminal mark on networking conference terminal.For example, view networking meeting
The Termination ID etc. of terminal.
Meeting control terminal mark and conference terminal mark are received depending on networking Conference server, it can be using meeting control terminal mark
The meeting of generation control terminal identifies encryption information, and, generation conference terminal is identified using conference terminal and identifies encryption information.Then,
Merge meeting control terminal mark encryption information and conference terminal identifies encryption information, obtains an encryption information, and the encryption is believed
Breath is sent to view networking conference management side, by providing the encryption information to the use for applying for regarding networking meeting depending on networking conference management side
Family.
In practical application, one can be generated for meeting control terminal mark and conference terminal mark by Key Core Generator
Key, as above-mentioned encryption information.
Appointed view networking meeting control terminal can be accessed appointed view networking conference terminal by user.Then, user
Can star view networking can meeting control software on control terminal, software can be controlled and accordingly pop up a user input interface, user can be with
In the user input interface, encryption information is inputted.Encryption information is got depending on networking meeting control terminal as a result,.
, can be according to the encryption information after getting encryption information depending on networking meeting control terminal, verifying view networking can control terminal
The meeting control terminal of upper storage identifies, to judge that whether this regards networking meeting control terminal as legal view networking meeting control terminal.
Optionally, the step of meeting control terminal mark described using encryption information verifying, comprising:
Extracting from the encryption information can control terminal mark encryption information;
Generate the first encryption information to be verified of the meeting control terminal mark;
Judge whether the described first encryption information to be verified and the meeting control terminal mark encryption information are consistent;
If so, determining the meeting control terminal identity verification success;
If it is not, then determining the meeting control terminal identity verification failure.
The meeting control terminal that view networking is verified according to the encryption information can be stored on control terminal identify in the specific implementation, can
With the extraction meeting control terminal mark encryption information first from encryption information, meanwhile, for meeting control terminal mark, generation one is to be tested
Demonstrate,prove encryption information.
In order to distinguish explanation, meeting control terminal identifies corresponding encryption information to be verified, is named as the first encryption letter to be verified
Breath.
Then, judge whether the first encryption information to be verified and meeting control terminal mark encryption information are consistent.It, can if consistent
To determine meeting control terminal identity verification success, otherwise, then can be determined that can the failure of control terminal identity verification.
For example, encryption information is a Key, which is identified by meeting control terminal mark encryption information Key_1 and conference terminal
Encryption information Key_2 composition, can be to extract meeting control terminal mark encryption information Key_1 in Key.Meanwhile for as can control
The MAC Address of terminal iidentification generates the first encryption information Key_1` to be verified, Key_1 is compared with Key_1`, judges it
Between consistency.
Step 120, when the meeting control terminal identity verification success, conference terminal mark is obtained, and using encryption letter
Breath verifies the conference terminal mark.
In the specific implementation, then can further network from view can control terminal institute when determining meeting control terminal identity verification success
In the view networking conference terminal of connection, conference terminal mark is obtained, and according to encryption information, verify conference terminal mark.
Optionally, the step of acquisition conference terminal identifies, comprising:
Conference terminal identification request is sent to view networking conference terminal;
Receive the conference terminal mark that the view networking conference terminal returns.
Obtain conference terminal mark in the specific implementation, due to view network can control terminal with view network conference terminal
Therefore connection can send conference terminal identification request to view networking conference terminal, can be asked according to this depending on networking conference terminal
It asks, returns to the conference terminal mark of its storage.View networking meeting control terminal is available as a result, arrives meeting terminal iidentification.
Optionally, described the step of conference terminal mark is verified using the encryption information, comprising:
Conference terminal is extracted from the encryption information identifies encryption information;
Generate the second encryption information to be verified of the conference terminal mark;
Judge whether the described second encryption information to be verified and conference terminal mark encryption information are consistent;
If so, determining the conference terminal identity verification success;
If it is not, then determining the conference terminal identity verification failure.
On verifying view networking conference terminal according to encryption information the conference terminal that stores identify in the specific implementation, can be with
Conference terminal is extracted first from encryption information identifies encryption information, meanwhile, it is identified for conference terminal, generation one is to be verified
Encryption information.
In order to distinguish explanation, conference terminal identifies corresponding encryption information to be verified, is named as the second encryption letter to be verified
Breath.
Then, judge whether the second encryption information to be verified and meeting terminal iidentification encryption information are consistent.It, can if consistent
To determine the success of conference terminal identity verification, otherwise, then it can be determined that conference terminal identity verification fails.
Based on above-mentioned example, conference terminal mark encryption information Key_2 can be extracted from encryption information Key.Meanwhile
For the Termination ID identified as conference terminal, the second encryption information Key_2` to be verified is generated, Key_2 and Key_2` is carried out
Compare, the consistency between judgement.
Step 130, it when conference terminal identity verification success, sends meeting and initiates request to view networking conference service
Device;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
In the specific implementation, showing it is currently that view networking can control terminal and view networking meeting when the success of conference terminal identity verification
View terminal is matched with specified view networking meeting control terminal and view networking conference terminal, therefore login authentication success, user are permitted
Permitted to log on to view networking Conference server.Correspondingly, it can be networked by view networking conference terminal to view depending on networking meeting control terminal
Conference server sends meeting and initiates request.It then can initiate to request according to the meeting depending on networking Conference server, execute meeting
Initiate operation.
In practical applications, in addition to verifying meeting control terminal mark and conference terminal mark, can also verify service life is
No legal, for example, being preset with corresponding frequency threshold value for encryption information, whether verifying access times are more than the preset threshold.
According to embodiments of the present invention, login authentication is carried out by the inputted encryption information of user, in encryption information and company of institute
When the terminal iidentification for regarding networking meeting control terminal, regarding networking conference terminal connect matches, the view meeting of networking control terminal and view could be used
Conference terminal of networking logs in view networking Conference server, consequently facilitating carrying out view networking conference management, solves the prior art and deposits
It is being difficult to the problem of carrying out view networking conference management.
Embodiment two
Fig. 2 is the flow chart of data processing method provided by Embodiment 2 of the present invention, is applied to view networking Conference server,
The method can specifically include:
Step 210, obtaining can control terminal mark and conference terminal mark.
In the specific implementation, can specify certain the view meeting of networking control terminal and view networking meeting end depending on networking conference management side
End, and the specified mark being directed to is sent to view networking Conference server.View networking Conference server is available as a result,
Meeting control terminal to the view meeting of networking control terminal identifies, and, get the conference terminal mark of view networking conference terminal.
Step 220, encryption information is identified using the meeting control terminal mark meeting of the generation control terminal, and, using the meeting
It discusses terminal iidentification and generates conference terminal mark encryption information.
In the specific implementation, encryption information can be identified for meeting control terminal mark, the meeting of generation control terminal, meanwhile, for meeting
Terminal iidentification is discussed, conference terminal is generated and identifies encryption information.
Step 230, merge the meeting control terminal mark encryption information and the conference terminal identifies encryption information, added
Confidential information.
In the specific implementation, can will control terminal mark encryption information and conference terminal mark encryption information merge,
Using the information after merging as encryption information.
Step 240, the encryption information is sent.
In the specific implementation, the encryption information can be supplied to view networking conference management side, or it is supplied to application and carries out
Depending on the user for meeting of networking.
According to embodiments of the present invention, by that will be bound depending on networking meeting control terminal with depending on networking conference terminal, and it is corresponding
Generate encryption information, user need according to the encryption information carry out login authentication, encryption information with connect view networking meeting
When control terminal, the terminal iidentification for regarding networking conference terminal match, view networking meeting control terminal could be used and regard networking conference terminal
View networking Conference server is logged in, consequently facilitating carrying out view networking conference management, solving the prior art, there is be difficult to carry out
The problem of depending on networking conference management.
Embodiment three
Fig. 3 is the structural block diagram for the view networking meeting control terminal that the embodiment of the present invention three provides, and the view networking can control terminal
It is stored with meeting control terminal mark, the view networking meeting control terminal 300 can be specifically included with lower module:
Meeting control terminal identity verification module 310 verifies the meeting for obtaining encryption information, and using the encryption information
Control terminal mark;
Conference terminal identity verification module 320, for obtaining conference terminal mark when the meeting control terminal identity verification success
Know, and the conference terminal mark is verified using the encryption information;
Request sending module 330, for sending meeting and initiating request to view connection when conference terminal identity verification success
Net Conference server;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
Optionally, the conference terminal identity verification module 320, comprising:
Identification request sending submodule, for sending conference terminal identification request to view networking conference terminal;
Receiving submodule is identified, the conference terminal mark returned for receiving the view networking conference terminal.
Optionally, the meeting control terminal identity verification module 310, comprising:
Encryption information extracting sub-module can be controlled, it can control terminal mark encryption information for being extracted from the encryption information;
First encryption information to be verified generates submodule, for generating the first encryption to be verified of the meeting control terminal mark
Information;
First judging submodule, for judging the described first encryption information to be verified and the meeting control terminal mark encryption letter
It whether consistent ceases;If so, identity verification success decision sub-module can be controlled by executing, if it is not, identity verification failure can be controlled by then executing
Decision sub-module;
Identity verification success decision sub-module can be controlled, for determining the meeting control terminal identity verification success;
Identity verification failure decision sub-module can be controlled, for determining the meeting control terminal identity verification failure.
Optionally, the conference terminal identity verification module 310, comprising:
Session encryption information extraction submodule identifies encryption information for extracting conference terminal from the encryption information;
Second encryption information to be verified generates submodule, for generating the second encryption to be verified of the conference terminal mark
Information;
Second judgment submodule, for judging the described second encryption information to be verified and conference terminal mark encryption letter
It whether consistent ceases;If so, executing meeting identification is proved to be successful decision sub-module, if it is not, then executing meeting identification authentication failed
Decision sub-module
Meeting identification is proved to be successful decision sub-module, for determining the conference terminal identity verification success;
Meeting identification authentication failed decision sub-module, for determining the conference terminal identity verification failure.
According to embodiments of the present invention, login authentication is carried out by the inputted encryption information of user, in encryption information and company of institute
When the terminal iidentification for regarding networking meeting control terminal, regarding networking conference terminal connect matches, the view meeting of networking control terminal and view could be used
Conference terminal of networking logs in view networking Conference server, consequently facilitating carrying out view networking conference management, solves the prior art and deposits
It is being difficult to the problem of carrying out view networking conference management.
Example IV
Fig. 4 is the structural block diagram for the view networking Conference server that the embodiment of the present invention four provides, the view networking meeting clothes
Business device 400, can specifically include with lower module:
Identifier acquisition module 410, can control terminal mark and conference terminal mark for obtaining;
Encryption information generation module 420 is identified, is used to encrypt using the meeting control terminal mark meeting of the generation control terminal mark
Information, and, it is identified using the conference terminal and generates conference terminal mark encryption information;
Encryption information merging module 430, for merging the meeting control terminal mark encryption information and the conference terminal mark
Know encryption information, obtains encryption information;
Encryption information sending module 440, for sending the encryption information.
According to embodiments of the present invention, by that will be bound depending on networking meeting control terminal with depending on networking conference terminal, and it is corresponding
Generate encryption information, user need according to the encryption information carry out login authentication, encryption information with connect view networking meeting
When control terminal, the terminal iidentification for regarding networking conference terminal match, view networking meeting control terminal could be used and regard networking conference terminal
View networking Conference server is logged in, consequently facilitating carrying out view networking conference management, solving the prior art, there is be difficult to carry out
The problem of depending on networking conference management.
The treatment process as described in terminal embodiment and server example has specifically in embodiment of the method
Bright, therefore, details are not described herein.
It should be added that the above embodiment of the present invention, can be applied in the communication network of view networking.Depending on connection
Net is the important milestone of network Development, is a real-time network, can be realized HD video real-time Transmission, by numerous internets
Using HD video is pushed to, high definition is face-to-face.
Real-time high-definition video switching technology is used depending on networking, it can be such as high in a network platform by required service
Clear video conference, Intellectualized monitoring analysis, emergency command, digital broadcast television, delay TV, the Web-based instruction, shows video monitoring
Field live streaming, VOD program request, TV Mail, individual character records (PVR), Intranet (manages) channel by oneself, intelligent video Broadcast Control, information publication
All be incorporated into a system platform etc. services such as tens of kinds of videos, voice, picture, text, communication, data, by TV or
Computer realizes that high-definition quality video plays.
Embodiment in order to enable those skilled in the art to better understand the present invention is introduced to depending on networking below:
Depending on networking, applied portion of techniques is as described below:
Network technology (Network Technology)
Traditional ethernet (Ethernet) is improved depending on the network technology innovation networked, with potential huge on network
Video flow.(Circuit is exchanged different from simple network packet packet switch (Packet Switching) or lattice network
Switching), Streaming demand is met using Packet Switching depending on networking technology.Has grouping depending on networking technology
Flexible, the simple and low price of exchange, is provided simultaneously with the quality and safety assurance of circuit switching, it is virtually electric to realize the whole network switch type
The seamless connection of road and data format.
Switching technology (Switching Technology)
Two advantages of asynchronous and packet switch that Ethernet is used depending on networking eliminate Ethernet under the premise of complete compatible and lack
It falls into, has the end-to-end seamless connection of the whole network, direct user terminal, directly carrying IP data packet.User data is in network-wide basis
It is not required to any format conversion.It is the more advanced form of Ethernet depending on networking, is a real-time exchange platform, can be realized at present mutually
The whole network large-scale high-definition realtime video transmission that networking cannot achieve pushes numerous network video applications to high Qinghua, unitizes.
Server technology (Server Technology)
It is different from traditional server, its Streaming Media depending on the server technology in networking and unified video platform
Transmission be built upon it is connection-oriented on the basis of, data-handling capacity is unrelated with flow, communication time, single network layer energy
Enough transmitted comprising signaling and data.For voice and video business, handled depending on networking and unified video platform Streaming Media
Complexity many simpler than data processing, efficiency substantially increase hundred times or more than traditional server.
Reservoir technology (Storage Technology)
The ultrahigh speed reservoir technology of unified video platform in order to adapt to the media content of vast capacity and super-flow and
Using state-of-the-art real time operating system, the programme information in server instruction is mapped to specific hard drive space, media
Content is no longer pass through server, and moment is directly delivered to user terminal, and user waits typical time less than 0.2 second.It optimizes
Sector distribution greatly reduces the mechanical movement of hard disc magnetic head tracking, and resource consumption only accounts for the 20% of the internet ad eundem IP, but
The concurrent flow greater than 3 times of traditional disk array is generated, overall efficiency promotes 10 times or more.
Network security technology (Network Security Technology)
Depending on the structural design networked by servicing independent licence system, equipment and the modes such as user data is completely isolated every time
The network security problem that puzzlement internet has thoroughly been eradicated from structure, does not need antivirus applet, firewall generally, has prevented black
The attack of visitor and virus, structural carefree secure network is provided for user.
It services innovative technology (Service Innovation Technology)
Business and transmission are fused together by unified video platform, whether single user, private user or a net
The sum total of network is all only primary automatic connection.User terminal, set-top box or PC are attached directly to unified video platform, obtain rich
The multimedia video service of rich colorful various forms.Unified video platform is traditional to substitute with table schema using " menu type "
Complicated applications programming, considerably less code, which can be used, can be realized complicated application, realize the new business innovation of " endless ".
Networking depending on networking is as described below:
It is a kind of central controlled network structure depending on networking, which can be Tree Network, Star network, ring network etc. class
Type, but centralized control node is needed to control whole network in network on this basis.
As shown in figure 5, being divided into access net and Metropolitan Area Network (MAN) two parts depending on networking.
The equipment of access mesh portions can be mainly divided into 3 classes: node server, access switch, terminal (including various machines
Top box, encoding board, memory etc.).Node server is connected with access switch, and access switch can be with multiple terminal phases
Even, and it can connect Ethernet.
Wherein, node server is the node that centralized control functions are played in access net, can control access switch and terminal.
Node server can directly be connected with access switch, can also directly be connected with terminal.
Similar, the equipment of metropolitan area mesh portions can also be divided into 3 classes: metropolitan area server, node switch, node serve
Device.Metropolitan area server is connected with node switch, and node switch can be connected with multiple node servers.
Wherein, node server is the node server for accessing mesh portions, i.e. node server had both belonged to access wet end
Point, and belong to metropolitan area mesh portions.
Metropolitan area server is the node that centralized control functions are played in Metropolitan Area Network (MAN), can control node switch and node serve
Device.Metropolitan area server can be directly connected to node switch, can also be directly connected to node server.
It can be seen that be entirely a kind of central controlled network structure of layering depending on networking network, and node server and metropolitan area
The network controlled under server can be the various structures such as tree-shaped, star-like, cyclic annular.
Visually claim, access mesh portions can form unified video platform (part in virtual coil), and multiple unified videos are flat
Platform can form view networking;Each unified video platform can be interconnected by metropolitan area and wide area depending on networking.
Classify depending on networked devices
1.1 embodiment of the present invention can be mainly divided into 3 classes: server depending on the equipment in networking, interchanger (including ether
Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).Depending on networking can be divided on the whole Metropolitan Area Network (MAN) (or
National net, World Wide Web etc.) and access net.
1.2 equipment for wherein accessing mesh portions can be mainly divided into 3 classes: node server, access switch (including ether
Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).
The specific hardware structure of each access network equipment are as follows:
Node server:
As shown in fig. 6, mainly including Network Interface Module 601, switching engine module 602, CPU module 603, disk array
Module 604;
Wherein, Network Interface Module 601, the Bao Jun that CPU module 603, disk array module 604 are come in enter switching engine
Module 602;Switching engine module 602 look into the operation of address table 605 to the packet come in, to obtain the navigation information of packet;
And the packet is stored according to the navigation information of packet the queue of corresponding pack buffer 606;If the queue of pack buffer 606 is close
It is full, then it abandons;All pack buffer queues of 602 poll of switching engine mould, are forwarded: 1) port if meeting the following conditions
It is less than to send caching;2) the queue package counting facility is greater than zero.Disk array module 604 mainly realizes the control to hard disk, including
The operation such as initialization, read-write to hard disk;CPU module 603 is mainly responsible between access switch, terminal (not shown)
Protocol processes, to address table 605 (including descending protocol packet address table, uplink protocol package address table, data packet addressed table)
Configuration, and, the configuration to disk array module 604.
Access switch:
As shown in fig. 7, mainly including Network Interface Module (downstream network interface module 701, uplink network interface module
702), switching engine module 703 and CPU module 704;
Wherein, the packet (upstream data) that downstream network interface module 701 is come in enters packet detection module 705;Packet detection mould
Whether mesh way address (DA), source address (SA), type of data packet and the packet length of the detection packet of block 705 meet the requirements, if met,
It then distributes corresponding flow identifier (stream-id), and enters switching engine module 703, otherwise abandon;Uplink network interface mould
The packet (downlink data) that block 702 is come in enters switching engine module 703;The data packet that CPU module 704 is come in enters switching engine
Module 703;Switching engine module 703 look into the operation of address table 706 to the packet come in, to obtain the navigation information of packet;
If the packet into switching engine module 703 is that downstream network interface is gone toward uplink network interface, in conjunction with flow identifier
(stream-id) packet is stored in the queue of corresponding pack buffer 707;If the queue of the pack buffer 707 is close full,
It abandons;If the packet into switching engine module 703 is not that downstream network interface is gone toward uplink network interface, according to packet
Navigation information is stored in the data packet queue of corresponding pack buffer 707;If the queue of the pack buffer 707 is close full,
Then abandon.
All pack buffer queues of 703 poll of switching engine module, are divided to two kinds of situations in embodiments of the present invention:
If the queue is that downstream network interface is gone toward uplink network interface, meets the following conditions and be forwarded: 1)
It is less than that the port sends caching;2) the queue package counting facility is greater than zero;3) token that rate control module generates is obtained;
If the queue is not that downstream network interface is gone toward uplink network interface, meets the following conditions and is forwarded:
1) it is less than to send caching for the port;2) the queue package counting facility is greater than zero.
Rate control module 708 is configured by CPU module 704, to all downlink networks in programmable interval
Interface generates token toward the pack buffer queue that uplink network interface is gone, to control the code rate of forwarded upstream.
CPU module 704 is mainly responsible for the protocol processes between node server, the configuration to address table 706, and,
Configuration to rate control module 708.
Ethernet association turns gateway:
As shown in figure 8, mainly including Network Interface Module (downstream network interface module 801, uplink network interface module
802), switching engine module 803, CPU module 804, packet detection module 805, rate control module 808, address table 806, Bao Huan
Storage 807 and MAC adding module 809, MAC removing module 810.
Wherein, the data packet that downstream network interface module 801 is come in enters packet detection module 805;Packet detection module 805 is examined
Ethernet mac DA, ethernet mac SA, Ethernet length or frame type, the view networking mesh way address of measured data packet
DA, whether meet the requirements depending on networking source address SA, depending on networking data Packet type and packet length, corresponding stream is distributed if meeting
Identifier (stream-id);Then, MAC DA, MAC SA, length or frame type are subtracted by MAC removing module 810
(2byte), and enter corresponding receive and cache, otherwise abandon;
Downstream network interface module 801 detects the transmission caching of the port, according to the view of packet networking mesh if there is Bao Ze
Address D A knows the ethernet mac DA of corresponding terminal, adds the ethernet mac DA of terminal, Ethernet assists the MAC for turning gateway
SA, Ethernet length or frame type, and send.
The function that Ethernet association turns other modules in gateway is similar with access switch.
Terminal:
It mainly include Network Interface Module, Service Processing Module and CPU module;For example, set-top box mainly connects including network
Mouth mold block, video/audio encoding and decoding engine modules, CPU module;Encoding board mainly includes Network Interface Module, video encoding engine
Module, CPU module;Memory mainly includes Network Interface Module, CPU module and disk array module.
The equipment of 1.3 metropolitan area mesh portions can be mainly divided into 2 classes: node server, node switch, metropolitan area server.
Wherein, node switch mainly includes Network Interface Module, switching engine module and CPU module;Metropolitan area server mainly includes
Network Interface Module, switching engine module and CPU module are constituted.
2, networking data package definition is regarded
2.1 access network data package definitions
Access net data packet mainly include following sections: destination address (DA), source address (SA), reserve bytes,
payload(PDU)、CRC。
As shown in the table, the data packet for accessing net mainly includes following sections:
Wherein:
Destination address (DA) is made of 8 bytes (byte), and first character section indicates type (such as the various associations of data packet
Discuss packet, multicast packet, unicast packet etc.), be up to 256 kinds of possibility, the second byte to the 6th byte is metropolitan area net address,
Seven, the 8th bytes are access net address;
Source address (SA) is also to be made of 8 bytes (byte), is defined identical as destination address (DA);
Reserve bytes are made of 2 bytes;
The part payload has different length according to the type of different datagrams, is if it is various protocol packages
64 bytes are 32+1024=1056 bytes if it is single group unicast packets words, are not restricted to above 2 kinds certainly;
CRC is made of 4 bytes, and calculation method follows the Ethernet CRC algorithm of standard.
2.2 Metropolitan Area Network (MAN) packet definitions
The topology of Metropolitan Area Network (MAN) is pattern, may there is 2 kinds, connection even of more than two kinds, i.e. node switching between two equipment
It can all can exceed that 2 kinds between machine and node server, node switch and node switch, node switch and node server
Connection.But the metropolitan area net address of metropolitan area network equipment is uniquely, to close to accurately describe the connection between metropolitan area network equipment
System, introduces parameter in embodiments of the present invention: label, uniquely to describe a metropolitan area network equipment.
(Multi-Protocol Label Switch, multiprotocol label are handed over by the definition of label and MPLS in this specification
Change) label definition it is similar, it is assumed that between equipment A and equipment B there are two connection, then data packet from equipment A to equipment B just
There are 2 labels, data packet also there are 2 labels from equipment B to equipment A.Label is divided into label, outgoing label, it is assumed that data packet enters
The label (entering label) of equipment A is 0x0000, and the label (outgoing label) when this data packet leaves equipment A may reform into
0x0001.The networking process of Metropolitan Area Network (MAN) is to enter network process under centralized control, also means that address distribution, the label of Metropolitan Area Network (MAN)
Distribution be all to be dominated by metropolitan area server, node switch, node server be all passively execute, this point with
The label distribution of MPLS is different, and the distribution of the label of MPLS is the result that interchanger, server are negotiated mutually.
As shown in the table, the data packet of Metropolitan Area Network (MAN) mainly includes following sections:
That is destination address (DA), source address (SA), reserve bytes (Reserved), label, payload (PDU), CRC.Its
In, the format of label, which can refer to, such as gives a definition: label is 32bit, wherein high 16bit retains, only with low 16bit, its area
Domain is between the reserve bytes and payload of data packet.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
Microprocessor or digital signal processor (DSP) come realize server according to an embodiment of the present invention, some in terminal or
The some or all functions of person's whole component.The present invention is also implemented as one for executing method as described herein
Point or whole device or device programs (for example, computer program and computer program product).Such this hair of realization
Bright program can store on a computer-readable medium, or may be in the form of one or more signals.It is such
Signal can be downloaded from an internet website to obtain, and is perhaps provided on the carrier signal or is provided in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
Claims (10)
1. a kind of data processing method is applied to view networking meeting control terminal, which is characterized in that the view networking can control terminal storage
There is meeting control terminal mark, which comprises
Encryption information is obtained, and using the encryption information verifying meeting control terminal mark;
When the meeting control terminal identity verification success, conference terminal mark is obtained, and using the encryption information verifying meeting
Discuss terminal iidentification;
When conference terminal identity verification success, sends meeting and initiate request to view networking Conference server;The view networking
Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
2. the method according to claim 1, wherein the step of acquisition conference terminal identifies, comprising:
Conference terminal identification request is sent to view networking conference terminal;
Receive the conference terminal mark that the view networking conference terminal returns.
3. the method according to claim 1, wherein described using the encryption information verifying meeting control terminal
The step of mark, comprising:
Extracting from the encryption information can control terminal mark encryption information;
Generate the first encryption information to be verified of the meeting control terminal mark;
Judge whether the described first encryption information to be verified and the meeting control terminal mark encryption information are consistent;
If so, determining the meeting control terminal identity verification success;
If it is not, then determining the meeting control terminal identity verification failure.
4. the method according to claim 1, wherein described verify the conference terminal using the encryption information
The step of mark, comprising:
Conference terminal is extracted from the encryption information identifies encryption information;
Generate the second encryption information to be verified of the conference terminal mark;
Judge whether the described second encryption information to be verified and conference terminal mark encryption information are consistent;
If so, determining the conference terminal identity verification success;
If it is not, then determining the conference terminal identity verification failure.
5. a kind of data processing method is applied to view networking Conference server, which is characterized in that the described method includes:
Obtaining can control terminal mark and conference terminal mark;
Encryption information is identified using the meeting control terminal mark meeting of the generation control terminal, and, it is given birth to using conference terminal mark
Encryption information is identified at conference terminal;
Merge the meeting control terminal mark encryption information and conference terminal mark encryption information, obtains encryption information;
Send the encryption information.
6. a kind of view networking meeting control terminal, which is characterized in that it is described to be stored with meeting control terminal mark depending on networking meeting control terminal, it is described
Terminal includes:
Meeting control terminal identity verification module, for obtaining encryption information, and using the encryption information verifying meeting control terminal
Mark;
Conference terminal identity verification module, for obtaining conference terminal mark, and adopt when the meeting control terminal identity verification success
The conference terminal mark is verified with the encryption information;
Request sending module, for sending meeting and initiating request to view networking meeting when conference terminal identity verification success
Server;The view networking Conference server, which is used to initiate request according to the meeting to execute meeting, initiates operation.
7. terminal according to claim 6, which is characterized in that the conference terminal identity verification module, comprising:
Identification request sending submodule, for sending conference terminal identification request to view networking conference terminal;
Receiving submodule is identified, the conference terminal mark returned for receiving the view networking conference terminal.
8. terminal according to claim 6, which is characterized in that the meeting control terminal identity verification module, comprising:
Encryption information extracting sub-module can be controlled, it can control terminal mark encryption information for being extracted from the encryption information;
First encryption information to be verified generates submodule, the encryption letter to be verified of first for generating the meeting control terminal mark
Breath;
First judging submodule, for judge the described first encryption information to be verified with it is described can control terminal mark encryption information be
It is no consistent;If so, identity verification success decision sub-module can be controlled by executing, unsuccessfully determine if it is not, then executing and can control identity verification
Submodule;
Identity verification success decision sub-module can be controlled, for determining the meeting control terminal identity verification success;
Identity verification failure decision sub-module can be controlled, for determining the meeting control terminal identity verification failure.
9. terminal according to claim 6, which is characterized in that the conference terminal identity verification module, comprising:
Session encryption information extraction submodule identifies encryption information for extracting conference terminal from the encryption information;
Second encryption information to be verified generates submodule, the encryption letter to be verified of second for generating the conference terminal mark
Breath;
Second judgment submodule, for judge the described second encryption information to be verified and the conference terminal mark encryption information be
It is no consistent;If so, executing meeting identification is proved to be successful decision sub-module, if it is not, then executing the judgement of meeting identification authentication failed
Submodule
Meeting identification is proved to be successful decision sub-module, for determining the conference terminal identity verification success;
Meeting identification authentication failed decision sub-module, for determining the conference terminal identity verification failure.
The Conference server 10. a kind of view is networked, which is characterized in that the server includes:
Identifier acquisition module, can control terminal mark and conference terminal mark for obtaining;
Encryption information generation module is identified, is used to identify encryption information using the meeting control terminal mark meeting of the generation control terminal, with
And it is identified using the conference terminal and generates conference terminal mark encryption information;
Encryption information merging module, for merging the meeting control terminal mark encryption information and conference terminal mark encryption letter
Breath, obtains encryption information;
Encryption information sending module, for sending the encryption information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711445200.8A CN108965227B (en) | 2017-12-27 | 2017-12-27 | Data processing method and video networking conference server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711445200.8A CN108965227B (en) | 2017-12-27 | 2017-12-27 | Data processing method and video networking conference server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108965227A true CN108965227A (en) | 2018-12-07 |
CN108965227B CN108965227B (en) | 2021-03-05 |
Family
ID=64495723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711445200.8A Active CN108965227B (en) | 2017-12-27 | 2017-12-27 | Data processing method and video networking conference server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108965227B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109803159A (en) * | 2018-12-17 | 2019-05-24 | 视联动力信息技术股份有限公司 | A kind of verification method and system of terminal |
CN111143607A (en) * | 2019-11-18 | 2020-05-12 | 视联动力信息技术股份有限公司 | Information acquisition method and device |
CN111260331A (en) * | 2020-02-07 | 2020-06-09 | 北京字节跳动网络技术有限公司 | Conference system, conference apparatus, conference system management method, and storage medium |
CN112291592A (en) * | 2020-12-29 | 2021-01-29 | 视联动力信息技术股份有限公司 | Control plane protocol-based secure video communication method, device, equipment and medium |
CN114615459A (en) * | 2022-05-10 | 2022-06-10 | 全时云商务服务股份有限公司 | Video conference joining method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102196436A (en) * | 2010-03-11 | 2011-09-21 | 华为技术有限公司 | Security authentication method, device and system |
CN104202440A (en) * | 2014-09-02 | 2014-12-10 | 腾讯科技(深圳)有限公司 | Method for identifying terminal, server and system |
US20150067777A1 (en) * | 2013-09-04 | 2015-03-05 | Facebook, Inc. | Systems and methods for authenticating nodes |
CN104993961A (en) * | 2015-06-30 | 2015-10-21 | 广州华多网络科技有限公司 | Equipment control methods, devices and system |
-
2017
- 2017-12-27 CN CN201711445200.8A patent/CN108965227B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102196436A (en) * | 2010-03-11 | 2011-09-21 | 华为技术有限公司 | Security authentication method, device and system |
US20150067777A1 (en) * | 2013-09-04 | 2015-03-05 | Facebook, Inc. | Systems and methods for authenticating nodes |
CN104202440A (en) * | 2014-09-02 | 2014-12-10 | 腾讯科技(深圳)有限公司 | Method for identifying terminal, server and system |
CN104993961A (en) * | 2015-06-30 | 2015-10-21 | 广州华多网络科技有限公司 | Equipment control methods, devices and system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109803159A (en) * | 2018-12-17 | 2019-05-24 | 视联动力信息技术股份有限公司 | A kind of verification method and system of terminal |
CN111143607A (en) * | 2019-11-18 | 2020-05-12 | 视联动力信息技术股份有限公司 | Information acquisition method and device |
CN111143607B (en) * | 2019-11-18 | 2024-05-24 | 视联动力信息技术股份有限公司 | Information acquisition method and device |
CN111260331A (en) * | 2020-02-07 | 2020-06-09 | 北京字节跳动网络技术有限公司 | Conference system, conference apparatus, conference system management method, and storage medium |
CN111260331B (en) * | 2020-02-07 | 2024-01-12 | 北京字节跳动网络技术有限公司 | Conference system, conference apparatus, conference method, and conference program management device and storage medium |
CN112291592A (en) * | 2020-12-29 | 2021-01-29 | 视联动力信息技术股份有限公司 | Control plane protocol-based secure video communication method, device, equipment and medium |
CN112291592B (en) * | 2020-12-29 | 2021-03-26 | 视联动力信息技术股份有限公司 | Control plane protocol-based secure video communication method, device, equipment and medium |
CN114615459A (en) * | 2022-05-10 | 2022-06-10 | 全时云商务服务股份有限公司 | Video conference joining method and device |
Also Published As
Publication number | Publication date |
---|---|
CN108965227B (en) | 2021-03-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108023910B (en) | A kind of terminal monitoring method and system based on view networking | |
CN108012106B (en) | A kind of method and system regarding networking monitoring source synchronous | |
CN108881799B (en) | A kind of system and method carrying out view networked video meeting | |
CN109451264A (en) | A kind of method and system of monitoring device membership | |
CN108965227A (en) | A kind of data processing method and view networking Conference server | |
CN108023858B (en) | A kind of view networking network management safety certifying method and its system | |
CN108965225A (en) | Data processing method turns server and view networked terminals depending on networking association | |
CN108965224A (en) | A kind of method and apparatus of video on demand | |
CN107888401B (en) | A kind of method and system of real time monitoring view networked terminals cpu busy percentage | |
CN108616549A (en) | A kind of file uploading method and file server | |
CN108810579A (en) | A kind of video data requesting method, association turn server and regard networked server | |
CN110062195A (en) | A kind of video conference cut-in method and system | |
CN109766753A (en) | A kind of finger print information acquisition methods and device | |
CN109729184A (en) | A kind of method and apparatus of view networking service processing | |
CN108881940A (en) | A kind of data processing method and view networked server | |
CN108965783A (en) | A kind of video data handling procedure and view networking recording/playing terminal | |
CN108880853A (en) | A kind of configuration information recovery method and configuration information server regarding networked server | |
CN108965941A (en) | A kind of data capture method and view networking management system | |
CN108881791B (en) | A kind of conference control method and Conference control device based on view networking | |
CN110149497A (en) | A kind of view networked data transmission method, apparatus, system and readable storage medium storing program for executing | |
CN109586851A (en) | Data transmission method and device based on view networking | |
CN109951726A (en) | Long-range control method and device | |
CN110049009A (en) | A kind of identity information acquisition system and method | |
CN109376507A (en) | A kind of data safety control method and system | |
CN109698859A (en) | A kind of date storage method and device based on view networking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 100000 Dongcheng District, Beijing, Qinglong Hutong 1, 1103 house of Ge Hua building. Applicant after: VISIONVERA INFORMATION TECHNOLOGY Co.,Ltd. Address before: 100000 Beijing Dongcheng District Qinglong Hutong 1 Song Hua Building A1103-1113 Applicant before: BEIJING VISIONVERA INTERNATIONAL INFORMATION TECHNOLOGY Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |