CN109286628A - Data safe transmission method, system, electronic equipment and storage medium - Google Patents

Data safe transmission method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN109286628A
CN109286628A CN201811183164.7A CN201811183164A CN109286628A CN 109286628 A CN109286628 A CN 109286628A CN 201811183164 A CN201811183164 A CN 201811183164A CN 109286628 A CN109286628 A CN 109286628A
Authority
CN
China
Prior art keywords
terminal
message
communication structure
data
message communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811183164.7A
Other languages
Chinese (zh)
Inventor
侯战胜
朱俊奇
彭林
韩海韵
徐敏
王鹤
王刚
于海
鲍兴川
朱亮
何志敏
张泽浩
周强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Anhui University of Science and Technology
Global Energy Interconnection Research Institute
State Grid Jibei Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Jiangsu Electric Power Co Ltd
Anhui University of Science and Technology
Global Energy Interconnection Research Institute
State Grid Jibei Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Jiangsu Electric Power Co Ltd, Anhui University of Science and Technology, Global Energy Interconnection Research Institute, State Grid Jibei Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201811183164.7A priority Critical patent/CN109286628A/en
Publication of CN109286628A publication Critical patent/CN109286628A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Abstract

The invention discloses a kind of data safe transmission method, system, electronic equipment and readable storage medium storing program for executing, wherein this method comprises the following steps: first terminal obtains first message communication structure data;Wherein, the first message communication structure data include at least one of call request message, control signaling request message;The first terminal encrypts the first message communication structure data;Encrypted first message communication structure data are sent to server by the first terminal, to establish the connection of the first terminal and second terminal by the server.This method carries out encrypted transmission to message communicating structural data by first terminal, carries out non-encrypted transmission to unstructured datas such as audio stream and video flowings, had both realized message communicating and has encrypted safely, and had in turn ensured the high-speed transfer of audio/video flow.

Description

Data safe transmission method, system, electronic equipment and storage medium
Technical field
The present invention relates to data communication technology fields, and in particular to a kind of data safe transmission method, system, electronic equipment And storage medium.
Background technique
With the development of the internet information communication technology, the development of audio/video flow communicating tech mainly experienced this simulation Signal audio-visual system, multimedia remote based on PC assist system, the remote audio-video cooperative system based on Web server, Four developing stage of audio/video collaboration system based on mobile terminal.Audio and video technology development at present is in based on the remote of mobile terminal Journey assists system stages, and mobile terminal matured product mainly has Skype, QQ and wechat voice and video telephone etc..
Public service enterprise of the electric power enterprise as relationship energy security and national economy, trouble free service relationship all trades and professions And huge numbers of families.Electric system is in large scale, equipment is various, structure is complicated, and Remote or scene are needed in electric operating Audio/video collaboration guidance, but in electric operating scene, since power equipment electromagnetism, noise etc. interfere larger and wireless network not Stablize, especially mobile terminal hardware handles performance is lower, in order to guarantee the real-time facile transport of mobile terminal audio, video data, electricity Scape remote collaboration guidance in the field of force causes the safety of message communicating low without encryption.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of data safe transmission method, system, electronic equipment and storages to be situated between Matter, to solve not can be implemented simultaneously the encryption of electric power scene remote collaboration guide message communication security and audio/video flow in the prior art High-speed transfer the problem of.
According in a first aspect, including the following steps: first the embodiment of the invention provides a kind of data safe transmission method Terminal obtains first message communication structure data;Wherein, the first message communication structure data include that call request disappears At least one of breath, control signaling request message;The first terminal carries out the first message communication structure data Encryption;Encrypted first message communication structure data are sent to server by the first terminal, to pass through the service Device establishes the connection of the first terminal and second terminal.
Optionally, before the step of first terminal acquisition first message communication structure data, further includes: first terminal obtains Take second message communication structure data;Wherein, the second message communication structure data include endpoint to register message, heartbeat At least one of message;The first terminal encrypts the second message communication structure data;Described first eventually Encrypted second message communication structure data are sent to server by end;So that the server is according to the second message Communication structure data establish the online list of terminal, and encrypt to the online list of the terminal;The first terminal receives The online list of encrypted terminal that the server is sent.
Optionally, the step of encrypted first message communication structure data are sent to server by the first terminal Later, further includes: first terminal receives the encrypted third message communication structure for the second terminal feedback that server is sent Data;Wherein, the third message communication structure data include call answering message, in control signaling response message at least One of;First terminal obtains the first audio/video flow unstructured data, and the first audio/video flow unstructured data is sent out It send to server;First terminal receives the second audio/video flow unstructured data of the second terminal feedback that server is sent.
Optionally, first terminal receives the second audio/video flow unstructured data of the second terminal feedback that server is sent The step of after, further includes: first terminal obtain the 4th message communication structure data;Wherein, the 4th message communicating knot Structure data include drawing to instruct at least one of markup information, target following markup information, exit message;Described first eventually End encrypts the 4th message communication structure data, and encrypted 4th message communication structure data are sent To server.
Optionally, key of the first terminal using rivest, shamir, adelman management symmetry algorithm, symmetric encipherment algorithm Encrypt first message communication structure data and/or second message communication structure data and/or the 4th message communication structure Data.
According to second aspect, the embodiment of the invention provides a kind of data safe transmission method, include the following steps: from One terminal receives encrypted first message communication structure data;Wherein, the first message communication structure data include At least one of call request message, control signaling request message;According to the encrypted first message communication structure Data establish the connection of the first terminal and second terminal.
Optionally, before the step of receiving encrypted first message communication structure data from first terminal, further includes: Encrypted second message communication structure data are received from first terminal;Wherein, the second message communication structure data Including at least one of endpoint to register message, heartbeat message;According to the encrypted second message communication structure data Establish the online list of terminal;The online list of the terminal is encrypted;The online list of encrypted terminal is sent to first Terminal and second terminal.
Optionally, the first terminal and second is established eventually according to the encrypted first message communication structure data After the step of connection at end, further includes: receive encrypted third message communication structure data from second terminal;Wherein, The third message communication structure data include at least one of call answering message, control signaling response message;By institute It states encrypted third message communication structure data and is sent to first terminal;The non-knot of the first audio/video flow is received from first terminal Structure data, and the first audio/video flow unstructured data is sent to the second terminal;The is received from second terminal Two audio/video flow unstructured datas, and the second audio/video flow unstructured data is sent to the first terminal.
Optionally, after the step of the second audio/video flow unstructured data being sent to the first terminal, also It include: to receive encrypted 4th message communication structure data from first terminal;Wherein, the 4th message communication structure Data include drawing to instruct at least one of markup information, target following markup information, exit message;It will be described encrypted 4th message communication structure data are sent to second terminal.
According to the third aspect, the embodiment of the invention provides a kind of data safe transmission systems, comprising: first obtains mould Block obtains first message communication structure data for first terminal;Wherein, the first message communication structure data include At least one of call request message, control signaling request message;First processing module, will be described for the first terminal First message communication structure data are encrypted;First sending module disappears for the first terminal by encrypted first Message communication structural data is sent to server, to establish the company of the first terminal and second terminal by the server It connects.
Optionally, further includes: third obtains module, obtains second message communication structure data for first terminal;Its In, the second message communication structure data include at least one of endpoint to register message, heartbeat message;Second processing mould Block encrypts the second message communication structure data for the first terminal;Third sending module, for described Encrypted second message communication structure data are sent to server by first terminal;So that the server is according to described Two message communication structure data establish the online list of terminal, and encrypt to the online list of the terminal;First receives mould Block receives the online list of encrypted terminal that the server is sent for the first terminal.
Optionally, further includes: the second receiving module receives the second terminal feedback that server is sent for first terminal Encrypted third message communication structure data;Wherein, the third message communication structure data include that call answering disappears At least one of breath, control signaling response message;Third processing module obtains the non-knot of the first audio/video flow for first terminal Structure data, and the first audio/video flow unstructured data is sent to server;Third receiving module, eventually for first End receives the second audio/video flow unstructured data of the second terminal feedback that server is sent.
Optionally, further includes: the 4th obtains module, obtains the 4th message communication structure data for first terminal;Its In, the 4th message communication structure data include drawing to instruct markup information, target following markup information, in exit message At least one of;Fourth processing module encrypts the 4th message communication structure data for the first terminal, And encrypted 4th message communication structure data are sent to server.
According to fourth aspect, the embodiment of the invention provides a kind of data safe transmission systems, comprising: second obtains mould Block, for receiving encrypted first message communication structure data from first terminal;Wherein, the first message communication structure Changing data includes at least one of call request message, control signaling request message;Second sending module, for according to Encrypted first message communication structure data establish the connection of the first terminal and second terminal.
Optionally, further includes: the 4th receiving module, for receiving encrypted second message communication structure from first terminal Change data;Wherein, the second message communication structure data include at least one of endpoint to register message, heartbeat message; 5th processing module, for establishing the online list of terminal according to the encrypted second message communication structure data;6th Processing module, for being encrypted to the online list of the terminal;4th sending module is used for encrypted terminal in alignment Table is sent to first terminal and second terminal.
Optionally, further includes: the 5th receiving module, for receiving encrypted third message communication structure from second terminal Change data;Wherein, the third message communication structure data include call answering message, in control signaling response message extremely It is one of few;5th sending module, for the encrypted third message communication structure data to be sent to first terminal;The Seven processing modules, for receiving the first audio/video flow unstructured data from first terminal, and first audio/video flow is non- Structural data is sent to the second terminal;8th processing module, for receiving the non-knot of the second audio/video flow from second terminal Structure data, and the second audio/video flow unstructured data is sent to the first terminal.
Optionally, further includes: the 6th receiving module, for receiving encrypted 4th message communication structure from first terminal Change data;Wherein, the 4th message communication structure data include draw instruct markup information, target following markup information, At least one of exit message;6th sending module, for sending out the encrypted 4th message communication structure data It send to second terminal.
According to the 5th aspect, the embodiment of the invention provides a kind of electronic equipment, comprising: memory and processor, it is described Connection is communicated with each other between memory and the processor, computer instruction is stored in the memory, and the processor is logical It crosses and executes the computer instruction, thereby executing the first aspect present invention any data safe transmission method or execution Any data safe transmission method of second aspect of the present invention.
It is described computer-readable the embodiment of the invention provides a kind of computer readable storage medium according to the 6th aspect Storage medium is stored with computer instruction, and the computer instruction is any for making the computer execute first aspect present invention The data safe transmission method executes any data safe transmission method of second aspect of the present invention.
The present invention has the advantage that
Data safe transmission method provided by the invention includes the following steps: that first terminal obtains first message communication knot Structure data;Wherein, the first message communication structure data include call request message, in control signaling request message At least one;The first terminal encrypts the first message communication structure data;The first terminal will encrypt First message communication structure data afterwards are sent to server, to establish the first terminal and second by the server The connection of terminal.This method carries out encrypted transmission to message communicating structural data by first terminal, to audio stream and video The unstructured datas such as stream carry out non-encrypted transmission, have both realized message communicating and have encrypted safely, and had in turn ensured the height of audio/video flow Speed transmission.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the application scenarios signal of a specific example of data safe transmission method provided in an embodiment of the present invention Figure;
Fig. 2 is the flow chart of a specific example of data safe transmission method provided in an embodiment of the present invention;
Fig. 3 is the flow chart of another specific example of data safe transmission method provided in an embodiment of the present invention;
Fig. 4 is the flow chart of another specific example of data safe transmission method provided in an embodiment of the present invention;
Fig. 5 is the flow chart of a specific example of data safe transmission method provided in an embodiment of the present invention;
Fig. 6 is the flow chart of another specific example of data safe transmission method provided in an embodiment of the present invention;
Fig. 7 is the flow chart of another specific example of data safe transmission method provided in an embodiment of the present invention;
Fig. 8 is the flow chart of a specific example of data safe transmission method provided in an embodiment of the present invention;
Fig. 9 be data safe transmission method provided in an embodiment of the present invention terminal and server between communicated one The schematic diagram of a specific example;
Figure 10 is the schematic diagram of a specific example of data safe transmission system provided in an embodiment of the present invention;
Figure 11 is the schematic diagram of a specific example of data safe transmission system provided in an embodiment of the present invention;
Figure 12 is the hardware structural diagram of electronic equipment provided in an embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those skilled in the art are not having Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation, It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also indirectly connected through an intermediary, it can be with It is the connection inside two elements, can be wireless connection, be also possible to wired connection.For those of ordinary skill in the art For, the concrete meaning of above-mentioned term in the present invention can be understood with concrete condition.
As long as in addition, the non-structure each other of technical characteristic involved in invention described below different embodiments It can be combined with each other at conflict.
Fig. 1 is the application scenarios schematic diagram of the embodiment of the present invention.First terminal and second terminal can be mobile phone or plate Computer etc. has the mobile terminal of WIFI module, is interacted between first terminal and second terminal by server, and first eventually End and second terminal are each equipped with the first encrypting module (such as TF card encryption chip), and server is also configured with the second encrypting module (such as high-speed encryption card).In order to realize electric power scene remote collaboration guide message communication security, need in first terminal, second The structural data transmitted between terminal and server carries out encrypted transmission, to improve the safety of message communicating;Together When in order to realize the high-speed transfer of audio/video flow, need directly to transmit between first terminal, second terminal and server The individual transmission that is not encrypted of unstructured data (such as audio-visual message), to realize the real-time of unstructured data Communication.
The present embodiment provides a kind of data safe transmission methods, can be applied in the guidance of electric power scene remote collaboration, to electricity The message communicating of field of force scape remote collaboration guidance carries out safe encryption, carries out non-encrypted transmission to audio/video flow, solves existing The high-speed transfer of the encryption of electric power scene remote collaboration guide message communication security and audio/video flow is not can be implemented simultaneously in technology Problem.Fig. 2 is the flow chart of a specific example of data safe transmission method in the present embodiment, as shown in Fig. 2, the data are pacified Full transmission method is applied to terminal side, includes the following steps S1-S3.
Step S1: first terminal obtains first message communication structure data;Wherein, first message communication structure data Including at least one of call request message, control signaling request message.
In an alternative embodiment, the control signaling request message that first terminal obtains may include the user name of first terminal (UserName), User ID (UserID), IP address, message sending end slogan, message sink port numbers, audio video transmission port Number;In another alternative embodiment, control signaling request message may also comprise a part in above-mentioned message, as needed rationally Setting;Certainly, in other embodiments, control signaling request message may also include other letters in addition to above-mentioned message It ceases, specific message included by control signaling request message can be determined rationally according to actual needs.
In an alternative embodiment, first message communication structure data include call request message and control signaling request Message;In other alternative embodiments, first message communication structure data may also include part messages among the above, may be used also Including other message in addition to above-mentioned message, rationally setting as needed.
In an alternative embodiment, first terminal first can send call request message to second terminal by server; And then the corresponding call answering message of second terminal feedback is obtained by server;Then, then pass through server to second Terminal sends control signaling request message;Finally, obtaining the call answering message of second terminal feedback by server, calling is answered Answering message may include the IP address of second terminal, message sending end slogan and message sink port numbers, audio video transmission port numbers. Certainly, in other embodiments, call request message and control signaling request message can also be sent to second terminal simultaneously, according to It needs rationally to be arranged, the present embodiment is not construed as limiting this.
Step S2: first terminal encrypts first message communication structure data.
It, can be by the TF card encryption chip that is configured in first terminal to first message communication structure in an alternative embodiment Change data to be encrypted.Certainly, in other embodiments, first terminal also can be used other encrypting modules in the prior art into Row encryption, as needed rationally setting.
In an alternative embodiment, the key of rivest, shamir, adelman management symmetry algorithm is can be used in first terminal, symmetrically Encryption Algorithm encrypts first message communication structure data;Rivest, shamir, adelman can be RSA, DSA or ECC etc., symmetrically add Close algorithm can be DES, 3DES or AES etc..Certainly, in other embodiments, other encryptions in the prior art also can be used Mode encrypts first message communication structure data, reasonably selects cipher mode, this implementation according to actual needs Example is not construed as limiting this.
Step S3: encrypted first message communication structure data are sent to server by first terminal, to pass through clothes Business device establishes the connection of first terminal and second terminal.
In an alternative embodiment, specifically, first terminal sends encrypted first message communication structure data To server, server forwards it to second terminal again and just establishes communication link between first terminal and second terminal in this way It connects.Server can be according to User ID and user name Query IP address, video calling port numbers, meeting room ID and meeting The information such as room title, and user message table is opened in cache maintenance one, after server receives first message communication structure data The relevant information of the second terminal of connection is established needed for can finding in user message table, and eventually according to second inquired First message communication structure data are sent to second terminal by the relevant information at end.
For example, one-to-one message call: it is assumed that first terminal A wants to establish connection with second terminal B, first terminal A to Second terminal B initiates message call, and first terminal A sends message related to calls to server, and server can pass through disappearing in server Message is forwarded by breath service module gives second terminal B, after second terminal B receives message, receives or refusal carries out calling and disappears Breath.
In another example one-to-many message call: it is assumed that first terminal A wants to establish connection with second terminal B, third terminal C, First terminal A initiates message call to second terminal B, third terminal C, and first terminal A sends message related to calls, service to server Message is forwarded to second terminal B and third terminal C by device messaging service module, and second terminal B and third terminal C reception disappear After breath, receives or refusal carries out call request.
It should be noted that, although first terminal, second terminal in the present embodiment etc. is by taking a mobile terminal as an example It is described, the present embodiment only schematically illustrates, and is not limited thereto.It should be understood by those skilled in the art that being first Terminal A may include several mobile terminals, and second terminal B may also comprise several mobile terminals, first terminal A and second terminal The specific number of B can be rationally arranged according to actual needs.
Above-mentioned data safe transmission method, first terminal are sent to after being encrypted first message communication structure data Encrypted communication structure data are sent to second terminal by server, to establish first terminal and second by server Connection between terminal.The message communication structure data transmitted between first terminal and server are passed in a manner of encrypting It is defeated, improve the safety of message communicating;Meanwhile directly to the unstructured data transmitted between first terminal and server The individual transmission that (such as audio-visual message) is not encrypted improves sound to realize the real time communication of unstructured data The high-speed transfer of video flowing.
In an alternative embodiment, as shown in figure 3, obtaining first message communication structure data in step S1 first terminal The step of before, further include step S4-S7.
Step S4: first terminal obtains second message communication structure data;Wherein, second message communication structure data Including at least one of endpoint to register message, heartbeat message.
In an alternative embodiment, endpoint to register message may include ID users, user name;In another alternative embodiment In, endpoint to register message may also comprise a part in above-mentioned message, as needed rationally setting;Certainly, in other realities It applies in example, endpoint to register message may also include the other information in addition to above-mentioned message, specific included by endpoint to register message Message can be determined rationally according to actual needs.
In an alternative embodiment, second message communication structure data include the endpoint to register message and the heart of first terminal Jump message;In other alternative embodiments, first message communication structure data may also include part messages among the above, also It may include other message in addition to above-mentioned message, rationally setting as needed.
It should be noted that the endpoint to register message and heartbeat message of second terminal can be also sent to service by second terminal Device;Similarly, itself terminal volume message and heartbeat message can be also sent to clothes by other terminals such as third terminal, the 4th terminal Business device, will pass through the communication connection that server is established between different terminals.
Step S5: first terminal encrypts second message communication structure data.
It, can be by the TF card encryption chip that is configured in first terminal to second message communication structure in an alternative embodiment Change data to be encrypted.Certainly, in other embodiments, first terminal also can be used other encrypting modules in the prior art into Row encryption, as needed rationally setting.
In an alternative embodiment, the key of rivest, shamir, adelman management symmetry algorithm is can be used in first terminal, symmetrically Encryption Algorithm encrypts second message communication structure data;Rivest, shamir, adelman can be RSA, DSA or ECC etc., symmetrically add Close algorithm can be DES, 3DES or AES etc..Certainly, in other embodiments, other encryptions in the prior art also can be used Mode encrypts second message communication structure data, reasonably selects cipher mode, this implementation according to actual needs Example is not construed as limiting this.
Step S6: encrypted second message communication structure data are sent to server by first terminal;So that service Device establishes the online list of terminal according to second message communication structure data, and encrypts to the online list of terminal.
In an alternative embodiment, the second message communication structure data that server is sent according to first terminal are being cached One online list of terminal (the online table of user) of middle maintenance, newly increases user's registration every time, to the whole network broadcasting user online information, Heartbeat function is kept with each user, when user offline or abnormal disconnection, then to the offline message of the whole network broadcasting user.Specifically Ground, after each meeting is initiated, server safeguards a meeting room lists of persons (the online list of terminal) in the buffer, is added when new Meeting room to meeting room line personnel multicast, while being had lists of persons and issued newly into personnel, when useful by meeting personnel's message Meeting is exited at family, then message server will move out meeting personnel message to meeting room other staff's multicast.
Step S7: first terminal receives the online list of encrypted terminal that server is sent.
In an alternative embodiment, specifically, first terminal receives the encrypted terminal of server transmission in alignment Table, second terminal can the client configuration interface of terminal can see in user list user whether online message, according to Other terminals that the online list of terminal connects needed for determining.
In alternative embodiment, as shown in figure 3, in step S3 by encrypted first message communication structure data It further include step S8-S10 after the step of being sent to server.
Step S8: first terminal receives the encrypted third message communication structure for the second terminal feedback that server is sent Change data;Wherein, third message communication structure data include call answering message, in control signaling response message at least it One.
In an alternative embodiment, third message communication structure data include call answering message and control signaling response Message;In other alternative embodiments, third message communication structure data may also include part messages among the above, may be used also Including other message in addition to above-mentioned message, rationally setting as needed.
In an alternative embodiment, call answering message may include the IP address of second terminal, message sending end slogan, disappear Cease receiving port number, audio video transmission port numbers;In other embodiments, the particular content that call answering message is included can root According to needs rationally setting.
Step S9: first terminal obtains the first audio/video flow unstructured data, and the first audio/video flow is unstructured Data are sent to server.
In an alternative embodiment, the first audio/video flow unstructured data can be the first voice and video telephone.
Step S10: first terminal receives the unstructured number of the second audio/video flow for the second terminal feedback that server is sent According to.Second terminal receives the second audio/video flow unstructured data of first terminal feedback, shows first terminal and second eventually End can carry out smooth voice and video telephone.
Above-mentioned data safe transmission method carries out non-encrypted transmission to unstructured datas such as audio/video flows, sets in electric power Standby electromagnetism, noise etc. interfere larger and wireless network unstable, especially in the lower situation of mobile terminal hardware handles performance, protect The high speed facile transport of audio/video flow is demonstrate,proved.
In alternative embodiment, as shown in figure 3, second in the reception server transmission of step S10 first terminal is whole It further include step S11-S12 after the step of holding the second audio/video flow unstructured data of feedback.
Step S11: first terminal obtains the 4th message communication structure data;Wherein, the 4th message communication structure number At least one of markup information, target following markup information, exit message are instructed according to including drawing.
In an alternative embodiment, the 4th message communication structure data include drawing to instruct markup information, target following Markup information, exit message;In other alternative embodiments, the 4th message communication structure data may also include among the above Part messages may also include other message in addition to above-mentioned message, as needed rationally setting.
Specifically, first terminal can by server first to second terminal send draw instruct markup information, target with Track markup information;And then exit message is first sent to second terminal by server.
In an alternative embodiment, first terminal carries out drawing guidance to target first, then uses the mesh based on feature Mark tracks and identifies algorithm, carries out identification matching and tracking to target object, realizes drawing guidance and target following identification mark.
Step S12: first terminal encrypts the 4th message communication structure data, and by encrypted 4th message Communication structure data are sent to server.
In an alternative embodiment, during voice and video telephone, first terminal A is at second terminal B video display interface Picture and text tutorial message is sent to server by upper progress picture and text mark, first terminal A, and server is transmitted to second terminal B, Graph text information is carried out on two terminal B to redraw, and realizes target following identification mark.
Above-mentioned data safe transmission method, by instructing the electric power such as markup information, target following markup information real drawing Border guide message is transmitted after being encrypted, and electric power scene remote collaboration instructs end-user listening data, message communicating, control signaling etc. Structural data carries out secure encrypted transmission, it is therefore prevented that data are stolen, and have ensured information communications safety, have further increased The safety of data communication.
As a specific embodiment of the present embodiment, as shown in figure 4, the data safe transmission method, including configuration Three interface manager module, message processing module and medium process module parts.
Configuration interface management module includes terminal management, management and group, video display interface, draw mark, multi-channel video It is laid out the parts such as displaying, terminal log management.Message processing module includes endpoint to register, message generates, message is sent, message connects It receives, Message Processing, the online heartbeat message of user, picture and text instruct drawing message, target following annotated message, audio-video control signaling The parts such as negotiation information.Medium process module includes audio/video flow, audio coding decoding, coding and decoding video, audio/video flow synchronization, sound Pushing video streaming, audio/video flow reception, video comfort and quality enhancing, audio echo cancellation, the superposition of picture and text tutorial message, target The superposition of tracking mark, audio-video play in real time, multi-channel video implements the parts such as switching.Wherein, audio coding decoding using AAC, The audio coding decodings agreement such as PUS, PCM, coding and decoding video use H264 video encoding protocol, and video resolution supports vga (640x480), svga (800x600), 720p (1280x720) etc..
The data safe transmission method carries out non-encrypted transmission to unstructured datas such as audio/video flows, in power equipment Electromagnetism, noise etc. interfere larger and wireless network unstable, especially in the lower situation of mobile terminal hardware handles performance, guarantee The high speed facile transport of audio/video flow.Electric power scene remote collaboration instructs the user data, message communicating, control signaling of terminal Equal structural datas carry out secure encrypted transmission, it is therefore prevented that data are stolen, and have ensured information communications safety.
The present embodiment also provides a kind of data safe transmission method, is applied to server side, as shown in figure 5, including as follows Step S13-S14.
Step S13: encrypted first message communication structure data are received from first terminal;Wherein, first message is logical Believe that structural data includes at least one of call request message, control signaling request message.
In an alternative embodiment, first message communication structure data are the data that first terminal is sent to server, It specifically is detailed in step S1, details are not described herein.
Step S14: the company of first terminal and second terminal is established according to encrypted first message communication structure data It connects.
In an alternative embodiment, server receives encrypted first message by radio receiving transmitting module (such as WIFI) and leads to Believe structural data, and first terminal is sent the data to by radio receiving transmitting module.
Above-mentioned data safe transmission method is moved applied in the electric power scene remote collaboration guidance of hardware security encryption There are a large amount of real-time unstructured datas in internet audiovisual applications, voice and video telephone data should be prevented to be easy to be stolen, again Ensure message communicating and secure user data transmission.It therefore, is that message communication structure data and sound regard by sub-data transmission Frequency stream unstructured data, and individual transmission is carried out to the data of both types, realize the guidance of electric power scene remote collaboration Message communicating encrypts safely, has ensured data transmission security.
In an alternative embodiment, as shown in fig. 6, step S13 receives encrypted first message communication from first terminal It further include step S15-S18 before the step of structural data.
Step S15: encrypted second message communication structure data are received from first terminal;Wherein, second message is logical Believe that structural data includes at least one of endpoint to register message, heartbeat message.
In an alternative embodiment, second message communication structure data are the data that first terminal is sent to server, It specifically is detailed in step S4, details are not described herein.
Step S16: the online list of terminal is established according to encrypted second message communication structure data.
In an alternative embodiment, the second message communication structure data that server is sent according to first terminal are being cached One online list of terminal (the online table of user) of middle maintenance, newly increases user's registration every time, to the whole network broadcasting user online information, Heartbeat function is kept with each user, when user offline or abnormal disconnection, then to the offline message of the whole network broadcasting user.Specifically Ground, after each meeting is initiated, server safeguards a meeting room lists of persons (the online list of terminal) in the buffer, is added when new Meeting room to meeting room line personnel multicast, while being had lists of persons and issued newly into personnel, when useful by meeting personnel's message Meeting is exited at family, then message server will move out meeting personnel message to meeting room other staff's multicast.
Step S17: the online list of terminal is encrypted.
In an alternative embodiment, server can be encrypted the online list of terminal by the high-speed encryption card configured, The code key that specifically symmetry algorithm can be managed by disposing rivest, shamir, adelman (RSA, DSA, ECC etc.) in encrypted card, symmetrically Encryption Algorithm (DES, 3DES, AES etc.) encrypts audio-visual message communication data, passes through WIFI/4G virtual Private Network and each terminal Establish encrypted tunnel.
Step S18: the online list of encrypted terminal is sent to first terminal and second terminal.
In an alternative embodiment, the online list of encrypted terminal is sent to each terminal, each terminal by server The online situation of different terminals can be learnt according to this list information, and establishes the connection between different terminals according to this.
In an alternative embodiment, as shown in fig. 6, step S14 is according to encrypted first message communication structure data It further include step S19-S22 after the step of establishing the connection of first terminal and second terminal.
Step S19: encrypted third message communication structure data are received from second terminal;Wherein, third message is logical Believe that structural data includes at least one of call answering message, control signaling response message.
In an alternative embodiment, third message communication structure data are the data that first terminal is sent to server, It specifically is detailed in step S8, details are not described herein.
Step S20: encrypted third message communication structure data are sent to first terminal.
In an alternative embodiment, encrypted third message communication structure data that server sends second terminal It is sent to first terminal, first terminal just receives the response feedback of second terminal, in this way can be whole in first terminal and second It is communicatively coupled between end.
Step S21: the first audio/video flow unstructured data is received from first terminal, and the first audio/video flow is non-structural Change data and is sent to second terminal.
In an alternative embodiment, the first audio/video flow unstructured data may include audio data and video data;? In another alternative embodiment, the first audio/video flow unstructured data can also only include audio data or video data, specifically The content for being included can be determined rationally according to actual needs.
Step S22: the second audio/video flow unstructured data is received from second terminal, and the second audio/video flow is non-structural Change data and is sent to first terminal.
In an alternative embodiment, the second audio/video flow unstructured data may include audio data and video data;? In another alternative embodiment, the first audio/video flow unstructured data can also only include audio data or video data, specifically The content for being included can be determined rationally according to actual needs.
In an alternative embodiment, server can ensure that transmission speed by transmitting audio/video flow on non-encrypted channel Rate;Message communicating is transmitted on safe encrypted tunnel, ensure that the safety of message communicating.
In an alternative embodiment, as shown in fig. 6, the second audio/video flow unstructured data is sent in step S22 It further include step S23-S24 after the step of first terminal.
Step S23: encrypted 4th message communication structure data are received from first terminal;Wherein, the 4th message is logical Letter structural data includes drawing to instruct at least one of markup information, target following markup information, exit message.
In an alternative embodiment, the 4th message communication structure data are the data that first terminal is sent to server, It specifically is detailed in step S11, details are not described herein.
Step S24: encrypted 4th message communication structure data are sent to second terminal.
By step S23 and S24, picture and text mark is carried out to the video of second terminal acquisition on first terminal, passes through clothes Markup information is sent to second terminal by business device;Second terminal carries out redrawing picture and text mark, realizes picture and text guidance and target following Mark instructs the electric operating of second terminal to realize first terminal.
As a specific embodiment of the present embodiment, as shown in fig. 7, the data safe transmission method, including system Three management module, messaging service module and media services module parts.
System management module includes terminal management, management and group, Role Management, rights management, history video management, log The parts such as management.Messaging service module includes endpoint to register, message sink, message forwarding, Message Processing, the online list dimension of user Shield, picture and text instruct the parts such as drawing message, target following identification message, the negotiation of audio-video control signaling.Media services module packet Include transmission process control, Bandwidth Management, congestion control, multi-channel video receive, multi-channel video forwarding, multi-channel video synthetic recording and The parts such as storage, terminal access.
Wherein, messaging service module concrete function is as follows:
(a) endpoint to register
On the basis of TCP connection, client initiates registering functional to message server, and ID users, user name are issued Message server, server is according to User ID and user name Query IP address, video calling port numbers, meeting room ID With the information such as conference room name, and user message table is opened in cache maintenance one, after succeeding in registration, it is true that message server returns to ACK Recognize information.
(b) the online list maintenance of user
Message server safeguards the online table of user in the buffer, newly increases user's registration every time, broadcasts and uses to the whole network Family online information keeps heartbeat function with each user, when user offline or abnormal disconnection, then offline to the whole network broadcasting user Message, client configuration interface can see in user list personnel whether online message.
(c) one-to-one and one-to-many message call
One-to-one message call: it is assumed that first terminal A, second terminal B, first terminal A initiates message to second terminal B and exhales It cries, first terminal A sends message related to calls to video server, and message is forwarded to second eventually by server message service module After holding B, second terminal B to receive message, receives or refusal carries out video calling.
One-to-many message call: it is assumed that first terminal A, second terminal B, third terminal C, first terminal A is to second terminal B, third terminal C initiates message call, and first terminal A sends message related to calls, video server messaging service to video server Message is forwarded to second terminal B, third terminal C by module, after second terminal B, third terminal C receive message, receive or Refusal carries out video calling.
(d) personnel enter or exit in meeting room
After each meeting is initiated, message server safeguards a meeting room lists of persons in the buffer, when newly addition meeting Meeting room to meeting room line personnel multicast, while being had lists of persons and issued newly into personnel by personnel's message, when there is user to move back Meeting out, then message server will move out meeting personnel message to meeting room other staff's multicast.
(e) picture and text guidance and target identification track markup information
It is assumed that terminal A, B, C, during video collaboration: carrying out picture and text mark to the video of B acquisition on intelligent terminal A Note, is sent to B, C for markup information by message server;Terminal B, C carries out redrawing picture and text mark, realizes picture and text guidance and mesh Mark tracking mark.Drawing guidance is carried out to target first, the target following recognizer based on feature is then used, to object Body carries out identification matching and tracking, realizes drawing guidance and target following identification mark.
Fig. 8 is the flow chart of the specific example communicated between terminal and server in the present embodiment, with first It carries out being described in detail for One-to-one communication between terminal A and second terminal B.As shown in figure 12, whole flow process is specifically wrapped It includes:
(a) endpoint to register: first terminal A registers UserName and UserID, video server end dimension to video server Protect terminal list.
(b) heartbeat message: first terminal A timing sends heartbeat message, video server updating maintenance to video server The online list of terminal, and timing pushes the online list of terminal to first terminal A and second terminal B.
(c) message related to calls: first terminal A initiates audio-video call request, video server forwarding request to second terminal B After message gives second terminal B, second terminal B to receive message, call request is responded.
(d) control signaling message: first terminal A is initiated in audio-video request message to second terminal B, includes control letter Message is enabled, as UserName, UserID of first terminal A, IP address, message send and receive port numbers, audio video transmission end Slogan, UserName, UserID of audio-video second terminal B), IP in second terminal B response message comprising second terminal B Location, message send and receive port numbers, audio video transmission port numbers.
(e) voice and video telephone: if second terminal B receives first terminal A message related to calls, according to negotiate control signaling, into The call of row audio/video flow.
(f) picture and text guidance and target following markup information
During voice and video telephone, first terminal A carries out picture and text mark on second terminal B video display interface, the Picture and text tutorial message is sent to video server by one terminal A, and server is transmitted to second terminal B, is carried out on second terminal B Graph text information is redrawn, and realizes target following identification mark.
Fig. 9 is the schematic diagram of the specific example communicated between terminal and server in the present embodiment.Such as Fig. 9 institute Show, the structural datas such as message communicating are transmitted on safe encrypted tunnel, and the unstructured datas such as audio/video flow add non- It is transmitted on close channel.
The secret of rivest, shamir, adelman (RSA, DSA, ECC etc.) management symmetry algorithm specifically can be used in message communicating encryption Key, then symmetric encipherment algorithm (DES, 3DES, AES etc.) encryption data.Mobile terminal configuration TF card encryption chip, Video service Device configuration high-speed encrypted card establishes hardware encrypted tunnel by WIFI/4G wireless network.Added using hardware cipher mode It is close, on encrypted tunnel transmit endpoint to register, heartbeat message, message related to calls, control signaling negotiation message, picture and text guidance draw and Target following markup information;The transmission of the unstructured datas such as audio-video is then transmitted by non-encrypted channel;It both realizes in this way Electric power scene remote collaboration guide message communication security encrypted transmission, and realize the high speed facile transport of audio/video flow.
A kind of data safe transmission system is additionally provided in the present embodiment, and the system is for realizing above-described embodiment and excellent Embodiment is selected, the descriptions that have already been made will not be repeated.As used below, predetermined function may be implemented in term " module " Software and/or hardware combination.Although device described in following embodiment is preferably realized with software, hardware, Or the realization of the combination of software and hardware is also that may and be contemplated.
As shown in Figure 10, the data safe transmission system provided in the present embodiment is applied to terminal side, comprising: first obtains Modulus block 1, first processing module 2 and the first sending module 3.
First obtains module 1, obtains first message communication structure data for first terminal;Wherein, first message is logical Believe that structural data includes at least one of call request message, control signaling request message;Detailed content refers to step S1 It is described.
First processing module 2 encrypts first message communication structure data for first terminal;Detailed content ginseng It examines described in step S2.
Encrypted first message communication structure data are sent to service for first terminal by the first sending module 3 Device, to establish the connection of the first terminal and second terminal by server;Detailed content is with reference to described in step S3.
In an alternative embodiment, the data safe transmission system further include: third obtain module, Second processing module, Third sending module and the first receiving module.
Third obtains module, obtains second message communication structure data for first terminal;Wherein, second message communicates Structural data includes at least one of endpoint to register message, heartbeat message;Detailed content is with reference to described in step S4.
Second processing module encrypts the second message communication structure data for first terminal;In in detail Hold with reference to described in step S5.
Encrypted second message communication structure data are sent to service for first terminal by third sending module Device;So that server establishes the online list of terminal according to second message communication structure data, and carries out to the online list of terminal Encryption;Detailed content is with reference to described in step S6.
First receiving module receives the online list of encrypted terminal that the server is sent for first terminal;In detail Thin content is with reference to described in step S7.
In alternative embodiment, data safe transmission system further include: the second receiving module, third processing module With third receiving module.
Second receiving module, the encrypted third for receiving the second terminal feedback that server is sent for first terminal disappear Message communication structural data;Wherein, third message communication structure data include call answering message, control signaling response message At least one of;Detailed content is with reference to described in step S8.
Third processing module obtains the first audio/video flow unstructured data for first terminal, and by the first audio-video Stream unstructured data is sent to server;Detailed content is with reference to described in step S9.
Third receiving module, the second audio/video flow for receiving the second terminal feedback that server is sent for first terminal are non- Structural data;Detailed content is with reference to described in step S10.
In another alternative embodiment, the data safe transmission system further include: the 4th obtains module and fourth process Module.
4th obtains module, obtains the 4th message communication structure data for first terminal;Wherein, the 4th message communicating Structural data includes drawing to instruct at least one of markup information, target following markup information, exit message;Detailed content With reference to described in step S11.
Fourth processing module encrypts the 4th message communication structure data for first terminal, and will be after encryption The 4th message communication structure data be sent to server;Detailed content is with reference to described in step S12.
As shown in figure 11, the data safe transmission system provided in the present embodiment is applied to server side, comprising: second Obtain module 4 and the second sending module 5.
Second obtains module 4, for receiving encrypted first message communication structure data from first terminal;Wherein, First message communication structure data include at least one of call request message, control signaling request message;Detailed content With reference to described in step S13.
Second sending module 5, for establishing first terminal and according to encrypted first message communication structure data The connection of two terminals;Detailed content is with reference to described in step S14.
In an alternative embodiment, the data safe transmission system further include: the 4th receiving module, the 5th processing module, 6th processing module and the 4th sending module.
4th receiving module, for receiving encrypted second message communication structure data from first terminal;Wherein, institute Stating second message communication structure data includes at least one of endpoint to register message, heartbeat message;Detailed content is with reference to step Described in rapid S15.
5th processing module, for establishing terminal in alignment according to the encrypted second message communication structure data Table;Detailed content is with reference to described in step S16.
6th processing module, for being encrypted to the online list of the terminal;Detailed content is with reference to described in step S17.
4th sending module, for the online list of encrypted terminal to be sent to first terminal and second terminal;In detail Content is with reference to described in step S18.
In alternative embodiment, which further includes, further includes: the 5th receiving module, the 5th Sending module, the 7th processing module and the 8th processing module.
5th receiving module, for receiving encrypted third message communication structure data from second terminal;Wherein, Three message communication structure data include at least one of call answering message, control signaling response message;Detailed content ginseng It examines described in step S19.
5th sending module, for the encrypted third message communication structure data to be sent to first terminal; Detailed content is with reference to described in step S20.
7th processing module, for receiving the first audio/video flow unstructured data from first terminal, and by described first Audio/video flow unstructured data is sent to the second terminal;Detailed content is with reference to described in step S21.
8th processing module, for receiving the second audio/video flow unstructured data from second terminal, and by described second Audio/video flow unstructured data is sent to the first terminal;Detailed content is with reference to described in step S22.
In another alternative embodiment, the data safe transmission system further include: the 6th receiving module and the 6th is sent Module.
6th receiving module, for receiving encrypted 4th message communication structure data from first terminal;Wherein, Four message communication structure data include draw instruct markup information, target following markup information, in exit message at least it One;Detailed content is with reference to described in step S23.
6th sending module, for encrypted 4th message communication structure data to be sent to second terminal;In detail Content is with reference to described in step S24.
The further function description of above-mentioned modules is identical as above method corresponding embodiment, no longer superfluous herein It states.
The embodiment of the invention also provides a kind of electronic equipment, and as shown in figure 12, which may include processor 121 and memory 122, wherein processor 121 can be connected with memory 122 by bus or other way, in Figure 12 with For being connected by bus.
Processor 121 can be central processing unit (CentralProcessingUnit, CPU).Processor 121 can be with For other general processors, digital signal processor (DigitalSignalProcessor, DSP), specific integrated circuit (App LicationSpecificIntegratedCircuit, ASIC), field programmable gate array (Field- ProgrammableGateArray, FPGA) either other programmable logic device, discrete gate or transistor logic, point The combination of the chips such as vertical hardware component or above-mentioned all kinds of chips.
Memory 122 is used as a kind of non-transient computer readable storage medium, can be used for storing non-transient software program, non- Transient computer executable program and module, as the corresponding program of data safe transmission system in the embodiment of the present invention refers to Order/module is (for example, shown in Fig. 10 first obtains module 1, first processing module 2 and the first sending module 3;Or Figure 11 institute Second shown obtains module 4 and the second sending module 5).Processor 121 is stored in non-transient in memory 122 by operation Software program, instruction and module, thereby executing the various function application and data processing of processor, i.e. the realization above method Data safe transmission method in embodiment.
Memory 122 may include storing program area and storage data area, wherein storing program area can store operation system System, at least one application program required for function;It storage data area can the data etc. that are created of storage processor 121.In addition, Memory 122 may include high-speed random access memory, can also include non-transient memory, and one of for example, at least disk is deposited Memory device, flush memory device or other non-transient solid-state memories.In some embodiments, it includes opposite that memory 122 is optional In the remotely located memory of processor 121, these remote memories can pass through network connection to processor 121.Above-mentioned net The example of network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
One or more of modules are stored in the memory 122, when being executed by the processor 121, are held Data safe transmission method in row embodiment as in Figure 2-4;Or the data executed in embodiment as illustrated in figs. 5-7 are pacified Full transmission method;Or the data safe transmission method in execution embodiment as shown in Figure 8.
Above-mentioned data safe transmission system detail can correspond to corresponding into embodiment shown in Fig. 8 refering to Fig. 2 Associated description and effect are understood that details are not described herein again.
It is that can lead to it will be understood by those skilled in the art that realizing all or part of the process in above-described embodiment method Computer program is crossed to instruct relevant hardware and complete, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for magnetic disk, CD, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), flash memory (Flash Memory), hard disk (Hard Disk Drive, abbreviation: HDD) or solid state hard disk (Solid-State Drive, SSD) etc.;The storage medium can also include the combination of the memory of mentioned kind.
Although being described in conjunction with the accompanying the embodiment of the present invention, those skilled in the art can not depart from the present invention Spirit and scope in the case where various modifications and variations can be made, such modifications and variations are each fallen within by appended claims institute Within the scope of restriction.

Claims (13)

1. a kind of data safe transmission method, which comprises the steps of:
First terminal obtains first message communication structure data;Wherein, the first message communication structure data include exhaling It is at least one of request message, control signaling request message;
The first terminal encrypts the first message communication structure data;
Encrypted first message communication structure data are sent to server by the first terminal, to pass through the server Establish the connection of the first terminal and second terminal.
2. data safe transmission method according to claim 1, which is characterized in that first terminal obtains first message communication Before the step of structural data, further includes:
First terminal obtains second message communication structure data;Wherein, the second message communication structure data include eventually Hold at least one of registration message, heartbeat message;
The first terminal encrypts the second message communication structure data;
Encrypted second message communication structure data are sent to server by the first terminal;So that the server root The online list of terminal is established according to the second message communication structure data, and the online list of the terminal is encrypted;
The first terminal receives the online list of encrypted terminal that the server is sent.
3. data safe transmission method according to claim 1, which is characterized in that the first terminal is by encrypted After the step of one message communication structure data are sent to server, further includes:
First terminal receives the encrypted third message communication structure data for the second terminal feedback that server is sent;Its In, the third message communication structure data include at least one of call answering message, control signaling response message;
First terminal obtains the first audio/video flow unstructured data, and the first audio/video flow unstructured data is sent To server;
First terminal receives the second audio/video flow unstructured data of the second terminal feedback that server is sent.
4. data safe transmission method according to claim 3, which is characterized in that first terminal receives what server was sent After the step of second audio/video flow unstructured data of second terminal feedback, further includes:
First terminal obtains the 4th message communication structure data;Wherein, the 4th message communication structure data include drawing Figure instructs at least one of markup information, target following markup information, exit message;
The first terminal encrypts the 4th message communication structure data, and by encrypted third message communicating Structural data is sent to server.
5. data safe transmission method according to claim 1 to 4, which is characterized in that the first terminal uses Rivest, shamir, adelman manage symmetry algorithm key, symmetric encipherment algorithm encrypt first message communication structure data and/or Second message communication structure data and/or the 4th message communication structure data.
6. a kind of data safe transmission method, which comprises the steps of:
Encrypted first message communication structure data are received from first terminal;Wherein, the first message communication structure Data include at least one of call request message, control signaling request message;
The connection of the first terminal and second terminal is established according to the encrypted first message communication structure data.
7. data safe transmission method according to claim 6, which is characterized in that receive encrypted the from first terminal Before the step of one message communication structure data, further includes:
Encrypted second message communication structure data are received from first terminal;Wherein, the second message communication structure Data include at least one of endpoint to register message, heartbeat message;
The online list of terminal is established according to the encrypted second message communication structure data;
The online list of the terminal is encrypted;
The online list of encrypted terminal is sent to first terminal and second terminal.
8. data safe transmission method according to claim 6, which is characterized in that according to the encrypted first message Communication structure data were established after the step of connection of the first terminal and second terminal, further includes:
Encrypted third message communication structure data are received from second terminal;Wherein, the third message communication structure Data include at least one of call answering message, control signaling response message;
The encrypted third message communication structure data are sent to first terminal;
The first audio/video flow unstructured data is received from first terminal, and the first audio/video flow unstructured data is sent out It send to the second terminal;
The second audio/video flow unstructured data is received from second terminal, and the second audio/video flow unstructured data is sent out It send to the first terminal.
9. data safe transmission method according to claim 8, which is characterized in that second audio/video flow is non-structural After the step of change data are sent to the first terminal, further includes:
Encrypted 4th message communication structure data are received from first terminal;Wherein, the 4th message communication structure Data include drawing to instruct at least one of markup information, target following markup information, exit message;
The encrypted 4th message communication structure data are sent to second terminal.
10. a kind of data safe transmission system characterized by comprising
First obtains module, obtains first message communication structure data for first terminal;Wherein, the first message communication Structural data includes at least one of call request message, control signaling request message;
First processing module encrypts the first message communication structure data for the first terminal;
Encrypted first message communication structure data are sent to service for the first terminal by the first sending module Device, to establish the connection of the first terminal and second terminal by the server.
11. a kind of data safe transmission system characterized by comprising
Second obtains module, for receiving encrypted first message communication structure data from first terminal;Wherein, described One message communication structure data include at least one of call request message, control signaling request message;
Second sending module, for according to the encrypted first message communication structure data establish the first terminal with The connection of second terminal.
12. a kind of electronic equipment characterized by comprising memory and processor, between the memory and the processor Connection is communicated with each other, computer instruction is stored in the memory, the processor, which passes through, executes the computer instruction, from And perform claim requires the 1-5 any data safe transmission method or perform claim to require any number of 6-9 According to safe transmission method.
13. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to Enable, the computer instruction be used to making the computer perform claim require any data safe transmission method of 1-5 or Person's perform claim requires any data safe transmission method of 6-9.
CN201811183164.7A 2018-10-10 2018-10-10 Data safe transmission method, system, electronic equipment and storage medium Pending CN109286628A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811183164.7A CN109286628A (en) 2018-10-10 2018-10-10 Data safe transmission method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811183164.7A CN109286628A (en) 2018-10-10 2018-10-10 Data safe transmission method, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109286628A true CN109286628A (en) 2019-01-29

Family

ID=65176759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811183164.7A Pending CN109286628A (en) 2018-10-10 2018-10-10 Data safe transmission method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109286628A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110780652A (en) * 2019-11-08 2020-02-11 上海快仓智能科技有限公司 Automatic guide car system
CN111143342A (en) * 2019-12-26 2020-05-12 南通科普特信息技术有限公司 Processing method of unstructured data and anti-copy encryption transmission system
CN115987574A (en) * 2022-12-06 2023-04-18 中国联合网络通信集团有限公司 Virtual private cloud security detection method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562813A (en) * 2009-05-12 2009-10-21 中兴通讯股份有限公司 Method for implementing real-time data service, real-time data service system and mobile terminal
CN105450977A (en) * 2014-09-24 2016-03-30 三亚中兴软件有限责任公司 Video conference calling method and video conference calling system
US20160127326A1 (en) * 2014-10-31 2016-05-05 Wei Lin Telecommunication method for securely exchanging data
CN105704149A (en) * 2016-03-24 2016-06-22 国网江苏省电力公司电力科学研究院 Safety protection method for power mobile application
CN106899562A (en) * 2016-04-21 2017-06-27 中国移动通信有限公司研究院 The secure algorithm negotiation method of Internet of Things, network element and internet-of-things terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101562813A (en) * 2009-05-12 2009-10-21 中兴通讯股份有限公司 Method for implementing real-time data service, real-time data service system and mobile terminal
CN105450977A (en) * 2014-09-24 2016-03-30 三亚中兴软件有限责任公司 Video conference calling method and video conference calling system
US20160127326A1 (en) * 2014-10-31 2016-05-05 Wei Lin Telecommunication method for securely exchanging data
CN105704149A (en) * 2016-03-24 2016-06-22 国网江苏省电力公司电力科学研究院 Safety protection method for power mobile application
CN106899562A (en) * 2016-04-21 2017-06-27 中国移动通信有限公司研究院 The secure algorithm negotiation method of Internet of Things, network element and internet-of-things terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110780652A (en) * 2019-11-08 2020-02-11 上海快仓智能科技有限公司 Automatic guide car system
CN111143342A (en) * 2019-12-26 2020-05-12 南通科普特信息技术有限公司 Processing method of unstructured data and anti-copy encryption transmission system
CN115987574A (en) * 2022-12-06 2023-04-18 中国联合网络通信集团有限公司 Virtual private cloud security detection method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US10778656B2 (en) Sharing resources across multiple devices in online meetings
US20170214525A1 (en) Mobile secret communications method based on quantum key distribution network
US10819687B2 (en) Apparatus and method of encrypted communication
US9356917B2 (en) System and method for end-to-end encryption and security indication at an endpoint
CN106850195B (en) Group key negotiation and communication method in instant communication
US10739933B2 (en) Reduced latency server-mediated audio-video communication
CN109286628A (en) Data safe transmission method, system, electronic equipment and storage medium
CN107948676A (en) Method of transmitting video data and device
CN206743420U (en) Remote Video Conference controls and management system
US20220078169A1 (en) Methods, systems, and media for providing secure network communications
US20220006798A1 (en) Secure multiway calling
CN107566671A (en) Network voice communication method and its system, storage medium, electronic equipment
CN106559396A (en) Media multicast method and system based on Web real-time Communication for Power
CN109688072A (en) Speaker method of network entry, speaker and computer readable storage medium
KR102212401B1 (en) Multiway audio-video conferencing with multiple communication channels per device
US10666693B1 (en) Encrypting multiple party calls
CN110475095A (en) A kind of conference control method, device, equipment and readable storage medium storing program for executing
US20170026414A1 (en) Methods Circuits Devices Systems and Functionally Associated Computer Executable Code for Managing a Data Access Network
CN110113623A (en) A kind of audio-video slice transmission platform based on Session Initiation Protocol
JP2006352662A (en) Server unit, reference terminal unit, and communication method
JP7366115B2 (en) Delivering notifications to mobile devices
Goncalves et al. LiveCity: A Secure Live Video-to-Video Interactive City Infrastructure
WO2019026776A1 (en) Encrypted communication device, encrypted communication system, encrypted communication method, and program
CN105338286B (en) A kind of secondary flow transmission method and device
US9648120B2 (en) Integration of intentional noise into a communication channel to simulate activity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190129

RJ01 Rejection of invention patent application after publication