CN109660568A - Method, equipment and the system of network talkback security mechanism are realized based on SRTP - Google Patents

Method, equipment and the system of network talkback security mechanism are realized based on SRTP Download PDF

Info

Publication number
CN109660568A
CN109660568A CN201910136732.6A CN201910136732A CN109660568A CN 109660568 A CN109660568 A CN 109660568A CN 201910136732 A CN201910136732 A CN 201910136732A CN 109660568 A CN109660568 A CN 109660568A
Authority
CN
China
Prior art keywords
radio voice
srtp
data
voice data
vop
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910136732.6A
Other languages
Chinese (zh)
Other versions
CN109660568B (en
Inventor
方国栋
张育钊
刘昊天
张鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaqiao University
Original Assignee
Huaqiao University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaqiao University filed Critical Huaqiao University
Priority to CN201910136732.6A priority Critical patent/CN109660568B/en
Publication of CN109660568A publication Critical patent/CN109660568A/en
Application granted granted Critical
Publication of CN109660568B publication Critical patent/CN109660568B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/65Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of method for realizing network talkback security mechanism based on SRTP, including 1, acquisition public key;2, radio voice data are acquired and grouping is set;3, radio voice data are packaged into SRTP VoP, and the encryption environment in SRTP VoP is encrypted using RSA;4, radio voice server is sent by SRTP VoP;5, radio voice server receives SRTP VoP and forwards;6, then radio voice server buffer SRTP VoP is decrypted encryption environment using RSA;7, voice data is obtained from the SRTP VoP obtained after decryption, and is merged storage into HDFS according to corresponding strategies.The present invention also provides a kind of computer equipments and a kind of system for realizing network talkback security mechanism based on SRTP, guarantee the safety of voice data transmission when intercommunication, also guarantee the safety of voice data storage.

Description

Method, equipment and the system of network talkback security mechanism are realized based on SRTP
Technical field
The present invention relates to intercommunication data flow safe transmission and field of storage, realize network based on SRTP more particularly to one kind Method, equipment and the system of intercommunication security mechanism.
Background technique
The high speed development of Internet technology, so that VOIP (Voice over Internet Protocol, IP-based language Sound transmission, is a kind of voice communication technology, via Internet protocol (IP) Lai Dacheng voice communication and multimedia conferencing, that is, passes through The application communicated by internet) also more and more extensive, this transmission that stream medium data is carried out by network, because of net The insecurity of network brings safety problem of these Stream Media Applications in data transmission procedure, simultaneously as when big data The arrival in generation, all valuable creed for becoming many application service providers of all data, but simultaneously these data in terms of storage Safety issue be also the current problem to be solved of these application service providers.
Security Real Time Protocol (Secure Real-Time Transport Protocol, SRTP), is real-time Transmission The security extensions protocol of agreement (Real-Time Transport Protocol, RTP), it provides a kind of peace for Real-time Transport Protocol Full mechanism joined the mechanism such as encryption and message authentication on the basis of Real-time Transport Protocol.It, which is defaulted, uses AES (Advanced Encryption Standard) Encryption Algorithm streaming media data are encrypted, it ensure that the safety of VOIP to a certain extent Property, but the algorithm needs communicating pair all while safeguarding an encryption environment, therefore, when streaming media, SRTP packet Similarly there is a possibility that being attacked in the safety for encrypting environment.
Hadoop distributed file system (Hadoop Distributed File System, HDFS), is that Apache is opened The core component of one distributed computing framework Hadoop of source tissue, with GFS (the Google File of Google company System) it is prototype, is increased income and realized using Java, sets up cloud storage solution for each great institutions and company and provide reference. It once appearance, is just widely used, including FaceBook, Yahoo, Alibaba, the internets such as Tencent and Baidu are public Department stores mass data using HDFS.Its design at the beginning of be exactly in order to stable operation in cheap commerce server, Also, it also has many advantages, such as fault-tolerance height, and scalability is good.HDFS uses master-slave architecture, is saved by a NameNode Point and a large amount of DataNode node composition, wherein NameNode is the core of HDFS, and work is the metadata of maintenance documentation Information, and all DataNode nodes are coordinated and managed, DataNode is then used for the storage of actual file.Start in Hadoop cluster Later, all metadata informations can be all loaded into NameNode memory.When client accesses HDFS, it is necessary first to NameNode node obtains the metadata information of associated documents, then finds actual storage file according to these metadata informations DataNode obtains the requested file of client finally by DataNode.
Summary of the invention
One of the problem to be solved in the present invention is to provide a kind of side for realizing network talkback security mechanism based on SRTP On the one hand method can solve speech talkback promoter and speech talkback recipient and carry out radio voice according to the security mechanism The safety issue of data brought radio voice data when transmitting, on the other hand, which take radio voice In the storage to HDFS for the radio voice data safety that business device cluster can transmit interphone terminal, data storage ensure that Safety;
One of the problem to be solved in the present invention is achieved in that a kind of based on SRTP realization network talkback security mechanism Method, comprising: interphone terminal and radio voice server cluster, the interphone terminal include it is a plurality of have data hair The intercom with receive capabilities is sent, for sending the intercoms of radio voice data as speech talkback promoter, for receiving For the intercom of radio voice data as speech talkback recipient, the radio voice server cluster includes a plurality of intercommunication languages Sound server;Described method includes following steps:
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, and the grouping according to SRTP VoP is big Small setting radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and It is encrypted;
Step 4, speech talkback promoter send intercommunication language by network for the SRTP VoP after the completion of encapsulation Corresponding radio voice server in sound server cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient Or it is forwarded in the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server by step 6, radio voice server Local, after having cached all SRTP VoPs, radio voice server is provided according to speech talkback recipient Private key decrypt MKI and authenticating tag from encrypted SRTP VoP, obtained further according to the MKI and authenticating tag Radio voice data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server.
Further, the step 7 specifically:
Radio voice server inspects periodically the radio voice data in local file, and according to radio voice server institute Whether the threshold determination of setting needs to store the radio voice data into HDFS, if the intercommunication language in current local file The data volume of sound data has reached the threshold size of setting, then radio voice server will be all right in such a way that integration dissipates and divides It says in voice data storage to HDFS;If the data volume of the radio voice data in current local file is less than set threshold Value, then without file Merge operation, continue waiting for server and merge inspection next time.
Further, the step 7 radio voice data merge storage into HDFS, wherein merging in radio voice data Later and before storage to HDFS further include: establish an index file for the radio voice data after merging, and calculated using RSA Method encrypts each index file, and user needs to carry out Authority Verification when obtaining radio voice data, if unauthorized Side, then can not get index record, to can not also get specific radio voice data;If authorized party, then pass through Index file gets radio voice data.
Further, being encrypted in the step 3 specifically has: filling SRTP fixing head, then according to being obtained RSA public key using RSA cryptographic algorithms in SRTP VoP MKI and authenticating tag be encrypted, and will The position of encrypted result covering original MKI and authenticating tag.
The two of the problem to be solved in the present invention are to provide a kind of computer equipment, can be according to the security mechanism, a side Face solves speech talkback promoter and speech talkback the recipient brought radio voice when carrying out the transmission of radio voice data The safety issue of data, on the other hand, which pass radio voice server cluster by interphone terminal In the storage to HDFS of defeated radio voice data safety, the safety of data storage ensure that;
The two of the problem to be solved in the present invention are achieved in that a kind of computer equipment, including memory, processor And storage is on a memory and the computer program that can run on a processor, when the processor executes described program realization with Lower step:
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, and the grouping according to SRTP VoP is big Small setting radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and It is encrypted;
Step 4, speech talkback promoter send intercommunication language by network for the SRTP VoP after the completion of encapsulation Corresponding radio voice server in sound server cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient Or it is forwarded in the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server by step 6, radio voice server Local, after having cached all SRTP VoPs, radio voice server is provided according to speech talkback recipient Private key decrypt MKI and authenticating tag from encrypted SRTP VoP, obtained further according to the MKI and authenticating tag Radio voice data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server.
Further, the step 7 specifically:
Radio voice server inspects periodically the radio voice data in local file, and according to radio voice server institute Whether the threshold determination of setting needs to store the radio voice data into HDFS, if the intercommunication language in current local file The data volume of sound data has reached the threshold size of setting, then radio voice server will be all right in such a way that integration dissipates and divides It says in voice data storage to HDFS;If the data volume of the radio voice data in current local file is less than set threshold Value, then without file Merge operation, continue waiting for server and merge inspection next time.
Further, the step 7 radio voice data merge storage into HDFS, wherein merging in radio voice data Later and before storage to HDFS further include: establish an index file for the radio voice data after merging, and calculated using RSA Method encrypts each index file, and user needs to carry out Authority Verification when obtaining radio voice data, if unauthorized Side, then can not get index record, to can not also get specific radio voice data;If authorized party, then pass through Index file gets radio voice data.
Further, being encrypted in the step 3 specifically has: filling SRTP fixing head, then according to being obtained RSA public key using RSA cryptographic algorithms in SRTP VoP MKI and authenticating tag be encrypted, and will The position of encrypted result covering original MKI and authenticating tag.
The three of the problem to be solved in the present invention, are to provide and a kind of are based on what SRTP realized network talkback security mechanism On the one hand system can solve speech talkback promoter and speech talkback recipient and carry out radio voice according to the security mechanism The safety issue of data brought radio voice data when transmitting, on the other hand, which take radio voice In the storage to HDFS for the radio voice data safety that business device cluster can transmit interphone terminal, data storage ensure that Safety;
The three of the problem to be solved in the present invention are achieved in that a kind of based on SRTP realization network talkback security mechanism System, including public key acquisition module, data preparation module, data package module and the data transmission module on interphone terminal And data forwarding module, local cache module and distributed storage module on radio voice server cluster;
The public key acquisition module obtains the RSA public key of speech talkback recipient for speech talkback promoter;
The data preparation module carries out the acquisition of radio voice data for speech talkback promoter, according to SRTP language Radio voice data grouping is arranged in the packet size of sound data packet;
The radio voice data obtained after grouping are packaged by the data package module for speech talkback promoter SRTP VoP, and be encrypted;
SRTP VoP after the completion of encapsulation is passed through net for speech talkback promoter by the data transmission module Network is sent to corresponding radio voice server in radio voice server cluster;
The data forwarding module receives the SRTP VoP for radio voice server, and is forwarded to correspondence Speech talkback recipient or be forwarded in the group being made of speech talkback recipient;
The local cache module, the SRTP voice data for sending speech talkback promoter for radio voice server Packet is cached to server local, and after having cached all SRTP VoPs, radio voice server is according to voice pair Say that private key provided by recipient decrypts MKI and authenticating tag from encrypted SRTP VoP, further according to the MKI Radio voice data are obtained with authenticating tag, are finally saved into local file;
The distributed storage module deposits the radio voice data obtained after decryption merging for radio voice server It stores up in HDFS.
The present invention has the advantage that
1, when interphone terminal and radio voice server carry out radio voice data interaction, guarantee that intercom both sides carry out Safety of the radio voice data in transmission process when speech talkback.By using SRTP to radio voice data encryption, protect The safety of radio voice data has been demonstrate,proved, meanwhile, using RSA cryptographic algorithms to the MKI and authenticating tag in SRTP VoP It is encrypted, on the other hand the safety on the one hand further ensuring the encryption environment in SRTP VoP also guarantees When carrying out radio voice data encryption using AES, obtained in the safety of AES code key transmission and the convenience of code key management It improves.
2, guarantee the safety of radio voice data storage.Radio voice server stores file mergences into HDFS, Before storing, an index file can be established for all big files for forming the merging file, the effect of the index file is Specific radio voice data are positioned, each index file for merging file is all made of RSA Algorithm and is encrypted, and user is searching Necessary verifying must be carried out when specific radio voice data, ensures that unauthorized parties can not get retrieval note in this way Record, also you can't get specific radio voice data.
Detailed description of the invention
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the system architecture diagram that the present invention realizes.
Fig. 2 is the functional block diagram of interphone terminal in the present invention.
Fig. 3 is the functional block diagram of radio voice server in the present invention.
Fig. 4 is the specific flow chart that speech talkback promoter carries out safe transmission in the present invention.
Fig. 5 is the specific flow chart that radio voice server end carries out data forwarding in the present invention.
Fig. 6 is the specific flow chart that radio voice server carries out data storage in the present invention.
Fig. 7 is the specific flow chart that user carries out radio voice data access in the present invention.
Specific embodiment
A kind of method that network talkback security mechanism is realized based on SRTP of the invention, comprising: interphone terminal and intercommunication Voice server cluster, the interphone terminal includes a plurality of intercoms with data transmission and reception function, for sending out Send the intercom of radio voice data as speech talkback promoter, for receiving the intercom of radio voice data as voice Intercommunication recipient, the radio voice server cluster include a plurality of radio voice servers;The method includes walking as follows It is rapid:
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, and the grouping according to SRTP VoP is big Small setting radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and Be encrypted, specific ciphering process is: filling SRTP fixing head, then according to RSA public key obtained and use RSA Encryption Algorithm in SRTP VoP MKI and authenticating tag be encrypted, guarantee intercom both sides carry out voice Safety of the radio voice data in transmission process when intercommunication, and encrypted result is covered into original MKI and authenticating tag Position ensures that unauthorized recipient can not obtain correct MKI and authenticating tag in this way, also can not just decrypt intercommunication Voice data, to ensure that the safety of radio voice data;
Step 4, speech talkback promoter send intercommunication language by network for the SRTP VoP after the completion of encapsulation Corresponding radio voice server in sound server cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient Or it is forwarded in the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server by step 6, radio voice server Local, after having cached all SRTP VoPs, radio voice server is provided according to speech talkback recipient Private key decrypt MKI and authenticating tag from encrypted SRTP VoP, obtained further according to the MKI and authenticating tag Radio voice data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server;Specifically Have: radio voice server inspects periodically the radio voice data in local file, and according to set by radio voice server Threshold determination whether need to store the radio voice data into HDFS, if the radio voice number in current local file According to data volume reached the threshold size of setting, then radio voice server is dissipated using integration divide by the way of by all intercommunication languages In the storage to HDFS of sound data;If the data volume of the radio voice data in current local file is less than set threshold value, Then without file Merge operation, continues waiting for server and merge inspection next time.For the peace for guaranteeing the storage of radio voice data Quan Xing carries out file mergences storage, and radio voice data merge storage into HDFS, wherein after the merging of radio voice data And before storage to HDFS, an index file is established for the radio voice data after merging, using RSA Algorithm to each index File is encrypted, and user must carry out Authority Verification when carrying out radio voice data retrieval and then can not if unauthorized parties Index record is got, to can not also get specific radio voice data;If authorized party, then obtained by index file Get radio voice data.An index file is established for the merging file, the effect of the index file is in order to merge Specific radio voice file is quickly retrieved in file, meanwhile, to guarantee storage to the radio voice data on HDFS Safety, will use RSA and encrypts to each index file, user needs to carry out necessary peace when obtaining radio voice data Full verifying, just can guarantee the safety of data.
A kind of computer equipment of the invention, including memory, processor and storage are on a memory and can be in processor The computer program of upper operation, the processor perform the steps of when executing described program
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, and the grouping according to SRTP VoP is big Small setting radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and It is encrypted;Specific ciphering process is: filling SRTP fixing head, then according to RSA public key obtained and uses RSA Encryption Algorithm in SRTP VoP MKI and authenticating tag be encrypted, guarantee intercom both sides carry out voice Safety of the radio voice data in transmission process when intercommunication, and encrypted result is covered into original MKI and authenticating tag Position ensures that unauthorized recipient can not obtain correct MKI and authenticating tag in this way, also can not just decrypt intercommunication Voice data, to ensure that the safety of radio voice data;
Step 4, speech talkback promoter send intercommunication language by network for the SRTP VoP after the completion of encapsulation Corresponding radio voice server in sound server cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient Or it is forwarded in the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server by step 6, radio voice server Local, after having cached all SRTP VoPs, radio voice server is provided according to speech talkback recipient Private key decrypt MKI and authenticating tag from encrypted SRTP VoP, obtained further according to the MKI and authenticating tag Radio voice data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server;Specifically Have: radio voice server inspects periodically the radio voice data in local file, and according to set by radio voice server Threshold determination whether need to store the radio voice data into HDFS, if the radio voice number in current local file According to data volume reached the threshold size of setting, then radio voice server is dissipated using integration divide by the way of by all intercommunication languages In the storage to HDFS of sound data;If the data volume of the radio voice data in current local file is less than set threshold value, It is then operated without file Merge operation, continues waiting for server and merge inspection next time.To guarantee the storage of radio voice data Safety, carry out file mergences storage, after the merging of radio voice data and storage is to before HDFS, for pair after merging It says that voice data establishes an index file, each index file is encrypted using RSA Algorithm, user is carrying out intercommunication language Authority Verification must be carried out when sound data retrieval, if unauthorized parties, then can not get index record, to can not also obtain To specific radio voice data;If authorized party, then radio voice data are got by index file.For the merging file An index file is established, the effect of the index file is in order to quickly retrieve specific intercommunication language in merging file Sound file, meanwhile, for guarantee storage to the radio voice data on HDFS safety, will use RSA to each index file into Row encryption, user need to carry out necessary safety verification when obtaining radio voice data, just can guarantee the safety of data.
The three of the problem to be solved in the present invention, are to provide and a kind of are based on what SRTP realized network talkback security mechanism On the one hand system can solve speech talkback promoter and speech talkback recipient and carry out radio voice according to the security mechanism The safety issue of data brought radio voice data when transmitting, on the other hand, which take radio voice In the storage to HDFS for the radio voice data safety that business device cluster can transmit interphone terminal, data storage ensure that Safety;
The three of the problem to be solved in the present invention are achieved in that a kind of based on SRTP realization network talkback security mechanism System, including public key acquisition module, data preparation module, data package module and the data transmission module on interphone terminal And data forwarding module, local cache module and distributed storage module on radio voice server cluster;
The public key acquisition module obtains the RSA public key of speech talkback recipient for speech talkback promoter;
The data preparation module carries out the acquisition of radio voice data for speech talkback promoter, according to SRTP language Radio voice data grouping is arranged in the packet size of sound data packet;
The radio voice data obtained after grouping are packaged by the data package module for speech talkback promoter SRTP VoP, and be encrypted;Specific ciphering process is: filling SRTP fixing head, then according to being obtained RSA public key and using RSA cryptographic algorithms in SRTP VoP MKI and authenticating tag be encrypted, guarantee Intercom both sides carry out safety of the radio voice data in transmission process when speech talkback, and encrypted result is covered The position of former MKI and authenticating tag ensure that unauthorized recipient can not obtain correct MKI and authenticating tag in this way, Also radio voice data can not be just decrypted, to ensure that the safety of radio voice data;
SRTP VoP after the completion of encapsulation is passed through net for speech talkback promoter by the data transmission module Network is sent to corresponding radio voice server in radio voice server cluster;
The data forwarding module receives the SRTP VoP for radio voice server, and is forwarded to correspondence Speech talkback recipient or be forwarded in the group being made of speech talkback recipient;
The local cache module, the SRTP voice data for sending speech talkback promoter for radio voice server Packet is cached to server local, and after having cached all SRTP VoPs, radio voice server is according to voice pair Say that private key provided by recipient decrypts MKI and authenticating tag from encrypted SRTP VoP, further according to the MKI Radio voice data are obtained with authenticating tag, are finally saved into local file;
The distributed storage module deposits the radio voice data obtained after decryption merging for radio voice server It stores up in HDFS;Specifically have: radio voice server inspects periodically the radio voice data in local file, and according to intercommunication language Whether threshold determination set by sound server needs to store the radio voice data into HDFS, if current local file In radio voice data data volume reached setting threshold size, then radio voice server using integration dissipate point side Formula stores all radio voice data onto HDFS;If the data volume of the radio voice data in current local file is less than Set threshold value continues waiting for server and merges inspection next time then without file Merge operation.To guarantee radio voice The safety of data storage carries out file mergences storage, and establishes an index file for the radio voice data after merging, and adopts Each index file is encrypted with RSA Algorithm, user must carry out Authority Verification when carrying out radio voice data retrieval, If unauthorized parties, then index record can not be got, to can not also get specific radio voice data;If authorization Side, then get radio voice data by index file.An index file is established for the merging file, the index file Effect be in order to merge file in quickly retrieve specific radio voice file, meanwhile, for guarantee storage arrive HDFS On radio voice data safety, will use RSA and each index file encrypted, user obtain radio voice data When need to carry out necessary safety verification, just can guarantee the safety of data.
It is a kind of to the present invention that the method for network talkback security mechanism, equipment are realized based on SRTP and are by shown in attached drawing One implementation of system is described in detail:
The present invention provides a kind of methods for realizing network talkback security mechanism based on SRTP, including interphone terminal to carry out Safety and radio voice server when radio voice data are transmitted store radio voice data to the safety on HDFS.Pass through Security mechanism provided by the present invention can guarantee entire communication link when receiving-transmitting sides carry out network talkback to a certain extent Finally it is stored in the safety of the radio voice on radio voice server.
A kind of method for realizing network talkback security mechanism based on SRTP of the present invention is carried out on the basis of SRTP agreement , by using RSA cryptographic algorithms, AES encryption environment in SRTP VoP is encrypted, is achieved the purpose that safe.
Shown in the packet header SRTP fixed format part is briefly described as follows:
Wherein:
The version number of V:RTSP, 2bits, the value provide to be 2 at present;
P: load filling flag bit, 1bit are then needed when the integral multiple of the inadequate 32bits of load data length to load Data are filled, otherwise it is 0 that the value, which is 1, at this time;
X: extension marker, 1bit, the extension header of 1 expression needs one 32bits of increase behind fixed packet header, 0 Expression does not need to carry out any extension;
The number of CC:CSRC, 4bits can calculate CSRC quantity included in the packet header RSRP by the value;
M: mark, 1bit allow to mark important event in the bitstream;
PT: the type of load data, 7bits, for illustrating that the SRTP packet is grouped transmitted data type;
Sequence number: the sequence number of SRTP packet, when 16bits, SRTP flow one SRTP data packet of every transmission, which adds 1, packet can be flowed to SRTP by value recipient and counted, packet loss is detected and sequences of packets is restored;
Timestamp: the timestamp of RTSP packet transmission, 32bits indicate the sampling moment of SRTP grouping first character section.Just It is a random number when value, each sampling period adds 1;
SSRC: sending the source mark of stream, and 32bits indicates the synchronisation source of signal, and value should randomly choose, same to guarantee The SSRC of any two synchronisation source identifies different in a SRTP session;
CSRC: interting person's identifier among data flow, n 32bits, CSRC mark are inserted by mixer, and value is exactly group At the SSRC mark of each sub-signal of composite signal, to identify the information source of each group of twocomponent signal.The head of RTP grouping is most It may include 15 CSRC marks, number is indicated by CC field more.
Payload: encrypted flow data;
MKI: master key identifier, length is configurable, is defined, described and used by code key management agreement, and MKI is for marking Know encryption and authenticate this SRTP and wraps used main code key;
Authenticating tag: Authentication Tag, length is configurable, is used for bearer messages authentication data, authenticating tag The certification of RTP and payload is provided, while by authenticating to sequence number, provides Replay Attack protection indirectly;
By the simple introduction above to the packet header SRTP, primarily to illustrating a kind of network pair based on SRTP of the present invention Say that security mechanism is, using rsa encryption MKI and authenticating tag, to reach safety on its basis to encrypt the encryption environment of AES Purpose;
Continue with a kind of network talkback security mechanism based on SRTP of the elaboration present invention.System architecture diagram of the invention is such as Shown in Fig. 1, system includes interphone terminal (intercom A1, intercom A2, intercom B1, intercom B2 and intercom B3) and right Say voice server cluster.Wherein intercom A1, intercom A2, intercom B1, intercom B2 and intercom B3 include simultaneously Send and receive function, sending function refers to interphone terminal as speech talkback promoter, at this point, intercom is by radio voice Data are sent to radio voice server by network, and the forwarding of radio voice data is carried out by radio voice server, complete Speech talkback;Receive capabilities refer to interphone terminal as speech talkback recipient, at this point, intercom receives radio voice service The radio voice data that device is forwarded, and played out in interphone terminal.The main function of radio voice server cluster is Radio voice data are forwarded, are one, alleviation system in order to solve the problems, such as three using radio voice server cluster on the other hand The high concurrent problem faced of uniting makes when system forwards the request of radio voice data in face of a large amount of speech talkback promoter System can increase timeliness and high efficiency;Two, the memory capacity of Extension of service device, since server end can save radio voice Data, so by radio voice server set group structure, the memory capacity of Extension of service device entirety;Three, a set of safety is provided Software memory mechanism.
Radio voice data when in order to guarantee that interphone terminal and radio voice server carry out radio voice data interaction The safety of transmission process, according to interphone terminal process flow by function modoularization, intercom A1, intercom A2, intercom B1, The module map of intercom B2 and intercom B3 are as shown in Fig. 2, include public key acquisition module, data preparation module, data encapsulation Module and data transmission module.When intercom A1 initiates speech talkback to intercom A2 or intercom B1 to intercom B2 and B3 When, each resume module process is as follows:
1) speech talkback promoter obtains the public key information of speech talkback recipient;
2) intercom A1 or intercom B1 (speech talkback promoter) advanced row data preparation, i.e. intercom A1 or intercommunication Machine B1 acquires radio voice data, then fills radio voice data grouping according to the packet size of SRTP VoP;
3) the collected radio voice data of step 1 are packaged into SRTP VoP by intercom A1 or intercom B1, That is interphone terminal A1 or intercom B1 radio voice data preparation stage is collected and is grouped after radio voice data It is encapsulated into SRTP VoP, and fills SRTP fixing head, then according to intercom A2 or intercom B2 and intercom The RSA public key that B3 (speech talkback recipient) is announced is to MKI (the Master Key in SRTP VoP Identifier it) is encrypted with authenticating tag (Authentication Tag), and encrypted result is covered into original The position of MKI and authenticating tag;
4) intercom A1 or intercom B1 sends the SRTP VoP after the completion of encapsulation in network, for intercommunication Voice server is forwarded the SRTP VoP to intercom A2 or intercom B2 and intercom B3.
In order to guarantee the storing data of radio voice server security, radio voice server is carried out according to as shown in Figure 3 Function division includes data forwarding module, local cache module and distributed storage module.Radio voice server receives After the radio voice data of intercom A1 or intercom B1, radio voice server cluster is first by radio voice data buffer storage to originally Ground, and radio voice data are decrypted from SRTP VoP according to the private key of intercom A2 or intercom B2 and B3, when When being buffered in the data volume of radio voice server greater than the threshold value that some sets, the advanced row file mergences of radio voice server Then operation stores the file after merging onto HDFS, and establish an index to the file on HDFS for storage after merging File, index file are encrypted using RSA Algorithm, and user must carry out permission when carrying out radio voice data retrieval and test Card, if unauthorized parties, then can not get index record, to can not also get specific radio voice data., simultaneously Radio voice server is needed radio voice data forwarding to intercom A2 or intercom B2 and intercom B3, radio voice clothes Each module detailed process of business device are as follows:
1) radio voice server first carries out radio voice data forwarding, i.e. radio voice server sends out speech talkback It plays SRTP voice data transmitted by person (intercom A1 or intercom B1) and forwards a packet to specified speech talkback recipient's (intercommunication Machine A2) or be forwarded in the group (intercom B2 and intercom B3) being made of speech talkback recipient;
2) radio voice server does the local cache of radio voice data simultaneously, i.e. radio voice server simultaneously will The radio voice data buffer storage of speech talkback promoter (intercom A1 or intercom B1) waits all pairs to server local After saying that voice data has received, the radio voice data of speech talkback promoter (intercom A1 or intercom B1) are saved in clothes Business device is local;
3) radio voice data are carried out distributed storage, i.e. radio voice server for intercommunication by radio voice server Voice data is stored in HDFS (Hadoop Distribute File System), when the data volume of radio voice data is tired When counting the threshold size of radio voice server settings, radio voice server is in such a way that integration dissipates and divides by radio voice In data storage to HDFS;
4) is that each file for merging storage establishes an index file, then encrypts index text using RSA Algorithm Part.
Specifically, the speech talkback promoter (intercom A1 and intercom B1) carries out the specific flow chart of safe transmission It is as shown in Figure 4:
Step 1, speech talkback promoter obtain the public key information of speech talkback recipient;
Step 2, speech talkback promoter acquire radio voice data, when the radio voice size of data of acquisition reaches grouping When size of data, radio voice data are encapsulated into SRTP VoP;
Step 3, according to public key information acquired in step 1, in SRTP VoP MKI and authenticating tag into Row encrypts, and result is covered to the position of original MKI and authenticating tag;
The SRTP VoP after encapsulation is sent corresponding radio voice service by step 4, speech talkback promoter Device is carried out the forwarding of SRTP VoP by radio voice server.
Specifically, the specific flow chart of the radio voice server progress data forwarding is as shown in Figure 5:
Step 1, radio voice server receive the intercommunication language in the SRTP VoP that speech talkback promoter sends Sound data;
Step 2, radio voice server are according to the intercommunication machine information of speech talkback recipient by received SRTP language Sound data forward a packet to corresponding speech talkback recipient or the group that is made of speech talkback recipient in;
Specifically, the specific flow chart of the radio voice server progress data storage is as shown in Figure 6:
The SRTP VoP that step 1, radio voice server are first sent in local cache speech talkback promoter, directly To having cached all SRTP VoPs;
Step 2, radio voice server private key according to provided by speech talkback recipient will be in SRTP VoPs MKI and authenticating tag decryption (being decrypted using environment of the RSA to encryption), cover the MKI and authenticating tag of former encryption, most The radio voice data obtained after decryption are saved in local file by radio voice server afterwards;
Step 3, radio voice server inspect periodically the radio voice data in local file, and according to set threshold Value determines a need for storing radio voice data into HDFS, if the number of the radio voice data in current local file Set threshold value is reached according to amount, has then directly carried out step 4, if the data of the radio voice data in current local file Amount is less than set threshold value, thens follow the steps 3;
Step 4, radio voice server store all radio voice data onto HDFS, and establish one using RSA The index file of encryption needs to carry out safety verification when user accesses radio voice data.
Specifically, the specific flow chart of user's progress radio voice data access is as shown in Figure 7:
Step 1, radio voice server first carry out user right verifying, then carry out if authorized party in next step, otherwise directly Connect denied access;
Step 2, user obtain and decrypt index file, report specific radio voice data to believe to radio voice server Breath;
Step 3, radio voice server navigate to the radio voice data and are stored according to the information search index file Location information on HDFS returns to user;
Step 4, user are according to return as a result, initiating to access to HDFS Client, acquisition radio voice data.
For the safety of data transmission procedure, since SRTP default encrypts data using AES, in order to guarantee to communicate It is able to carry out, needs to distribute to code key into communicating pair, therefore result in safety of the code key in transmission process and be on the hazard, So by using RSA in SRTP VoP MKI and authenticating tag encrypt so that relevant to AES decryption Information is stored by rsa encryption, enhances the safety of SRTP VoP, meanwhile, bring the letter that AES carries out code key management Just property;
For the safety of data storage procedure, by storing file distribution onto HDFS, so that authorized user can root Specific radio voice data are quickly navigated to according to encrypted index file, and unauthorized user can not navigate to specifically Radio voice data also can not just get specific radio voice data, thus ensure that the safety of radio voice data, Just improve the safety of radio voice data storage.
In conclusion the present invention has the advantage that
1, when interphone terminal and radio voice server carry out radio voice data interaction, guarantee that intercom both sides carry out Safety of the radio voice data in transmission process when speech talkback.By using SRTP to radio voice data encryption, protect The safety of radio voice data has been demonstrate,proved, meanwhile, using RSA cryptographic algorithms to the MKI and authenticating tag in SRTP VoP It is encrypted, on the other hand the safety on the one hand further ensuring the encryption environment in SRTP VoP also guarantees When carrying out radio voice data encryption using AES, obtained in the safety of AES code key transmission and the convenience of code key management It improves.
2, guarantee the safety of radio voice data storage.Radio voice server is in the intercommunication for transmitting interphone terminal Voice data uploads to before HDFS, the advanced row file Merge operation of meeting, then establishes an index text for the file after merging Part subsequently uses the rsa encryption merging file, so that unauthorized parties are difficult to navigate to specific radio voice data, thus It ensure that the storage safety of radio voice data, and authorized party can quickly navigate to specific file according to index file.,
This method, which only needs user to dispose related software, can be completed function provided by system, and for a user ten It is point convenient, simple, convenient for promoting the use of.
Although specific embodiments of the present invention have been described above, those familiar with the art should be managed Solution, we are merely exemplary described specific embodiment, rather than for the restriction to the scope of the present invention, it is familiar with this The technical staff in field should be covered of the invention according to modification and variation equivalent made by spirit of the invention In scope of the claimed protection.

Claims (9)

1. a kind of method for realizing network talkback security mechanism based on SRTP, comprising: interphone terminal and radio voice server Cluster, the interphone terminal includes a plurality of intercoms with data transmission and reception function, for sending radio voice As speech talkback promoter, the intercom for receiving radio voice data receives the intercom of data as speech talkback Person, the radio voice server cluster include a plurality of radio voice servers;It is characterized by: the method includes as follows Step:
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, set according to the packet size of SRTP VoP Set radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and are carried out Encryption;
Step 4, speech talkback promoter send radio voice clothes by network for the SRTP VoP after the completion of encapsulation Corresponding radio voice server in business device cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient or turn It is dealt into the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server local by step 6, radio voice server, After having cached all SRTP VoPs, radio voice server private key according to provided by speech talkback recipient MKI and authenticating tag are decrypted from encrypted SRTP VoP, obtains intercommunication language further according to the MKI and authenticating tag Sound data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server.
2. a kind of method for realizing network talkback security mechanism based on SRTP according to claim 1, it is characterised in that: institute State step 7 specifically:
Radio voice server inspects periodically the radio voice data in local file, and according to set by radio voice server Threshold determination whether need to store the radio voice data into HDFS, if the radio voice number in current local file According to data volume reached the threshold size of setting, then radio voice server is dissipated using integration divide by the way of by all intercommunication languages In the storage to HDFS of sound data;If the data volume of the radio voice data in current local file is less than set threshold value, Then without file Merge operation, continue waiting for checking operation next time.
3. a kind of method for realizing network talkback security mechanism based on SRTP according to claim 1, it is characterised in that: institute State step 7 radio voice data merge storage into HDFS, wherein radio voice data merging after and storage to HDFS it Before further include: establish an index file for the radio voice data after merging, and using RSA Algorithm to each index file into Row encryption, user need to carry out Authority Verification when obtaining radio voice data, if unauthorized parties, then can not get index Record, to can not also get specific radio voice data;If authorized party, then intercommunication language is got by index file Sound data.
4. a kind of method for realizing network talkback security mechanism based on SRTP according to claim 1, it is characterised in that: institute Stating to be encrypted in step 3 specifically has: then filling SRTP fixing head is added according to RSA public key obtained using RSA Close algorithm in SRTP VoP MKI and authenticating tag be encrypted, and by encrypted result cover original MKI With the position of authenticating tag.
5. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor performs the steps of when executing described program
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, set according to the packet size of SRTP VoP Set radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and are carried out Encryption;
Step 4, speech talkback promoter send radio voice clothes by network for the SRTP VoP after the completion of encapsulation Corresponding radio voice server in business device cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient or turn It is dealt into the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server local by step 6, radio voice server, After having cached all SRTP VoPs, radio voice server private key according to provided by speech talkback recipient MKI and authenticating tag are decrypted from encrypted SRTP VoP, obtains intercommunication language further according to the MKI and authenticating tag Sound data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server.
6. a kind of computer equipment according to claim 5, it is characterised in that: the step 7 specifically:
Radio voice server inspects periodically the radio voice data in local file, and according to set by radio voice server Threshold determination whether need to store the radio voice data into HDFS, if the radio voice number in current local file According to data volume reached the threshold size of setting, then radio voice server is dissipated using integration divide by the way of by all intercommunication languages In the storage to HDFS of sound data;If the data volume of the radio voice data in current local file is less than set threshold value, Then without file Merge operation, continue waiting for checking operation next time.
7. a kind of computer equipment according to claim 5, it is characterised in that: the step 7 radio voice data merge It stores in HDFS, wherein after the merging of radio voice data and before storage to HDFS further include: for the intercommunication after merging Voice data establishes an index file, and is encrypted using RSA Algorithm to each index file, and user is obtaining intercommunication language It needs to carry out Authority Verification when sound data, if unauthorized parties, then can not get index record, to can not also get tool The radio voice data of body;If authorized party, then radio voice data are got by index file.
8. a kind of computer equipment according to claim 5, it is characterised in that: tool is encrypted in the step 3 Body has: then filling SRTP fixing head uses RSA cryptographic algorithms to SRTP VoP according to RSA public key obtained In MKI and authenticating tag be encrypted, and by encrypted result covering original MKI and authenticating tag position.
9. a kind of system for realizing network talkback security mechanism based on SRTP, it is characterised in that: including the public affairs on interphone terminal On key acquisition module, data preparation module, data package module and data transmission module and radio voice server cluster Data forwarding module, local cache module and distributed storage module;
The public key acquisition module obtains the RSA public key of speech talkback recipient for speech talkback promoter;
The data preparation module carries out the acquisition of radio voice data for speech talkback promoter, according to SRTP voice number According to the packet size of packet, radio voice data grouping is set;
The radio voice data obtained after grouping are packaged into SRTP language for speech talkback promoter by the data package module Sound data packet, and be encrypted;
The data transmission module is sent out the SRTP VoP after the completion of encapsulation by network for speech talkback promoter It is sent to corresponding radio voice server in radio voice server cluster;
The data forwarding module receives the SRTP VoP for radio voice server, and is forwarded to corresponding language Sound intercommunication recipient is forwarded in the group being made of speech talkback recipient;
The local cache module delays the SRTP VoP that speech talkback promoter sends for radio voice server It is stored to server local, after having cached all SRTP VoPs, radio voice server connects according to speech talkback Private key provided by receipts person decrypts MKI and authenticating tag from encrypted SRTP VoP, further according to the MKI and recognizes It demonstrate,proves label and obtains radio voice data, be finally saved into local file;
The radio voice data obtained after decryption are merged storage for radio voice server and arrived by the distributed storage module In HDFS.
CN201910136732.6A 2019-02-25 2019-02-25 Method, equipment and system for realizing network talkback security mechanism based on SRTP Active CN109660568B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910136732.6A CN109660568B (en) 2019-02-25 2019-02-25 Method, equipment and system for realizing network talkback security mechanism based on SRTP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910136732.6A CN109660568B (en) 2019-02-25 2019-02-25 Method, equipment and system for realizing network talkback security mechanism based on SRTP

Publications (2)

Publication Number Publication Date
CN109660568A true CN109660568A (en) 2019-04-19
CN109660568B CN109660568B (en) 2021-04-30

Family

ID=66122903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910136732.6A Active CN109660568B (en) 2019-02-25 2019-02-25 Method, equipment and system for realizing network talkback security mechanism based on SRTP

Country Status (1)

Country Link
CN (1) CN109660568B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110176235A (en) * 2019-05-23 2019-08-27 腾讯科技(深圳)有限公司 Methods of exhibiting, device, storage medium and the computer equipment of speech recognition text
CN111262837A (en) * 2020-01-09 2020-06-09 奇安信科技集团股份有限公司 Data encryption method, data decryption method, system, equipment and medium
CN114173213A (en) * 2021-12-10 2022-03-11 善理通益信息科技(深圳)有限公司 Websocket-based voice quality optimization method and talkback terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7730309B2 (en) * 2005-07-27 2010-06-01 Zimmermann Philip R Method and system for key management in voice over internet protocol
CN105049788A (en) * 2015-06-08 2015-11-11 深圳市盛烽科技有限公司 Intelligent visual electronic doorbell and operation method thereof
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method
CN107277456A (en) * 2017-07-26 2017-10-20 北京计算机技术及应用研究所 A kind of video security monitoring system based on Android device
US10356059B2 (en) * 2015-06-04 2019-07-16 Nagravision S.A. Methods and systems for communication-session arrangement on behalf of cryptographic endpoints

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7730309B2 (en) * 2005-07-27 2010-06-01 Zimmermann Philip R Method and system for key management in voice over internet protocol
US10356059B2 (en) * 2015-06-04 2019-07-16 Nagravision S.A. Methods and systems for communication-session arrangement on behalf of cryptographic endpoints
CN105049788A (en) * 2015-06-08 2015-11-11 深圳市盛烽科技有限公司 Intelligent visual electronic doorbell and operation method thereof
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method
CN107277456A (en) * 2017-07-26 2017-10-20 北京计算机技术及应用研究所 A kind of video security monitoring system based on Android device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110176235A (en) * 2019-05-23 2019-08-27 腾讯科技(深圳)有限公司 Methods of exhibiting, device, storage medium and the computer equipment of speech recognition text
CN111262837A (en) * 2020-01-09 2020-06-09 奇安信科技集团股份有限公司 Data encryption method, data decryption method, system, equipment and medium
CN114173213A (en) * 2021-12-10 2022-03-11 善理通益信息科技(深圳)有限公司 Websocket-based voice quality optimization method and talkback terminal

Also Published As

Publication number Publication date
CN109660568B (en) 2021-04-30

Similar Documents

Publication Publication Date Title
Dyer et al. Protocol misidentification made easy with format-transforming encryption
CN103107889B (en) A kind of cloud computing environment data encryption storage system and method that can search for
USRE45348E1 (en) Method and apparatus for intercepting events in a communication system
CN105051750B (en) System and method for encrypted file system layer
US9852300B2 (en) Secure audit logging
CN112581126A (en) Block chain-based platform data management method and device and storage medium
CN105656920B (en) A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery
BRPI0615147A2 (en) protecting digital media from various types of content
CN110213669B (en) Video content anti-theft system and method based on TS (transport stream) slices
CN1593033A (en) Method and system for securely storing and transmitting data by applying a one-time pad
CN109660568A (en) Method, equipment and the system of network talkback security mechanism are realized based on SRTP
CN109995530B (en) Safe distributed database interaction system suitable for mobile positioning system
CN101521667B (en) Method and device for safety data communication
CN108881205A (en) A kind of safety broadcasting system and playback method of HLS Streaming Media
US20100223466A1 (en) Shared scalable server to control confidental event traffic among recordation terminals, analysis engines, and a storage farm coupled via a public network
US20150350375A1 (en) Information Processing Method, Trusted Server, and Cloud Server
CN104202736A (en) Mobile terminal short message end-to-end encryption method oriented to Android system
CN109743170A (en) A kind of Streaming Media logs in and the method and apparatus of data transmission encryption
CN118054903A (en) Talkback command dispatching system and method based on quantum encryption
Rosen et al. Balboa: Bobbing and weaving around network censorship
GB2488753A (en) Encrypted communication
CN105246172A (en) Network transmission method for mobile terminals
Tian et al. A Survey on Data Integrity Attacks and DDoS Attacks in Cloud Computing
CN114978769B (en) Unidirectional leading-in device, unidirectional leading-in method, unidirectional leading-in medium and unidirectional leading-in equipment
US20170201493A1 (en) System and method for secure and anonymous communication in a network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant