CN109660568A - Method, equipment and the system of network talkback security mechanism are realized based on SRTP - Google Patents
Method, equipment and the system of network talkback security mechanism are realized based on SRTP Download PDFInfo
- Publication number
- CN109660568A CN109660568A CN201910136732.6A CN201910136732A CN109660568A CN 109660568 A CN109660568 A CN 109660568A CN 201910136732 A CN201910136732 A CN 201910136732A CN 109660568 A CN109660568 A CN 109660568A
- Authority
- CN
- China
- Prior art keywords
- radio voice
- srtp
- data
- voice data
- vop
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/65—Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of method for realizing network talkback security mechanism based on SRTP, including 1, acquisition public key;2, radio voice data are acquired and grouping is set;3, radio voice data are packaged into SRTP VoP, and the encryption environment in SRTP VoP is encrypted using RSA;4, radio voice server is sent by SRTP VoP;5, radio voice server receives SRTP VoP and forwards;6, then radio voice server buffer SRTP VoP is decrypted encryption environment using RSA;7, voice data is obtained from the SRTP VoP obtained after decryption, and is merged storage into HDFS according to corresponding strategies.The present invention also provides a kind of computer equipments and a kind of system for realizing network talkback security mechanism based on SRTP, guarantee the safety of voice data transmission when intercommunication, also guarantee the safety of voice data storage.
Description
Technical field
The present invention relates to intercommunication data flow safe transmission and field of storage, realize network based on SRTP more particularly to one kind
Method, equipment and the system of intercommunication security mechanism.
Background technique
The high speed development of Internet technology, so that VOIP (Voice over Internet Protocol, IP-based language
Sound transmission, is a kind of voice communication technology, via Internet protocol (IP) Lai Dacheng voice communication and multimedia conferencing, that is, passes through
The application communicated by internet) also more and more extensive, this transmission that stream medium data is carried out by network, because of net
The insecurity of network brings safety problem of these Stream Media Applications in data transmission procedure, simultaneously as when big data
The arrival in generation, all valuable creed for becoming many application service providers of all data, but simultaneously these data in terms of storage
Safety issue be also the current problem to be solved of these application service providers.
Security Real Time Protocol (Secure Real-Time Transport Protocol, SRTP), is real-time Transmission
The security extensions protocol of agreement (Real-Time Transport Protocol, RTP), it provides a kind of peace for Real-time Transport Protocol
Full mechanism joined the mechanism such as encryption and message authentication on the basis of Real-time Transport Protocol.It, which is defaulted, uses AES (Advanced
Encryption Standard) Encryption Algorithm streaming media data are encrypted, it ensure that the safety of VOIP to a certain extent
Property, but the algorithm needs communicating pair all while safeguarding an encryption environment, therefore, when streaming media, SRTP packet
Similarly there is a possibility that being attacked in the safety for encrypting environment.
Hadoop distributed file system (Hadoop Distributed File System, HDFS), is that Apache is opened
The core component of one distributed computing framework Hadoop of source tissue, with GFS (the Google File of Google company
System) it is prototype, is increased income and realized using Java, sets up cloud storage solution for each great institutions and company and provide reference.
It once appearance, is just widely used, including FaceBook, Yahoo, Alibaba, the internets such as Tencent and Baidu are public
Department stores mass data using HDFS.Its design at the beginning of be exactly in order to stable operation in cheap commerce server,
Also, it also has many advantages, such as fault-tolerance height, and scalability is good.HDFS uses master-slave architecture, is saved by a NameNode
Point and a large amount of DataNode node composition, wherein NameNode is the core of HDFS, and work is the metadata of maintenance documentation
Information, and all DataNode nodes are coordinated and managed, DataNode is then used for the storage of actual file.Start in Hadoop cluster
Later, all metadata informations can be all loaded into NameNode memory.When client accesses HDFS, it is necessary first to
NameNode node obtains the metadata information of associated documents, then finds actual storage file according to these metadata informations
DataNode obtains the requested file of client finally by DataNode.
Summary of the invention
One of the problem to be solved in the present invention is to provide a kind of side for realizing network talkback security mechanism based on SRTP
On the one hand method can solve speech talkback promoter and speech talkback recipient and carry out radio voice according to the security mechanism
The safety issue of data brought radio voice data when transmitting, on the other hand, which take radio voice
In the storage to HDFS for the radio voice data safety that business device cluster can transmit interphone terminal, data storage ensure that
Safety;
One of the problem to be solved in the present invention is achieved in that a kind of based on SRTP realization network talkback security mechanism
Method, comprising: interphone terminal and radio voice server cluster, the interphone terminal include it is a plurality of have data hair
The intercom with receive capabilities is sent, for sending the intercoms of radio voice data as speech talkback promoter, for receiving
For the intercom of radio voice data as speech talkback recipient, the radio voice server cluster includes a plurality of intercommunication languages
Sound server;Described method includes following steps:
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, and the grouping according to SRTP VoP is big
Small setting radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and
It is encrypted;
Step 4, speech talkback promoter send intercommunication language by network for the SRTP VoP after the completion of encapsulation
Corresponding radio voice server in sound server cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient
Or it is forwarded in the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server by step 6, radio voice server
Local, after having cached all SRTP VoPs, radio voice server is provided according to speech talkback recipient
Private key decrypt MKI and authenticating tag from encrypted SRTP VoP, obtained further according to the MKI and authenticating tag
Radio voice data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server.
Further, the step 7 specifically:
Radio voice server inspects periodically the radio voice data in local file, and according to radio voice server institute
Whether the threshold determination of setting needs to store the radio voice data into HDFS, if the intercommunication language in current local file
The data volume of sound data has reached the threshold size of setting, then radio voice server will be all right in such a way that integration dissipates and divides
It says in voice data storage to HDFS;If the data volume of the radio voice data in current local file is less than set threshold
Value, then without file Merge operation, continue waiting for server and merge inspection next time.
Further, the step 7 radio voice data merge storage into HDFS, wherein merging in radio voice data
Later and before storage to HDFS further include: establish an index file for the radio voice data after merging, and calculated using RSA
Method encrypts each index file, and user needs to carry out Authority Verification when obtaining radio voice data, if unauthorized
Side, then can not get index record, to can not also get specific radio voice data;If authorized party, then pass through
Index file gets radio voice data.
Further, being encrypted in the step 3 specifically has: filling SRTP fixing head, then according to being obtained
RSA public key using RSA cryptographic algorithms in SRTP VoP MKI and authenticating tag be encrypted, and will
The position of encrypted result covering original MKI and authenticating tag.
The two of the problem to be solved in the present invention are to provide a kind of computer equipment, can be according to the security mechanism, a side
Face solves speech talkback promoter and speech talkback the recipient brought radio voice when carrying out the transmission of radio voice data
The safety issue of data, on the other hand, which pass radio voice server cluster by interphone terminal
In the storage to HDFS of defeated radio voice data safety, the safety of data storage ensure that;
The two of the problem to be solved in the present invention are achieved in that a kind of computer equipment, including memory, processor
And storage is on a memory and the computer program that can run on a processor, when the processor executes described program realization with
Lower step:
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, and the grouping according to SRTP VoP is big
Small setting radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and
It is encrypted;
Step 4, speech talkback promoter send intercommunication language by network for the SRTP VoP after the completion of encapsulation
Corresponding radio voice server in sound server cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient
Or it is forwarded in the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server by step 6, radio voice server
Local, after having cached all SRTP VoPs, radio voice server is provided according to speech talkback recipient
Private key decrypt MKI and authenticating tag from encrypted SRTP VoP, obtained further according to the MKI and authenticating tag
Radio voice data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server.
Further, the step 7 specifically:
Radio voice server inspects periodically the radio voice data in local file, and according to radio voice server institute
Whether the threshold determination of setting needs to store the radio voice data into HDFS, if the intercommunication language in current local file
The data volume of sound data has reached the threshold size of setting, then radio voice server will be all right in such a way that integration dissipates and divides
It says in voice data storage to HDFS;If the data volume of the radio voice data in current local file is less than set threshold
Value, then without file Merge operation, continue waiting for server and merge inspection next time.
Further, the step 7 radio voice data merge storage into HDFS, wherein merging in radio voice data
Later and before storage to HDFS further include: establish an index file for the radio voice data after merging, and calculated using RSA
Method encrypts each index file, and user needs to carry out Authority Verification when obtaining radio voice data, if unauthorized
Side, then can not get index record, to can not also get specific radio voice data;If authorized party, then pass through
Index file gets radio voice data.
Further, being encrypted in the step 3 specifically has: filling SRTP fixing head, then according to being obtained
RSA public key using RSA cryptographic algorithms in SRTP VoP MKI and authenticating tag be encrypted, and will
The position of encrypted result covering original MKI and authenticating tag.
The three of the problem to be solved in the present invention, are to provide and a kind of are based on what SRTP realized network talkback security mechanism
On the one hand system can solve speech talkback promoter and speech talkback recipient and carry out radio voice according to the security mechanism
The safety issue of data brought radio voice data when transmitting, on the other hand, which take radio voice
In the storage to HDFS for the radio voice data safety that business device cluster can transmit interphone terminal, data storage ensure that
Safety;
The three of the problem to be solved in the present invention are achieved in that a kind of based on SRTP realization network talkback security mechanism
System, including public key acquisition module, data preparation module, data package module and the data transmission module on interphone terminal
And data forwarding module, local cache module and distributed storage module on radio voice server cluster;
The public key acquisition module obtains the RSA public key of speech talkback recipient for speech talkback promoter;
The data preparation module carries out the acquisition of radio voice data for speech talkback promoter, according to SRTP language
Radio voice data grouping is arranged in the packet size of sound data packet;
The radio voice data obtained after grouping are packaged by the data package module for speech talkback promoter
SRTP VoP, and be encrypted;
SRTP VoP after the completion of encapsulation is passed through net for speech talkback promoter by the data transmission module
Network is sent to corresponding radio voice server in radio voice server cluster;
The data forwarding module receives the SRTP VoP for radio voice server, and is forwarded to correspondence
Speech talkback recipient or be forwarded in the group being made of speech talkback recipient;
The local cache module, the SRTP voice data for sending speech talkback promoter for radio voice server
Packet is cached to server local, and after having cached all SRTP VoPs, radio voice server is according to voice pair
Say that private key provided by recipient decrypts MKI and authenticating tag from encrypted SRTP VoP, further according to the MKI
Radio voice data are obtained with authenticating tag, are finally saved into local file;
The distributed storage module deposits the radio voice data obtained after decryption merging for radio voice server
It stores up in HDFS.
The present invention has the advantage that
1, when interphone terminal and radio voice server carry out radio voice data interaction, guarantee that intercom both sides carry out
Safety of the radio voice data in transmission process when speech talkback.By using SRTP to radio voice data encryption, protect
The safety of radio voice data has been demonstrate,proved, meanwhile, using RSA cryptographic algorithms to the MKI and authenticating tag in SRTP VoP
It is encrypted, on the other hand the safety on the one hand further ensuring the encryption environment in SRTP VoP also guarantees
When carrying out radio voice data encryption using AES, obtained in the safety of AES code key transmission and the convenience of code key management
It improves.
2, guarantee the safety of radio voice data storage.Radio voice server stores file mergences into HDFS,
Before storing, an index file can be established for all big files for forming the merging file, the effect of the index file is
Specific radio voice data are positioned, each index file for merging file is all made of RSA Algorithm and is encrypted, and user is searching
Necessary verifying must be carried out when specific radio voice data, ensures that unauthorized parties can not get retrieval note in this way
Record, also you can't get specific radio voice data.
Detailed description of the invention
The present invention is further illustrated in conjunction with the embodiments with reference to the accompanying drawings.
Fig. 1 is the system architecture diagram that the present invention realizes.
Fig. 2 is the functional block diagram of interphone terminal in the present invention.
Fig. 3 is the functional block diagram of radio voice server in the present invention.
Fig. 4 is the specific flow chart that speech talkback promoter carries out safe transmission in the present invention.
Fig. 5 is the specific flow chart that radio voice server end carries out data forwarding in the present invention.
Fig. 6 is the specific flow chart that radio voice server carries out data storage in the present invention.
Fig. 7 is the specific flow chart that user carries out radio voice data access in the present invention.
Specific embodiment
A kind of method that network talkback security mechanism is realized based on SRTP of the invention, comprising: interphone terminal and intercommunication
Voice server cluster, the interphone terminal includes a plurality of intercoms with data transmission and reception function, for sending out
Send the intercom of radio voice data as speech talkback promoter, for receiving the intercom of radio voice data as voice
Intercommunication recipient, the radio voice server cluster include a plurality of radio voice servers;The method includes walking as follows
It is rapid:
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, and the grouping according to SRTP VoP is big
Small setting radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and
Be encrypted, specific ciphering process is: filling SRTP fixing head, then according to RSA public key obtained and use RSA
Encryption Algorithm in SRTP VoP MKI and authenticating tag be encrypted, guarantee intercom both sides carry out voice
Safety of the radio voice data in transmission process when intercommunication, and encrypted result is covered into original MKI and authenticating tag
Position ensures that unauthorized recipient can not obtain correct MKI and authenticating tag in this way, also can not just decrypt intercommunication
Voice data, to ensure that the safety of radio voice data;
Step 4, speech talkback promoter send intercommunication language by network for the SRTP VoP after the completion of encapsulation
Corresponding radio voice server in sound server cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient
Or it is forwarded in the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server by step 6, radio voice server
Local, after having cached all SRTP VoPs, radio voice server is provided according to speech talkback recipient
Private key decrypt MKI and authenticating tag from encrypted SRTP VoP, obtained further according to the MKI and authenticating tag
Radio voice data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server;Specifically
Have: radio voice server inspects periodically the radio voice data in local file, and according to set by radio voice server
Threshold determination whether need to store the radio voice data into HDFS, if the radio voice number in current local file
According to data volume reached the threshold size of setting, then radio voice server is dissipated using integration divide by the way of by all intercommunication languages
In the storage to HDFS of sound data;If the data volume of the radio voice data in current local file is less than set threshold value,
Then without file Merge operation, continues waiting for server and merge inspection next time.For the peace for guaranteeing the storage of radio voice data
Quan Xing carries out file mergences storage, and radio voice data merge storage into HDFS, wherein after the merging of radio voice data
And before storage to HDFS, an index file is established for the radio voice data after merging, using RSA Algorithm to each index
File is encrypted, and user must carry out Authority Verification when carrying out radio voice data retrieval and then can not if unauthorized parties
Index record is got, to can not also get specific radio voice data;If authorized party, then obtained by index file
Get radio voice data.An index file is established for the merging file, the effect of the index file is in order to merge
Specific radio voice file is quickly retrieved in file, meanwhile, to guarantee storage to the radio voice data on HDFS
Safety, will use RSA and encrypts to each index file, user needs to carry out necessary peace when obtaining radio voice data
Full verifying, just can guarantee the safety of data.
A kind of computer equipment of the invention, including memory, processor and storage are on a memory and can be in processor
The computer program of upper operation, the processor perform the steps of when executing described program
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, and the grouping according to SRTP VoP is big
Small setting radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and
It is encrypted;Specific ciphering process is: filling SRTP fixing head, then according to RSA public key obtained and uses RSA
Encryption Algorithm in SRTP VoP MKI and authenticating tag be encrypted, guarantee intercom both sides carry out voice
Safety of the radio voice data in transmission process when intercommunication, and encrypted result is covered into original MKI and authenticating tag
Position ensures that unauthorized recipient can not obtain correct MKI and authenticating tag in this way, also can not just decrypt intercommunication
Voice data, to ensure that the safety of radio voice data;
Step 4, speech talkback promoter send intercommunication language by network for the SRTP VoP after the completion of encapsulation
Corresponding radio voice server in sound server cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient
Or it is forwarded in the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server by step 6, radio voice server
Local, after having cached all SRTP VoPs, radio voice server is provided according to speech talkback recipient
Private key decrypt MKI and authenticating tag from encrypted SRTP VoP, obtained further according to the MKI and authenticating tag
Radio voice data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server;Specifically
Have: radio voice server inspects periodically the radio voice data in local file, and according to set by radio voice server
Threshold determination whether need to store the radio voice data into HDFS, if the radio voice number in current local file
According to data volume reached the threshold size of setting, then radio voice server is dissipated using integration divide by the way of by all intercommunication languages
In the storage to HDFS of sound data;If the data volume of the radio voice data in current local file is less than set threshold value,
It is then operated without file Merge operation, continues waiting for server and merge inspection next time.To guarantee the storage of radio voice data
Safety, carry out file mergences storage, after the merging of radio voice data and storage is to before HDFS, for pair after merging
It says that voice data establishes an index file, each index file is encrypted using RSA Algorithm, user is carrying out intercommunication language
Authority Verification must be carried out when sound data retrieval, if unauthorized parties, then can not get index record, to can not also obtain
To specific radio voice data;If authorized party, then radio voice data are got by index file.For the merging file
An index file is established, the effect of the index file is in order to quickly retrieve specific intercommunication language in merging file
Sound file, meanwhile, for guarantee storage to the radio voice data on HDFS safety, will use RSA to each index file into
Row encryption, user need to carry out necessary safety verification when obtaining radio voice data, just can guarantee the safety of data.
The three of the problem to be solved in the present invention, are to provide and a kind of are based on what SRTP realized network talkback security mechanism
On the one hand system can solve speech talkback promoter and speech talkback recipient and carry out radio voice according to the security mechanism
The safety issue of data brought radio voice data when transmitting, on the other hand, which take radio voice
In the storage to HDFS for the radio voice data safety that business device cluster can transmit interphone terminal, data storage ensure that
Safety;
The three of the problem to be solved in the present invention are achieved in that a kind of based on SRTP realization network talkback security mechanism
System, including public key acquisition module, data preparation module, data package module and the data transmission module on interphone terminal
And data forwarding module, local cache module and distributed storage module on radio voice server cluster;
The public key acquisition module obtains the RSA public key of speech talkback recipient for speech talkback promoter;
The data preparation module carries out the acquisition of radio voice data for speech talkback promoter, according to SRTP language
Radio voice data grouping is arranged in the packet size of sound data packet;
The radio voice data obtained after grouping are packaged by the data package module for speech talkback promoter
SRTP VoP, and be encrypted;Specific ciphering process is: filling SRTP fixing head, then according to being obtained
RSA public key and using RSA cryptographic algorithms in SRTP VoP MKI and authenticating tag be encrypted, guarantee
Intercom both sides carry out safety of the radio voice data in transmission process when speech talkback, and encrypted result is covered
The position of former MKI and authenticating tag ensure that unauthorized recipient can not obtain correct MKI and authenticating tag in this way,
Also radio voice data can not be just decrypted, to ensure that the safety of radio voice data;
SRTP VoP after the completion of encapsulation is passed through net for speech talkback promoter by the data transmission module
Network is sent to corresponding radio voice server in radio voice server cluster;
The data forwarding module receives the SRTP VoP for radio voice server, and is forwarded to correspondence
Speech talkback recipient or be forwarded in the group being made of speech talkback recipient;
The local cache module, the SRTP voice data for sending speech talkback promoter for radio voice server
Packet is cached to server local, and after having cached all SRTP VoPs, radio voice server is according to voice pair
Say that private key provided by recipient decrypts MKI and authenticating tag from encrypted SRTP VoP, further according to the MKI
Radio voice data are obtained with authenticating tag, are finally saved into local file;
The distributed storage module deposits the radio voice data obtained after decryption merging for radio voice server
It stores up in HDFS;Specifically have: radio voice server inspects periodically the radio voice data in local file, and according to intercommunication language
Whether threshold determination set by sound server needs to store the radio voice data into HDFS, if current local file
In radio voice data data volume reached setting threshold size, then radio voice server using integration dissipate point side
Formula stores all radio voice data onto HDFS;If the data volume of the radio voice data in current local file is less than
Set threshold value continues waiting for server and merges inspection next time then without file Merge operation.To guarantee radio voice
The safety of data storage carries out file mergences storage, and establishes an index file for the radio voice data after merging, and adopts
Each index file is encrypted with RSA Algorithm, user must carry out Authority Verification when carrying out radio voice data retrieval,
If unauthorized parties, then index record can not be got, to can not also get specific radio voice data;If authorization
Side, then get radio voice data by index file.An index file is established for the merging file, the index file
Effect be in order to merge file in quickly retrieve specific radio voice file, meanwhile, for guarantee storage arrive HDFS
On radio voice data safety, will use RSA and each index file encrypted, user obtain radio voice data
When need to carry out necessary safety verification, just can guarantee the safety of data.
It is a kind of to the present invention that the method for network talkback security mechanism, equipment are realized based on SRTP and are by shown in attached drawing
One implementation of system is described in detail:
The present invention provides a kind of methods for realizing network talkback security mechanism based on SRTP, including interphone terminal to carry out
Safety and radio voice server when radio voice data are transmitted store radio voice data to the safety on HDFS.Pass through
Security mechanism provided by the present invention can guarantee entire communication link when receiving-transmitting sides carry out network talkback to a certain extent
Finally it is stored in the safety of the radio voice on radio voice server.
A kind of method for realizing network talkback security mechanism based on SRTP of the present invention is carried out on the basis of SRTP agreement
, by using RSA cryptographic algorithms, AES encryption environment in SRTP VoP is encrypted, is achieved the purpose that safe.
Shown in the packet header SRTP fixed format part is briefly described as follows:
Wherein:
The version number of V:RTSP, 2bits, the value provide to be 2 at present;
P: load filling flag bit, 1bit are then needed when the integral multiple of the inadequate 32bits of load data length to load
Data are filled, otherwise it is 0 that the value, which is 1, at this time;
X: extension marker, 1bit, the extension header of 1 expression needs one 32bits of increase behind fixed packet header, 0
Expression does not need to carry out any extension;
The number of CC:CSRC, 4bits can calculate CSRC quantity included in the packet header RSRP by the value;
M: mark, 1bit allow to mark important event in the bitstream;
PT: the type of load data, 7bits, for illustrating that the SRTP packet is grouped transmitted data type;
Sequence number: the sequence number of SRTP packet, when 16bits, SRTP flow one SRTP data packet of every transmission, which adds
1, packet can be flowed to SRTP by value recipient and counted, packet loss is detected and sequences of packets is restored;
Timestamp: the timestamp of RTSP packet transmission, 32bits indicate the sampling moment of SRTP grouping first character section.Just
It is a random number when value, each sampling period adds 1;
SSRC: sending the source mark of stream, and 32bits indicates the synchronisation source of signal, and value should randomly choose, same to guarantee
The SSRC of any two synchronisation source identifies different in a SRTP session;
CSRC: interting person's identifier among data flow, n 32bits, CSRC mark are inserted by mixer, and value is exactly group
At the SSRC mark of each sub-signal of composite signal, to identify the information source of each group of twocomponent signal.The head of RTP grouping is most
It may include 15 CSRC marks, number is indicated by CC field more.
Payload: encrypted flow data;
MKI: master key identifier, length is configurable, is defined, described and used by code key management agreement, and MKI is for marking
Know encryption and authenticate this SRTP and wraps used main code key;
Authenticating tag: Authentication Tag, length is configurable, is used for bearer messages authentication data, authenticating tag
The certification of RTP and payload is provided, while by authenticating to sequence number, provides Replay Attack protection indirectly;
By the simple introduction above to the packet header SRTP, primarily to illustrating a kind of network pair based on SRTP of the present invention
Say that security mechanism is, using rsa encryption MKI and authenticating tag, to reach safety on its basis to encrypt the encryption environment of AES
Purpose;
Continue with a kind of network talkback security mechanism based on SRTP of the elaboration present invention.System architecture diagram of the invention is such as
Shown in Fig. 1, system includes interphone terminal (intercom A1, intercom A2, intercom B1, intercom B2 and intercom B3) and right
Say voice server cluster.Wherein intercom A1, intercom A2, intercom B1, intercom B2 and intercom B3 include simultaneously
Send and receive function, sending function refers to interphone terminal as speech talkback promoter, at this point, intercom is by radio voice
Data are sent to radio voice server by network, and the forwarding of radio voice data is carried out by radio voice server, complete
Speech talkback;Receive capabilities refer to interphone terminal as speech talkback recipient, at this point, intercom receives radio voice service
The radio voice data that device is forwarded, and played out in interphone terminal.The main function of radio voice server cluster is
Radio voice data are forwarded, are one, alleviation system in order to solve the problems, such as three using radio voice server cluster on the other hand
The high concurrent problem faced of uniting makes when system forwards the request of radio voice data in face of a large amount of speech talkback promoter
System can increase timeliness and high efficiency;Two, the memory capacity of Extension of service device, since server end can save radio voice
Data, so by radio voice server set group structure, the memory capacity of Extension of service device entirety;Three, a set of safety is provided
Software memory mechanism.
Radio voice data when in order to guarantee that interphone terminal and radio voice server carry out radio voice data interaction
The safety of transmission process, according to interphone terminal process flow by function modoularization, intercom A1, intercom A2, intercom B1,
The module map of intercom B2 and intercom B3 are as shown in Fig. 2, include public key acquisition module, data preparation module, data encapsulation
Module and data transmission module.When intercom A1 initiates speech talkback to intercom A2 or intercom B1 to intercom B2 and B3
When, each resume module process is as follows:
1) speech talkback promoter obtains the public key information of speech talkback recipient;
2) intercom A1 or intercom B1 (speech talkback promoter) advanced row data preparation, i.e. intercom A1 or intercommunication
Machine B1 acquires radio voice data, then fills radio voice data grouping according to the packet size of SRTP VoP;
3) the collected radio voice data of step 1 are packaged into SRTP VoP by intercom A1 or intercom B1,
That is interphone terminal A1 or intercom B1 radio voice data preparation stage is collected and is grouped after radio voice data
It is encapsulated into SRTP VoP, and fills SRTP fixing head, then according to intercom A2 or intercom B2 and intercom
The RSA public key that B3 (speech talkback recipient) is announced is to MKI (the Master Key in SRTP VoP
Identifier it) is encrypted with authenticating tag (Authentication Tag), and encrypted result is covered into original
The position of MKI and authenticating tag;
4) intercom A1 or intercom B1 sends the SRTP VoP after the completion of encapsulation in network, for intercommunication
Voice server is forwarded the SRTP VoP to intercom A2 or intercom B2 and intercom B3.
In order to guarantee the storing data of radio voice server security, radio voice server is carried out according to as shown in Figure 3
Function division includes data forwarding module, local cache module and distributed storage module.Radio voice server receives
After the radio voice data of intercom A1 or intercom B1, radio voice server cluster is first by radio voice data buffer storage to originally
Ground, and radio voice data are decrypted from SRTP VoP according to the private key of intercom A2 or intercom B2 and B3, when
When being buffered in the data volume of radio voice server greater than the threshold value that some sets, the advanced row file mergences of radio voice server
Then operation stores the file after merging onto HDFS, and establish an index to the file on HDFS for storage after merging
File, index file are encrypted using RSA Algorithm, and user must carry out permission when carrying out radio voice data retrieval and test
Card, if unauthorized parties, then can not get index record, to can not also get specific radio voice data., simultaneously
Radio voice server is needed radio voice data forwarding to intercom A2 or intercom B2 and intercom B3, radio voice clothes
Each module detailed process of business device are as follows:
1) radio voice server first carries out radio voice data forwarding, i.e. radio voice server sends out speech talkback
It plays SRTP voice data transmitted by person (intercom A1 or intercom B1) and forwards a packet to specified speech talkback recipient's (intercommunication
Machine A2) or be forwarded in the group (intercom B2 and intercom B3) being made of speech talkback recipient;
2) radio voice server does the local cache of radio voice data simultaneously, i.e. radio voice server simultaneously will
The radio voice data buffer storage of speech talkback promoter (intercom A1 or intercom B1) waits all pairs to server local
After saying that voice data has received, the radio voice data of speech talkback promoter (intercom A1 or intercom B1) are saved in clothes
Business device is local;
3) radio voice data are carried out distributed storage, i.e. radio voice server for intercommunication by radio voice server
Voice data is stored in HDFS (Hadoop Distribute File System), when the data volume of radio voice data is tired
When counting the threshold size of radio voice server settings, radio voice server is in such a way that integration dissipates and divides by radio voice
In data storage to HDFS;
4) is that each file for merging storage establishes an index file, then encrypts index text using RSA Algorithm
Part.
Specifically, the speech talkback promoter (intercom A1 and intercom B1) carries out the specific flow chart of safe transmission
It is as shown in Figure 4:
Step 1, speech talkback promoter obtain the public key information of speech talkback recipient;
Step 2, speech talkback promoter acquire radio voice data, when the radio voice size of data of acquisition reaches grouping
When size of data, radio voice data are encapsulated into SRTP VoP;
Step 3, according to public key information acquired in step 1, in SRTP VoP MKI and authenticating tag into
Row encrypts, and result is covered to the position of original MKI and authenticating tag;
The SRTP VoP after encapsulation is sent corresponding radio voice service by step 4, speech talkback promoter
Device is carried out the forwarding of SRTP VoP by radio voice server.
Specifically, the specific flow chart of the radio voice server progress data forwarding is as shown in Figure 5:
Step 1, radio voice server receive the intercommunication language in the SRTP VoP that speech talkback promoter sends
Sound data;
Step 2, radio voice server are according to the intercommunication machine information of speech talkback recipient by received SRTP language
Sound data forward a packet to corresponding speech talkback recipient or the group that is made of speech talkback recipient in;
Specifically, the specific flow chart of the radio voice server progress data storage is as shown in Figure 6:
The SRTP VoP that step 1, radio voice server are first sent in local cache speech talkback promoter, directly
To having cached all SRTP VoPs;
Step 2, radio voice server private key according to provided by speech talkback recipient will be in SRTP VoPs
MKI and authenticating tag decryption (being decrypted using environment of the RSA to encryption), cover the MKI and authenticating tag of former encryption, most
The radio voice data obtained after decryption are saved in local file by radio voice server afterwards;
Step 3, radio voice server inspect periodically the radio voice data in local file, and according to set threshold
Value determines a need for storing radio voice data into HDFS, if the number of the radio voice data in current local file
Set threshold value is reached according to amount, has then directly carried out step 4, if the data of the radio voice data in current local file
Amount is less than set threshold value, thens follow the steps 3;
Step 4, radio voice server store all radio voice data onto HDFS, and establish one using RSA
The index file of encryption needs to carry out safety verification when user accesses radio voice data.
Specifically, the specific flow chart of user's progress radio voice data access is as shown in Figure 7:
Step 1, radio voice server first carry out user right verifying, then carry out if authorized party in next step, otherwise directly
Connect denied access;
Step 2, user obtain and decrypt index file, report specific radio voice data to believe to radio voice server
Breath;
Step 3, radio voice server navigate to the radio voice data and are stored according to the information search index file
Location information on HDFS returns to user;
Step 4, user are according to return as a result, initiating to access to HDFS Client, acquisition radio voice data.
For the safety of data transmission procedure, since SRTP default encrypts data using AES, in order to guarantee to communicate
It is able to carry out, needs to distribute to code key into communicating pair, therefore result in safety of the code key in transmission process and be on the hazard,
So by using RSA in SRTP VoP MKI and authenticating tag encrypt so that relevant to AES decryption
Information is stored by rsa encryption, enhances the safety of SRTP VoP, meanwhile, bring the letter that AES carries out code key management
Just property;
For the safety of data storage procedure, by storing file distribution onto HDFS, so that authorized user can root
Specific radio voice data are quickly navigated to according to encrypted index file, and unauthorized user can not navigate to specifically
Radio voice data also can not just get specific radio voice data, thus ensure that the safety of radio voice data,
Just improve the safety of radio voice data storage.
In conclusion the present invention has the advantage that
1, when interphone terminal and radio voice server carry out radio voice data interaction, guarantee that intercom both sides carry out
Safety of the radio voice data in transmission process when speech talkback.By using SRTP to radio voice data encryption, protect
The safety of radio voice data has been demonstrate,proved, meanwhile, using RSA cryptographic algorithms to the MKI and authenticating tag in SRTP VoP
It is encrypted, on the other hand the safety on the one hand further ensuring the encryption environment in SRTP VoP also guarantees
When carrying out radio voice data encryption using AES, obtained in the safety of AES code key transmission and the convenience of code key management
It improves.
2, guarantee the safety of radio voice data storage.Radio voice server is in the intercommunication for transmitting interphone terminal
Voice data uploads to before HDFS, the advanced row file Merge operation of meeting, then establishes an index text for the file after merging
Part subsequently uses the rsa encryption merging file, so that unauthorized parties are difficult to navigate to specific radio voice data, thus
It ensure that the storage safety of radio voice data, and authorized party can quickly navigate to specific file according to index file.,
This method, which only needs user to dispose related software, can be completed function provided by system, and for a user ten
It is point convenient, simple, convenient for promoting the use of.
Although specific embodiments of the present invention have been described above, those familiar with the art should be managed
Solution, we are merely exemplary described specific embodiment, rather than for the restriction to the scope of the present invention, it is familiar with this
The technical staff in field should be covered of the invention according to modification and variation equivalent made by spirit of the invention
In scope of the claimed protection.
Claims (9)
1. a kind of method for realizing network talkback security mechanism based on SRTP, comprising: interphone terminal and radio voice server
Cluster, the interphone terminal includes a plurality of intercoms with data transmission and reception function, for sending radio voice
As speech talkback promoter, the intercom for receiving radio voice data receives the intercom of data as speech talkback
Person, the radio voice server cluster include a plurality of radio voice servers;It is characterized by: the method includes as follows
Step:
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, set according to the packet size of SRTP VoP
Set radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and are carried out
Encryption;
Step 4, speech talkback promoter send radio voice clothes by network for the SRTP VoP after the completion of encapsulation
Corresponding radio voice server in business device cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient or turn
It is dealt into the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server local by step 6, radio voice server,
After having cached all SRTP VoPs, radio voice server private key according to provided by speech talkback recipient
MKI and authenticating tag are decrypted from encrypted SRTP VoP, obtains intercommunication language further according to the MKI and authenticating tag
Sound data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server.
2. a kind of method for realizing network talkback security mechanism based on SRTP according to claim 1, it is characterised in that: institute
State step 7 specifically:
Radio voice server inspects periodically the radio voice data in local file, and according to set by radio voice server
Threshold determination whether need to store the radio voice data into HDFS, if the radio voice number in current local file
According to data volume reached the threshold size of setting, then radio voice server is dissipated using integration divide by the way of by all intercommunication languages
In the storage to HDFS of sound data;If the data volume of the radio voice data in current local file is less than set threshold value,
Then without file Merge operation, continue waiting for checking operation next time.
3. a kind of method for realizing network talkback security mechanism based on SRTP according to claim 1, it is characterised in that: institute
State step 7 radio voice data merge storage into HDFS, wherein radio voice data merging after and storage to HDFS it
Before further include: establish an index file for the radio voice data after merging, and using RSA Algorithm to each index file into
Row encryption, user need to carry out Authority Verification when obtaining radio voice data, if unauthorized parties, then can not get index
Record, to can not also get specific radio voice data;If authorized party, then intercommunication language is got by index file
Sound data.
4. a kind of method for realizing network talkback security mechanism based on SRTP according to claim 1, it is characterised in that: institute
Stating to be encrypted in step 3 specifically has: then filling SRTP fixing head is added according to RSA public key obtained using RSA
Close algorithm in SRTP VoP MKI and authenticating tag be encrypted, and by encrypted result cover original MKI
With the position of authenticating tag.
5. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor performs the steps of when executing described program
Step 1, speech talkback promoter obtain the RSA public key of speech talkback recipient;
Step 2, speech talkback promoter carry out the acquisition of radio voice data, set according to the packet size of SRTP VoP
Set radio voice data grouping;
The radio voice data obtained after grouping are packaged into SRTP VoP by step 3, speech talkback promoter, and are carried out
Encryption;
Step 4, speech talkback promoter send radio voice clothes by network for the SRTP VoP after the completion of encapsulation
Corresponding radio voice server in business device cluster;
Step 5, radio voice server receive the SRTP VoP, and are forwarded to corresponding speech talkback recipient or turn
It is dealt into the group being made of speech talkback recipient;
The SRTP VoP that speech talkback promoter sends is cached to server local by step 6, radio voice server,
After having cached all SRTP VoPs, radio voice server private key according to provided by speech talkback recipient
MKI and authenticating tag are decrypted from encrypted SRTP VoP, obtains intercommunication language further according to the MKI and authenticating tag
Sound data, are finally saved into local file;
The radio voice data obtained after decryption are merged storage into HDFS by step 7, radio voice server.
6. a kind of computer equipment according to claim 5, it is characterised in that: the step 7 specifically:
Radio voice server inspects periodically the radio voice data in local file, and according to set by radio voice server
Threshold determination whether need to store the radio voice data into HDFS, if the radio voice number in current local file
According to data volume reached the threshold size of setting, then radio voice server is dissipated using integration divide by the way of by all intercommunication languages
In the storage to HDFS of sound data;If the data volume of the radio voice data in current local file is less than set threshold value,
Then without file Merge operation, continue waiting for checking operation next time.
7. a kind of computer equipment according to claim 5, it is characterised in that: the step 7 radio voice data merge
It stores in HDFS, wherein after the merging of radio voice data and before storage to HDFS further include: for the intercommunication after merging
Voice data establishes an index file, and is encrypted using RSA Algorithm to each index file, and user is obtaining intercommunication language
It needs to carry out Authority Verification when sound data, if unauthorized parties, then can not get index record, to can not also get tool
The radio voice data of body;If authorized party, then radio voice data are got by index file.
8. a kind of computer equipment according to claim 5, it is characterised in that: tool is encrypted in the step 3
Body has: then filling SRTP fixing head uses RSA cryptographic algorithms to SRTP VoP according to RSA public key obtained
In MKI and authenticating tag be encrypted, and by encrypted result covering original MKI and authenticating tag position.
9. a kind of system for realizing network talkback security mechanism based on SRTP, it is characterised in that: including the public affairs on interphone terminal
On key acquisition module, data preparation module, data package module and data transmission module and radio voice server cluster
Data forwarding module, local cache module and distributed storage module;
The public key acquisition module obtains the RSA public key of speech talkback recipient for speech talkback promoter;
The data preparation module carries out the acquisition of radio voice data for speech talkback promoter, according to SRTP voice number
According to the packet size of packet, radio voice data grouping is set;
The radio voice data obtained after grouping are packaged into SRTP language for speech talkback promoter by the data package module
Sound data packet, and be encrypted;
The data transmission module is sent out the SRTP VoP after the completion of encapsulation by network for speech talkback promoter
It is sent to corresponding radio voice server in radio voice server cluster;
The data forwarding module receives the SRTP VoP for radio voice server, and is forwarded to corresponding language
Sound intercommunication recipient is forwarded in the group being made of speech talkback recipient;
The local cache module delays the SRTP VoP that speech talkback promoter sends for radio voice server
It is stored to server local, after having cached all SRTP VoPs, radio voice server connects according to speech talkback
Private key provided by receipts person decrypts MKI and authenticating tag from encrypted SRTP VoP, further according to the MKI and recognizes
It demonstrate,proves label and obtains radio voice data, be finally saved into local file;
The radio voice data obtained after decryption are merged storage for radio voice server and arrived by the distributed storage module
In HDFS.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910136732.6A CN109660568B (en) | 2019-02-25 | 2019-02-25 | Method, equipment and system for realizing network talkback security mechanism based on SRTP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910136732.6A CN109660568B (en) | 2019-02-25 | 2019-02-25 | Method, equipment and system for realizing network talkback security mechanism based on SRTP |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109660568A true CN109660568A (en) | 2019-04-19 |
CN109660568B CN109660568B (en) | 2021-04-30 |
Family
ID=66122903
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910136732.6A Active CN109660568B (en) | 2019-02-25 | 2019-02-25 | Method, equipment and system for realizing network talkback security mechanism based on SRTP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109660568B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110176235A (en) * | 2019-05-23 | 2019-08-27 | 腾讯科技(深圳)有限公司 | Methods of exhibiting, device, storage medium and the computer equipment of speech recognition text |
CN111262837A (en) * | 2020-01-09 | 2020-06-09 | 奇安信科技集团股份有限公司 | Data encryption method, data decryption method, system, equipment and medium |
CN114173213A (en) * | 2021-12-10 | 2022-03-11 | 善理通益信息科技(深圳)有限公司 | Websocket-based voice quality optimization method and talkback terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7730309B2 (en) * | 2005-07-27 | 2010-06-01 | Zimmermann Philip R | Method and system for key management in voice over internet protocol |
CN105049788A (en) * | 2015-06-08 | 2015-11-11 | 深圳市盛烽科技有限公司 | Intelligent visual electronic doorbell and operation method thereof |
CN105488887A (en) * | 2015-12-28 | 2016-04-13 | 慧锐通智能科技股份有限公司 | Entrance guard access control method |
CN107277456A (en) * | 2017-07-26 | 2017-10-20 | 北京计算机技术及应用研究所 | A kind of video security monitoring system based on Android device |
US10356059B2 (en) * | 2015-06-04 | 2019-07-16 | Nagravision S.A. | Methods and systems for communication-session arrangement on behalf of cryptographic endpoints |
-
2019
- 2019-02-25 CN CN201910136732.6A patent/CN109660568B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7730309B2 (en) * | 2005-07-27 | 2010-06-01 | Zimmermann Philip R | Method and system for key management in voice over internet protocol |
US10356059B2 (en) * | 2015-06-04 | 2019-07-16 | Nagravision S.A. | Methods and systems for communication-session arrangement on behalf of cryptographic endpoints |
CN105049788A (en) * | 2015-06-08 | 2015-11-11 | 深圳市盛烽科技有限公司 | Intelligent visual electronic doorbell and operation method thereof |
CN105488887A (en) * | 2015-12-28 | 2016-04-13 | 慧锐通智能科技股份有限公司 | Entrance guard access control method |
CN107277456A (en) * | 2017-07-26 | 2017-10-20 | 北京计算机技术及应用研究所 | A kind of video security monitoring system based on Android device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110176235A (en) * | 2019-05-23 | 2019-08-27 | 腾讯科技(深圳)有限公司 | Methods of exhibiting, device, storage medium and the computer equipment of speech recognition text |
CN111262837A (en) * | 2020-01-09 | 2020-06-09 | 奇安信科技集团股份有限公司 | Data encryption method, data decryption method, system, equipment and medium |
CN114173213A (en) * | 2021-12-10 | 2022-03-11 | 善理通益信息科技(深圳)有限公司 | Websocket-based voice quality optimization method and talkback terminal |
Also Published As
Publication number | Publication date |
---|---|
CN109660568B (en) | 2021-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dyer et al. | Protocol misidentification made easy with format-transforming encryption | |
CN103107889B (en) | A kind of cloud computing environment data encryption storage system and method that can search for | |
USRE45348E1 (en) | Method and apparatus for intercepting events in a communication system | |
CN105051750B (en) | System and method for encrypted file system layer | |
US9852300B2 (en) | Secure audit logging | |
CN112581126A (en) | Block chain-based platform data management method and device and storage medium | |
CN105656920B (en) | A kind of encryption and decryption method and system for posting number of packages evidence based on express delivery | |
BRPI0615147A2 (en) | protecting digital media from various types of content | |
CN110213669B (en) | Video content anti-theft system and method based on TS (transport stream) slices | |
CN1593033A (en) | Method and system for securely storing and transmitting data by applying a one-time pad | |
CN109660568A (en) | Method, equipment and the system of network talkback security mechanism are realized based on SRTP | |
CN109995530B (en) | Safe distributed database interaction system suitable for mobile positioning system | |
CN101521667B (en) | Method and device for safety data communication | |
CN108881205A (en) | A kind of safety broadcasting system and playback method of HLS Streaming Media | |
US20100223466A1 (en) | Shared scalable server to control confidental event traffic among recordation terminals, analysis engines, and a storage farm coupled via a public network | |
US20150350375A1 (en) | Information Processing Method, Trusted Server, and Cloud Server | |
CN104202736A (en) | Mobile terminal short message end-to-end encryption method oriented to Android system | |
CN109743170A (en) | A kind of Streaming Media logs in and the method and apparatus of data transmission encryption | |
CN118054903A (en) | Talkback command dispatching system and method based on quantum encryption | |
Rosen et al. | Balboa: Bobbing and weaving around network censorship | |
GB2488753A (en) | Encrypted communication | |
CN105246172A (en) | Network transmission method for mobile terminals | |
Tian et al. | A Survey on Data Integrity Attacks and DDoS Attacks in Cloud Computing | |
CN114978769B (en) | Unidirectional leading-in device, unidirectional leading-in method, unidirectional leading-in medium and unidirectional leading-in equipment | |
US20170201493A1 (en) | System and method for secure and anonymous communication in a network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |