CN109660568B - Method, equipment and system for realizing network talkback security mechanism based on SRTP - Google Patents

Method, equipment and system for realizing network talkback security mechanism based on SRTP Download PDF

Info

Publication number
CN109660568B
CN109660568B CN201910136732.6A CN201910136732A CN109660568B CN 109660568 B CN109660568 B CN 109660568B CN 201910136732 A CN201910136732 A CN 201910136732A CN 109660568 B CN109660568 B CN 109660568B
Authority
CN
China
Prior art keywords
talkback
voice
voice data
srtp
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910136732.6A
Other languages
Chinese (zh)
Other versions
CN109660568A (en
Inventor
方国栋
张育钊
刘昊天
张鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaqiao University
Original Assignee
Huaqiao University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaqiao University filed Critical Huaqiao University
Priority to CN201910136732.6A priority Critical patent/CN109660568B/en
Publication of CN109660568A publication Critical patent/CN109660568A/en
Application granted granted Critical
Publication of CN109660568B publication Critical patent/CN109660568B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/65Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes

Abstract

The invention provides a method for realizing a network talkback security mechanism based on SRTP, which comprises the following steps of 1, obtaining a public key; 2. collecting talkback voice data and setting groups; 3. packaging the talkback voice data into an SRTP voice data packet, and encrypting an encryption environment in the SRTP voice data packet by using RSA; 4. sending the SRTP voice data packet to a talkback voice server; 5. the talkback voice server receives and forwards the SRTP voice data packet; 6. the talkback voice server caches the SRTP voice data packet, and then uses RSA to decrypt the encryption environment; 7. and acquiring voice data from the SRTP voice data packet obtained after decryption, and merging and storing the voice data into the HDFS according to a relevant strategy. The invention also provides a computer device and a system for realizing the network talkback safety mechanism based on the SRTP, which ensure the safety of voice data transmission during talkback and the safety of voice data storage.

Description

Method, equipment and system for realizing network talkback security mechanism based on SRTP
Technical Field
The invention relates to the field of safe transmission and storage of talkback data streams, in particular to a method, equipment and a system for realizing a network talkback safety mechanism based on SRTP.
Background
With the rapid development of Internet technology, VOIP (Voice over Internet Protocol, which is a Voice call technology, is used to achieve Voice call and multimedia conference through Internet Protocol (IP), that is, to perform communication through the Internet), is also becoming more and more widespread, and this kind of transmission of streaming media data through a network brings about the security problem of these streaming media applications in the data transmission process due to the insecurity of the network, and meanwhile, due to the arrival of the big data era, all the data has value to become the credits of many application service providers, but at the same time, the security problem of these data in storage is also the problem that these application service providers need to solve at present.
The Secure Real-Time Transport Protocol (SRTP) is a Secure extension Protocol of the Real-Time Transport Protocol (RTP), and provides a security mechanism for the RTP Protocol, and mechanisms such as encryption and message authentication are added on the basis of the RTP Protocol. The streaming media data is encrypted by adopting an AES (advanced Encryption Standard) Encryption algorithm by default, the security of the VOIP is ensured to a certain extent, but the algorithm needs both communication parties to maintain an Encryption environment at the same time, so that the security of the SRTP packet Encryption environment also has the possibility of being attacked when the streaming media is transmitted.
The Hadoop Distributed File System (HDFS) is a core component of Hadoop of a Distributed computing framework of an Apache open source organization, takes GFS (Google File System) of Google company as a prototype, is realized by adopting Java open source, and provides reference for erecting cloud storage solutions for various major institutions and companies. Once released, the HDFS has been widely used to store mass data in internet companies such as FaceBook, Yahoo, ariiba, tench, and hectometre. The design is designed to stably run on a low-cost commercial server, and the system also has the advantages of high fault tolerance, good expandability and the like. The HDFS adopts a master-slave type structure and consists of a NameNode node and a large number of DataNode nodes, wherein the NameNode is the core of the HDFS, the operation of the NameNode is to maintain the metadata information of files and coordinate and manage all the DataNode nodes, and the DataNode is used for storing actual files. After the Hadoop cluster is started, all metadata information is loaded into the memory of the NameNode. When a client accesses the HDFS, metadata information of related files is firstly acquired from the NameNode node, then the DataNode for actually storing the files is found according to the metadata information, and finally the files requested by the client are acquired through the DataNode.
Disclosure of Invention
One of the problems to be solved by the present invention is to provide a method for implementing a network talkback security mechanism based on SRTP, which can solve the security problem of talkback voice data caused by the voice talkback initiator and the voice talkback receiver during the transmission of talkback voice data according to the security mechanism, and on the other hand, the security mechanism enables the talkback voice server cluster to safely store the talkback voice data transmitted by the interphone terminal on the HDFS, thereby ensuring the security of data storage;
one of the problems to be solved by the present invention is realized as follows: a method for realizing a network talkback security mechanism based on SRTP comprises the following steps: the system comprises an interphone terminal and an talkback voice server cluster, wherein the interphone terminal comprises a plurality of interphones with data sending and receiving functions, the interphone used for sending talkback voice data serves as a voice talkback initiator, the interphone used for receiving talkback voice data serves as a voice talkback receiver, and the talkback voice server cluster comprises a plurality of talkback voice servers; the method comprises the following steps:
step 1, a voice talkback initiator acquires an RSA public key of a voice talkback receiver;
step 2, the voice talkback initiator collects talkback voice data and sets talkback voice data packets according to the packet size of the SRTP voice data packets;
step 3, the voice talkback initiator encapsulates the talkback voice data obtained after grouping into an SRTP voice data packet and carries out encryption processing;
step 4, the voice talkback initiator sends the SRTP voice data packet after being packaged to a corresponding talkback voice server in the talkback voice server cluster through a network;
step 5, the talkback voice server receives the SRTP voice data packet and forwards the SRTP voice data packet to a corresponding voice talkback receiver or forwards the SRTP voice data packet to a group consisting of voice talkback receivers;
step 6, the talkback voice server caches the SRTP voice data packets sent by the voice talkback initiator to the local server, until all the SRTP voice data packets are cached, the talkback voice server decrypts an MKI and an authentication tag from the encrypted SRTP voice data packets according to a private key provided by the voice talkback receiver, acquires talkback voice data according to the MKI and the authentication tag, and finally stores the talkback voice data in a local file;
and 7, the talkback voice server merges and stores the talkback voice data obtained after decryption into the HDFS.
Further, the step 7 specifically includes:
the talkback voice server periodically checks the talkback voice data in the local file, judges whether the talkback voice data needs to be stored in the HDFS according to a threshold value set by the talkback voice server, and stores all the talkback voice data on the HDFS in an integrated and scattered mode if the data volume of the talkback voice data in the current local file reaches the set threshold value; and if the data volume of the talkback voice data in the current local file is smaller than the set threshold, not performing file merging operation, and continuously waiting for the next merging check of the server.
Further, the step 7 of merging the talkback voice data and storing the merged talkback voice data into the HDFS, wherein after the merging of the talkback voice data and before the storing into the HDFS, the method further includes: establishing an index file for the combined talkback voice data, encrypting each index file by adopting an RSA algorithm, verifying the authority when the user acquires the talkback voice data, and if the user is an unauthorized party, not acquiring the index record, thereby not acquiring the specific talkback voice data; and if the user is the authorized party, the talkback voice data is obtained through the index file.
Further, the encryption processing in step 3 specifically includes: and filling the SRTP fixed head, then encrypting the MKI and the authentication tag in the SRTP voice data packet by using an RSA encryption algorithm according to the obtained RSA public key, and covering the encrypted result on the positions of the original MKI and the authentication tag.
The second problem to be solved by the present invention is to provide a computer device, which can solve the problem of the security of the talkback voice data caused by the talkback voice data transmission between the voice talkback initiator and the voice talkback receiver on the one hand, and on the other hand, the security mechanism enables the talkback voice server cluster to safely store the talkback voice data transmitted by the interphone terminal on the HDFS, thereby ensuring the security of data storage;
the second problem to be solved by the invention is realized as follows: a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps when executing the program of:
step 1, a voice talkback initiator acquires an RSA public key of a voice talkback receiver;
step 2, the voice talkback initiator collects talkback voice data and sets talkback voice data packets according to the packet size of the SRTP voice data packets;
step 3, the voice talkback initiator encapsulates the talkback voice data obtained after grouping into an SRTP voice data packet and carries out encryption processing;
step 4, the voice talkback initiator sends the SRTP voice data packet after being packaged to a corresponding talkback voice server in the talkback voice server cluster through a network;
step 5, the talkback voice server receives the SRTP voice data packet and forwards the SRTP voice data packet to a corresponding voice talkback receiver or forwards the SRTP voice data packet to a group consisting of voice talkback receivers;
step 6, the talkback voice server caches the SRTP voice data packets sent by the voice talkback initiator to the local server, until all the SRTP voice data packets are cached, the talkback voice server decrypts an MKI and an authentication tag from the encrypted SRTP voice data packets according to a private key provided by the voice talkback receiver, acquires talkback voice data according to the MKI and the authentication tag, and finally stores the talkback voice data in a local file;
and 7, the talkback voice server merges and stores the talkback voice data obtained after decryption into the HDFS.
Further, the step 7 specifically includes:
the talkback voice server periodically checks the talkback voice data in the local file, judges whether the talkback voice data needs to be stored in the HDFS according to a threshold value set by the talkback voice server, and stores all the talkback voice data on the HDFS in an integrated and scattered mode if the data volume of the talkback voice data in the current local file reaches the set threshold value; and if the data volume of the talkback voice data in the current local file is smaller than the set threshold, not performing file merging operation, and continuously waiting for the next merging check of the server.
Further, the step 7 of merging the talkback voice data and storing the merged talkback voice data into the HDFS, wherein after the merging of the talkback voice data and before the storing into the HDFS, the method further includes: establishing an index file for the combined talkback voice data, encrypting each index file by adopting an RSA algorithm, verifying the authority when the user acquires the talkback voice data, and if the user is an unauthorized party, not acquiring the index record, thereby not acquiring the specific talkback voice data; and if the user is the authorized party, the talkback voice data is obtained through the index file.
Further, the encryption processing in step 3 specifically includes: and filling the SRTP fixed head, then encrypting the MKI and the authentication tag in the SRTP voice data packet by using an RSA encryption algorithm according to the obtained RSA public key, and covering the encrypted result on the positions of the original MKI and the authentication tag.
The third problem to be solved by the invention is to provide a system for realizing a network talkback security mechanism based on SRTP, which can solve the security problem of talkback voice data caused by the talkback voice data transmission between a voice talkback initiator and a voice talkback receiver on one hand, and on the other hand, the security mechanism enables a talkback voice server cluster to safely store the talkback voice data transmitted by an interphone terminal on an HDFS, thereby ensuring the security of data storage;
the third problem to be solved by the invention is realized as follows: a system for realizing a network talkback security mechanism based on SRTP comprises a public key acquisition module, a data preparation module, a data packaging module and a data transmission module on a interphone terminal, and a data forwarding module, a local cache module and a distributed storage module on a talkback voice server cluster;
the public key acquisition module is used for the voice talkback initiator to acquire an RSA public key of the voice talkback receiver;
the data preparation module is used for collecting talkback voice data by a voice talkback initiator and setting talkback voice data packets according to the packet size of the SRTP voice data packet;
the data encapsulation module is used for encapsulating the talkback voice data obtained after grouping into an SRTP voice data packet by the voice talkback initiator and carrying out encryption processing;
the data transmission module is used for the voice talkback initiator to send the SRTP voice data packet after being packaged to a corresponding talkback voice server in the talkback voice server cluster through a network;
the data forwarding module is used for receiving the SRTP voice data packet by the talkback voice server and forwarding the SRTP voice data packet to a corresponding voice talkback receiver or forwarding the SRTP voice data packet to a group consisting of voice talkback receivers;
the local cache module is used for caching the SRTP voice data packet sent by the voice talkback initiator to the local of the server by the talkback voice server until all the SRTP voice data packets are cached, decrypting an MKI and an authentication tag from the encrypted SRTP voice data packet by the talkback voice server according to a private key provided by the voice talkback receiver, acquiring talkback voice data according to the MKI and the authentication tag, and finally storing the talkback voice data in a local file;
and the distributed storage module is used for merging and storing the decrypted talkback voice data into the HDFS by the talkback voice server.
The invention has the following advantages:
1. when the interphone terminal and the talkback voice server carry out talkback voice data interaction, the safety of the talkback voice data in the transmission process when two interphone sides carry out voice talkback is ensured. The security of the talkback voice data is ensured by encrypting the talkback voice data by adopting SRTP, meanwhile, the MKI and the authentication tag in the SRTP voice data packet are encrypted by adopting an RSA encryption algorithm, so that the security of the encryption environment in the SRTP voice data packet is further ensured on the one hand, and when the AES is used for encrypting the talkback voice data, the security of AES key transmission and the convenience of key management are improved on the other hand.
2. The safety of talkback voice data storage is guaranteed. The method comprises the steps that an talkback voice server merges and stores files into an HDFS, before storage, an index file is established for all large files forming the merged file, the index file is used for positioning specific talkback voice data, the index file of each merged file is encrypted by adopting an RSA algorithm, and a user needs to perform necessary verification when searching for the specific talkback voice data, so that an unauthorized party cannot obtain a retrieval record, and the specific talkback voice data cannot be obtained.
Drawings
The invention will be further described with reference to the following examples with reference to the accompanying drawings.
FIG. 1 is a diagram of a system architecture for implementing the present invention.
Fig. 2 is a functional block diagram of the interphone terminal of the present invention.
Fig. 3 is a functional block diagram of the talkback voice server according to the present invention.
Fig. 4 is a specific flowchart of the secure transmission performed by the voice intercom initiator according to the present invention.
Fig. 5 is a specific flowchart of data forwarding performed by the talkback voice server side according to the present invention.
Fig. 6 is a specific flowchart of data storage performed by the talkback voice server according to the present invention.
Fig. 7 is a specific flowchart of the user performing talkback voice data access according to the present invention.
Detailed Description
The invention discloses a method for realizing a network talkback security mechanism based on SRTP, which comprises the following steps: the system comprises an interphone terminal and an talkback voice server cluster, wherein the interphone terminal comprises a plurality of interphones with data sending and receiving functions, the interphone used for sending talkback voice data serves as a voice talkback initiator, the interphone used for receiving talkback voice data serves as a voice talkback receiver, and the talkback voice server cluster comprises a plurality of talkback voice servers; the method comprises the following steps:
step 1, a voice talkback initiator acquires an RSA public key of a voice talkback receiver;
step 2, the voice talkback initiator collects talkback voice data and sets talkback voice data packets according to the packet size of the SRTP voice data packets;
step 3, the voice talkback initiator encapsulates the talkback voice data obtained after grouping into an SRTP voice data packet and carries out encryption processing, wherein the specific encryption process is as follows: filling an SRTP fixed head, then encrypting the MKI and the authentication tag in the SRTP voice data packet according to the obtained RSA public key and by using an RSA encryption algorithm, ensuring the safety of talkback voice data in the transmission process when two parties of the interphone carry out voice talkback, and covering the encrypted result on the positions of the original MKI and the authentication tag, so that an unauthorized receiving party can be ensured not to obtain correct MKI and authentication tag, and the talkback voice data can not be decrypted, thereby ensuring the safety of the talkback voice data;
step 4, the voice talkback initiator sends the SRTP voice data packet after being packaged to a corresponding talkback voice server in the talkback voice server cluster through a network;
step 5, the talkback voice server receives the SRTP voice data packet and forwards the SRTP voice data packet to a corresponding voice talkback receiver or forwards the SRTP voice data packet to a group consisting of voice talkback receivers;
step 6, the talkback voice server caches the SRTP voice data packets sent by the voice talkback initiator to the local server, until all the SRTP voice data packets are cached, the talkback voice server decrypts an MKI and an authentication tag from the encrypted SRTP voice data packets according to a private key provided by the voice talkback receiver, acquires talkback voice data according to the MKI and the authentication tag, and finally stores the talkback voice data in a local file;
step 7, the talkback voice server merges and stores the talkback voice data obtained after decryption into the HDFS; the method specifically comprises the following steps: the talkback voice server periodically checks the talkback voice data in the local file, judges whether the talkback voice data needs to be stored in the HDFS according to a threshold value set by the talkback voice server, and stores all the talkback voice data on the HDFS in an integrated and scattered mode if the data volume of the talkback voice data in the current local file reaches the set threshold value; and if the data volume of the talkback voice data in the current local file is smaller than the set threshold, not performing file merging operation, and continuously waiting for the next merging check of the server. In order to ensure the safety of talkback voice data storage, file merging storage is carried out, and talkback voice data is merged and stored in an HDFS (Hadoop distributed File System), wherein after the talkback voice data are merged and before the talkback voice data are stored in the HDFS, an index file is established for the merged talkback voice data, each index file is encrypted by adopting an RSA (rivest-Shamir-Adleman) algorithm, a user must carry out authority verification when retrieving the talkback voice data, if the talkback voice data are unauthorized parties, index records cannot be obtained, and therefore specific talkback voice data cannot be obtained; and if the user is the authorized party, the talkback voice data is obtained through the index file. An index file is established for the merged file, the index file is used for rapidly searching specific talkback voice files in the merged file, meanwhile, in order to ensure the safety of talkback voice data stored on the HDFS, RSA is used for encrypting each index file, and a user needs to perform necessary safety verification when obtaining the talkback voice data to ensure the safety of the data.
The computer equipment comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the following steps:
step 1, a voice talkback initiator acquires an RSA public key of a voice talkback receiver;
step 2, the voice talkback initiator collects talkback voice data and sets talkback voice data packets according to the packet size of the SRTP voice data packets;
step 3, the voice talkback initiator encapsulates the talkback voice data obtained after grouping into an SRTP voice data packet and carries out encryption processing; the specific encryption process is as follows: filling an SRTP fixed head, then encrypting the MKI and the authentication tag in the SRTP voice data packet according to the obtained RSA public key and by using an RSA encryption algorithm, ensuring the safety of talkback voice data in the transmission process when two parties of the interphone carry out voice talkback, and covering the encrypted result on the positions of the original MKI and the authentication tag, so that an unauthorized receiving party can be ensured not to obtain correct MKI and authentication tag, and the talkback voice data can not be decrypted, thereby ensuring the safety of the talkback voice data;
step 4, the voice talkback initiator sends the SRTP voice data packet after being packaged to a corresponding talkback voice server in the talkback voice server cluster through a network;
step 5, the talkback voice server receives the SRTP voice data packet and forwards the SRTP voice data packet to a corresponding voice talkback receiver or forwards the SRTP voice data packet to a group consisting of voice talkback receivers;
step 6, the talkback voice server caches the SRTP voice data packets sent by the voice talkback initiator to the local server, until all the SRTP voice data packets are cached, the talkback voice server decrypts an MKI and an authentication tag from the encrypted SRTP voice data packets according to a private key provided by the voice talkback receiver, acquires talkback voice data according to the MKI and the authentication tag, and finally stores the talkback voice data in a local file;
step 7, the talkback voice server merges and stores the talkback voice data obtained after decryption into the HDFS; the method specifically comprises the following steps: the talkback voice server periodically checks the talkback voice data in the local file, judges whether the talkback voice data needs to be stored in the HDFS according to a threshold value set by the talkback voice server, and stores all the talkback voice data on the HDFS in an integrated and scattered mode if the data volume of the talkback voice data in the current local file reaches the set threshold value; and if the data volume of the talkback voice data in the current local file is smaller than the set threshold, not performing file merging operation, and continuously waiting for the next merging check of the server. In order to ensure the safety of talkback voice data storage, file merging storage is carried out, after talkback voice data are merged and before the talkback voice data are stored in an HDFS, an index file is established for the merged talkback voice data, an RSA algorithm is adopted to encrypt each index file, a user has to carry out authority verification when carrying out talkback voice data retrieval, if the user is an unauthorized party, an index record cannot be obtained, and therefore specific talkback voice data cannot be obtained; and if the user is the authorized party, the talkback voice data is obtained through the index file. An index file is established for the merged file, the index file is used for rapidly searching specific talkback voice files in the merged file, meanwhile, in order to ensure the safety of talkback voice data stored on the HDFS, RSA is used for encrypting each index file, and a user needs to perform necessary safety verification when obtaining the talkback voice data to ensure the safety of the data.
The third problem to be solved by the invention is to provide a system for realizing a network talkback security mechanism based on SRTP, which can solve the security problem of talkback voice data caused by the talkback voice data transmission between a voice talkback initiator and a voice talkback receiver on one hand, and on the other hand, the security mechanism enables a talkback voice server cluster to safely store the talkback voice data transmitted by an interphone terminal on an HDFS, thereby ensuring the security of data storage;
the third problem to be solved by the invention is realized as follows: a system for realizing a network talkback security mechanism based on SRTP comprises a public key acquisition module, a data preparation module, a data packaging module and a data transmission module on a interphone terminal, and a data forwarding module, a local cache module and a distributed storage module on a talkback voice server cluster;
the public key acquisition module is used for the voice talkback initiator to acquire an RSA public key of the voice talkback receiver;
the data preparation module is used for collecting talkback voice data by a voice talkback initiator and setting talkback voice data packets according to the packet size of the SRTP voice data packet;
the data encapsulation module is used for encapsulating the talkback voice data obtained after grouping into an SRTP voice data packet by the voice talkback initiator and carrying out encryption processing; the specific encryption process is as follows: filling an SRTP fixed head, then encrypting the MKI and the authentication tag in the SRTP voice data packet according to the obtained RSA public key and by using an RSA encryption algorithm, ensuring the safety of talkback voice data in the transmission process when two parties of the interphone carry out voice talkback, and covering the encrypted result on the positions of the original MKI and the authentication tag, so that an unauthorized receiving party can be ensured not to obtain correct MKI and authentication tag, and the talkback voice data can not be decrypted, thereby ensuring the safety of the talkback voice data;
the data transmission module is used for the voice talkback initiator to send the SRTP voice data packet after being packaged to a corresponding talkback voice server in the talkback voice server cluster through a network;
the data forwarding module is used for receiving the SRTP voice data packet by the talkback voice server and forwarding the SRTP voice data packet to a corresponding voice talkback receiver or forwarding the SRTP voice data packet to a group consisting of voice talkback receivers;
the local cache module is used for caching the SRTP voice data packet sent by the voice talkback initiator to the local of the server by the talkback voice server until all the SRTP voice data packets are cached, decrypting an MKI and an authentication tag from the encrypted SRTP voice data packet by the talkback voice server according to a private key provided by the voice talkback receiver, acquiring talkback voice data according to the MKI and the authentication tag, and finally storing the talkback voice data in a local file;
the distributed storage module is used for the talkback voice server to combine and store the talkback voice data obtained after decryption into the HDFS; the method specifically comprises the following steps: the talkback voice server periodically checks the talkback voice data in the local file, judges whether the talkback voice data needs to be stored in the HDFS according to a threshold value set by the talkback voice server, and stores all the talkback voice data on the HDFS in an integrated and scattered mode if the data volume of the talkback voice data in the current local file reaches the set threshold value; and if the data volume of the talkback voice data in the current local file is smaller than the set threshold, not performing file merging operation, and continuously waiting for the next merging check of the server. In order to ensure the safety of talkback voice data storage, files are merged and stored, an index file is established for the merged talkback voice data, each index file is encrypted by adopting an RSA algorithm, a user must carry out authority verification when talkback voice data retrieval is carried out, if the user is an unauthorized party, an index record cannot be obtained, and therefore specific talkback voice data cannot be obtained; and if the user is the authorized party, the talkback voice data is obtained through the index file. An index file is established for the merged file, the index file is used for rapidly searching specific talkback voice files in the merged file, meanwhile, in order to ensure the safety of talkback voice data stored on the HDFS, RSA is used for encrypting each index file, and a user needs to perform necessary safety verification when obtaining the talkback voice data to ensure the safety of the data.
An implementation of the method, device and system for implementing a network talkback security mechanism based on SRTP of the present invention is described in detail with reference to the accompanying drawings:
the invention provides a method for realizing a network talkback safety mechanism based on SRTP, which comprises the safety when an interphone terminal transmits talkback voice data and the safety when a talkback voice server stores the talkback voice data on HDFS. The safety mechanism provided by the invention can ensure the safety of the whole communication link and the talkback voice finally stored on the talkback voice server when the transmitting and receiving parties carry out network talkback to a certain extent.
The invention relates to a method for realizing a network talkback security mechanism based on SRTP, which is carried out on the basis of SRTP protocol, and the aim of security is achieved by encrypting an AES encryption environment in an SRTP voice data packet by using an RSA encryption algorithm.
The SRTP header fixed format portion is briefly described as follows:
Figure BDA0001977160630000121
wherein:
v: version number of RTSP, 2bits, which is currently specified to be 2;
p: a load filling zone bit, 1bit, when the length of the load data is not an integral multiple of 32bits, the load data needs to be filled, and the value is 1 at the moment, otherwise, the value is 0;
x: the extension identification bit, 1 indicates that an extension header of 32bits needs to be added behind the fixed header, and 0 indicates that no extension is needed;
CC: the number of CSRCs, 4bits, by which the number of CSRCs contained in the RSRP header can be calculated;
m: flag, 1bit, allowing important events to be marked in the bitstream;
PT: the type of the load data, 7bits, is used for explaining the data type transmitted by the SRTP packet;
sequence number: the serial number of the SRTP packet is 16bits, when the SRTP stream sends an SRTP data packet, the serial number is added with 1, and a receiver can count the SRTP stream packet through the serial number, detect packet loss and recover the packet sequence;
time stamping: the time stamp for RTSP packet transmission, 32bits, indicates the sampling instant of the first byte of the SRTP packet. The initial value is a random number, and 1 is added in each sampling period;
and (3) SSRC: sending a source identifier of a stream, 32bits, representing a synchronization source of a signal, the value of which should be randomly selected to ensure that the SSRC identifiers of any two synchronization sources in the same SRTP session are different;
CSRC: the flow intermediate interlude identifier, n 32bits, CSRC marks, are inserted by the mixer, whose value is the SSRC mark of each component signal that makes up the composite signal, to identify the source of each component signal. The header of the RTP packet may contain up to 15 CSRC identities, the number of which is indicated by the CC field.
Payload: encrypted stream data;
MKI: a master key identifier, configurable in length, defined, described, and used by a key management protocol, the MKI used to identify the master key used to encrypt and authenticate the SRTP packets;
authenticating the label: the Authentication Tag is configurable in length and used for bearing message Authentication data, the Authentication Tag provides Authentication of an RTP header and a payload, and meanwhile, replay attack protection is indirectly provided by authenticating a serial number;
through the above simple introduction of the SRTP packet header, it is mainly for explaining that a network talkback security mechanism based on SRTP of the present invention is based on it, uses RSA to encrypt MKI and authentication tag, to encrypt the encryption environment of AES to achieve the security purpose;
the following is a continued description of a network talk-back security mechanism based on SRTP of the present invention. The system architecture diagram of the invention is shown in fig. 1, and the system comprises interphone terminals (interphone A1, interphone A2, interphone B1, interphone B2 and interphone B3) and an interphone voice server cluster. The interphone A1, the interphone A2, the interphone B1, the interphone B2 and the interphone B3 simultaneously comprise a sending function and a receiving function, the sending function means that an interphone terminal is used as a voice talkback initiator, at the moment, the interphone sends talkback voice data to the talkback voice server through a network, and the talkback voice server forwards the talkback voice data to finish voice talkback; the receiving function means that the interphone terminal is used as a voice interphone receiver, and at the moment, the interphone receives the talkback voice data forwarded by the talkback voice server and plays the talkback voice data at the interphone terminal. The talkback voice server cluster is mainly used for forwarding talkback voice data, and on the other hand, the talkback voice server cluster is adopted to solve three problems, namely, the problem of high concurrency of the system is solved, and when the system faces a large number of voice talkback initiators to forward requests of talkback voice data, the timeliness and the high efficiency of the system can be improved; secondly, the storage capacity of the server is enlarged, and the server end can store talkback voice data, so that the whole storage capacity of the server is enlarged through a talkback voice server cluster structure; and thirdly, providing a set of safe software storage mechanism.
In order to ensure the safety of the talkback voice data transmission process when the talkback voice data interaction is performed between the interphone terminal and the talkback voice server, the function is modularized according to the processing flow of the interphone terminal, and the block diagram of the interphone A1, the interphone A2, the interphone B1, the interphone B2 and the interphone B3 is shown in FIG. 2 and comprises a public key acquisition module, a data preparation module, a data encapsulation module and a data transmission module. When the interphone A1 initiates voice talkback to the interphone A2 or the interphone B1 to the interphones B2 and B3, the processing flows of the modules are as follows:
1) the voice talkback initiator acquires public key information of the voice talkback receiver;
2) an interphone A1 or an interphone B1 (voice talkback initiator) firstly prepares data, namely the interphone A1 or the interphone B1 collects talkback voice data, and then the talkback voice data packets are filled according to the packet size of an SRTP voice data packet;
3) the intercom a1 or the intercom B1 encapsulates the intercom voice data collected in the step 1 into an SRTP voice data packet, that is, the intercom terminal a1 or the intercom B1 encapsulates the intercom voice data collected and grouped in the intercom voice data preparation stage into the SRTP voice data packet, fills the SRTP fixed header, then encrypts the MKI (master Key identifier) and the Authentication Tag (Authentication Tag) in the SRTP voice data packet according to the RSA public Key published by the intercom a2 or the intercom B2 and the intercom B3 (voice intercom receiver), and covers the encrypted result with the positions of the original MKI and the Authentication Tag;
4) the interphone A1 or the interphone B1 sends the packaged SRTP voice data packet to the network, so that the interphone voice server forwards the SRTP voice data packet to the interphone A2 or the interphone B2 and the interphone B3.
In order to ensure the safe data storage of the talkback voice server, the talkback voice server is functionally divided as shown in fig. 3, and comprises a data forwarding module, a local cache module and a distributed storage module. After receiving talkback voice data of the interphone A1 or the interphone B1, the talkback voice server cluster caches the talkback voice data to the local, decrypts the talkback voice data from the SRTP voice data packet according to the private key of the interphone A2 or the interphone B2 and B3, when the data amount cached in the talkback voice server is larger than a certain set threshold value, the talkback voice server firstly performs file merging operation, then stores the merged file on the HDFS, establishes an index file for the file stored on the HDFS after merging, encrypts the index file by adopting an RSA algorithm, and needs to perform permission verification when a user retrieves the talkback voice data, and cannot acquire an index record if the talkback voice server is a non-authorized party, so that specific talkback voice data cannot be acquired. Meanwhile, the talkback voice server needs to forward the talkback voice data to the interphone a2 or the interphone B2 and the interphone B3, and the specific flow of each module of the talkback voice server is as follows:
1) the talkback voice server firstly forwards talkback voice data, namely the talkback voice server forwards an SRTP voice data packet sent by a voice talkback initiator (an interphone A1 or an interphone B1) to a specified voice talkback receiver (an interphone A2) or forwards the SRTP voice data packet to a group consisting of voice talkback receivers (an interphone B2 and an interphone B3);
2) the talkback voice server simultaneously performs local caching of talkback voice data, namely the talkback voice server simultaneously caches talkback voice data of a voice talkback initiator (an interphone A1 or an interphone B1) to the local of the server, and stores the talkback voice data of the voice talkback initiator (an interphone A1 or an interphone B1) to the local of the server after all talkback voice data are received;
3) the talkback voice server stores the talkback voice data in a distributed manner, namely the talkback voice server stores the talkback voice data into an HDFS (Hadoop distributed File System), and when the data volume of the talkback voice data is accumulated to the threshold value set by the talkback voice server, the talkback voice server stores the talkback voice data on the HDFS in an integrated and dispersed manner;
4) an index file is created for each merged stored file and then encrypted using the RSA algorithm.
Specifically, a specific flowchart of the voice talkback initiator (interphone a1 and interphone B1) for secure transmission is shown in fig. 4:
step 1, a voice talkback initiator acquires public key information of a voice talkback receiver;
step 2, a voice talkback initiator collects talkback voice data, and when the collected talkback voice data reaches the packet data size, the talkback voice data is packaged into an SRTP voice data packet;
step 3, encrypting the MKI and the authentication tag in the SRTP voice data packet according to the public key information acquired in the step 1, and covering the result on the position of the original MKI and the position of the authentication tag;
and 4, the voice talkback initiator sends the packaged SRTP voice data packet to a corresponding talkback voice server, and the talkback voice server forwards the SRTP voice data packet.
Specifically, a specific flowchart of the data forwarding performed by the talkback voice server is shown in fig. 5:
step 1, an intercom voice server receives intercom voice data in an SRTP voice data packet sent by a voice intercom initiator;
step 2, the talkback voice server forwards the SRTP voice data packet received by the talkback voice server to the corresponding voice talkback receiver or a group consisting of the voice talkback receivers according to the interphone information of the voice talkback receiver;
specifically, a specific flowchart of the data storage performed by the talkback voice server is shown in fig. 6:
step 1, an talkback voice server firstly caches SRTP voice data packets sent by a voice talkback initiator locally until all SRTP voice data packets are cached;
step 2, the talkback voice server decrypts the MKI and the authentication tag in the SRTP voice data packet according to a private key provided by the voice talkback receiver (the encrypted environment is decrypted by using RSA), covers the original encrypted MKI and the authentication tag, and finally stores the talkback voice data obtained after decryption into a local file;
step 3, the talkback voice server periodically checks the talkback voice data in the local file, judges whether the talkback voice data needs to be stored in the HDFS according to a set threshold value, directly performs step 4 if the data volume of the talkback voice data in the current local file reaches the set threshold value, and performs step 3 if the data volume of the talkback voice data in the current local file is smaller than the set threshold value;
and 4, storing all talkback voice data on the HDFS by the talkback voice server, establishing an index file encrypted by RSA, and performing security verification when a user accesses the talkback voice data.
Specifically, a specific flowchart of the user performing the access to the talkback voice data is shown in fig. 7:
step 1, the talkback voice server firstly carries out user authority verification, if the talkback voice server is an authorized party, the next step is carried out, and if the talkback voice server is not the authorized party, the access is directly refused;
step 2, the user acquires and decrypts the index file, and reports specific talkback voice data information to the talkback voice server;
step 3, the talkback voice server inquires an index file according to the information, positions the position information of the talkback voice data stored on the HDFS, and returns the position information to the user;
and 4, initiating access to the HDFS Client by the user according to the returned result to acquire talkback voice data.
For the safety of the data transmission process, the SRTP adopts AES as a default to encrypt data, and in order to ensure that communication can be carried out, a secret key needs to be distributed to two communication parties, so that the safety of the secret key in the transmission process is threatened, and the MKI and the authentication tag in the SRTP voice data packet are encrypted by using RSA, so that the information related to the decryption of the AES is encrypted and stored by the RSA, the safety of the SRTP voice data packet is enhanced, and meanwhile, the simplicity of key management of the AES is brought;
for the safety of the data storage process, the files are stored on the HDFS in a distributed mode, so that authorized users can quickly locate specific talkback voice data according to the encrypted index files, unauthorized users cannot locate the specific talkback voice data, and cannot acquire the specific talkback voice data, the safety of the talkback voice data is guaranteed, and the safety of talkback voice data storage is improved.
In summary, the invention has the following advantages:
1. when the interphone terminal and the talkback voice server carry out talkback voice data interaction, the safety of the talkback voice data in the transmission process when two interphone sides carry out voice talkback is ensured. The security of the talkback voice data is ensured by encrypting the talkback voice data by adopting SRTP, meanwhile, the MKI and the authentication tag in the SRTP voice data packet are encrypted by adopting an RSA encryption algorithm, so that the security of the encryption environment in the SRTP voice data packet is further ensured on the one hand, and when the AES is used for encrypting the talkback voice data, the security of AES key transmission and the convenience of key management are improved on the other hand.
2. The safety of talkback voice data storage is guaranteed. Before uploading talkback voice data transmitted by the interphone terminal to the HDFS, the talkback voice server performs file merging operation, then establishes an index file for the merged file, and then encrypts the merged file by using RSA (rivest-Shamir-Adleman) so that an unauthorized party can hardly locate specific talkback voice data, thereby ensuring the storage safety of the talkback voice data, and an authorized party can quickly locate the specific file according to the index file. ,
the method can complete the functions provided by the system only by deploying the relevant software by the user, is very convenient and simple for the user, and is convenient to popularize and use.
Although specific embodiments of the invention have been described above, it will be understood by those skilled in the art that the specific embodiments described are illustrative only and are not limiting upon the scope of the invention, and that equivalent modifications and variations can be made by those skilled in the art without departing from the spirit of the invention, which is to be limited only by the appended claims.

Claims (7)

1. A method for realizing a network talkback security mechanism based on SRTP comprises the following steps: the system comprises an interphone terminal and an talkback voice server cluster, wherein the interphone terminal comprises a plurality of interphones with data sending and receiving functions, the interphone used for sending talkback voice data serves as a voice talkback initiator, the interphone used for receiving talkback voice data serves as a voice talkback receiver, and the talkback voice server cluster comprises a plurality of talkback voice servers; the method is characterized in that: the method comprises the following steps:
step 1, a voice talkback initiator acquires an RSA public key of a voice talkback receiver;
step 2, the voice talkback initiator collects talkback voice data and sets talkback voice data packets according to the packet size of the SRTP voice data packets;
step 3, the voice talkback initiator encapsulates the talkback voice data obtained after grouping into an SRTP voice data packet and carries out encryption processing; the encryption processing specifically comprises: filling an SRTP fixed head, then encrypting the MKI and the authentication tag in the SRTP voice data packet by using an RSA encryption algorithm according to the obtained RSA public key, and covering the encrypted result on the positions of the original MKI and the authentication tag;
step 4, the voice talkback initiator sends the SRTP voice data packet after being packaged to a corresponding talkback voice server in the talkback voice server cluster through a network;
step 5, the talkback voice server receives the SRTP voice data packet and forwards the SRTP voice data packet to a corresponding voice talkback receiver or forwards the SRTP voice data packet to a group consisting of voice talkback receivers;
step 6, the talkback voice server caches the SRTP voice data packets sent by the voice talkback initiator to the local server, until all the SRTP voice data packets are cached, the talkback voice server decrypts an MKI and an authentication tag from the encrypted SRTP voice data packets according to a private key provided by the voice talkback receiver, acquires talkback voice data according to the MKI and the authentication tag, and finally stores the talkback voice data in a local file;
and 7, the talkback voice server merges and stores the talkback voice data obtained after decryption into the HDFS.
2. The method according to claim 1, wherein the method for implementing network talk-back security mechanism based on SRTP comprises: the step 7 specifically comprises the following steps:
the talkback voice server periodically checks the talkback voice data in the local file, judges whether the talkback voice data needs to be stored in the HDFS according to a threshold value set by the talkback voice server, and stores all the talkback voice data on the HDFS in an integrated and scattered mode if the data volume of the talkback voice data in the current local file reaches the set threshold value; and if the data volume of the talkback voice data in the current local file is smaller than the set threshold, not performing file merging operation and continuously waiting for the next checking operation.
3. The method according to claim 1, wherein the method for implementing network talk-back security mechanism based on SRTP comprises: the step 7 of merging and storing the talkback voice data into the HDFS, wherein after merging and before storing the talkback voice data into the HDFS, the method further includes: establishing an index file for the combined talkback voice data, encrypting each index file by adopting an RSA algorithm, verifying the authority when the user acquires the talkback voice data, and if the user is an unauthorized party, not acquiring the index record, thereby not acquiring the specific talkback voice data; and if the user is the authorized party, the talkback voice data is obtained through the index file.
4. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the program performs the steps of:
step 1, a voice talkback initiator acquires an RSA public key of a voice talkback receiver;
step 2, the voice talkback initiator collects talkback voice data and sets talkback voice data packets according to the packet size of the SRTP voice data packets;
step 3, the voice talkback initiator encapsulates the talkback voice data obtained after grouping into an SRTP voice data packet and carries out encryption processing; the encryption processing specifically comprises: filling an SRTP fixed head, then encrypting the MKI and the authentication tag in the SRTP voice data packet by using an RSA encryption algorithm according to the obtained RSA public key, and covering the encrypted result on the positions of the original MKI and the authentication tag;
step 4, the voice talkback initiator sends the SRTP voice data packet after being packaged to a corresponding talkback voice server in the talkback voice server cluster through a network;
step 5, the talkback voice server receives the SRTP voice data packet and forwards the SRTP voice data packet to a corresponding voice talkback receiver or forwards the SRTP voice data packet to a group consisting of voice talkback receivers;
step 6, the talkback voice server caches the SRTP voice data packets sent by the voice talkback initiator to the local server, until all the SRTP voice data packets are cached, the talkback voice server decrypts an MKI and an authentication tag from the encrypted SRTP voice data packets according to a private key provided by the voice talkback receiver, acquires talkback voice data according to the MKI and the authentication tag, and finally stores the talkback voice data in a local file;
and 7, the talkback voice server merges and stores the talkback voice data obtained after decryption into the HDFS.
5. A computer device according to claim 4, wherein: the step 7 specifically comprises the following steps:
the talkback voice server periodically checks the talkback voice data in the local file, judges whether the talkback voice data needs to be stored in the HDFS according to a threshold value set by the talkback voice server, and stores all the talkback voice data on the HDFS in an integrated and scattered mode if the data volume of the talkback voice data in the current local file reaches the set threshold value; and if the data volume of the talkback voice data in the current local file is smaller than the set threshold, not performing file merging operation and continuously waiting for the next checking operation.
6. A computer device according to claim 4, wherein: the step 7 of merging and storing the talkback voice data into the HDFS, wherein after merging and before storing the talkback voice data into the HDFS, the method further includes: establishing an index file for the combined talkback voice data, encrypting each index file by adopting an RSA algorithm, verifying the authority when the user acquires the talkback voice data, and if the user is an unauthorized party, not acquiring the index record, thereby not acquiring the specific talkback voice data; and if the user is the authorized party, the talkback voice data is obtained through the index file.
7. A system for realizing network talkback security mechanism based on SRTP is characterized in that: the system comprises a public key acquisition module, a data preparation module, a data packaging module and a data transmission module on an interphone terminal, and a data forwarding module, a local cache module and a distributed storage module on an interphone voice server cluster;
the public key acquisition module is used for the voice talkback initiator to acquire an RSA public key of the voice talkback receiver;
the data preparation module is used for collecting talkback voice data by a voice talkback initiator and setting talkback voice data packets according to the packet size of the SRTP voice data packet;
the data encapsulation module is used for encapsulating the talkback voice data obtained after grouping into an SRTP voice data packet by the voice talkback initiator and carrying out encryption processing; the encryption processing specifically comprises: filling an SRTP fixed head, then encrypting the MKI and the authentication tag in the SRTP voice data packet by using an RSA encryption algorithm according to the obtained RSA public key, and covering the encrypted result on the positions of the original MKI and the authentication tag;
the data transmission module is used for the voice talkback initiator to send the SRTP voice data packet after being packaged to a corresponding talkback voice server in the talkback voice server cluster through a network;
the data forwarding module is used for receiving the SRTP voice data packet by the talkback voice server and forwarding the SRTP voice data packet to a corresponding voice talkback receiver or forwarding the SRTP voice data packet to a group consisting of voice talkback receivers;
the local cache module is used for caching the SRTP voice data packet sent by the voice talkback initiator to the local of the server by the talkback voice server until all the SRTP voice data packets are cached, decrypting an MKI and an authentication tag from the encrypted SRTP voice data packet by the talkback voice server according to a private key provided by the voice talkback receiver, acquiring talkback voice data according to the MKI and the authentication tag, and finally storing the talkback voice data in a local file;
and the distributed storage module is used for merging and storing the decrypted talkback voice data into the HDFS by the talkback voice server.
CN201910136732.6A 2019-02-25 2019-02-25 Method, equipment and system for realizing network talkback security mechanism based on SRTP Active CN109660568B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910136732.6A CN109660568B (en) 2019-02-25 2019-02-25 Method, equipment and system for realizing network talkback security mechanism based on SRTP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910136732.6A CN109660568B (en) 2019-02-25 2019-02-25 Method, equipment and system for realizing network talkback security mechanism based on SRTP

Publications (2)

Publication Number Publication Date
CN109660568A CN109660568A (en) 2019-04-19
CN109660568B true CN109660568B (en) 2021-04-30

Family

ID=66122903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910136732.6A Active CN109660568B (en) 2019-02-25 2019-02-25 Method, equipment and system for realizing network talkback security mechanism based on SRTP

Country Status (1)

Country Link
CN (1) CN109660568B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110176235B (en) * 2019-05-23 2022-02-01 腾讯科技(深圳)有限公司 Method and device for displaying voice recognition text, storage medium and computer equipment
CN111262837B (en) * 2020-01-09 2023-04-11 奇安信科技集团股份有限公司 Data encryption method, data decryption method, system, equipment and medium
CN114173213A (en) * 2021-12-10 2022-03-11 善理通益信息科技(深圳)有限公司 Websocket-based voice quality optimization method and talkback terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7730309B2 (en) * 2005-07-27 2010-06-01 Zimmermann Philip R Method and system for key management in voice over internet protocol
US10356059B2 (en) * 2015-06-04 2019-07-16 Nagravision S.A. Methods and systems for communication-session arrangement on behalf of cryptographic endpoints
CN105049788A (en) * 2015-06-08 2015-11-11 深圳市盛烽科技有限公司 Intelligent visual electronic doorbell and operation method thereof
CN105488887A (en) * 2015-12-28 2016-04-13 慧锐通智能科技股份有限公司 Entrance guard access control method
CN107277456B (en) * 2017-07-26 2020-04-17 北京计算机技术及应用研究所 Safe video monitoring system based on Android equipment

Also Published As

Publication number Publication date
CN109660568A (en) 2019-04-19

Similar Documents

Publication Publication Date Title
US10581599B2 (en) Cloud storage method and system
US7680281B2 (en) Method and apparatus for intercepting events in a communication system
US10650119B2 (en) Multimedia data processing method, apparatus, system, and storage medium
CN109660568B (en) Method, equipment and system for realizing network talkback security mechanism based on SRTP
WO2011135529A2 (en) Method and nodes for providing secure access to cloud computing for mobile users
CN110213669B (en) Video content anti-theft system and method based on TS (transport stream) slices
CN109743170B (en) Method and device for logging in streaming media and encrypting data transmission
WO2017039785A2 (en) Apparatus and method for secure file transfer
CN112436936B (en) Cloud storage method and system with quantum encryption function
CN110061962A (en) A kind of method and apparatus of video stream data transmission
CN113727058A (en) Multimedia conference data processing method, system, equipment and storage medium
US7886160B2 (en) Information processing apparatus and method, and computer program
CN107769918B (en) Safe cloud data multi-copy association deletion method
US8739306B2 (en) System and method for accessing private digital content
Zhu et al. An edge re‐encryption‐based access control mechanism in NDN
US20170201493A1 (en) System and method for secure and anonymous communication in a network
CN101877709A (en) Multi-media safety signaling system
EP2713576A1 (en) Method and device for processing streaming media content
CN109698966B (en) Method and device for logging in streaming media and interactively encrypting data
CN108965939A (en) Media data processing method, device, system and readable storage medium storing program for executing
Yang et al. Identity authentication system for mobile terminal equipment based on SDN network
Zhao et al. Research on Information Security Release Scheme of Metro Intelligent Passenger Service
CN114866527B (en) Data processing method, device and system
WO2023221856A1 (en) Quantum secure communication method and device, quantum password service network, and communication system
US20240097903A1 (en) Ipcon mcdata session establishment method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant