CN110475095A - A kind of conference control method, device, equipment and readable storage medium storing program for executing - Google Patents

A kind of conference control method, device, equipment and readable storage medium storing program for executing Download PDF

Info

Publication number
CN110475095A
CN110475095A CN201910773956.8A CN201910773956A CN110475095A CN 110475095 A CN110475095 A CN 110475095A CN 201910773956 A CN201910773956 A CN 201910773956A CN 110475095 A CN110475095 A CN 110475095A
Authority
CN
China
Prior art keywords
target
meeting
terminal
random number
control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910773956.8A
Other languages
Chinese (zh)
Inventor
陈刘刘
吴虎
芮义根
许世林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Kodak Technology Co Ltd
Suzhou Keda Technology Co Ltd
Original Assignee
Suzhou Kodak Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Kodak Technology Co Ltd filed Critical Suzhou Kodak Technology Co Ltd
Priority to CN201910773956.8A priority Critical patent/CN110475095A/en
Publication of CN110475095A publication Critical patent/CN110475095A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems

Abstract

The invention discloses a kind of conference control method, this method carries out data interaction by the terminal of attending a meeting of the target with target meeting, and the terminal that can attend a meeting with target generates identical symmetric key respectively.Then, it when realizing Conference control, is encrypted using symmetric key to data can be controlled, and the encrypted ciphertext data that can control is added in info message, the terminal that obtains can attending a meeting with target carries out safety and can control the info interacted that message can be controlled.It has been encrypted by symmetric key since info can control the meeting control data in message, thus this, which can control data and is only capable of being held the target of identical symmetric key, attends a meeting terminal deciphering, thus, even if info can control message by unauthorized person packet capturing, the unauthorized person, which can not also obtain, can accurately control data, and can control the private information in data.The invention also discloses a kind of Conference control device, equipment and readable storage medium storing program for executing, have corresponding technical effect.

Description

A kind of conference control method, device, equipment and readable storage medium storing program for executing
Technical field
The present invention relates to technical field of communication safety and comprising, more particularly to a kind of conference control method, device, equipment and readable Storage medium.
Background technique
Video network communication common protocol mainly has h323 agreement and Session Initiation Protocol.Wherein, and Session Initiation Protocol application is more clever Living, scalability is strong, and sip protocol gradually is doted on by more and more video signal developers.
But in terms of Conference control of the sip protocol in multipoint conference, considerably less, i.e. sip is told about inside standard document Agreement does not do good explanation in terms of the control of multipoint conference, and the meeting control signaling of standard, does not merely provide one kind Info expansible message, each manufacturer are different to the positioning of info message, and practical application is also different.Using info message into It,, can be easy by packet capturing without very strong bound due to sip protocol is easy to expand when row Conference control Ground knows that the meeting control content of transmission, data are easy leakage, can say without safety.And can control the part attribute in content can be related to The private information of meeting, is protected, and cannot be leaked.
It is that current those skilled in the art are badly in need of solving in conclusion how to efficiently solve the problems such as controlling safety The technical issues of.
Summary of the invention
The object of the present invention is to provide a kind of conference control method, device, equipment and readable storage medium storing program for executing, by info Data can be controlled in information to be encrypted, to avoid that can control leaking data, can ensure can control safety.
In order to solve the above technical problems, the invention provides the following technical scheme:
A kind of conference control method, comprising:
With the target of target meeting attend a meeting terminal carry out data interaction, and with the target attend a meeting terminal generate respectively it is identical Symmetric key;
It is encrypted using the symmetric key to data can be controlled, acquisition can control ciphertext data;
The ciphertext data that can control are added in info message, message can be controlled by obtaining info;
Message can be controlled using the info and target terminal of attending a meeting carries out that interaction can be controlled, and the target meeting is carried out Control.
Preferably, the terminal of attending a meeting with target meeting target carries out data interaction, and attends a meeting terminal with the target Identical symmetric key is generated respectively, comprising:
It carries out secure data using key and the target terminal of attending a meeting and interact, acquisition is for generating the symmetric key Target random number;
Terminal is attended a meeting respectively according to the generation of identical key generation strategy using the target random number, and with the target The symmetric key.
Preferably, described to carry out secure data using key and the target terminal of attending a meeting and interact, acquisition is for generating State the target random number of symmetric key, comprising:
The Conference ID generation target cipher key for the terminal utilization target meeting of attending a meeting with the target;
It carries out secure data using the target cipher key and the target terminal of attending a meeting and interacts, it is random to obtain the target Number.
Preferably, it carries out secure data using the target cipher key and the target terminal of attending a meeting and interacts, obtain the mesh Mark random number, comprising:
The target meeting terminal is received using the random number ciphertext sent after target cipher key encryption;
The random number ciphertext is decrypted using the target cipher key, obtains the target random number.
Preferably, it carries out secure data using the target cipher key and the target terminal of attending a meeting and interacts, obtain the mesh Mark random number, comprising:
Receive the target attend a meeting terminal transmission the first random number ciphertext, and using the target cipher key to described first Random number ciphertext is decrypted, and obtains the first random number;
The second random number and public and private key pair are generated, using the target cipher key to second random number and described public and private The public key of cipher key pair is encrypted, and the second random number ciphertext and public key cryptography that encryption obtains are sent to the target meeting Discuss terminal;
Receive the target attend a meeting terminal transmission third random number ciphertext, and using the public and private key to the third Random number ciphertext is decrypted, and obtains third random number;
First random number, second random number and the third random number are combined, the target is obtained Random number.
Preferably, it using the info can control message and target terminal of attending a meeting carries out that interaction can be controlled, comprising:
It sends the info to target terminal of attending a meeting and can control message, so that the target attends a meeting terminal using described right Claim info described in key pair that can control the meeting control ciphertext data in message to be decrypted, acquisition is described to control data;
Receive the target attend a meeting terminal transmission the info can control message;
The meeting control ciphertext data in message can be controlled to the info using the symmetric key to be decrypted, and obtain target ginseng The meeting control data of meeting terminal feedback.
It is preferably, described to send the info to target terminal of attending a meeting and control message, comprising:
It the info can be controlled into message is sent to the target according to XML structure and attend a meeting terminal.
A kind of Conference control device, comprising:
Symmetric key obtain module, for the target with target meeting attend a meeting terminal carry out data interaction, and with the mesh It marks terminal of attending a meeting and generates identical symmetric key respectively;
Encrypting module, for being encrypted using the symmetric key to that can control data, acquisition can control ciphertext data;
Info can control data obtaining module, for the ciphertext data that can control to be added in info message, obtain info Message can be controlled;
Interaction can be controlled and realize module, for message can be controlled using the info and target terminal of attending a meeting carries out that friendship can be controlled Mutually, the target meeting is controlled.
A kind of conference control equipment, comprising:
Memory, for storing computer program;
Processor, the step of above-mentioned conference control method is realized when for executing the computer program.
A kind of readable storage medium storing program for executing is stored with computer program, the computer program quilt on the readable storage medium storing program for executing The step of processor realizes above-mentioned conference control method when executing.
Using method provided by the embodiment of the present invention, data interaction is carried out with the target of target meeting terminal of attending a meeting, and Identical symmetric key is generated respectively with target terminal of attending a meeting;It is encrypted using symmetric key to data can be controlled, acquisition can be controlled Ciphertext data;Ciphertext data will be controlled to be added in info message, message can be controlled by obtaining info;Message and mesh can be controlled using info It marks terminal of attending a meeting to carry out that interaction can be controlled, target meeting is controlled.
In the method, by the target with target meeting attend a meeting terminal carry out data interaction, can attend a meeting terminal with target Identical symmetric key is generated respectively.Then, it when realizing Conference control, is encrypted using symmetric key to data can be controlled, And the encrypted ciphertext data that can control are added in info message, the terminal that obtains can attending a meeting with target, which carries out safety, can control interaction Info can control message.It has been encrypted by symmetric key since info can control the meeting control data in message, thus this can control number It attends a meeting terminal deciphering according to the target for being only capable of being held identical symmetric key, thus, even if info can control message and be grabbed by unauthorized person Packet, which, which can not also obtain, can accurately control data, and can control the private information in data.
Correspondingly, the embodiment of the invention also provides Conference control device corresponding with above-mentioned conference control method, set Standby and readable storage medium storing program for executing, has above-mentioned technique effect, and details are not described herein.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow chart of conference control method in the embodiment of the present invention;
Fig. 2 is that target cipher key generates schematic diagram in the embodiment of the present invention;
Fig. 3 is a kind of specific implementation schematic diagram of conference control method in the embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of Conference control device in the embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of conference control equipment in the embodiment of the present invention;
Fig. 6 is a kind of structural schematic diagram of conference control equipment in the embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description The present invention is described in further detail.Obviously, described embodiments are only a part of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Embodiment one:
Referring to FIG. 1, Fig. 1 is a kind of flow chart of conference control method in the embodiment of the present invention, this method be can be applied to (property server or virtual server of such as meeting platform), hereinafter referred to as platform, this method packet in the equipment of meeting platform Include following steps:
S101, terminal of attending a meeting with the target of target meeting carry out data interaction, and generate phase respectively with target terminal of attending a meeting Same symmetric key.
It in embodiments of the present invention, can be 3 or 3 with last to the terminal quantity of attending a meeting of target meeting, and to ginseng The specific device type of meeting terminal is without limitation.When carrying out Conference control, the terminal of attending a meeting of target meeting is needed to all refer to wherein, In order to ensure the safety that can control data, can control between platform and each terminal of attending a meeting when interacting, it can be using this Conference control method provided by inventive embodiments is handled and is transmitted to that can control data.For ease of description, in the present embodiment In only list any one terminal of attending a meeting in platform and target meeting, i.e. the target meeting control between terminal of attending a meeting was realized The interactive process of journey, remaining attend a meeting terminal and platform can refer to and this.
Wherein, symmetric key encryption, also known as private key encryption or session key Encryption Algorithm, the i.e. sender of information and reception Side goes encrypting and decrypting data using the same key, has enciphering/deciphering speed fast, is suitable for encrypting big data quantity Feature.In embodiments of the present invention, to avoid the occurrence of by symmetric key when platform and target are attended a meeting and synchronized between terminal, Lead to being intercepted and captured by illegal user to this key by network transmission, in embodiments of the present invention respectively using platform and terminal The mode of identical symmetric key is generated to realize the synchronization to this key.
Generate the specific implementation of symmetric key, comprising:
Step 1: carrying out secure data using key and target terminal of attending a meeting and interact, acquisition is for generating symmetric key Target random number.
Step 2: attending a meeting terminal respectively according to the generation of identical key generation strategy using target random number, and with target Symmetric key.
It is illustrated for ease of description, below combining above-mentioned two step.
Cipher key processes are generated, platform and target terminal of attending a meeting is needed respectively to hold identical target random number, are based on the mesh Random number is marked under identical key generation strategy, symmetric key can be generated.
It, can benefit in order to ensure that target random data synchronizes interactive process and be not stolen in platform and target terminal of attending a meeting It is encrypted with the data interaction carried out between terminal of attending a meeting of key pair platform and target, to avoid leaking data.It is preferred that Ground, the key from stealing, can be individually created one for attending a meeting end to platform and target in order to prevent for each multipoint conference The key that the data interaction carried out between end encrypts.In view of can generate when multipoint conference is created each time One unique identifier is as Conference ID.In embodiments of the present invention, target cipher key is generated using the Conference ID, be then based on The target cipher key completes the safety encryption in data exchange process.The acquisition process of the target random number can include:
Step 1, terminal of attending a meeting with target utilize the Conference ID of target meeting to generate target cipher key;
Step 2, terminal of being attended a meeting using target cipher key and target are carried out secure data and interacts, acquisition target random number.
One multipoint conference or point-to-point meeting have one uniquely after meeting is driven, in conference process Conference ID (i.e. call-id) identifies this meeting.For purposes of illustration only, below by taking a specific Conference ID as an example, it is close to target Key generating process is described in detail.
Referring to FIG. 2, Fig. 2 is that target cipher key generates schematic diagram in the embodiment of the present invention.When the call-id of target meeting is When 5c920fccb05349cc9de9a8ca3d22dace, call-id value every two byte can be put together, it can be by every two A byte homologous segment carries out serial number, i.e. the call-id points are: 5c, 92,0f, cc, b0,53,49, cc, 9d, e9, a8, Ca, 3d, 22, da, ce, reference numeral are 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16;Then take out 6 Segment, 6 subscripts are subject to even number that is, 2,4,6,8,10 corresponding segments to the segment in the past: 92, cc, 53, cc, e9, ca, and weight New composition: 92-cc-53cc-e9-ca, using 92-cc-53cc-e9-ca as key corresponding when key generation, and by generation Key A is as target cipher key.
It should be noted that in other embodiments of the invention, can also modify specific in above-mentioned key generating mode Realization process, for example, segment division mode can be also 1 segment for 3 bytes, it, can also be according to other screenings when selecting segment Mode filters out several segments.Certainly, in embodiments of the present invention, it is close using Conference ID generation target that other modes also can be used Key.
After generating target cipher key, data can be exchanged between target meeting terminal and platform, to ensure platform and target Conference terminal holds identical target random number.
The target random number can be generated by platform, and target meeting terminal is safely fed back to using target cipher key, to protect Barrier platform and target meeting terminal hold corresponding target random number;The target random number can also have the generation of target meeting terminal, And platform is fed back to using target cipher key safety, to ensure that platform and target meeting terminal hold corresponding target random number.
Below to target attend a meeting terminal generate target random number and with platform synchronize be described in detail.
Step 1., receive target meeting terminal using the random number ciphertext that sends after target cipher key encryption;
2., using target cipher key to random number ciphertext step is decrypted, obtain target random number.
After i.e. target meeting terminal generates target random number, target random number is added using target cipher key first It is close, and platform is sent to after the completion of encryption.After platform receives random number ciphertext, using target cipher key to random number ciphertext into Row decryption, obtains target random number.In this way, platform can obtain target random number identical with target meeting terminal.Correspondingly, The mode that platform generates target random number can also refer to and this, and this is no longer going to repeat them.
Preferably, during to avoid because carrying out encrypted transmission to complete object random number using target cipher key, target is close Key is compromised and target random number is caused to be intercepted, which can also be cooperated jointly life by platform and target meeting terminal At to avoid complete object random number is transmitted between platform and target meeting terminal.
Below to platform and target attend a meeting terminal collaboration generate target random number a kind of implementation be described in detail, Include:
Step 1., receive target and attend a meeting the first random number ciphertext of terminal transmission, and it is random to first using target cipher key Number ciphertext is decrypted, and obtains the first random number;
Step 2., generate the second random number and public and private key pair, using target cipher key to the second random number and public and private key The public key of centering is encrypted, and the second random number ciphertext and public key cryptography that encryption obtains are sent to target meeting terminal;
Step 3., receive target attend a meeting terminal transmission third random number ciphertext, and using public and private key it is random to third Number ciphertext is decrypted, and obtains third random number;
4., to the first random number, the second random number and third random number step is combined, obtain target random number.
From above-mentioned steps as it can be seen that the first random number, the third random number of composition target random number are given birth to by target meeting terminal At, and the second random number is generated by platform, in this way, only transmitting one of target random number every time in transmission data procedures Point content, rather than full content, can ensure data safety.In addition, transmitting the second random number to avoid leaking because of target cipher key When to target meeting terminal, can also can be used for encrypting the public key of third random number to target meeting terminal transmission so that third with Machine number ciphertext is only capable of being decoded by platform, further ensures the random data safety of target.Wherein, the first random number, second random Several and third random number digit and without limitation, such as can be 8 random numbers, 24 targets finally obtained are random Number.
When generating target random number, simple concatenation simply can be carried out according to first, second, and third sequence, it can also be again It is secondary that logical operation is carried out to these three random numbers, obtain increasingly complex target random number.Certainly, complicated fortune is if desired carried out It calculates, then platform and target meeting terminal is needed to carry out identical logical operation, to ensure that platform and target meeting terminal are each self-holding Some target random numbers are consistent.
It should be noted that describing a kind of mode of one target random number of three generating random numbers, In in this instance In practical application, can also generate at least one random number by target meeting terminal, platform generates at least one random number, platform and Target meeting terminal synchronizes random number generated, and according to identical logical process mode, obtain an identical target with Machine number.
In embodiments of the present invention, the digit of the generating mode to target random number and target random number does not limit It is fixed.Preferably, in order to further ensure the safety of symmetric key, can be screened by random number, ensure target terminal equipment and The target random number that platform is held is different from the target random number that target terminal equipment last time multipoint conference obtains, and can also lead to certainly It crosses and is compared with other of target meeting corresponding target random number of terminal of attending a meeting, so that terminal of finally each attending a meeting corresponds to mesh Mark random number is all different.I.e. platform finally hold about the target random number of target meeting and the terminal of attending a meeting of target meeting Quantity is identical, and different between each target random number.
After obtaining target random number, platform and target meeting terminal can use identical key generation strategy, generate The symmetric key.Key generation strategy is not limited in embodiments of the present invention, it is only necessary to which platform and target meeting terminal use Identical key generation strategy is to target generating random number symmetric key.
S102, it is encrypted using symmetric key to data can be controlled, acquisition can control ciphertext data.
After obtaining symmetric key, platform can be encrypted to that can control data, can control ciphertext data to obtain.
Wherein, can control data may include conventional meeting attribute and chairman's attribute.Specifically, meeting attribute may include meeting The parameters such as audio mix characteristic, TV news mixed characteristic, Video coding mode and video image size;Chairman's attribute may include Chairman's sound, video media stream and its direction, and the instruction whether being shown in more split screens and display area.
S103, it ciphertext data will be controlled is added in info message, message can be controlled by obtaining info.
In embodiments of the present invention, the interaction that can control data can be completed by the scalability of info message.Unexpectedly, Ciphertext data can will be controlled to be added in info message.Disappear for purposes of illustration only, the info that can control ciphertext data will be added to herein Breath, which is known as info, can control message.
S104, message can be controlled using info and target terminal of attending a meeting carries out that interaction can be controlled, target meeting is controlled.
When carrying out can control, then it using the info can control message and target terminal of attending a meeting carries out that interaction can be controlled, ensure meeting Control the safety of data.
Wherein, interaction can be controlled, comprising:
Step 1: sending info to target terminal of attending a meeting and can control message, so that target attends a meeting terminal using symmetric key pair Info can control the meeting control ciphertext data in message and be decrypted, and acquisition can control data;
Step 2: reception target is attended a meeting, the info of terminal transmission can control message;
It is decrypted Step 3: the meeting control ciphertext data in message can be controlled to info using symmetric key, obtains target ginseng The meeting control data of meeting terminal feedback.
When carrying out to control interactive between platform and target meeting terminal, that is, data can be controlled to this key pair by, which using, adds Decryption, and ciphertext data can be controlled using the transmission of info message.
Preferably, message can be controlled to info for the ease of platform and target meeting terminal to parse, XML format can be used Message can be controlled to info to transmit.I.e. to target attend a meeting terminal send info can control message, info specially can be controlled into message Target is sent to according to XML structure to attend a meeting terminal.
Wherein, XML structure can are as follows:
Wherein, message number is put inside eventid, is what message attributes for distinguishing, the specific meeting deposited inside body Discuss the content of message, i.e., it is encrypted to control data.
For example, message number is 149, using the ciphertext data after base64 coding encrypting, following format can refer in platform And target is attended a meeting and is interacted between terminal.
To more fully understand conference control method provided by the embodiment of the present invention convenient for those skilled in the art, below with It is provided for the embodiments of the invention conference control method for concrete application scene in conjunction with multipoint conference, carries out specifically It is bright.
Referring to FIG. 3, Fig. 3 is a kind of specific implementation schematic diagram of conference control method in the embodiment of the present invention.
Due to being multipoint conference, calling and called can not be distinguished, key can be initiated by terminal (i.e. with above-mentioned target attend a meeting terminal) Negotiate.
To ensure data safety, when meeting is established, platform produces a pair of of public and private key.
The realization process includes:
Step 1, terminal will be encrypted "+8 random numbers of fixed news number are sent to platform " using target cipher key;
Wherein, the generating mode of target cipher key can design parameter it is above, details are not described herein.
Sampled targets key encrypted "+8 random number+fixed news number of platform public key " is sent to by step 2, platform Terminal.
Step 3, terminal are sent to platform using " the 8 random number+fixed news number " after platform public key encryption.
By above-mentioned 3 steps, platform and terminal save 3 random numbers.
Step 4, platform and terminal utilize 3 random numbers, generate symmetric key using identical algorithm.
Data can be controlled using to the encryption of this key between step 5, platform and terminal, realization communicates with each other, to carry out meeting Control.
Using method provided by the embodiment of the present invention, data interaction is carried out with the target of target meeting terminal of attending a meeting, and Identical symmetric key is generated respectively with target terminal of attending a meeting;It is encrypted using symmetric key to data can be controlled, acquisition can be controlled Ciphertext data;Ciphertext data will be controlled to be added in info message, message can be controlled by obtaining info;Message and mesh can be controlled using info It marks terminal of attending a meeting to carry out that interaction can be controlled, target meeting is controlled.
In the method, by the target with target meeting attend a meeting terminal carry out data interaction, can attend a meeting terminal with target Identical symmetric key is generated respectively.Then, it when realizing Conference control, is encrypted using symmetric key to data can be controlled, And the encrypted ciphertext data that can control are added in info message, the terminal that obtains can attending a meeting with target, which carries out safety, can control interaction Info can control message.It has been encrypted by symmetric key since info can control the meeting control data in message, thus this can control number It attends a meeting terminal deciphering according to the target for being only capable of being held identical symmetric key, thus, even if info can control message and be grabbed by unauthorized person Packet, which, which can not also obtain, can accurately control data, and can control the private information in data.
Embodiment two:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of Conference control devices, are described below Conference control device can correspond to each other reference with above-described conference control method.
Shown in Figure 4, which comprises the following modules:
Symmetric key obtains module 101, carries out data interaction, and and target for the terminal of attending a meeting of the target with target meeting Terminal of attending a meeting generates identical symmetric key respectively;
Encrypting module 102, for being encrypted using symmetric key to that can control data, acquisition can control ciphertext data;
Info can control data obtaining module 103, be added in info message for that will control ciphertext data, obtain info meeting Control message;
Interaction can be controlled and realize module 104, it is right for message can be controlled using info and target terminal of attending a meeting carries out that interaction can be controlled Target meeting is controlled.
Using device provided by the embodiment of the present invention, data interaction is carried out with the target of target meeting terminal of attending a meeting, and Identical symmetric key is generated respectively with target terminal of attending a meeting;It is encrypted using symmetric key to data can be controlled, acquisition can be controlled Ciphertext data;Ciphertext data will be controlled to be added in info message, message can be controlled by obtaining info;Message and mesh can be controlled using info It marks terminal of attending a meeting to carry out that interaction can be controlled, target meeting is controlled.
In the present apparatus, by the target with target meeting attend a meeting terminal carry out data interaction, can attend a meeting terminal with target Identical symmetric key is generated respectively.Then, it when realizing Conference control, is encrypted using symmetric key to data can be controlled, And the encrypted ciphertext data that can control are added in info message, the terminal that obtains can attending a meeting with target, which carries out safety, can control interaction Info can control message.It has been encrypted by symmetric key since info can control the meeting control data in message, thus this can control number It attends a meeting terminal deciphering according to the target for being only capable of being held identical symmetric key, thus, even if info can control message and be grabbed by unauthorized person Packet, which, which can not also obtain, can accurately control data, and can control the private information in data.
In a kind of specific embodiment of the invention, symmetric key obtains module 101, comprising:
Target random number acquiring unit is used for carrying out secure data using key and target terminal of attending a meeting and interacting In the target random number for generating symmetric key;
Symmetric key acquiring unit for utilizing target random number, and attends a meeting terminal respectively according to identical close with target Key generation strategy generates symmetric key.
In a kind of specific embodiment of the invention, target random number acquiring unit, specifically for attending a meeting end with target End generates target cipher key using the Conference ID of target meeting;Secure data friendship is carried out using target cipher key and target terminal of attending a meeting Mutually, target random number is obtained.
In a kind of specific embodiment of the invention, target random number acquiring unit is specifically used for receiving target meeting Terminal utilizes the random number ciphertext sent after target cipher key encryption;Random number ciphertext is decrypted using target cipher key, is obtained Target random number.
In a kind of specific embodiment of the invention, target random number acquiring unit, specifically for including:
Receive target attend a meeting terminal transmission the first random number ciphertext, and using target cipher key to the first random number ciphertext into Row decryption, obtains the first random number;The second random number and public and private key pair are generated, using target cipher key to the second random number and public affairs The public key of private key centering is encrypted, and the second random number ciphertext and public key cryptography that encryption obtains are sent to target meeting Terminal;Receive target attend a meeting terminal transmission third random number ciphertext, and using public and private key to third random number ciphertext progress Decryption obtains third random number;First random number, the second random number and third random number are combined, it is random to obtain target Number.
In a kind of specific embodiment of the invention, interaction can be controlled and realize module 104, comprising:
Data sending processing unit can be controlled, for target attend a meeting terminal send info can control message, so that target is attended a meeting Terminal can control the meeting control ciphertext data in message to info using symmetric key and be decrypted, and acquisition can control data;
Data reception processing unit can be controlled, for receive target attend a meeting terminal transmission info can control message;Using symmetrical Key pair info can control the meeting control ciphertext data in message and be decrypted, obtain target attend a meeting terminal feedback meeting control data.
In a kind of specific embodiment of the invention, data sending processing unit can be controlled, specifically for info can be controlled Message is sent to target according to XML structure and attends a meeting terminal.
Embodiment three:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of conference control equipments, are described below A kind of conference control equipment can correspond to each other reference with a kind of above-described conference control method.
Shown in Figure 5, which includes:
Memory D1, for storing computer program;
Processor D2, when for executing computer program the step of the conference control method of realization above method embodiment.
Specifically, referring to FIG. 6, Fig. 6 be a kind of concrete structure schematic diagram of conference control equipment provided in this embodiment, The conference control equipment can generate bigger difference because configuration or performance are different, may include one or more processing Device (central processing units, CPU) 322 (for example, one or more processors) and memory 332, one (such as one or more mass memories of storage medium 330 of a or more than one storage application program 342 or data 344 Equipment).Wherein, memory 332 and storage medium 330 can be of short duration storage or persistent storage.It is stored in storage medium 330 Program may include one or more modules (diagram does not mark), and each module may include in data processing equipment Series of instructions operation.Further, central processing unit 322 can be set to communicate with storage medium 330, in Conference control The series of instructions operation in storage medium 330 is executed in equipment 301.
Conference control equipment 301 can also include one or more power supplys 326, one or more wired or nothings Wired network interface 350, one or more input/output interfaces 358, and/or, one or more operating systems 341. For example, Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in conference control method as described above can be realized by the structure of conference control equipment.
Example IV:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of readable storage medium storing program for executing, are described below A kind of readable storage medium storing program for executing can correspond to each other reference with a kind of above-described conference control method.
A kind of readable storage medium storing program for executing is stored with computer program on readable storage medium storing program for executing, and computer program is held by processor The step of conference control method of above method embodiment is realized when row.
The readable storage medium storing program for executing be specifically as follows USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), the various program storage generations such as random access memory (Random Access Memory, RAM), magnetic or disk The readable storage medium storing program for executing of code.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.

Claims (10)

1. a kind of conference control method characterized by comprising
With the target of target meeting attend a meeting terminal carry out data interaction, and with the target attend a meeting terminal generate respectively it is identical right Claim key;
It is encrypted using the symmetric key to data can be controlled, acquisition can control ciphertext data;
The ciphertext data that can control are added in info message, message can be controlled by obtaining info;
Message can be controlled using the info and target terminal of attending a meeting carries out that interaction can be controlled, and the target meeting is controlled System.
2. conference control method according to claim 1, which is characterized in that the terminal of attending a meeting with target meeting target Data interaction is carried out, and generates identical symmetric key respectively with target terminal of attending a meeting, comprising:
It carries out secure data using key and the target terminal of attending a meeting and interacts, obtain the target for generating the symmetric key Random number;
Terminal is attended a meeting respectively according to described in the generation of identical key generation strategy using the target random number, and with the target Symmetric key.
3. conference control method according to claim 2, which is characterized in that described to be attended a meeting end using key and the target End carries out secure data interaction, obtains the target random number for generating the symmetric key, comprising:
The Conference ID generation target cipher key for the terminal utilization target meeting of attending a meeting with the target;
It carries out secure data using the target cipher key and the target terminal of attending a meeting and interacts, obtain the target random number.
4. conference control method according to claim 3, which is characterized in that joined using the target cipher key and the target Meeting terminal carries out secure data interaction, obtains the target random number, comprising:
The target meeting terminal is received using the random number ciphertext sent after target cipher key encryption;
The random number ciphertext is decrypted using the target cipher key, obtains the target random number.
5. conference control method according to claim 3, which is characterized in that joined using the target cipher key and the target Meeting terminal carries out secure data interaction, obtains the target random number, comprising:
It receives the target to attend a meeting the first random number ciphertext of terminal transmission, and random to described first using the target cipher key Number ciphertext is decrypted, and obtains the first random number;
The second random number and public and private key pair are generated, using the target cipher key to second random number and the public and private key The public key of centering is encrypted, and the second random number ciphertext and public key cryptography that encryption obtains are sent to the target meeting end End;
Receive the target attend a meeting terminal transmission third random number ciphertext, and using the public and private key it is random to the third Number ciphertext is decrypted, and obtains third random number;
First random number, second random number and the third random number are combined, it is random to obtain the target Number.
6. conference control method according to claim 1, which is characterized in that message and the mesh can be controlled using the info Terminal of attending a meeting is marked to carry out that interaction can be controlled, comprising:
It sends the info to target terminal of attending a meeting and can control message, so that the target attends a meeting terminal using described symmetrical close Key can control the meeting control ciphertext data in message to the info and be decrypted, and acquisition is described to control data;
Receive the target attend a meeting terminal transmission the info can control message;
The meeting control ciphertext data in message can be controlled to the info using the symmetric key to be decrypted, and are obtained target and are attended a meeting end Hold the meeting control data of feedback.
7. conference control method according to claim 6, which is characterized in that it is described to the target attend a meeting terminal send institute Message can be controlled by stating info, comprising:
It the info can be controlled into message is sent to the target according to XML structure and attend a meeting terminal.
8. a kind of Conference control device characterized by comprising
Symmetric key obtain module, for the target with target meeting attend a meeting terminal carry out data interaction, and with the target join Meeting terminal generates identical symmetric key respectively;
Encrypting module, for being encrypted using the symmetric key to that can control data, acquisition can control ciphertext data;
Info can control data obtaining module, and for the ciphertext data that can control to be added in info message, obtaining info can be controlled Message;
Interaction can be controlled and realize module, for message can be controlled using the info and target terminal of attending a meeting carries out that interaction can be controlled, The target meeting is controlled.
9. a kind of conference control equipment characterized by comprising
Memory, for storing computer program;
Processor, realizing the conference control method as described in any one of claim 1 to 7 when for executing the computer program Step.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter on the readable storage medium storing program for executing It is realized when calculation machine program is executed by processor as described in any one of claim 1 to 7 the step of conference control method.
CN201910773956.8A 2019-08-21 2019-08-21 A kind of conference control method, device, equipment and readable storage medium storing program for executing Pending CN110475095A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910773956.8A CN110475095A (en) 2019-08-21 2019-08-21 A kind of conference control method, device, equipment and readable storage medium storing program for executing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910773956.8A CN110475095A (en) 2019-08-21 2019-08-21 A kind of conference control method, device, equipment and readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
CN110475095A true CN110475095A (en) 2019-11-19

Family

ID=68512312

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910773956.8A Pending CN110475095A (en) 2019-08-21 2019-08-21 A kind of conference control method, device, equipment and readable storage medium storing program for executing

Country Status (1)

Country Link
CN (1) CN110475095A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113656788A (en) * 2021-08-31 2021-11-16 成都卫士通信息产业股份有限公司 Multimedia conference terminal conference-in authentication method, device, equipment and storage medium
CN113660285A (en) * 2021-08-31 2021-11-16 成都卫士通信息产业股份有限公司 Multimedia conference on-line terminal control method, device, equipment and storage medium
WO2023141864A1 (en) * 2022-01-27 2023-08-03 京东方科技集团股份有限公司 Conference data transmission method, apparatus and system, electronic device and readable medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120005475A1 (en) * 2009-03-18 2012-01-05 Brother Kogyo Kabushiki Kaisha Terminal Device, Computer Program Product, and Communication Control Method
CN206743420U (en) * 2017-03-06 2017-12-12 天津市武清区兴科百纳有限公司 Remote Video Conference controls and management system
CN107566397A (en) * 2017-09-28 2018-01-09 深圳市汉普电子技术开发有限公司 Video conference information transferring method, terminal device, server and storage medium
CN108696512A (en) * 2018-04-24 2018-10-23 苏州科达科技股份有限公司 Across encrypted bit stream machinery of consultation, device and the conference facility of agreement
CN108718233A (en) * 2018-03-27 2018-10-30 北京安御道合科技有限公司 A kind of encryption method, computer equipment and storage medium
CN109039628A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120005475A1 (en) * 2009-03-18 2012-01-05 Brother Kogyo Kabushiki Kaisha Terminal Device, Computer Program Product, and Communication Control Method
CN206743420U (en) * 2017-03-06 2017-12-12 天津市武清区兴科百纳有限公司 Remote Video Conference controls and management system
CN107566397A (en) * 2017-09-28 2018-01-09 深圳市汉普电子技术开发有限公司 Video conference information transferring method, terminal device, server and storage medium
CN108718233A (en) * 2018-03-27 2018-10-30 北京安御道合科技有限公司 A kind of encryption method, computer equipment and storage medium
CN108696512A (en) * 2018-04-24 2018-10-23 苏州科达科技股份有限公司 Across encrypted bit stream machinery of consultation, device and the conference facility of agreement
CN109039628A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113656788A (en) * 2021-08-31 2021-11-16 成都卫士通信息产业股份有限公司 Multimedia conference terminal conference-in authentication method, device, equipment and storage medium
CN113660285A (en) * 2021-08-31 2021-11-16 成都卫士通信息产业股份有限公司 Multimedia conference on-line terminal control method, device, equipment and storage medium
CN113656788B (en) * 2021-08-31 2023-10-24 成都卫士通信息产业股份有限公司 Conference participation authentication method, device and equipment for multimedia conference terminal and storage medium
WO2023141864A1 (en) * 2022-01-27 2023-08-03 京东方科技集团股份有限公司 Conference data transmission method, apparatus and system, electronic device and readable medium

Similar Documents

Publication Publication Date Title
US11101999B2 (en) Two-way handshake for key establishment for secure communications
US10541814B2 (en) End-to-end encryption during a secure communication session
US11502816B2 (en) Generating new encryption keys during a secure communication session
EP2056521A1 (en) A method, system and device for achieving multi-party communication security
CN110475095A (en) A kind of conference control method, device, equipment and readable storage medium storing program for executing
US10778432B2 (en) End-to-end encryption during a secure communication session
CN112737774B (en) Data transmission method, device and storage medium in network conference
WO2011163073A1 (en) Secure node admission in a communication network
CN103534975A (en) Discovery of security associations for key management relying on public keys
US20080028204A1 (en) Client server distributed system, client apparatus, server apparatus, and message encryption method used therefor
CN109688573A (en) Exchange method and bluetooth equipment between bluetooth equipment
CN104683304A (en) Processing method, equipment and system of secure communication service
CN109408015A (en) A kind of multimedia file processing method sends terminal and display terminal
CN101958907A (en) Method, system and device for transmitting key
CN111835997B (en) Cloud video conference system based on quantum key encryption and decryption method thereof
US20220078169A1 (en) Methods, systems, and media for providing secure network communications
CN112153641A (en) Secondary authentication enhancement and end-to-end encryption method and system based on edge UPF
CN106559396A (en) Media multicast method and system based on Web real-time Communication for Power
WO2016082401A1 (en) Conversation method and apparatus, user terminal and computer storage medium
CN108768920A (en) A kind of recorded broadcast data processing method and device
CN109889763B (en) Call establishment method, device and storage medium of conference television system
CN112165494A (en) Message analysis method and device, electronic equipment and storage medium
CN101222612A (en) Method and system for safely transmitting media stream
CN102694819A (en) Streaming media transmission method based on broadcast encryption
CN105338286B (en) A kind of secondary flow transmission method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191119

RJ01 Rejection of invention patent application after publication