CN111355921A - Video conference encryption method and system - Google Patents

Video conference encryption method and system Download PDF

Info

Publication number
CN111355921A
CN111355921A CN202010284647.7A CN202010284647A CN111355921A CN 111355921 A CN111355921 A CN 111355921A CN 202010284647 A CN202010284647 A CN 202010284647A CN 111355921 A CN111355921 A CN 111355921A
Authority
CN
China
Prior art keywords
client
conference
key
symmetric key
participating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010284647.7A
Other languages
Chinese (zh)
Inventor
马蓓
冯文澜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suirui Technology Group Co Ltd
Original Assignee
Suirui Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suirui Technology Group Co Ltd filed Critical Suirui Technology Group Co Ltd
Priority to CN202010284647.7A priority Critical patent/CN111355921A/en
Publication of CN111355921A publication Critical patent/CN111355921A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption

Abstract

A video conference encryption method and system comprises the following steps: 1) a client initiates a request for reserving a conference to an conference control server, and the conference control server generates a symmetric key corresponding to the conference; 2) the conference participating client sends a conference joining request to the conference control server; 3) the conference participating client acquires the symmetric key subjected to asymmetric encryption from the conference control server; 4) the participating client carries out asymmetric decryption on the symmetric key subjected to asymmetric encryption to obtain the symmetric key; 5) and the participating client encrypts and/or decrypts the media stream by using the symmetric key. The invention also provides a video conference encryption system, which is used for symmetrically encrypting the conference media stream and asymmetrically encrypting the symmetric key, thereby improving the security of the conference, greatly reducing the possibility of being cracked and reducing the leakage risk.

Description

Video conference encryption method and system
Technical Field
The invention relates to the technical field of network multimedia, in particular to a video conference encryption method and system.
Background
In the communication process of various video conferences in the current market, in a meeting system, communication is generally carried out through a network when a network video conference is carried out, and because various network security problems exist, such as leakage of account passwords, interception of conference contents and other security risks.
Although there are many encryption methods, many are not suitable for the encryption process of the video conference.
Especially for video communication between organizations related to national security, encryption based on national secrets is required, and no encryption method is available at present in the face of such encryption methods.
Disclosure of Invention
In order to solve the defects in the prior art, the invention aims to provide a video conference encryption method and system, after symmetrically encrypting a conference media stream, asymmetrically encrypting a symmetric key again, and particularly based on a national cryptographic algorithm, so that the security of a conference is improved, the possibility of being cracked is greatly reduced, and the leakage risk is reduced.
In order to achieve the above object, the present invention provides a video conference encryption method, which comprises the following steps:
1) a client initiates a request for reserving a conference to an conference control server, and the conference control server generates a symmetric key corresponding to the conference;
2) the conference participating client sends a conference joining request to the conference control server;
3) the conference participating client acquires the symmetric key subjected to asymmetric encryption from the conference control server;
4) the participating client carries out asymmetric decryption on the symmetric key subjected to asymmetric encryption to obtain the symmetric key;
5) and the participating client encrypts and/or decrypts the media stream by using the symmetric key.
Further, before the step 2), further comprising,
each participating client sends the identity identification and the password of the participating client to an identity authentication server, and the identity authentication server generates a participating client public key and a participating client private key corresponding to the participating client;
and the participating client acquires the participating client private key from the identity authentication server.
Further, after the step 2), further comprising,
and the conference control server acquires the public key of the conference participating client from the identity authentication server according to the identity of the conference participating client, and asymmetrically encrypts the symmetric key.
Further, in the step 4), further comprising,
and the participating client side carries out asymmetric decryption by using the participating client side private key to obtain the symmetric key.
Further, the conference control server adopts a symmetric key randomly generated by a cryptographic algorithm.
Further, the participating clients comprise a master client and a slave client;
the main client encrypts the media stream by using the symmetric key and sends the encrypted media stream to the media stream server,
one or more of the slave clients obtain the symmetrically encrypted media stream from the media stream server and decrypt the media stream using the symmetric key.
Furthermore, the conference control server asymmetrically encrypts the symmetric key by using a public key of the host client acquired from the identity authentication server and sends the symmetric key to the host client;
the host client obtains the symmetric key by performing asymmetric decryption using a host client private key obtained from the authentication server,
the conference control server asymmetrically encrypts the symmetric key by using a slave client public key acquired from the identity authentication server and then sends the symmetric key to the slave client;
the slave client performs asymmetric decryption by using a slave client private key acquired from the identity authentication server to acquire the symmetric key.
In order to achieve the above object, the present invention further provides a video conference encryption system, which comprises an conference control server, an identity authentication server, a media stream server and a client, wherein,
the conference control server receives the conference reservation request of the client, generates a symmetric key corresponding to the conference, and sends the asymmetric encrypted symmetric key to the conference participating client;
the identity authentication server receives the identity and the password of the participation client and generates a participation client public key and a participation client private key corresponding to the participation client;
and the participating client encrypts the media stream by using the symmetric key and then sends the encrypted media stream to the media stream server, and acquires the media stream encrypted by using the symmetric key from the media stream server for decryption.
Furthermore, the conference control server acquires a conference client public key corresponding to the conference client from the identity authentication server according to the conference access request of the conference client, and asymmetrically encrypts the symmetric key;
and the participating client acquires the participating client private key corresponding to the participating client from the identity authentication server and decrypts the symmetric key.
To achieve the above object, the present invention further provides a computer readable storage medium having stored thereon computer instructions which, when executed, perform the steps of the video conference encryption method as described above.
The video conference encryption method and the system have the following beneficial effects:
1) the conference media stream is symmetrically encrypted, and the symmetric key is asymmetrically encrypted, so that the security of the conference is improved.
2) The possibility of being cracked is greatly reduced, and the leakage risk is reduced.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flow chart of a video conference encryption method according to the present invention;
fig. 2 is a schematic structural diagram of a video conference encryption system according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example 1
Fig. 1 is a flowchart of a video conference encryption method according to the present invention, and the video conference encryption method of the present invention will be described in detail with reference to fig. 1.
First, in step 101, the host client 40 of the video conference encryption system initiates a reservation request of a symmetric encrypted conference to the conference control server 10, and applies for generating a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference.
In this embodiment, the reservation request sent by the host client 40 of the video conference encryption system includes the identification ID _ a of the host client 40 and the symmetric encrypted conference type.
In step 102, the conference control server 10 of the video conference encryption system generates a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference according to the reservation request sent by the host client 40.
In this embodiment, the symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference is generated by the conference control server 10 according to the symmetric encrypted conference type in the reservation request of each symmetric encrypted conference, and is only effective for the symmetric encrypted conference process. Preferably, the symmetric KEY (SYM _ KEY) is generated by using a cryptographic algorithm, such as the cryptographic SM4 algorithm, so that the possibility of being cracked is greatly reduced.
In step 103, the host client 40 of the videoconference encryption system sends a request to obtain the asymmetric private KEY (PRI _ KEY _ a) to the authentication server 20, and obtains its corresponding asymmetric private KEY (PRI _ KEY _ a) from the authentication server 20.
In this embodiment, the request for obtaining the asymmetric private KEY (PRI _ KEY _ a) sent by the host client 40 includes an identity (ID _ a) of the host client 40 and a password for identity identification.
The authentication server 20 generates an asymmetric public KEY (PUB _ KEY _ a) and an asymmetric private KEY (PRI _ KEY _ a) corresponding to the host client 40 according to the identity and the password of the host client 40.
In this embodiment, the authentication server 20 generates the asymmetric public KEY (PUB _ KEY _ a) and the asymmetric private KEY (PRI _ KEY _ a) by using a cryptographic algorithm, such as the cryptographic SM9 algorithm.
Preferably, in order to ensure the secure transmission of the asymmetric private key corresponding to the client, the asymmetric private key may be transmitted in a non-network manner.
Preferably, in order to ensure that the sending client receives the corresponding asymmetric private key, when the client obtains the asymmetric private key, the identity authentication server performs identity verification by comparing the identity and the password thereof with information already registered on the identity authentication server.
At step 104, the host client 40 sends a conference entry request and an identification to the conference server 10 of the video conference encryption system.
In this embodiment, the host client 40 sends its own identity (ID _ a) to the conference control server 10 of the video conference encryption system to request for conference entry.
In step 105, the conference control server 10, after receiving the conference joining request from the host client 40, obtains the asymmetric public KEY (PUB _ KEY _ a) corresponding to the host client 40 from the authentication server 20 by using the identification (ID _ a) of the host client 40.
In step 106, the conference control server 10 encrypts the symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference by using the asymmetric public KEY (PUB _ KEY _ a) corresponding to the host client 40 and sends the encrypted symmetric KEY (SYM _ KEY) to the host client 40.
In this embodiment, the symmetric KEY is encrypted according to the corresponding asymmetric public KEY (PUB _ KEY _ a) of the client that makes the request after being generated, which ensures that the symmetric KEY is not leaked during transmission, and even if the corresponding public KEY is leaked, the corresponding private KEY cannot be decrypted without the corresponding private KEY.
In step 107, the host client 40 receives the encrypted symmetric KEY, and decrypts the encrypted symmetric KEY using the asymmetric private KEY (PRI _ KEY _ a) obtained in step 103 to obtain the original symmetric KEY (SYM _ KEY).
In step 108, the host client 40 encrypts the media stream of the symmetric encrypted conference using the symmetric KEY (SYM KEY) and transmits the encrypted media stream to the media stream server 30 of the symmetric encrypted conference.
In this embodiment, the host client 40 directly encrypts the media stream after obtaining the symmetric KEY (SYM _ KEY).
In step 109, a get asymmetric private KEY (PRI _ KEY _ B) request is sent from the client 50 to the authentication server 20, and the corresponding asymmetric private KEY (PRI _ KEY _ B) is obtained from the authentication server 20.
In this embodiment, the request for obtaining the asymmetric private KEY (PRI _ KEY _ B) sent from the client 50 to the authentication server 20 includes the identity (ID _ B) of the client 50 and the password used for identification from the client 50.
In this embodiment, the slave client 50 applies for joining the symmetric encrypted conference initiated by the master client 40, sends its own ID _ B and password to the authentication server 20 of the video conference encryption system, and obtains its corresponding asymmetric private KEY PRI _ KEY _ B. In this step, the step is the same as the step in which the host client 40 obtains its corresponding asymmetric private KEY (PRI _ KEY _ a) in step 203.
In step 110, a conference entry request and an identification (ID _ B) are sent from the client 50 to the conference server 10 of the videoconference encryption system.
In this embodiment, the client 50 sends its own identification (ID _ B) to the conference control server 10 of the video conference encryption system to request for conference entry.
In step 111, after receiving the conference entry request from the client 50, the conference control server 10 of the video conference encryption system obtains the asymmetric public KEY PUB _ KEY _ B corresponding to the slave client 50 from the authentication server 20 by using the identification ID _ B and the password of the slave client 50.
In step 112, the conference control server 10 of the video conference encryption system encrypts the symmetric KEY SYM _ KEY of the conference using the asymmetric public KEY PUB _ KEY _ B and sends the encrypted symmetric KEY SYM _ KEY to the slave client 50. In this step, the encrypted symmetric key is obtained from the client 50.
In step 113, the encrypted symmetric KEY is received from the client 50, and decrypted by using the asymmetric private KEY (PRI _ KEY _ B) obtained in step 109 to obtain the original symmetric KEY SYM _ KEY, in which the symmetric KEY is obtained from the client 50.
In step 114, the slave client 50 receives the media stream of the video conference encrypted by the master client 40 from the video conference media stream server 30, and decrypts the media stream using the symmetric KEY SYM _ KEY. In this step, the process of decrypting the symmetric key from the client 50 further reduces the risk of leakage.
Example 2
Fig. 2 is a schematic structural diagram of a video conference encryption system according to the present invention, and as shown in fig. 2, the video conference encryption system of the present invention includes a conference control server 10, an authentication server 20, a media streaming server 30, a master client 40, and a slave client 50, wherein,
the conference control server 10 receives a reservation request of the main client 40 requesting the symmetric encrypted conference, and generates a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference; receiving a conference joining request of the host client 40, and acquiring an asymmetric public KEY (PUB _ KEY _ a) corresponding to the host client 40 from the authentication server 20 by using the identification (ID _ a) of the host client 40; receiving a conference-in request from the client 50, acquiring an asymmetric public KEY (PUB _ KEY _ B) corresponding to the slave client 50 from the authentication server 20 using the identification (ID _ B) of the slave client 50; encrypting a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference by using an asymmetric public KEY (PUB _ KEY _ A) corresponding to the host client 40 and sending the encrypted symmetric KEY (SYM _ KEY) to the host client 40; encrypting a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference by using an asymmetric public KEY (PUB _ KEY _ B) corresponding to the slave client 50 and transmitting the encrypted symmetric KEY (SYM _ KEY) to the slave client 50;
in this embodiment, the conference control server 10 generates a symmetric KEY (SYM _ KEY) by using a cryptographic algorithm (e.g., the cryptographic SM4 algorithm).
The identity authentication server 20 receives a request for acquiring an asymmetric private KEY (PRI _ KEY _ a) sent by the primary client 40, and generates an asymmetric private KEY (PRI _ KEY _ a) corresponding to the primary client 40 according to the identity and the password of the primary client 40; receiving a request for obtaining the asymmetric private KEY (PRI _ KEY _ B) from the client 50, and generating the asymmetric private KEY (PRI _ KEY _ B) corresponding to the client 50 according to the identity and the password of the client 50.
In this embodiment, the request for obtaining the asymmetric private KEY (PRI _ KEY _ a) sent by the primary client 40 includes the identity (ID _ a) of the primary client 40 and the corresponding password that has been registered on the authentication server for identity identification; the request for obtaining the asymmetric private KEY (PRI _ KEY _ B) sent from the client 50 includes the identity (ID _ B) of the client 50 and the corresponding password that has been registered to the authentication server for identification.
In this embodiment, the asymmetric private key method generated by the identity authentication server 20 is generated by using a cryptographic algorithm, such as the cryptographic SM9 algorithm.
A media stream server 30 for storing the media stream encrypted by using a symmetric KEY (SYM _ KEY) transmitted by the host client 40; the media stream encrypted using the symmetric KEY (SYM KEY) is transmitted to the slave client 50.
A master client 40, which sends a symmetric encrypted conference reservation request to the conference control server 10, and applies for generating a symmetric KEY (SYM _ KEY); acquiring a corresponding asymmetric private KEY (PRI _ KEY _ a) from the authentication server 20; sending a conference entering request to the conference control server 10, and receiving a symmetric KEY (SYM _ KEY) encrypted by the conference control server 10 by using an asymmetric public KEY (PUB _ KEY _ a) corresponding to the host client 40; decrypting the symmetric KEY (SYM _ KEY) by using the corresponding asymmetric private KEY (PRI _ KEY _ A) to obtain the symmetric KEY (SYM _ KEY); the media stream is encrypted using a symmetric KEY (SYM KEY) and transmitted to the media streaming server 30.
Acquiring a corresponding asymmetric private KEY (PRI _ KEY _ B) from the authentication server 20 from the client 50; sending a conference entry request to the conference control server 10, and receiving a symmetric KEY (SYM _ KEY) encrypted by the conference control server 10 using a corresponding asymmetric public KEY (PUB _ KEY _ B) from the client 50; decrypting the symmetric KEY (SYM _ KEY) by using the corresponding asymmetric private KEY (PRI _ KEY _ B) to obtain the symmetric KEY (SYM _ KEY); the media stream encrypted using the symmetric KEY (SYM KEY) sent by the media stream server 30 is received and decrypted.
Example 3
In an embodiment of the present invention, a computer-readable storage medium is further provided, on which a computer program is stored, where the computer program executes the steps of the video conference encryption method described above.
Those of ordinary skill in the art will understand that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A video conference encryption method, comprising the steps of:
1) a client initiates a request for reserving a conference to an conference control server, and the conference control server generates a symmetric key corresponding to the conference;
2) the conference participating client sends a conference joining request to the conference control server;
3) the conference participating client acquires the symmetric key subjected to asymmetric encryption from the conference control server;
4) the participating client carries out asymmetric decryption on the symmetric key subjected to asymmetric encryption to obtain the symmetric key;
5) and the participating client encrypts and/or decrypts the media stream by using the symmetric key.
2. The video conference encryption method according to claim 1, further comprising, before step 2),
each participating client sends the identity identification and the password of the participating client to an identity authentication server, and the identity authentication server generates a participating client public key and a participating client private key corresponding to the participating client;
and the participating client acquires the participating client private key from the identity authentication server.
3. The video conference encryption method of claim 2, further comprising, after step 2),
and the conference control server acquires the public key of the conference participating client from the identity authentication server according to the identity of the conference participating client, and asymmetrically encrypts the symmetric key.
4. The video conference encryption method according to claim 3, further comprising, in step 4),
and the participating client side carries out asymmetric decryption by using the participating client side private key to obtain the symmetric key.
5. The video conference encryption method according to any one of claims 1 to 4,
and the conference control server adopts a symmetric key randomly generated by a national cryptographic algorithm.
6. The video conference encryption method according to any one of claims 2 to 4,
the participating clients comprise a master client and a slave client;
the main client encrypts the media stream by using the symmetric key and sends the encrypted media stream to the media stream server,
one or more of the slave clients obtain the symmetrically encrypted media stream from the media stream server and decrypt the media stream using the symmetric key.
7. The video conference encryption method of claim 6,
the conference control server asymmetrically encrypts the symmetric key by using a public key of the host client acquired from the identity authentication server and sends the symmetric key to the host client;
the host client obtains the symmetric key by performing asymmetric decryption using a host client private key obtained from the authentication server,
the conference control server asymmetrically encrypts the symmetric key by using a slave client public key acquired from the identity authentication server and then sends the symmetric key to the slave client;
the slave client performs asymmetric decryption by using a slave client private key acquired from the identity authentication server to acquire the symmetric key.
8. A video conference encryption system is characterized by comprising a conference control server, an identity authentication server, a media stream server and a client, wherein,
the conference control server receives the conference reservation request of the client, generates a symmetric key corresponding to the conference, and sends the asymmetric encrypted symmetric key to the conference participating client;
the identity authentication server receives the identity and the password of the participation client and generates a participation client public key and a participation client private key corresponding to the participation client;
and the participating client encrypts the media stream by using the symmetric key and then sends the encrypted media stream to the media stream server, and acquires the media stream encrypted by using the symmetric key from the media stream server for decryption.
9. The video conference encryption system of claim 8,
the conference control server acquires a conference client public key corresponding to the conference client from the identity authentication server according to the conference access request of the conference client, and asymmetrically encrypts the symmetric key;
and the participating client acquires the participating client private key corresponding to the participating client from the identity authentication server and decrypts the symmetric key.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program performs the steps of the video conference encryption method according to any one of claims 1 to 7 when running.
CN202010284647.7A 2020-04-13 2020-04-13 Video conference encryption method and system Pending CN111355921A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010284647.7A CN111355921A (en) 2020-04-13 2020-04-13 Video conference encryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010284647.7A CN111355921A (en) 2020-04-13 2020-04-13 Video conference encryption method and system

Publications (1)

Publication Number Publication Date
CN111355921A true CN111355921A (en) 2020-06-30

Family

ID=71194888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010284647.7A Pending CN111355921A (en) 2020-04-13 2020-04-13 Video conference encryption method and system

Country Status (1)

Country Link
CN (1) CN111355921A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112260832A (en) * 2020-12-17 2021-01-22 南京易科腾信息技术有限公司 Information encryption, decryption and control method and device and electronic equipment
CN112672098A (en) * 2020-12-30 2021-04-16 北京弈天诚达科技有限公司 Cloud video conference encryption method, device and system
CN112804058A (en) * 2021-03-17 2021-05-14 浙江华创视讯科技有限公司 Conference data encryption and decryption method and device, storage medium and electronic equipment
CN113347215A (en) * 2021-08-09 2021-09-03 北京电信易通信息技术股份有限公司 Encryption method for mobile video conference
WO2023141864A1 (en) * 2022-01-27 2023-08-03 京东方科技集团股份有限公司 Conference data transmission method, apparatus and system, electronic device and readable medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070079145A1 (en) * 1994-10-27 2007-04-05 Intarsia Software Llc Data copyright management
US20110264742A1 (en) * 1999-06-30 2011-10-27 Silverbrook Research Pty Ltd Method of conferencing using forms
CN104065487A (en) * 2014-07-08 2014-09-24 华南理工大学 Random secret value IBC identity authentication method based on digital fingerprint
CN106850520A (en) * 2016-04-18 2017-06-13 中国科学院信息工程研究所 A kind of implementation method for encrypting voice conferencing

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070079145A1 (en) * 1994-10-27 2007-04-05 Intarsia Software Llc Data copyright management
US20110264742A1 (en) * 1999-06-30 2011-10-27 Silverbrook Research Pty Ltd Method of conferencing using forms
CN104065487A (en) * 2014-07-08 2014-09-24 华南理工大学 Random secret value IBC identity authentication method based on digital fingerprint
CN106850520A (en) * 2016-04-18 2017-06-13 中国科学院信息工程研究所 A kind of implementation method for encrypting voice conferencing

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112260832A (en) * 2020-12-17 2021-01-22 南京易科腾信息技术有限公司 Information encryption, decryption and control method and device and electronic equipment
CN112672098A (en) * 2020-12-30 2021-04-16 北京弈天诚达科技有限公司 Cloud video conference encryption method, device and system
CN112672098B (en) * 2020-12-30 2022-09-20 北京真视通数字科技有限公司 Cloud video conference encryption method, device and system
CN112804058A (en) * 2021-03-17 2021-05-14 浙江华创视讯科技有限公司 Conference data encryption and decryption method and device, storage medium and electronic equipment
CN113347215A (en) * 2021-08-09 2021-09-03 北京电信易通信息技术股份有限公司 Encryption method for mobile video conference
CN113347215B (en) * 2021-08-09 2021-10-01 北京电信易通信息技术股份有限公司 Encryption method for mobile video conference
WO2023141864A1 (en) * 2022-01-27 2023-08-03 京东方科技集团股份有限公司 Conference data transmission method, apparatus and system, electronic device and readable medium

Similar Documents

Publication Publication Date Title
CN111355921A (en) Video conference encryption method and system
US9923877B2 (en) External indexing and search for a secure cloud collaboration system
US8056139B2 (en) Method and system for authorizing multimedia multicasting
CN109218825B (en) Video encryption system
US20080285756A1 (en) Random shared key
CN109151508B (en) Video encryption method
CN108809633B (en) Identity authentication method, device and system
CN112751821B (en) Data transmission method, electronic equipment and storage medium
CN110808829A (en) SSH authentication method based on key distribution center
US20230132485A1 (en) System for Thin Client Devices in Hybrid Edge Cloud Systems
CN112332986A (en) Private encryption communication method and system based on authority control
CN113347143A (en) Identity authentication method, device, equipment and storage medium
CN109981271B (en) Network multimedia safety protection encryption method
CN109905376A (en) A kind of method and system preventing unauthorized access server
CN111224968B (en) Secure communication method for randomly selecting transfer server
JP7208383B2 (en) Video data transmission system, method and apparatus
CN113079155B (en) File encryption processing method based on mixed password
CN112235320B (en) Cipher-based video networking multicast communication method and device
CN113839786B (en) Key distribution method and system based on SM9 key algorithm
CN112437436B (en) Identity authentication method and device
KR101760718B1 (en) System and method for managing mobile device based on pairing
CN111901335B (en) Block chain data transmission management method and system based on middle station
CN112383392A (en) Video conference alternate encryption method and device and computer readable storage medium
WO2021109998A1 (en) Media content transmission method and apparatus, and storage medium
CN110365661B (en) Network security authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200630

RJ01 Rejection of invention patent application after publication