CN114390240A - Safety processing method and device for video conference - Google Patents

Safety processing method and device for video conference Download PDF

Info

Publication number
CN114390240A
CN114390240A CN202111499722.2A CN202111499722A CN114390240A CN 114390240 A CN114390240 A CN 114390240A CN 202111499722 A CN202111499722 A CN 202111499722A CN 114390240 A CN114390240 A CN 114390240A
Authority
CN
China
Prior art keywords
conference
video
state
security authentication
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111499722.2A
Other languages
Chinese (zh)
Other versions
CN114390240B (en
Inventor
兰雨晴
刘一凡
余丹
王丹星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Standard Intelligent Security Technology Co Ltd
Original Assignee
China Standard Intelligent Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Standard Intelligent Security Technology Co Ltd filed Critical China Standard Intelligent Security Technology Co Ltd
Priority to CN202111499722.2A priority Critical patent/CN114390240B/en
Publication of CN114390240A publication Critical patent/CN114390240A/en
Application granted granted Critical
Publication of CN114390240B publication Critical patent/CN114390240B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management

Landscapes

  • Engineering & Computer Science (AREA)
  • Library & Information Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a safety processing method and device for a video conference, and relates to the technical field of information safety. Firstly, acquiring a pre-constructed SIP security service model comprising two layers of security certificates; then, performing first-layer security authentication according to the SIP security service model, and performing security authentication on equipment and software related to the video conference entity; and further performing second-layer security authentication according to the SIP security service model to perform security authentication on the personal identity of the user. It can be seen that, in the embodiment of the application, different authentications are performed on two levels of the video conference terminal and the user through the SIP security service model of two-layer authentication, so that the leakage of video data is avoided, and the integrity of the service is ensured.

Description

Safety processing method and device for video conference
Technical Field
The present application relates to the field of information security technologies, and in particular, to a method and an apparatus for secure processing of a video conference.
Background
Video conferencing is a system whereby people at different locations can communicate face to face over long distances with a network via a communication device. Video conferences can bring convenience to people to a high degree, so that enterprises using video conference systems are gradually increasing, and domestic medical departments, education departments and the like start to make video conferences become daily working tools.
Although the technology of the domestic video conference is greatly optimized in the last years, the problem of security is not solved at present, and the processing links of source address forgery, agent identity information forgery and other malicious attack modes are weak. Therefore, there is a need to solve this technical problem.
Disclosure of Invention
In view of the above problems, the present application is proposed to provide a method and an apparatus for security processing of a video conference, which overcome or at least partially solve the above problems, and perform different authentications on two levels of a video conference terminal and a user through an SIP security service model of two-layer authentication, thereby not only avoiding leakage of video data, but also ensuring integrity of services. The technical scheme is as follows:
in a first aspect, a method for safely processing a video conference is provided, which includes the following steps:
acquiring a pre-constructed SIP (Session Initiation Protocol) security service model comprising two layers of security authentication;
performing first-layer security authentication according to the SIP security service model, and performing security authentication on equipment and software related to the video conference entity;
and performing second-layer security authentication according to the SIP security service model, and performing security authentication on the personal identity of the user.
In one possible implementation manner, the performing security authentication on the personal identity of the user includes:
and carrying out face recognition on the user, comparing the face recognition result of the user with the face of the database actually participating in the conference, and identifying the identity applying for using the video conference service.
In one possible implementation, the method further includes:
in the process of the conference, controlling the identification frequency according to the duration of the conference to repeatedly perform the second layer of security authentication so as to ensure that no person leaves the field or changes people in the process of the video conference;
if someone wants to leave the conference midway in the conference process, the video software is required to be submitted with an leaving field application, a one-key privacy button is pressed on the video software to enter a privacy conference state when a privacy or important event is taught in the conference, the video software can open a camera of equipment at the maximum identification frequency to carry out second-layer security authentication, and if an abnormal condition occurs in the privacy conference state, the equipment can immediately transmit a person video with an abnormal state to each piece of equipment participating in the conference, so as to remind all people of interrupting the conference; and if the abnormal situation occurs in the non-confidential conference state, displaying the name of the person corresponding to the abnormal situation video on the equipment display ends of all the persons participating in the video conference in a bullet screen mode.
In one possible implementation, the method includes a step a1 of controlling the frequency of repeated identification of the second-layer security authentication during the conference according to the duration of the conference and the state of the one-touch security button by using the following formula:
Figure BDA0003402262500000021
wherein f (t) represents the repeated identification frequency of the second layer security authentication in the current time meeting process; t represents the current time; t is t0Representing a conference start time; f. ofmaxThe maximum repeated identification frequency of the second layer security authentication is represented by
Figure BDA0003402262500000022
T represents the time required to perform the second-layer security authentication once; d (t) represents the state value of the one-key security button at the current moment if the video software is usedThe state value is always kept at d (t) 1 when the one-key privacy button is pressed, and is always kept at d (t) 0 when the one-key privacy button is not pressed or the one-key privacy state is canceled on the video software.
In a possible implementation manner, the method includes step a2, determining whether an abnormal state occurs in the current conference according to the result of repeating the second-layer security authentication during the conference by using the following formula:
Figure BDA0003402262500000031
wherein e (t) represents a state output value of the conference at the current time; n isi(t) represents the total number of times of repeating the second-layer security authentication to the current time according to the frequency of the step a 1; g [ n ]i(t)-a]Indicating that the second layer of security authentication is repeated to the nth as frequently as step A1iIf the output result of the ith participant from (t) -a shows that the second-layer security authentication is repeated until the nth security authentication is repeated according to the frequency of the step A1iG [ n ] is output when the authentication result of the ith participant is not the same as the authentication result of the ith participant who participated in the conference for (t) -a timesi(t)-a]When it is equal to 0, on the contrary, G [ n ] is outputi(t)-a]1 is ═ 1; y (i) is an output value indicating the leaving application submitted by the ith participant, and if the leaving application is submitted by the ith participant, y (i) is 1, otherwise y (i) is 0; m represents the total number of participants in the conference; δ { } denotes a normalization function, and the function value is 1 if the value in parentheses is greater than 0, and is 0 if the value in parentheses is 0;
if E (t) is 1, the current conference state is an abnormal state, namely, the conference state is left or replaced without a reason;
if e (t) is 0, it indicates that the conference state at the current time is a normal state, that is, there is no person leaving the field or changing person without any reason.
In one possible implementation, the method includes a step a3, where the display status on the display terminals of all the devices participating in the video conference is controlled according to the output result of the current abnormal conference status and the status of the one-touch-secret button by using the following formula:
Figure BDA0003402262500000032
wherein B (t) represents the display status values on the device display terminals of all the participating video conference personnel; n represents taking intersection;
if B (t) is 1, the current state is abnormal, and the video of the person in the abnormal state needs to be displayed on the equipment display terminals of all the persons participating in the video conference;
if B (t) is 0, the current state is normal, the current conference state is maintained on the equipment display ends of all the participating video conference personnel;
if b (t) is-1, it indicates that the current state is abnormal, the names of the persons who are identified to have abnormal states are displayed on the device display terminals of all the persons participating in the video conference in the form of bullet screens.
In a second aspect, a secure processing apparatus for video conference is provided, including:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a pre-constructed Session Initiation Protocol (SIP) security service model comprising two layers of security certificates;
the first authentication module is used for performing first-layer security authentication according to the SIP security service model and performing security authentication on equipment and software related to the video conference entity;
and the second authentication module is used for performing second-layer security authentication according to the SIP security service model and performing security authentication on the personal identity of the user.
In one possible implementation manner, the second authentication module is further configured to:
and carrying out face recognition on the user, comparing the face recognition result of the user with the face of the database actually participating in the conference, and identifying the identity applying for using the video conference service.
In one possible implementation manner, the second authentication module is further configured to:
in the process of the conference, controlling the identification frequency according to the duration of the conference to repeatedly perform the second layer of security authentication so as to ensure that no person leaves the field or changes people in the process of the video conference;
if someone wants to leave the conference midway in the conference process, the video software is required to be submitted with an leaving field application, a one-key privacy button is pressed on the video software to enter a privacy conference state when a privacy or important event is taught in the conference, the video software can open a camera of equipment at the maximum identification frequency to carry out second-layer security authentication, and if an abnormal condition occurs in the privacy conference state, the equipment can immediately transmit a person video with an abnormal state to each piece of equipment participating in the conference, so as to remind all people of interrupting the conference; and if the abnormal situation occurs in the non-confidential conference state, displaying the name of the person corresponding to the abnormal situation video on the equipment display ends of all the persons participating in the video conference in a bullet screen mode.
In one possible implementation manner, the second authentication module is further configured to:
step A1, controlling the repeated identification frequency of the second layer security authentication in the conference process according to the conference time length and the state of the one-key security button by using the following formula:
Figure BDA0003402262500000051
wherein f (t) represents the repeated identification frequency of the second layer security authentication in the current time meeting process; t represents the current time; t is t0Representing a conference start time; f. ofmaxThe maximum repeated identification frequency of the second layer security authentication is represented by
Figure BDA0003402262500000052
T represents the time required to perform the second-layer security authentication once; d (t) represents a state value of the one-key privacy button at the present time, and the state value is always maintained at d (t) 1 when the one-key privacy button is pressed on the video software, and is always maintained at d (t) 0 when the one-key privacy button is not pressed or the one-key privacy state is canceled on the video software.
By means of the technical scheme, the safety processing method and the safety processing device for the video conference, provided by the embodiment of the application, firstly, a pre-constructed SIP safety service model comprising two layers of safety certificates is obtained; then, performing first-layer security authentication according to the SIP security service model, and performing security authentication on equipment and software related to the video conference entity; and further performing second-layer security authentication according to the SIP security service model to perform security authentication on the personal identity of the user. It can be seen that, in the embodiment of the application, different authentications are performed on two levels of the video conference terminal and the user through the SIP security service model of two-layer authentication, so that the leakage of video data is avoided, and the integrity of the service is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 shows a flow chart of a method for secure processing of a video conference according to an embodiment of the application;
fig. 2 shows a block diagram of a secure processing device for a video conference according to an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that such uses are interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the term "include" and its variants are to be read as open-ended terms meaning "including, but not limited to".
The embodiment of the application provides a safe processing method of a video conference, which can be applied to electronic equipment such as a server, a mobile terminal, a personal computer and a tablet computer. As shown in fig. 1, the security processing method for a video conference may include the following steps S101 to S103:
step S101, a pre-constructed SIP security service model comprising two layers of security authentication is obtained;
step S102, according to the SIP security service model, performing first-layer security authentication, and performing security authentication on equipment and software related to the video conference entity;
and step S103, performing second-layer security authentication according to the SIP security service model, and performing security authentication on the personal identity of the user.
The method comprises the steps of firstly, acquiring a pre-constructed SIP security service model comprising two layers of security certificates; then, performing first-layer security authentication according to the SIP security service model, and performing security authentication on equipment and software related to the video conference entity; and further performing second-layer security authentication according to the SIP security service model to perform security authentication on the personal identity of the user. It can be seen that, in the embodiment of the application, different authentications are performed on two levels of the video conference terminal and the user through the SIP security service model of two-layer authentication, so that the leakage of video data is avoided, and the integrity of the service is ensured.
In the embodiment of the present application, a possible implementation manner is provided, in which step S103 performs a second-layer security authentication according to the SIP security service model, performs a security authentication on the personal identity of the user, specifically performs face recognition on the user, and compares the face recognition result of the user with the database face of the actual conference participant, so as to identify the identity of the application using the video conference service. The authentication of the personal identity of the user is used for identifying who applies for the video conference service and whether the user is the user.
The embodiment of the application provides a possible implementation mode, in the process of a conference, the identification frequency is controlled according to the duration of the conference to repeatedly perform the second layer of security authentication so as to ensure that no person leaves the field or changes people in the process of the video conference; if someone wants to leave the conference midway in the conference process, the video software is required to be submitted with a leave application, a one-key privacy button is pressed on the video software to enter a privacy conference state when a privacy or important event is taught in the conference, the video software can open a camera of equipment at the maximum identification frequency to carry out second-layer security authentication, and if an abnormal condition occurs in the privacy conference state, the equipment can immediately transmit a person video with an abnormal state to each piece of equipment participating in the conference, so as to remind all people of interrupting the conference; and if the abnormal situation occurs in the non-confidential conference state, displaying the name of the person corresponding to the abnormal situation video on the equipment display ends of all the persons participating in the video conference in a bullet screen mode.
The embodiment of the present application provides a possible implementation manner, which may specifically include step a1, where the following formula is used to control the repeated identification frequency of the second-layer security authentication in the conference process according to the duration of the conference and the state of the one-key security button:
Figure BDA0003402262500000071
wherein f (t) represents the repeated identification frequency of the second layer security authentication in the current time meeting process; t represents the current time; t is t0Representing a conference start time; f. ofmaxThe maximum repeated identification frequency of the second layer security authentication is represented by
Figure BDA0003402262500000072
T represents the time required to perform the second-layer security authentication once; d (t) represents a state value of the one-key privacy button at the present time, and the state value is always maintained at d (t) 1 when the one-key privacy button is pressed on the video software, and is always maintained at d (t) 0 when the one-key privacy button is not pressed on the video software or the one-key privacy state is canceled.
According to the embodiment of the application, the formula of the step A1 is utilized to control the repeated identification frequency of the second-layer security authentication in the conference process according to the conference time and the state of the one-key security button, and then the identification frequency is continuously increased along with the increase of the conference time so as to prevent a person from leaving the conference midway.
The embodiment of the present application provides a possible implementation manner, which may specifically include step a2, and determine whether an abnormal state occurs in a current conference according to a result of repeating the second layer security authentication in a conference process by using the following formula:
Figure BDA0003402262500000081
wherein e (t) represents a state output value of the conference at the current time; n isi(t) represents the total number of times of repeating the second-layer security authentication to the current time according to the frequency of the step a 1; g [ n ]i(t)-a]Indicating that the second layer of security authentication is repeated to the nth as frequently as step A1iIf the output result of the ith participant from (t) -a shows that the second-layer security authentication is repeated until the nth security authentication is repeated according to the frequency of the step A1iG [ n ] is output when the authentication result of the ith participant is not the same as the authentication result of the ith participant who participated in the conference for (t) -a timesi(t)-a]When it is equal to 0, on the contrary, G [ n ] is outputi(t)-a]1 is ═ 1; y (i) is an output value indicating the leaving application submitted by the ith participant, and if the leaving application is submitted by the ith participant, y (i) is 1, otherwise y (i) is 0; m represents the total number of participants in the conference; δ { } denotes a normalization function, and the function value is 1 if the value in parentheses is greater than 0, and is 0 if the value in parentheses is 0;
if E (t) is 1, the current conference state is an abnormal state, namely, the conference state is left or replaced without a reason;
if e (t) is 0, it indicates that the conference state at the current time is a normal state, that is, there is no person leaving the field or changing person without any reason.
The physical meaning of the above formula is that if more than 3 times of continuous existence of people, namely people do not submit departure applications and the identification result is non-self, the state is an abnormal state, otherwise, the state is a normal state.
In the embodiment of the application, the formula in step a2 is used to determine whether the current conference has an abnormal state according to the result of the second-layer security authentication repeated in the conference process, and then the formula can be used to perform corresponding determination and operation on the abnormal state in time.
The embodiment of the present application provides a possible implementation manner, which may specifically include step a3, where the following formula is used to control the display states on the display terminals of all the devices participating in the video conference according to the output result of the current abnormal conference state and the state of the one-key privacy button:
Figure BDA0003402262500000091
wherein B (t) represents the display status values on the device display terminals of all the participating video conference personnel; n represents taking intersection;
if B (t) is 1, the current state is abnormal, and the video of the person in the abnormal state needs to be displayed on the equipment display terminals of all the persons participating in the video conference;
if B (t) is 0, the current state is normal, the current conference state is maintained on the equipment display ends of all the participating video conference personnel;
if b (t) is-1, it indicates that the current state is abnormal, the names of the persons who are identified to have abnormal states are displayed on the device display terminals of all the persons participating in the video conference in the form of bullet screens.
According to the embodiment of the application, the display states of the equipment display ends of all the people participating in the video conference are controlled by the formula in the step A3 according to the output result of the current abnormal state of the conference and the state of the one-key secret button, and then different display results are carried out according to different states, so that all the people participating in the video conference are timely reminded to carry out corresponding operations.
It should be noted that, in practical applications, all the possible embodiments described above may be combined in a combined manner at will to form possible embodiments of the present application, and details are not described here again.
Based on the same inventive concept, the embodiment of the present application further provides a security processing apparatus for a video conference.
Fig. 2 shows a block diagram of a secure processing device for a video conference according to an embodiment of the present application. As shown in fig. 2, the security processing apparatus for a video conference may include an acquisition module 210, a first authentication module 220, and a second authentication module 230.
An obtaining module 210, configured to obtain a pre-constructed session initiation protocol SIP security service model including two layers of security certificates;
the first authentication module 220 is configured to perform a first layer of security authentication according to the SIP security service model, and perform security authentication on devices and software related to the video conference entity;
and the second authentication module 230 is configured to perform a second-layer security authentication according to the SIP security service model, so as to perform a security authentication on the personal identity of the user.
In the embodiment of the present application, a possible implementation manner is provided, and the second authentication module 230 shown in fig. 2 is further configured to:
and carrying out face recognition on the user, comparing the face recognition result of the user with the face of the database actually participating in the conference, and identifying the identity applying for using the video conference service.
In the embodiment of the present application, a possible implementation manner is provided, and the second authentication module 230 shown in fig. 2 is further configured to:
in the process of the conference, controlling the identification frequency according to the duration of the conference to repeatedly perform the second layer of security authentication so as to ensure that no person leaves the field or changes people in the process of the video conference;
if someone wants to leave the conference midway in the conference process, the video software is required to be submitted with a leave application, a one-key privacy button is pressed on the video software to enter a privacy conference state when a privacy or important event is taught in the conference, the video software can open a camera of equipment at the maximum identification frequency to carry out second-layer security authentication, and if an abnormal condition occurs in the privacy conference state, the equipment can immediately transmit a person video with an abnormal state to each piece of equipment participating in the conference, so as to remind all people of interrupting the conference; and if the abnormal situation occurs in the non-confidential conference state, displaying the name of the person corresponding to the abnormal situation video on the equipment display ends of all the persons participating in the video conference in a bullet screen mode.
In the embodiment of the present application, a possible implementation manner is provided, and the second authentication module 230 shown in fig. 2 is further configured to:
step A1, controlling the repeated identification frequency of the second layer security authentication in the conference process according to the conference time length and the state of the one-key security button by using the following formula:
Figure BDA0003402262500000101
wherein f (t) represents the repeated identification frequency of the second layer security authentication in the current time meeting process; t represents the current time; t is t0Representing a conference start time; f. ofmaxThe maximum repeated identification frequency of the second layer security authentication is represented by
Figure BDA0003402262500000102
T represents the time required to perform the second-layer security authentication once; d (t) represents a state value of the one-key privacy button at the present time, and the state value is always maintained at d (t) 1 when the one-key privacy button is pressed on the video software, and is always maintained at d (t) 0 when the one-key privacy button is not pressed on the video software or the one-key privacy state is canceled.
In the embodiment of the present application, a possible implementation manner is provided, and the second authentication module 230 shown in fig. 2 is further configured to:
step A2, using the following formula to judge whether the current conference is abnormal according to the result of the second layer security authentication repeated in the conference process:
Figure BDA0003402262500000111
where E9t) represents the current timeState output value of the conference; n isi(t) represents the total number of times of repeating the second-layer security authentication to the current time according to the frequency of the step a 1; g [ n ]i(t)-a]Indicating that the second layer of security authentication is repeated to the nth as frequently as step A1iIf the output result of the ith participant from (t) -a shows that the second-layer security authentication is repeated until the nth security authentication is repeated according to the frequency of the step A1iG [ n ] is output when the authentication result of the ith participant is not the same as the authentication result of the ith participant who participated in the conference for (t) -a timesi(t)-a]When it is equal to 0, on the contrary, G [ n ] is outputi(t)-a]1 is ═ 1; y (i) is an output value indicating the leaving application submitted by the ith participant, and if the leaving application is submitted by the ith participant, y (i) is 1, otherwise y (i) is 0; m represents the total number of participants in the conference; δ { } denotes a normalization function, and the function value is 1 if the value in parentheses is greater than 0, and is 0 if the value in parentheses is 0;
if E (t) is 1, the current conference state is an abnormal state, namely, the conference state is left or replaced without a reason;
if e (t) is 0, it indicates that the conference state at the current time is a normal state, that is, there is no person leaving the field or changing person without any reason.
In the embodiment of the present application, a possible implementation manner is provided, and the second authentication module 230 shown in fig. 2 is further configured to:
step A3, controlling the display status of the display terminals of all the participating video conference persons according to the output result of the current conference abnormal status and the status of the one-key privacy button by using the following formula:
Figure BDA0003402262500000121
wherein B (t) represents the display status values on the device display terminals of all the participating video conference personnel; n represents taking intersection;
if B (t) is 1, the current state is abnormal, and the video of the person in the abnormal state needs to be displayed on the equipment display terminals of all the persons participating in the video conference;
if B (t) is 0, the current state is normal, the current conference state is maintained on the equipment display ends of all the participating video conference personnel;
if b (t) is-1, it indicates that the current state is abnormal, the names of the persons who are identified to have abnormal states are displayed on the device display terminals of all the persons participating in the video conference in the form of bullet screens.
By means of the technical scheme, the safety processing device for the video conference, provided by the embodiment of the application, firstly acquires a pre-constructed SIP safety service model comprising two layers of safety certificates; then, performing first-layer security authentication according to the SIP security service model, and performing security authentication on equipment and software related to the video conference entity; and further performing second-layer security authentication according to the SIP security service model to perform security authentication on the personal identity of the user. It can be seen that, in the embodiment of the application, different authentications are performed on two levels of the video conference terminal and the user through the SIP security service model of two-layer authentication, so that the leakage of video data is avoided, and the integrity of the service is ensured.
It can be clearly understood by those skilled in the art that the specific working processes of the system, the apparatus, and the module described above may refer to the corresponding processes in the foregoing method embodiments, and for the sake of brevity, the detailed description is omitted here.
Those of ordinary skill in the art will understand that: the technical solution of the present application may be essentially or wholly or partially embodied in the form of a software product, where the computer software product is stored in a storage medium and includes program instructions for enabling an electronic device (e.g., a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application when the program instructions are executed. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Alternatively, all or part of the steps of implementing the foregoing method embodiments may be implemented by hardware (an electronic device such as a personal computer, a server, or a network device) associated with program instructions, which may be stored in a computer-readable storage medium, and when the program instructions are executed by a processor of the electronic device, the electronic device executes all or part of the steps of the method described in the embodiments of the present application.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments can be modified or some or all of the technical features can be equivalently replaced within the spirit and principle of the present application; such modifications or substitutions do not depart from the scope of the present application.

Claims (10)

1. A safe processing method for video conference is characterized by comprising the following steps:
acquiring a pre-constructed Session Initiation Protocol (SIP) security service model comprising two layers of security certificates;
performing first-layer security authentication according to the SIP security service model, and performing security authentication on equipment and software related to the video conference entity;
and performing second-layer security authentication according to the SIP security service model, and performing security authentication on the personal identity of the user.
2. The method for secure processing of video conference as claimed in claim 1, wherein said security authentication of the personal identity of the user comprises:
and carrying out face recognition on the user, comparing the face recognition result of the user with the face of the database actually participating in the conference, and identifying the identity applying for using the video conference service.
3. The method for secure processing of video conferencing of claim 2, wherein the method further comprises:
in the process of the conference, controlling the identification frequency according to the duration of the conference to repeatedly perform the second layer of security authentication so as to ensure that no person leaves the field or changes people in the process of the video conference;
if someone wants to leave the conference midway in the conference process, the video software is required to be submitted with an leaving field application, a one-key privacy button is pressed on the video software to enter a privacy conference state when a privacy or important event is taught in the conference, the video software can open a camera of equipment at the maximum identification frequency to carry out second-layer security authentication, and if an abnormal condition occurs in the privacy conference state, the equipment can immediately transmit a person video with an abnormal state to each piece of equipment participating in the conference, so as to remind all people of interrupting the conference; and if the abnormal situation occurs in the non-confidential conference state, displaying the name of the person corresponding to the abnormal situation video on the equipment display ends of all the persons participating in the video conference in a bullet screen mode.
4. The method for processing security of video conference as claimed in claim 3, comprising step A1, wherein the frequency of repeated identification of the second layer security authentication during the conference is controlled according to the duration of the conference and the state of the one-touch security button by using the following formula:
Figure FDA0003402262490000021
wherein f (t) represents the repeated identification frequency of the second layer security authentication in the current time meeting process; t represents the current time; t is t0Representing a conference start time; f. ofmaxThe maximum repeated identification frequency of the second layer security authentication is represented by
Figure FDA0003402262490000022
T represents the time required to perform the second-layer security authentication once; d (t) represents a state value of the one-key privacy button at the present time, and the state value is always kept at d (t) -1 when the one-key privacy button is pressed on the video software, and is kept at d (t) -1 when the one-key privacy button is not pressed on the video softwareThe button or key-off privacy state is maintained at a state value of d (t) 0.
5. The method for processing security of video conference as claimed in claim 4, comprising step A2, determining whether the current conference is in abnormal state according to the result of repeating the second layer security authentication in the conference process by using the following formula:
Figure FDA0003402262490000023
wherein e (t) represents a state output value of the conference at the current time; n isi(t) represents the total number of times of repeating the second-layer security authentication to the current time according to the frequency of the step a 1; g [ n ]i(t)-a]Indicating that the second layer of security authentication is repeated to the nth as frequently as step A1iIf the output result of the ith participant from (t) -a shows that the second-layer security authentication is repeated until the nth security authentication is repeated according to the frequency of the step A1iG [ n ] is output when the authentication result of the ith participant is not the same as the authentication result of the ith participant who participated in the conference for (t) -a timesi(t)-a]When it is equal to 0, on the contrary, G [ n ] is outputi(t)-a]1 is ═ 1; y (i) is an output value indicating the leaving application submitted by the ith participant, and if the leaving application is submitted by the ith participant, y (i) is 1, otherwise y (i) is 0; m represents the total number of participants in the conference; δ { } denotes a normalization function, and the function value is 1 if the value in parentheses is greater than 0, and is 0 if the value in parentheses is 0;
if E (t) is 1, the current conference state is an abnormal state, namely, the conference state is left or replaced without a reason;
if e (t) is 0, it indicates that the conference state at the current time is a normal state, that is, there is no person leaving the field or changing person without any reason.
6. The method for safely processing the video conference as claimed in claim 5, wherein the method comprises a step A3, wherein the display status on the display terminals of all the devices participating in the video conference is controlled according to the output result of the abnormal status of the current conference and the status of the one-key privacy button by using the following formula:
Figure FDA0003402262490000031
wherein B (t) represents the display status values on the device display terminals of all the participating video conference personnel; n represents taking intersection;
if B (t) is 1, the current state is abnormal, and the video of the person in the abnormal state needs to be displayed on the equipment display terminals of all the persons participating in the video conference;
if B (t) is 0, the current state is normal, the current conference state is maintained on the equipment display ends of all the participating video conference personnel;
if b (t) is-1, it indicates that the current state is abnormal, the names of the persons who are identified to have abnormal states are displayed on the device display terminals of all the persons participating in the video conference in the form of bullet screens.
7. A secure processing apparatus for video conferencing, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a pre-constructed Session Initiation Protocol (SIP) security service model comprising two layers of security certificates;
the first authentication module is used for performing first-layer security authentication according to the SIP security service model and performing security authentication on equipment and software related to the video conference entity;
and the second authentication module is used for performing second-layer security authentication according to the SIP security service model and performing security authentication on the personal identity of the user.
8. The apparatus for secure processing of video conference according to claim 7, wherein said second authentication module is further configured to:
and carrying out face recognition on the user, comparing the face recognition result of the user with the face of the database actually participating in the conference, and identifying the identity applying for using the video conference service.
9. The apparatus for secure processing of video conferencing as in claim 8, wherein the second authentication module is further configured to:
in the process of the conference, controlling the identification frequency according to the duration of the conference to repeatedly perform the second layer of security authentication so as to ensure that no person leaves the field or changes people in the process of the video conference;
if someone wants to leave the conference midway in the conference process, the video software is required to be submitted with an leaving field application, a one-key privacy button is pressed on the video software to enter a privacy conference state when a privacy or important event is taught in the conference, the video software can open a camera of equipment at the maximum identification frequency to carry out second-layer security authentication, and if an abnormal condition occurs in the privacy conference state, the equipment can immediately transmit a person video with an abnormal state to each piece of equipment participating in the conference, so as to remind all people of interrupting the conference; and if the abnormal situation occurs in the non-confidential conference state, displaying the name of the person corresponding to the abnormal situation video on the equipment display ends of all the persons participating in the video conference in a bullet screen mode.
10. The apparatus for secure processing of video conference according to claim 9, wherein said second authentication module is further configured to:
step A1, controlling the repeated identification frequency of the second layer security authentication in the conference process according to the conference time length and the state of the one-key security button by using the following formula:
Figure FDA0003402262490000041
wherein f (t) represents the repeated identification frequency of the second layer security authentication in the current time meeting process; t represents the current time; t is t0Representing a conference start time; f. ofmaxThe maximum repeated identification frequency of the second layer security authentication is represented by
Figure FDA0003402262490000042
T represents the time required to perform the second-layer security authentication once; d (t) represents a state value of the one-key privacy button at the present time, and the state value is always maintained at d (t) 1 when the one-key privacy button is pressed on the video software, and is always maintained at d (t) 0 when the one-key privacy button is not pressed or the one-key privacy state is canceled on the video software.
CN202111499722.2A 2021-12-09 2021-12-09 Safety processing method and device for video conference Active CN114390240B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111499722.2A CN114390240B (en) 2021-12-09 2021-12-09 Safety processing method and device for video conference

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111499722.2A CN114390240B (en) 2021-12-09 2021-12-09 Safety processing method and device for video conference

Publications (2)

Publication Number Publication Date
CN114390240A true CN114390240A (en) 2022-04-22
CN114390240B CN114390240B (en) 2022-10-28

Family

ID=81196670

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111499722.2A Active CN114390240B (en) 2021-12-09 2021-12-09 Safety processing method and device for video conference

Country Status (1)

Country Link
CN (1) CN114390240B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114998880A (en) * 2022-05-18 2022-09-02 慧之安信息技术股份有限公司 Violent vulgar barrage detection method based on LSTM technology
CN116420989A (en) * 2023-06-09 2023-07-14 广州美术学院 Intelligent office workstation

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110115877A1 (en) * 2009-11-17 2011-05-19 Kang Sung Suk Method for user authentication, and video communication apparatus and display apparatus thereof
CN107707868A (en) * 2016-08-08 2018-02-16 中国电信股份有限公司 Video conference Adding Way, multiple access Conference server and video conferencing system
CN110519545A (en) * 2018-05-22 2019-11-29 中兴通讯股份有限公司 Meeting authority control method and system, server, terminal, storage medium
CN111556269A (en) * 2020-04-29 2020-08-18 从法信息科技有限公司 Remote meeting system, device and method based on identity authentication
CN112766890A (en) * 2021-01-11 2021-05-07 卓望数码技术(深圳)有限公司 Conference admission method, device, electronic equipment and storage medium
CN112822433A (en) * 2021-04-19 2021-05-18 荣耀终端有限公司 Control method and related device in video conference
CN113271428A (en) * 2020-09-30 2021-08-17 常熟九城智能科技有限公司 Video conference user authentication method, device and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110115877A1 (en) * 2009-11-17 2011-05-19 Kang Sung Suk Method for user authentication, and video communication apparatus and display apparatus thereof
CN102612841A (en) * 2009-11-17 2012-07-25 Lg电子株式会社 Method for user authentication, and video communication apparatus and display apparatus thereof
CN107707868A (en) * 2016-08-08 2018-02-16 中国电信股份有限公司 Video conference Adding Way, multiple access Conference server and video conferencing system
CN110519545A (en) * 2018-05-22 2019-11-29 中兴通讯股份有限公司 Meeting authority control method and system, server, terminal, storage medium
CN111556269A (en) * 2020-04-29 2020-08-18 从法信息科技有限公司 Remote meeting system, device and method based on identity authentication
CN113271428A (en) * 2020-09-30 2021-08-17 常熟九城智能科技有限公司 Video conference user authentication method, device and system
CN112766890A (en) * 2021-01-11 2021-05-07 卓望数码技术(深圳)有限公司 Conference admission method, device, electronic equipment and storage medium
CN112822433A (en) * 2021-04-19 2021-05-18 荣耀终端有限公司 Control method and related device in video conference

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114998880A (en) * 2022-05-18 2022-09-02 慧之安信息技术股份有限公司 Violent vulgar barrage detection method based on LSTM technology
CN114998880B (en) * 2022-05-18 2023-04-28 慧之安信息技术股份有限公司 Method for detecting violent low-custom barrage based on LSTM technology
CN116420989A (en) * 2023-06-09 2023-07-14 广州美术学院 Intelligent office workstation
CN116420989B (en) * 2023-06-09 2023-08-22 广州美术学院 Intelligent office workstation

Also Published As

Publication number Publication date
CN114390240B (en) 2022-10-28

Similar Documents

Publication Publication Date Title
US8931071B2 (en) Biometric authentication for video communication sessions
CN114390240B (en) Safety processing method and device for video conference
US9712526B2 (en) User authentication for social networks
US9094388B2 (en) Methods and systems for identifying, verifying, and authenticating an identity
US20140331278A1 (en) Systems and methods for verifying identities
CN111191205B (en) Method for managing teleconference, server, and computer-readable storage medium
US20080127296A1 (en) Identity assurance method and system
US20030163708A1 (en) Method and system for detecting and eliminating fraud
Nadler Rapport in legal negotiation: How small talk can facilitate e-mail dealmaking
US20120204029A1 (en) Method and system for conducting an attorney client privileged conference with the lawyer at an independent location
Kainda et al. Two heads are better than one: security and usability of device associations in group scenarios
CN110910523A (en) Conference sign-in method, conference room operation terminal and computer storage medium
US9025746B2 (en) System and method for visual caller identification
US6937702B1 (en) Method, apparatus, and computer readable media for minimizing the risk of fraudulent access to call center resources
US10839067B2 (en) Active control of anonymous forum for members of service
EP1523166A1 (en) Conference system with voice recognition as identification method
WO2021073270A1 (en) Method and apparatus for risk management and control, computer apparatus, and storage medium
JP2010109995A (en) Voice chat system having call-significance function
WO2015035057A1 (en) Systems and methods for verifying identities
US20220150286A1 (en) Videoconferencing System
US20230325481A1 (en) Method and System for Authentication of a Subject by a Trusted Contact
Baker During the Pandemic, Virtual Arbitration Offers a Promising Alternative--Provided You Know What You Are Doing.
JP5354311B2 (en) Voice chat system with call importance function
JP4450286B2 (en) Voice chat system with call importance function
CN116193063A (en) Remote conference safety management method, system and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant