CN116233275A - Subcontracting recombination method for big data safety transmission of online inspection system - Google Patents

Subcontracting recombination method for big data safety transmission of online inspection system Download PDF

Info

Publication number
CN116233275A
CN116233275A CN202211656649.XA CN202211656649A CN116233275A CN 116233275 A CN116233275 A CN 116233275A CN 202211656649 A CN202211656649 A CN 202211656649A CN 116233275 A CN116233275 A CN 116233275A
Authority
CN
China
Prior art keywords
data
message
transmission
inspection system
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211656649.XA
Other languages
Chinese (zh)
Inventor
杨增敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jyd Digital System Technology Co ltd
Original Assignee
Beijing Jyd Digital System Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jyd Digital System Technology Co ltd filed Critical Beijing Jyd Digital System Technology Co ltd
Priority to CN202211656649.XA priority Critical patent/CN116233275A/en
Publication of CN116233275A publication Critical patent/CN116233275A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a packet recombination method for large data safety transmission of an online inspection system, which optimizes the medium safety problem of SIP protocol outgoing transmission by defining a mechanism of intelligent analysis data packet of an SIP protocol, a data transmission format and a split packet rule based on the existing protocol, ensures network data interception and data falsification, and can transmit various types of data based on the SIP protocol. The security and the integrity of the business on large data transmission are effectively solved, the data transmission capacity is improved, and more business data can be expanded.

Description

Subcontracting recombination method for big data safety transmission of online inspection system
Technical Field
The invention relates to a data transmission method, in particular to a packet reassembling method for large data security transmission of a national education examination network inspection system based on an SIP protocol.
Background
The technical specifications of video standard of the national education examination online inspection system (2007 NEEA-0001) and (2017 JY/T-KS-JS-2017-1) introduce a SIP mechanism into the national education examination online inspection system through the expansion of the SIP protocol and the new definition of message load, but a packetizing and reassembling method for transmitting big data is not defined in the specifications, so that data transmission is limited to an MTU unit (maximum transmission unit MaximumTransmissionUnit, MTU) of the Ethernet.
The SIP (SessionInitiationProtocol) is a signaling control protocol of a session layer, has extremely strong expandability, can be used for creating, modifying and releasing sessions participated by two or more parties, and is applied to VOIP, internet multimedia conferences and the like.
Disclosure of Invention
The invention provides a subpackaging and reorganizing method for big data safety transmission of an online inspection system, which is used for solving the problem of limited data of big data transmission of the online inspection system of the current national education examination, effectively solving the bottleneck of the data transmission in the industry affected by MTU, improving the safety and expanding the support for various data formats at the same time, and the technical scheme is as follows:
a method for subcontracting and reorganizing big data security transmission of an online inspection system comprises the following steps:
s1: the superior service sends a data request instruction to the inferior service;
s2: after receiving the data request, the lower-level service analyzes the content of the message body, and queries the data to be sent from the background data to the memory table;
s3: the lower-level service starts an analysis algorithm in real time to analyze the data size, and the size rule is set by external dynamic setting or default system setting;
s4: splitting data into N data units according to transmission requirements, performing SIP signaling packaging and data body encryption on each data unit, and packaging the data units into encrypted data packets;
s5: completing the serial number marking of each data packet, expanding Content-type header domain information in the SIP protocol, including expanding ID, order and total, so that signaling transmission of the data packet is endowed with the capability of data packet, wherein the ID is a unique identifier and is used for representing the serial numbers of all packets; the order is a sequence field used for representing the sub-packaging sequence; the total is the total number of sub-packets and represents the number of sub-packets;
s6: defining rules and constraints of packet reassembly of SIP protocol transmission, and ensuring data development and security;
s7: the Content-type header domain information in the SIP protocol is expanded by carrying out encryption operation on the message body in the data packet, destype is expanded, and the ID, order, total is encrypted according to a formulated encryption mode;
s8: after receiving the data packet, the superior service performs data reorganization, firstly stores the data packet into a memory table, and identifies the integrity of the data packet according to the total number and sequence number of the message, wherein the incomplete data packet is not analyzed;
s9: and (3) decrypting the data of each memory table, wherein the decryption rule refers to encryption and decryption in the message body, and the decryption rule is constrained, and after the decryption, the decoded data of each memory table are recombined according to the sequence number, and the message body added with the SIP is restored into the original message body.
Further, in step S1, the data request instruction includes a request line, a message header, and a message body, where the request line includes a request domain name and a method name; the message header comprises routing information, a sender and a destination address; the message body contains the requested data content.
Further, in step S3, the size rule is 2/3 of the MTU.
Further, in step S4, the data wrapper is to extend the SIP message head part, and add a Date field and a Note field, where the Date field refers to carrying time of each transmission, the Note field refers to encrypted data of the key field, and the encrypted data includes time, method name, to field and CALLID, and through the two extended fields, the encrypted data is used to ensure capability of checking signaling integrity during each signaling transmission.
Further, on the basis of the basic signaling field of the SIP protocol, a Date field and a Note field are added, which specifically has the following format:
Date:yyyy-mm-ddThh:mm:ss.mmm;
Note:nonce=”xxxxxxxxxxxxxxxxxxxxxxxxxxddeexxxxxxxxxxxxxxxx”,
algorithm=SM3;
wherein, the time format must be yyy-mm-ddThh: mm: ss.mmm format;
the length of the nonce value exceeds 128 bytes, calculated as:
base64[ SM3[ METHOD+from+to+date+CallID+Messaging ] ].
Further, in step S6, the rule includes:
(1) The slicing agent must divide the message only by the boundary line;
(2) All header fields from the original nested Message must be copied into the new Message except in "Content-" or specific header fields "Subject", "Message-ID";
(3) Each message only reorganizes new message content, and other additional information is abandoned in the reorganization;
(4) The message body length of each single segmented message is kept within 1000 bytes, ensuring that the data is not limited by the ethernet MTU.
Further, in step S6, the constraint includes:
(1) For each segmented MESSAGE, the three parameters "id", "order" and "total" specified by the header Content-Type header field must be carried;
(2) For Message-ID header fields of Message entities adopting segmented transmission, for response messages, message-IDs carried by the response messages should be consistent with Message-IDs carried by the request messages, so that corresponding request messages can be found through the Message-IDs of the response messages;
(3) The Content-type header field information in the extended SIP protocol and the extended destype are encrypted one by one in the order of total+order.
Further, in step S7, the destype is an encryption type, and the encryption method includes:
des: a DES encryption mode;
MD5, MD5 encryption;
SM1/SM2/SM3/SM4: guomai (national density): SM1/SM2/SM3/SM4;
encrypted content = Base64[ SM3[ method+from+to+date+callid+message body ] ].
Further, in step S7, various types of data can be transmitted based on the SIP protocol by defining a format of data transmission.
The packetizing and reassembling method for the big data safety transmission of the online inspection system effectively solves the problem of safety and integrity of the business on the big data transmission, improves the data transmission capacity and can expand more business data.
Drawings
Fig. 1 is a flow chart of a method for packetizing and reassembling big data for secure transmission of the online inspection system.
Detailed Description
The present invention will be described in detail with reference to an example of an online inspection system for national education exams, but the implementation of the present invention is not limited to the scenario described in this example.
As shown in FIG. 1, the method for packetizing and reassembling big data security transmission of the online inspection system comprises the following steps:
s1: the upper service sends a data request instruction to the lower service, wherein the data request instruction comprises the following core contents:
a first part: the Request Line (Request-Line) contains a Request domain name (URL), a Method name (Method);
a second part: the message header (message head) contains routing information (Via domain), sender (From domain), destination address (To domain);
third section: the message body (MessageBody) contains the requested data content.
S2: after receiving the data request, the lower service analyzes the message body content, and queries the data to be sent from the background data to the memory table.
S3: the subordinate service starts an analysis algorithm in real time to perform intelligent analysis on the data size, and the size rule can be set through external dynamic setting or default setting of a system, and the rule refers to the data size of 2/3 of the MTU (maximum transmission unit).
S4: splitting data into N data units according to transmission requirements after analysis, carrying out SIP signaling packaging and data body encryption on each data unit, and packaging into an encrypted data packet;
the data package is to extend a message head part of an SIP protocol, and add a Date field and a Note field, wherein the Date field is used for carrying time of each transmission, the Note field is used for encrypting data of a key field, the encrypted data comprises time, a method name, a to field and a CALLID, and the capability of checking signaling integrity during each signaling transmission is ensured through the two extended fields;
the method comprises the step of adding a Date field and a Note field on the basis of a basic signaling field of an SIP protocol, so that the capability of checking the integrity of signaling in each signaling transmission is ensured, and the format is specifically as follows.
Date:yyyy-mm-ddThh:mm:ss.mmm;
Note:nonce=”xxxxxxxxxxxxxxxxxxxxxxxxxxddeexxxxxxxxxxxxxxxx”,
algorithm=SM3;
Wherein the time format must be yyyy-mm-ddThh: mm: ss.mmm format.
The length of the nonce value exceeds 128 bytes, calculated as:
base64[ SM3[ METHOD+from+to+date+CallID+Messaging ] ].
S5: completing the sequence number marking of each data packet, ensuring the disorder problem in the data packet transmission, expanding Content-type header domain information in the SIP protocol, including expanding ID, order and total, so that the signaling transmission of the information endows the data packet with the capability, wherein the ID is a unique identifier and is used for representing the number of all packets; the order is a sequence field used for representing the sub-packaging sequence; the total is the total number of sub-packets and represents the number of sub-packets.
The following is an example of header field information split into 4 segments:
Content-Type:Message/Partial;order=1;total=4;id="F4345678";
Content-Type:Message/Partial;id="F4345678";order=2;total=4;
Content-Type:Message/Partial;id="F4345678";order=4;total=4;
Content-Type:Message/Partial;id="F4345678";order=3;total=4。
s6: and defining rules and constraints of packet reassembly of SIP protocol transmission, and ensuring data development and security.
The rules are as follows:
(1) The fragmentation agent must split the message only with the boundary line.
(2) All header fields from the original nested Message must be copied into the new Message except those in "Content-" or specific header fields "Subject", "Message-ID".
(3) Each message reassembles only the new message content, and other additional information is discarded in the reassembly.
(4) The message body length proposal for each single segmented message remains within 1000 bytes, ensuring that the data is not limited by the ethernet MTU.
The constraints are as follows:
(1) For each segmented MESSAGE, the three parameters "id", "order" and "total" specified by the header Content-Type header field must be carried over.
(2) For Message entity Message-ID header field adopting segmented transmission, for response Message, message-ID carried by response Message should be consistent with Message-ID carried by request Message, so that corresponding request Message can be found through Message-ID of response Message.
(3) The Content-type header field information in the extended SIP protocol is encrypted and decrypted in the sequence of total+according to order.
S7: and (3) carrying out encryption operation on a message body in the data packet, expanding Content-type header domain information in the SIP protocol, expanding destype, encrypting the ID, order, total according to a formulated encryption mode, and ensuring the security of each data transmission of the SIP.
The destype is an encryption type in the following format, and represents encryption modes such as (DES: DES encryption mode, MD5: MD5 encryption, SM1/SM2/SM3/SM4: national encryption: SM1/SM2/SM3/SM 4), and the following example is encryption mode based on national encryption SM 3:
Content-Type:destype="SM3"
encrypted content = Base64[ SM3[ method+from+to+date+callid+message body ] ].
The following description is made using examples:
each message body carries a basic message header (MessageHead) and two main parts of the message body. The message header (message head) main core content includes:
message body header information: carrying a protocol version of the message SIP signaling.
Via Domain: the nodes or routes through which the signaling passes carry all the nodes and the detailed information of each node which pass through the middle of the message body, so that the safe and accurate transmission of the data is ensured.
From domain: the sender's detailed information is carried, and the sender's domain name information, port number, tag value and the like are included.
To domain: the detailed information of the carrying receiver contains domain name and port number information.
The Content-Type field is an extension field, carrying a packet identifier, an ID of each packet, wherein each ID is unique and unchanged in the transmission, a sequence number (Order) guarantees the number set by the sequence of the packets, a start value starts from 1, a total number (total) of the packets is carried to guarantee whether the packet loss condition of the data is checked when the packets are recombined after the transmission, and a encryption algorithm Type (destype) is carried.
Message body (MessageBody): mainly contains encrypted data fragments, the fragment size of the message body is constrained by the size of the intelligent analysis in S3.
Examples of message transmission formats are as follows:
DataTran-Version:1.0\r\n
Content-Type message body Type [ optional, message entity carried optional \r\n ]
Content-Length message entity Length \r\n [ optional ]
… … message packet 1
DataTran-Version:1.0\r\n
Content-Type message body Type [ optional, message entity carried optional \r\n ]
Content-Length message entity Length \r\n [ optional ]
… … message packet 2
DataTran-Version:1.0\r\n
Content-Type message body Type [ optional, message entity carried optional \r\n ]
Content-Length message entity Length \r\n [ optional ]
… … message packetization 3
S8: after receiving the data packet, the superior service performs data reorganization, firstly stores the data packet into a memory table, and identifies the integrity of the data packet according to the total number and sequence number of the message, and the incomplete data packet is not analyzed.
S9: data decryption is carried out on the data of each memory table, decryption rules refer to encryption and decryption in a message body, constraint is carried out, after completion, the decoded data of each memory table are recombined according to the sequence number, the message body of the SIP is added, the message body is restored into the original message body, and the restored message body is exemplified as follows:
MESSAGE sip:jydcs.cnjy@jydce.cnjy:9902SIP/2.0
Via:SIP/2.0/UDP 188.18.45.246:5062;rport;branch=z9hG4bK3708622041
From:<sip:jydcs.cnjy@hubjy.cnjy:9902>;tag=61430332
To:<sip:jydcs.cnjy@jydcs.cnjy:9902>
Call-ID:3211263582@188.18.45.246
CSeq:20MESSAGE
Content-Type:Message/Partial;id="F4345678";order=1;
total=2,destype="SM3"
DataTran-Version:1.0
Max-Forwards:120
User-Agent:JYD-2
Expires:120
Content-Length:768
DataTran-Version:1.0
.MessageBody
the MessageBody represents a complete packet, which is a decrypted, packetized, reassembled message body.
When the data is transmitted based on the SIP protocol, firstly, data size assessment is carried out, intelligent data splitting is carried out by referring to the influence of MTU on the network transmission data size, intelligent recombination is carried out after the receiving party receives the data, the integrity of the big data is ensured, the encryption transmission is carried out on the message body, and the data security is ensured. Has the following characteristics:
(1) A mechanism for intelligently analyzing data packets of the SIP protocol is newly defined, and the data packets can be freely grouped according to network conditions.
(2) The method newly defines the packet splitting rule based on the existing protocol in the industry and solves the problem of packet loss and disorder of data.
(3) The security problem in the outgoing transmission of the SIP protocol is optimized, and network data interception and data tampering are guaranteed.
(4) The format of data transmission is well defined and various types of data can be transmitted based on the SIP protocol.
The packetizing and reassembling method for the big data safety transmission of the online inspection system effectively solves the problem of safety and integrity of the business on the big data transmission, improves the data transmission capacity and can expand more business data.

Claims (9)

1. A method for subcontracting and reorganizing big data security transmission of an online inspection system comprises the following steps:
s1: the superior service sends a data request instruction to the inferior service;
s2: after receiving the data request, the lower-level service analyzes the content of the message body, and queries the data to be sent from the background data to the memory table;
s3: the lower-level service starts an analysis algorithm in real time to analyze the data size, and the size rule is set by external dynamic setting or default system setting;
s4: splitting data into N data units according to transmission requirements, performing SIP signaling packaging and data body encryption on each data unit, and packaging the data units into encrypted data packets;
s5: completing the serial number marking of each data packet, expanding Content-type header domain information in the SIP protocol, including expanding ID, order and total, so that signaling transmission of the data packet is endowed with the capability of data packet, wherein the ID is a unique identifier and is used for representing the serial numbers of all packets; the order is a sequence field used for representing the sub-packaging sequence; the total is the total number of sub-packets and represents the number of sub-packets;
s6: defining rules and constraints of packet reassembly of SIP protocol transmission, and ensuring data development and security;
s7: the Content-type header domain information in the SIP protocol is expanded by carrying out encryption operation on the message body in the data packet, destype is expanded, and the ID, order, total is encrypted according to a formulated encryption mode;
s8: after receiving the data packet, the superior service performs data reorganization, firstly stores the data packet into a memory table, and identifies the integrity of the data packet according to the total number and sequence number of the message, wherein the incomplete data packet is not analyzed;
s9: and (3) decrypting the data of each memory table, wherein the decryption rule refers to encryption and decryption in the message body, and the decryption rule is constrained, and after the decryption, the decoded data of each memory table are recombined according to the sequence number, and the message body added with the SIP is restored into the original message body.
2. The method for packetizing and reassembling the secure transmission of big data for an online inspection system of claim 1, wherein: in step S1, the data request instruction includes a request line, a message header, and a message body, where the request line includes a request domain name and a method name; the message header comprises routing information, a sender and a destination address; the message body contains the requested data content.
3. The method for packetizing and reassembling the secure transmission of big data for an online inspection system of claim 1, wherein: in step S3, the size rule is 2/3 of the MTU.
4. The method for packetizing and reassembling the secure transmission of big data for an online inspection system of claim 1, wherein: in step S4, the data wrapper is to extend the message head part of the SIP protocol, and add a Date field and a Note field, where the Date field refers to the time of carrying each transmission, the Note field refers to the encrypted data of the key field, and the encrypted data includes time, a method name, a to field and a CALLID, and through the two extended fields, the encrypted data is used to ensure the capability of checking the integrity of the signaling during each signaling transmission.
5. The method for packetizing and reassembling the secure transmission of big data for an online inspection system of claim 4, wherein: on the basis of the basic signaling field of the SIP protocol, a Date field and a Note field are added, and the following format is specific:
Date:yyyy-mm-ddThh:mm:ss.mmm;
Note:nonce=”xxxxxxxxxxxxxxxxxxxxxxxxxxddeexxxxxxxxxxxxxxxx”,
algorithm=SM3;
wherein, the time format must be yyy-mm-ddThh: mm: ss.mmm format;
the length of the nonce value exceeds 128 bytes, calculated as:
base64[ SM3[ METHOD+from+to+date+CallID+Messaging ] ].
6. The method for packetizing and reassembling the secure transmission of big data for an online inspection system of claim 1, wherein: in step S6, the rule includes:
(1) The slicing agent must divide the message only by the boundary line;
(2) All header fields from the original nested Message must be copied into the new Message except in "Content-" or specific header fields "Subject", "Message-ID";
(3) Each message only reorganizes new message content, and other additional information is abandoned in the reorganization;
(4) The message body length of each single segmented message is kept within 1000 bytes, ensuring that the data is not limited by the ethernet MTU.
7. The method for packetizing and reassembling the secure transmission of big data for an online inspection system of claim 1, wherein: in step S6, the constraint includes:
(1) For each segmented MESSAGE, the three parameters "id", "order" and "total" specified by the header Content-Type header field must be carried;
(2) For Message-ID header fields of Message entities adopting segmented transmission, for response messages, message-IDs carried by the response messages should be consistent with Message-IDs carried by the request messages, so that corresponding request messages can be found through the Message-IDs of the response messages;
(3) The Content-type header field information in the extended SIP protocol and the extended destype are encrypted one by one in the order of total+order.
8. The method for packetizing and reassembling the secure transmission of big data for an online inspection system of claim 1, wherein: in step S7, the destype is an encryption type, and the encryption method includes:
des: a DES encryption mode;
MD5, MD5 encryption;
SM1/SM2/SM3/SM4: guomai (national density): SM1/SM2/SM3/SM4;
encrypted content = Base64[ SM3[ method+from+to+date+callid+message body ] ].
9. The method for packetizing and reassembling the secure transmission of big data for an online inspection system of claim 1, wherein: in step S7, various types of data can be transmitted based on the SIP protocol by defining the format of data transmission.
CN202211656649.XA 2022-12-22 2022-12-22 Subcontracting recombination method for big data safety transmission of online inspection system Pending CN116233275A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211656649.XA CN116233275A (en) 2022-12-22 2022-12-22 Subcontracting recombination method for big data safety transmission of online inspection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211656649.XA CN116233275A (en) 2022-12-22 2022-12-22 Subcontracting recombination method for big data safety transmission of online inspection system

Publications (1)

Publication Number Publication Date
CN116233275A true CN116233275A (en) 2023-06-06

Family

ID=86588223

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211656649.XA Pending CN116233275A (en) 2022-12-22 2022-12-22 Subcontracting recombination method for big data safety transmission of online inspection system

Country Status (1)

Country Link
CN (1) CN116233275A (en)

Similar Documents

Publication Publication Date Title
EP1611726B1 (en) Methods and apparatus for secure and adaptive delivery of multimedia content
CN101047711B (en) Method for IP message transmitting, bargaining bandwidth saving ability and saving network bandwidth
CN101370004A (en) Distribution method and multicast apparatus for multicast conversation security policy
CN104717220B (en) Based on the encrypted control signaling safe transmission method of hardware
Fischlin et al. Data is a stream: Security of stream-based channels
US20240114010A1 (en) Systems and methods for encrypting and transmitting data packets using a unicast address
EP2124379A1 (en) A method and system for distributing secret keys of media stream
WO2012116628A2 (en) Ims network, and data transmission method and device
CN101764825B (en) Data transmission method of virtual private network, system thereof, terminal thereof and gateway equipment thereof
CN113784298B (en) Communication system of big dipper short message based on quantum key
US20170237720A1 (en) System and method of encrypted media encapsulation
US7484098B2 (en) Data non repudiation
CN109714295A (en) A kind of voice encryption/decryption synchronization processing method and device
CN116233275A (en) Subcontracting recombination method for big data safety transmission of online inspection system
CN114826748B (en) Audio and video stream data encryption method and device based on RTP, UDP and IP protocols
CN102185827A (en) Firewall-penetrating method of voice in VOIP (Voice Over Internet Protocol) system
CN101547208A (en) Session enciphering method and voice terminal
CN113098864B (en) Data transmission system
Grozev et al. PERC double media encryption for WebRTC 1.0 sender simulcast
Kim et al. Implementation of quality of service control and security based on real-time transport protocol
Begen et al. Duplication Delay Attribute in the Session Description Protocol
WO2015032734A1 (en) Srtp protocol extension
CN102238377B (en) Data transmission method and device for video monitoring system
CN116527680A (en) Load balancing method, system and computer medium of IPSecVPN (Internet protocol secure private network)
CN112333204A (en) 5G network transmission security device based on TCP IP protocol disorder feature code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination