CN116634196A - Audio/video conference method and system with data encryption and decryption functions - Google Patents

Audio/video conference method and system with data encryption and decryption functions Download PDF

Info

Publication number
CN116634196A
CN116634196A CN202310619665.XA CN202310619665A CN116634196A CN 116634196 A CN116634196 A CN 116634196A CN 202310619665 A CN202310619665 A CN 202310619665A CN 116634196 A CN116634196 A CN 116634196A
Authority
CN
China
Prior art keywords
audio
decryption
encryption
video stream
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310619665.XA
Other languages
Chinese (zh)
Inventor
陈吉思
杜恒
李宇博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Technology Changjiang Data Co ltd
Original Assignee
China Electronics Technology Changjiang Data Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electronics Technology Changjiang Data Co ltd filed Critical China Electronics Technology Changjiang Data Co ltd
Priority to CN202310619665.XA priority Critical patent/CN116634196A/en
Publication of CN116634196A publication Critical patent/CN116634196A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/242Synchronization processes, e.g. processing of PCR [Program Clock References]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application discloses an audio and video conference method and system with a data encryption and decryption function, and relates to the field of audio and video conference research and development. The method comprises the following steps: generating a dedicated encryption key and a decryption key corresponding to the current meeting, sending the encryption key to an encryption party, and sending the decryption key to a decryption party; the encryption party encrypts the audio and video stream in the H264 format through the encryption key, then forwards the encrypted audio and video stream to the decryption party, decrypts the Fang Shoudao audio and video stream, and then decrypts the audio and video stream through the decryption key. According to the method and the device, the conference audio and video stream is encrypted by adding the secret key corresponding to the conference, and even if the situation that other people abnormally acquire the audio and video stream in the prior art occurs, the specific information cannot be decrypted and cannot be known, so that the safety performance is remarkably improved.

Description

Audio/video conference method and system with data encryption and decryption functions
Technical Field
The application relates to the field of audio/video (audio and video) conference research and development, in particular to an audio/video conference method and system with a data encryption and decryption function.
Background
An audio-video conference system is a teleconference that provides audio and video services through network communication, where participating users of the conference include at least 1 (i.e., a presenter) and several participants (i.e., participants), the roles of the initiator and participant being interchangeable at any time. At present, the conference flow of the existing audio-video conference system is generally: entering the appointed meeting room through the user ID and the password, the main talker starts the meeting, and corresponding audio and video streams (namely, audio streams and video streams) in the main talker terminal are forwarded to the other users through forwarding devices (such as routers, light cats and the like).
Although the audio and video conference system avoids abnormal participation of other personnel and acquires conference information (namely, acquires audio and video streams of a conference) by means of the user ID and the appointed conference room, people can steal the conference information through other network means, for example, a stealer controls forwarding equipment of an initiator, and a terminal for forwarding conference contents to the stealer can be arranged; namely, the stealer can acquire the conference information without the user ID and the password, and certain hidden danger exists in safety.
Disclosure of Invention
Aiming at the defects in the prior art, the application solves the technical problems as follows: when an audio-video conference is carried out, encrypting an audio-video stream of the conference on an initiator in real time, and decrypting the audio-video stream on a participant; therefore, even if other people acquire the audio and video stream of the conference abnormally, specific information cannot be known because the audio and video stream is encrypted, and the safety performance is improved obviously.
In order to achieve the above purpose, the audio/video conference method with the data encryption and decryption function provided by the application comprises the following steps: generating a dedicated encryption key and a decryption key corresponding to the current meeting, sending the encryption key to an encryption party, and sending the decryption key to a decryption party; the encryption party encrypts the audio and video stream in the H264 format through the encryption key, then forwards the encrypted audio and video stream to the decryption party, decrypts the Fang Shoudao audio and video stream, and then decrypts the audio and video stream through the decryption key.
On the basis of the technical scheme, the process of encrypting the audio and video stream in the H264 format by the encryption party through the encryption key comprises the following steps: taking the encryption key as a separator and inserting the encryption key into the audio and video stream at intervals; the process of decrypting the audio and video stream by the decryption key comprises the following steps: the delimiter is decrypted and decoded by a decryption key.
On the basis of the technical scheme, the process of generating the exclusive encryption key and the decryption key corresponding to the current meeting comprises the following steps: generating a digital ring connected end to end according to the current encryption party ID and decryption party ID; sequentially selecting digits of digits required by the separator on the digit ring as an encryption key and a decryption key; the process of taking the encryption key as a separator and inserting the encryption key into the audio and video stream at intervals comprises the following steps: sequentially inserting separators into the audio and video streams according to the generation sequence of the encryption keys; the process of decrypting and decoding the separator by the decryption key includes: and obtaining a decryption key corresponding to the encryption key in the separator, and decrypting and decoding the audio and video stream.
On the basis of the technical scheme, before the audio and video stream is forwarded to the decryption party, the method further comprises the following steps: inserting a time synchronization frame in the audio/video stream, and forwarding the decoding mode of the time synchronization frame to a decryption party; the process of obtaining the decryption key corresponding to the encryption key in the separator includes: and decoding the time synchronization frame to obtain playing time, and determining a decryption key corresponding to the encryption key in the separator according to the playing time.
On the basis of the technical scheme, after the separator is inserted into the audio-video stream, before the audio-video stream is forwarded, the method further comprises the following steps: the same data as the delimiter in the video stream is subjected to an anti-contention endian process that produces only a single pixel color shift.
The application provides an audio/video conference system with a data encryption and decryption function, which comprises a key generation module arranged on a server, an encrypted data module arranged on a client, a decrypted data module and an audio/video stream transmission module;
the key generation module is used for: generating an encryption key and a decryption key which are exclusive to the current conference, sending the encryption key to an encryption party, and sending the decryption key to a decryption party;
the encryption data module is used for: the audio and video stream in the H264 format is encrypted through an encryption key and then forwarded to a decryption party through a server;
the decryption data module is used for: and decrypting the received audio and video stream by the decryption key.
On the basis of the technical scheme, the workflow of the encrypted data module comprises the following steps: taking the encryption key as a separator and inserting the encryption key into the audio and video stream at intervals; the workflow of the decryption data module comprises: the delimiter is decrypted and decoded by a decryption key.
On the basis of the technical scheme, the workflow of the key generation module comprises the following steps: generating a digital ring connected end to end according to the encryption party ID and the decryption party ID; sequentially selecting digits of digits required by the separator on the digit ring as an encryption key and a decryption key; the workflow of the encryption data module taking the encryption key as a separator and inserting the encryption key into the audio and video stream at intervals comprises the following steps: sequentially inserting separators into the audio and video streams according to the generation sequence of the encryption keys; the workflow of the decryption data module for decrypting and decoding the separator by the decryption key comprises the following steps: and obtaining a decryption key corresponding to the encryption key in the separator, and decrypting and decoding the audio and video stream.
On the basis of the technical scheme, the system further comprises a time synchronization module arranged on the server or the client, and the time synchronization module is used for: before the audio and video stream is forwarded to the decryption party, inserting a time synchronization frame in the audio and video stream, and forwarding the decoding mode of the time synchronization frame to the decryption party; the process of obtaining the decryption key corresponding to the encryption key in the separator by the decryption data module comprises the following steps: and decoding the time synchronization frame to obtain playing time, and determining a decryption key corresponding to the encryption key in the separator according to the playing time.
Based on the above technical solution, the system further includes an anti-contention endian processing module disposed on the server or the client, which is configured to: before forwarding the audio-video stream, the same data as the delimiters in the video stream is subjected to an anti-contention endian process that only produces a single pixel color shift.
Compared with the prior art, the application has the advantages that:
according to the method and the device, the conference audio and video stream is encrypted by adding the secret key corresponding to the conference, and even if the situation that other people abnormally acquire the audio and video stream in the prior art occurs, the specific information cannot be decrypted and cannot be known, so that the safety performance is remarkably improved.
Meanwhile, the encryption key and the decryption key are obtained in the special digital ring for the conference in an iterative way, so that the continuous change of the key is realized, the situation that other people can decrypt the audio and video stream by obtaining one decryption key in an abnormal way is avoided, and the safety performance is further improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of an audio/video conference method with a data encryption and decryption function in an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
The audio/video conference method with the data encryption and decryption functions in the embodiment of the application comprises the following steps: generating a dedicated encryption key and a decryption key corresponding to the current conference, sending the encryption key to software used by an encryption party (hereinafter referred to as an encryption party, namely an initiating party), and sending the decryption key to software used by a decryption party (hereinafter referred to as a decryption party, namely other participating parties); the encryption party encrypts the audio and video stream in the H264 format through the encryption key and then forwards the encrypted audio and video stream to the decryption party, and after decrypting Fang Shoudao the audio and video stream, the audio and video stream is decrypted through the decryption key and played.
Therefore, the conference audio and video stream is encrypted by the exclusive secret key corresponding to the conference, and even if the audio and video stream is abnormally acquired by other people in the prior art, the security performance is remarkably improved because the specific information cannot be decrypted and cannot be known.
The development process and principle of encryption and decryption of the present application are described below.
The audio/video stream decoding method of the H264 format is as follows: the video stream is segmented by a plurality of segmentation frames to realize frame decoding, wherein the segmentation frames are commonly public characters such as 001 or 0001; to this end, in order to avoid the multiple steps of decoding and decrypting the audio-video stream, the present application needs to implement how to change the split frames into encrypted form, so that the decryption and decoding can be "integrated", i.e. the decoding operation is completed at the same time as the decryption.
Therefore, the process of encrypting the audio and video stream in the H264 format by the encryptor through the encryption key in the method comprises the following steps: inserting the encryption key as a separator into the audio/video stream at intervals (i.e. a plurality of frames are spaced between adjacent separators, in this embodiment 9999 frames, how a delayed access time of about 6 minutes can be achieved); the method comprises the following steps of: the delimiter is decrypted and decoded by a decryption key.
Further, the process of generating the exclusive encryption key and the decryption key corresponding to the current meeting in the method comprises the following steps: and generating a digital ring connected end to end according to the current encryption party ID and decryption party ID (for example, the encryption party ID and the decryption party ID are 16 bits, and the number of the decryption parties is 2, and the digital ring comprises 16-by-3 digits). And sequentially selecting numbers on the number ring by taking the number of bits required by the separator as a unit to generate an encryption key and a decryption key (namely, the length of the key is the same as that of the separator, and the encryption key and the decryption key are the same array). The method comprises the following steps of taking an encryption key as a separator and inserting the encryption key into an audio/video stream at intervals: sequentially inserting separators into the audio and video streams according to the generation sequence of the encryption keys; the process of decrypting and decoding the separator by the decryption key in the method comprises the following steps: and obtaining a decryption key corresponding to the encryption key in the separator, and decrypting and decoding the audio and video stream.
Therefore, the application also considers the uniqueness of the encryption key and the decryption key, so as to avoid the situation that other people can decrypt the audio and video stream by acquiring a decryption key abnormally, and further improve the safety performance.
Further, the method further comprises the following steps before forwarding the audio/video stream to the decryption party: inserting time synchronization frames (the interval between adjacent time synchronization frames is 100 frames in the embodiment) in the audio and video stream, and forwarding the decoding mode of the time synchronization frames (the decoding mode of each time synchronization frame is the same) to a decryption party; on this basis, the process of obtaining the decryption key corresponding to the encryption key in the separator includes: and decoding the time synchronization frame to obtain playing time, and determining a decryption key corresponding to the encryption key in the separator according to the playing time.
Therefore, the application can locate the specific decryption key needed to be used for decryption in the audio and video stream by introducing the time synchronization frame, so that even if the participant in the conference is seen later, the audio and video stream can be decrypted and decoded, and the condition that the user does not know which decryption key to decrypt due to the fact that the audio and video stream before the audio and video stream is not received is avoided.
Further, after inserting the separator in the audio-video stream, the method further comprises the following steps before forwarding the audio-video stream: the purpose of performing anti-contention endian processing (e.g. adding 1 or subtracting 1 to the same data) that only generates a single pixel color offset on the same data in the video stream is to prevent the decryption party from decrypting the same data in the video stream as the separator, thereby affecting the playback of the audio/video stream.
The method of the application is illustrated by a specific example with reference to fig. 1.
S1: after the initiator and the participants enter the conference, the server generates a digital ring (the digital ring comprises 16 x n digits) connected end to end according to the user IDs (16 digits) of the initiator and the rest of the participants. Sequentially selecting numbers on the digital ring to generate an encryption key and a decryption key by taking the number of bits required by the separator as a unit (4 bits); the encryption key is sent to the participants and the decryption key is sent to the remaining participants, proceeding to S2.
S2: after the initiator acquires the audio and video stream, sequentially inserting the encryption keys into the audio and video stream in the H264 format according to the generation sequence of the encryption keys, and simultaneously taking the encryption keys as separators, wherein 9999 frames are spaced between adjacent separators; and (3) carrying out 1 adding processing on the data which are the same as the separator in the video stream, and turning to S3.
S3: inserting time synchronization frames into the audio and video stream, wherein the interval between adjacent time synchronization frames is 100 frames; and forwarding the decoding modes of the audio and video stream and the time synchronization frame to other participants through a server, wherein the server can reduce the audio and video stream to backup, and then the step S4 is performed.
S4: after receiving the audio and video stream, the participant decodes the time synchronization frame to obtain the playing time, determines the decryption key corresponding to the encryption key in the separator according to the playing time, and decrypts and decodes the audio and video stream through the decryption key, so that even if the audio and video stream is accessed in a delayed manner (the initial 9999 frames are missed), the frame synchronization can be realized within 4 seconds, and the process goes to S5.
Meanwhile, in the process of executing S4, a frame discard policy is also executed, for example, the current frame counter is 8000, the received frame is 7998, and at this time, the frame corresponding to the current frame is the previous frame, and this frame is discarded.
S5: and after the audio and video rendering operation is carried out on the content frames of the decoded audio and video stream, converting the content frames into a live stream coded by the standard H264 for playing.
Of course, the application also comprises the necessary functions of the current conference, such as compatible public network and intranet, audio and video conference delay control, controllable conference archiving and searchable permission, etc., and will not be described herein.
The audio/video conference system with the data encryption and decryption functions comprises a key generation module arranged on a server, an encrypted data module, a decrypted data module and an audio/video streaming transmission module which are arranged on a client.
The key generation module is used for: generating an encryption key and a decryption key which are exclusive to the current conference, sending the encryption key to an encryption party, and sending the decryption key to a decryption party; the method comprises the following steps: generating a digital ring connected end to end according to the encryption party ID and the decryption party ID; the digits of the digits required by the separator are sequentially selected on the digit ring as an encryption key and a decryption key.
The encryption data module is used for: after encrypting the audio and video stream in the H264 format by the encryption key, forwarding the decryption party by the server (taking the encryption key as a separator and inserting the encryption key into the audio and video stream at intervals); the method comprises the following steps: sequentially inserting separators into the audio and video streams according to the generation sequence of the encryption keys;
the decryption data module is used for: decrypting the received audio-video stream with the decryption key (decrypting and decoding the separator with the decryption key); the method comprises the following steps: and obtaining a decryption key corresponding to the encryption key in the separator (decoding the time synchronization frame to obtain the playing time, and determining the decryption key corresponding to the encryption key in the separator according to the playing time), and decrypting and decoding the audio and video stream.
The system also includes an anti-race endian processing module disposed on the server or the client for: before forwarding the audio-video stream, the same data as the delimiters in the video stream is subjected to an anti-contention endian process that only produces a single pixel color shift.
The system also comprises other necessary functional modules, such as a user playing module (arranged at a client) for playing the audio and video stream, a conference module (arranged at the client) for recording and video recording to form the audio and video stream, a backup module (arranged at a server) for backing up the audio and video stream, and the like.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer-readable storage media, which may include computer-readable storage media (or non-transitory media) and communication media (or transitory media).
The term computer-readable storage medium includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer-readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer-readable storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
By way of example, the computer readable storage medium may be an internal storage unit of the electronic device of the foregoing embodiments, such as a hard disk or a memory of the electronic device. The computer readable storage medium may also be an external storage device of the electronic device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device.
The foregoing is merely a specific implementation of the embodiment of the present application, but the protection scope of the embodiment of the present application is not limited thereto, and any person skilled in the art may easily think of various equivalent modifications or substitutions within the technical scope of the embodiment of the present application, and these modifications or substitutions should be covered in the protection scope of the embodiment of the present application. Therefore, the protection scope of the embodiments of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An audio/video conference method with a data encryption and decryption function is characterized by comprising the following steps: generating a dedicated encryption key and a decryption key corresponding to the current meeting, sending the encryption key to an encryption party, and sending the decryption key to a decryption party; the encryption party encrypts the audio and video stream in the H264 format through the encryption key, then forwards the encrypted audio and video stream to the decryption party, decrypts the Fang Shoudao audio and video stream, and then decrypts the audio and video stream through the decryption key.
2. The audio-video conference method with the data encryption and decryption function as set forth in claim 1, wherein: the process of encrypting the audio and video stream in the H264 format by the encryptor through the encryption key comprises the following steps: taking the encryption key as a separator and inserting the encryption key into the audio and video stream at intervals; the process of decrypting the audio and video stream by the decryption key comprises the following steps: the delimiter is decrypted and decoded by a decryption key.
3. The audio-video conference method with the data encryption and decryption functions as set forth in claim 2, wherein: the process for generating the exclusive encryption key and the decryption key corresponding to the current meeting comprises the following steps: generating a digital ring connected end to end according to the current encryption party ID and decryption party ID; sequentially selecting digits of digits required by the separator on the digit ring as an encryption key and a decryption key; the process of taking the encryption key as a separator and inserting the encryption key into the audio and video stream at intervals comprises the following steps: sequentially inserting separators into the audio and video streams according to the generation sequence of the encryption keys; the process of decrypting and decoding the separator by the decryption key includes: and obtaining a decryption key corresponding to the encryption key in the separator, and decrypting and decoding the audio and video stream.
4. The audio-video conference method with the data encryption and decryption function as set forth in claim 3, wherein: before the audio and video stream is forwarded to the decryption party, the method further comprises the following steps: inserting a time synchronization frame in the audio/video stream, and forwarding the decoding mode of the time synchronization frame to a decryption party; the process of obtaining the decryption key corresponding to the encryption key in the separator includes: and decoding the time synchronization frame to obtain playing time, and determining a decryption key corresponding to the encryption key in the separator according to the playing time.
5. The audio-video conference method with the data encryption and decryption function according to claim 4, wherein: after inserting the separator in the audio-video stream, before forwarding the audio-video stream, the method further comprises the following steps: the same data as the delimiter in the video stream is subjected to an anti-contention endian process that produces only a single pixel color shift.
6. An audio-video conference system with data encryption and decryption functions is characterized in that: the system comprises a key generation module arranged on a server, an encrypted data module, a decrypted data module and an audio/video streaming transmission module which are arranged on a client;
the key generation module is used for: generating an encryption key and a decryption key which are exclusive to the current conference, sending the encryption key to an encryption party, and sending the decryption key to a decryption party;
the encryption data module is used for: the audio and video stream in the H264 format is encrypted through an encryption key and then forwarded to a decryption party through a server;
the decryption data module is used for: and decrypting the received audio and video stream by the decryption key.
7. The audio-video conference system with data encryption and decryption functions according to claim 6, wherein: the workflow of the encryption data module comprises: taking the encryption key as a separator and inserting the encryption key into the audio and video stream at intervals; the workflow of the decryption data module comprises: the delimiter is decrypted and decoded by a decryption key.
8. The audio-video conference system with data encryption and decryption functions according to claim 7, wherein: the workflow of the key generation module comprises: generating a digital ring connected end to end according to the encryption party ID and the decryption party ID; sequentially selecting digits of digits required by the separator on the digit ring as an encryption key and a decryption key; the workflow of the encryption data module taking the encryption key as a separator and inserting the encryption key into the audio and video stream at intervals comprises the following steps: sequentially inserting separators into the audio and video streams according to the generation sequence of the encryption keys; the workflow of the decryption data module for decrypting and decoding the separator by the decryption key comprises the following steps: and obtaining a decryption key corresponding to the encryption key in the separator, and decrypting and decoding the audio and video stream.
9. The audio-video conference system with data encryption and decryption functions according to claim 8, wherein: the system also includes a time synchronization module disposed on the server or the client for: before the audio and video stream is forwarded to the decryption party, inserting a time synchronization frame in the audio and video stream, and forwarding the decoding mode of the time synchronization frame to the decryption party; the process of obtaining the decryption key corresponding to the encryption key in the separator by the decryption data module comprises the following steps: and decoding the time synchronization frame to obtain playing time, and determining a decryption key corresponding to the encryption key in the separator according to the playing time.
10. The audio-video conference system with data encryption and decryption functions according to claim 9, wherein: the system also includes an anti-race endian processing module disposed on the server or the client for: before forwarding the audio-video stream, the same data as the delimiters in the video stream is subjected to an anti-contention endian process that only produces a single pixel color shift.
CN202310619665.XA 2023-05-29 2023-05-29 Audio/video conference method and system with data encryption and decryption functions Pending CN116634196A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310619665.XA CN116634196A (en) 2023-05-29 2023-05-29 Audio/video conference method and system with data encryption and decryption functions

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310619665.XA CN116634196A (en) 2023-05-29 2023-05-29 Audio/video conference method and system with data encryption and decryption functions

Publications (1)

Publication Number Publication Date
CN116634196A true CN116634196A (en) 2023-08-22

Family

ID=87641376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310619665.XA Pending CN116634196A (en) 2023-05-29 2023-05-29 Audio/video conference method and system with data encryption and decryption functions

Country Status (1)

Country Link
CN (1) CN116634196A (en)

Similar Documents

Publication Publication Date Title
JP6921075B2 (en) Secure hierarchical encryption of data streams
US7792296B2 (en) Access-controlled encrypted recording method for site, interaction and process monitoring
Chu et al. A secure multicast protocol with copyright protection
JP4698106B2 (en) System and method for copy protection of transmitted information
CN109218825B (en) Video encryption system
US7865723B2 (en) Method and apparatus for multicast delivery of program information
CN108449563A (en) To the method and system of audio and video encryption and decryption
CN104519013B (en) Ensure the method, apparatus and system of media stream safety
US20090154707A1 (en) Method and system for distributing group key in video conference system
JP2005505846A (en) Method and system for secure content distribution
US20060047976A1 (en) Method and apparatus for generating a decrpytion content key
CN112165596A (en) Monitoring video data transmission method and device, terminal equipment and storage medium
KR20060101788A (en) Method and conditional access system applied to the protection of content
CN113347215B (en) Encryption method for mobile video conference
US20210203486A1 (en) System and method for electronic conference verification and management
CN103535044A (en) Method of protecting a recorded multimedia content
CN110012260A (en) A kind of video conference content guard method, device, equipment and system
US8615650B2 (en) Control-word deciphering, transmission and reception methods, recording medium and server for these methods
US20220078169A1 (en) Methods, systems, and media for providing secure network communications
CN108768920B (en) Recorded broadcast data processing method and device
TW201203990A (en) Methods for decrypting, transmitting and receiving control words, recording medium and control word server to implement these methods
RU2554825C2 (en) Method of determining illegal use of processing device of security system
TWI448920B (en) Methods for transmitting, receiving and identifying, security processor and information-recording carrier for these methods
KR20050009227A (en) Individual video encryption system and method
US10200136B2 (en) Method for broadcasting protected multimedia contents

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination