CN117939057A - Method, device, equipment and medium for processing conference related data - Google Patents

Method, device, equipment and medium for processing conference related data Download PDF

Info

Publication number
CN117939057A
CN117939057A CN202410193667.1A CN202410193667A CN117939057A CN 117939057 A CN117939057 A CN 117939057A CN 202410193667 A CN202410193667 A CN 202410193667A CN 117939057 A CN117939057 A CN 117939057A
Authority
CN
China
Prior art keywords
data
encrypted
character
processed
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410193667.1A
Other languages
Chinese (zh)
Inventor
徐春龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haoxin Cloud Beijing Network Communication Co ltd
Original Assignee
Haoxin Cloud Beijing Network Communication Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haoxin Cloud Beijing Network Communication Co ltd filed Critical Haoxin Cloud Beijing Network Communication Co ltd
Priority to CN202410193667.1A priority Critical patent/CN117939057A/en
Publication of CN117939057A publication Critical patent/CN117939057A/en
Pending legal-status Critical Current

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the application provides a method, a device, equipment and a medium for processing conference related data, wherein the method is applied to a client, and comprises the following steps: obtaining encryption time; calculating according to the encryption time to obtain an operation result; selecting an encrypted character from the encrypted character string according to the operation result; and performing bit exclusive OR operation on the data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed, wherein the data to be processed comprises video conference related data. The embodiment of the application is simple and convenient to realize and can reduce the occupied space of data.

Description

Method, device, equipment and medium for processing conference related data
Technical Field
The present application relates to the field of video conferencing, and in particular, to a method, apparatus, device, and medium for processing conference related data.
Background
With the development of communication technology, in order to reduce unnecessary server interaction during the use process of software, most of software will choose to store some data locally and store the data locally, which can ensure that the files and data of the user are not lost due to network failure or other reasons. Second, it can increase the access speed of the user, thereby improving the work efficiency. For example, in a video conferencing scenario, a client may save some conference related data locally.
In the prior art, in order to ensure that the saved file is not intuitively acquired, the saved data is encrypted, and the existing client encryption scheme generally uses symmetric encryption methods such as an advanced encryption standard (Advanced Encryption Standard, AES) or a data encryption standard (Data Encryption Standard, DES) to encrypt. However, the existing encryption method has the problems of complex encryption and large occupied space.
Therefore, how to provide an encryption method that is simple and can reduce the occupied space is called as a problem to be solved.
Disclosure of Invention
An object of an embodiment of the present application is to provide a method, an apparatus, a device, and a medium for processing conference related data, which implement simple data processing and can reduce the occupied space of data by using the technical solution of the embodiment of the present application.
In a first aspect, an embodiment of the present application provides a method for processing conference related data, applied to a client, where the method includes: obtaining encryption time; calculating according to the encryption time to obtain an operation result; selecting an encrypted character from the encrypted character string according to the operation result; and performing bit exclusive OR operation on the data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed, wherein the data to be processed comprises video conference related data.
According to the embodiment of the application, the encryption character is selected according to time, the encryption character is used for carrying out bitwise exclusive-or operation on the data to be processed, so that the encrypted data or the decrypted data corresponding to the data to be processed are obtained, and the data can be encrypted only through bitwise exclusive-or operation.
In one embodiment, the calculating according to the encryption time to obtain an operation result includes: performing sine operation on the encryption time to obtain an initial value; performing multiple rounding operation on the absolute value of the initial value to obtain the operation result; wherein the selecting the encrypted character from the encrypted character string according to the operation result includes: and selecting a character corresponding to the operation result from the encryption character string as the encryption character.
In one embodiment, before selecting an encrypted character from the encrypted character string according to the operation result, the method further includes: the encryption string is selected from a plurality of preset strings.
In one embodiment, the selecting the encrypted string from a plurality of preset strings includes: and selecting the encryption character string from the plurality of preset character strings according to the selection operation result of the encryption time.
In one embodiment, the selecting, from the encrypted character string, a character corresponding to the operation result as the encrypted character includes: selecting a plurality of characters from the encrypted character string in sequence with the operation result as a starting point to serve as the encrypted characters; the performing bitwise exclusive or operation on the data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed, where the method includes: and carrying out bit-wise exclusive-or operation on the data to be processed one by one according to the sequence of the plurality of characters, wherein the result of the previous bit-wise exclusive-or operation is used for carrying out the bit-wise exclusive-or operation on the next character, and after the last character bit-wise exclusive-or operation, obtaining the encrypted data or the decrypted data corresponding to the data to be processed, wherein the character sequence of the bit-wise exclusive-or operation corresponding to the obtained encrypted data is opposite to the character sequence of the bit-wise exclusive-or operation corresponding to the obtained decrypted data.
In one embodiment, the video conference related data includes: at least one of historical meeting information, meeting account numbers, account passwords, meeting records and last meeting option information.
In one embodiment, when the data to be processed is data to be encrypted, the encrypted character is used to perform bit exclusive or operation on the data to be processed to obtain encrypted data of the data to be processed; and when the data to be processed is encrypted data, performing bit exclusive OR operation on the data to be processed by using the encrypted character to obtain decrypted data of the data to be processed.
In a second aspect, an embodiment of the present application provides an apparatus for processing conference related data, comprising: an acquisition unit configured to acquire an encryption time; the operation unit is used for carrying out operation according to the encryption time to obtain an operation result; a selection unit for selecting an encrypted character from the encrypted character string according to the operation result; and the processing unit is used for carrying out bitwise exclusive OR operation on the data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed, wherein the data to be processed comprises video conference related data.
In one embodiment, the operation unit is specifically configured to perform sinusoidal operation on the encryption time to obtain an initial value; performing multiple rounding operation on the absolute value of the initial value to obtain the operation result; the selecting unit is specifically configured to select, from the encrypted character string, a character corresponding to the operation result as the encrypted character.
In one embodiment, the selecting unit is further configured to select the encrypted character string from a plurality of preset character strings before selecting the encrypted character from the encrypted character strings according to the operation result.
In one embodiment, the selecting unit is specifically configured to select the encrypted string from the plurality of preset strings according to a result of the selecting operation of the encryption time.
In one embodiment, the selecting unit is specifically configured to sequentially select, with the operation result as a starting point, a plurality of characters from the encrypted character string as the encrypted characters; the processing unit is specifically configured to perform a bitwise exclusive-or operation on the data to be processed one by one according to the sequence of the plurality of characters, where a result of a previous bitwise exclusive-or operation is used for performing a bitwise exclusive-or operation on a next character, and after a last character is subjected to the bitwise exclusive-or operation, encrypted data or decrypted data corresponding to the data to be processed is obtained, where an endian of the bitwise exclusive-or operation corresponding to the encrypted data is obtained and an endian of the bitwise exclusive-or operation corresponding to the decrypted data is opposite.
In one embodiment, the video conference related data includes: at least one of historical meeting information, meeting account numbers, account passwords, meeting records and last meeting option information.
In one embodiment, when the data to be processed is data to be encrypted, the encrypted character is used to perform bit exclusive or operation on the data to be processed to obtain encrypted data of the data to be processed; and when the data to be processed is encrypted data, performing bit exclusive OR operation on the data to be processed by using the encrypted character to obtain decrypted data of the data to be processed.
In a third aspect, an embodiment of the present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the method according to any of the first aspect and the implementation manner of the first aspect.
In a fourth aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor can implement the method according to any implementation of the first aspect and the first aspect when executing the program.
In a fifth aspect, an embodiment of the present application provides a computer program product, the computer program product comprising a computer program, wherein the computer program, when executed by a processor, is capable of implementing a method according to any implementation of the first aspect or the first aspect.
Drawings
In order to more clearly illustrate the technical solution of one embodiment of the present application, the following description will briefly explain the drawings required to be used in one embodiment of the present application, it being understood that the following drawings illustrate only some embodiments of the present application and are therefore not to be considered limiting of the scope, since other related drawings may be obtained by those skilled in the art without inventive effort.
Fig. 1 is a schematic view of a videoconferencing system according to an embodiment of the present application;
FIG. 2 is a flow chart of a method for processing meeting-related data according to one embodiment of the present application;
Fig. 3 is a schematic diagram of an apparatus for processing conference related data according to an embodiment of the present application;
fig. 4 is a schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application.
It should be appreciated that the client in the embodiments of the present application may be a client in any video conference system, which may be any form of conference system, for example, a hardware-based video conference system, a software-based video conference system, or a network video conference system. The following description will take the videoconferencing system as an example of a network videoconferencing system, for example, a system using Web Real-time communication (WebRTC) technology, but the embodiments of the present application are not limited thereto.
The multi-to-multi real-time communication multi-party communication architecture based on WebRTC mainly comprises the following three architectures: a Mesh (Mesh) architecture, that is, a plurality of clients are connected in pairs to form a Mesh structure, and can be interconnected with all other clients; the multipoint conference unit (Multipoint Conferencing Unit, MCU) architecture consists of a server and a plurality of clients, wherein each client sends own audio and video to the server, the server carries out mixed coding on all clients in the same room and sends the mixed audio and video to each client; the selective forwarding unit (SELECTIVE FORWARDING UNIT, SFU) architecture also comprises a server and a plurality of clients, but unlike MCU, SFU does not mix audio and video, and after receiving the audio and video stream shared by a certain client, it directly forwards the audio and video stream to other clients in the room. The SFU server acts as an audio-video routing repeater.
The overall composition of a videoconferencing system according to an embodiment of the present application is described below by way of example with reference to fig. 1. It should be understood that the system architecture in the embodiment of the present application may be any of the WebRTC three system architectures above, and may also be other conference systems. The following description is given by way of example only of an SFU architecture system, but embodiments of the present application are not limited thereto.
As shown in fig. 1, a video conference system according to an embodiment of the present application includes: the system comprises a plurality of clients, a control end and an SFU server.
In the embodiment of the application, the control end can also be called a management end or a signaling server, and is used for carrying out signaling interaction with the client to transfer necessary information required by connection establishment between the clients, and meanwhile, the control end is used for acquiring the subscription relation of the client and sending instructions to the client and the SFU server to determine the producer and the consumer based on the subscription relation. The control end in the embodiment of the application is used as a middleman to help the two parties to establish connection under the condition of exposing privacy as little as possible. The communication manner between the control end and the client and the SFU server may use any manner, for example, webSocket or XMLHttpRequest, etc. to exchange token information with each other, and embodiments of the present application are not limited thereto.
In the embodiment of the present application, the SFU server may be Mediasoup, janus, jitsi, kurento or Medooze, etc., and the embodiment of the present application is not limited thereto, and hereinafter, SFU is taken as Mediasoup as an example. The SFU server may receive instructions from the control side to manage the producer and consumer objects and may then decide whether to receive and/or send audio and/or video streams of the real-time communication from the client. It should be understood that the SFU server may also be called as an SFU or a forwarding server or a media forwarding server, and several calls of the SFU server may be replaced if not specifically described hereinafter, which is not limited by the embodiment of the present application. It should be understood that in the present application, the control end and the SFU may be two independent devices, or may be integrated on one device.
It should be understood that, in the embodiment of the present application, the client may also be referred to as a user side, a user device, or a terminal device, and in the real-time embodiment of the present application, the terminal device may be installed with a browser, and may perform real-time communication through the browser, or be installed with an APP or an applet, and perform real-time communication through the APP or the applet. The terminal device in the present application may include a smart phone, a tablet computer, (personal DIGITAL ASSISTANT, PDA personal digital assistant), a computer, a game machine, a wearable device, a tablet computer (portable android device, PAD), etc., which is not limited thereto.
It should be understood that the operating system running on the electronic device may be a Linux kernel-based operating system such as Android (Android) mobile version, ubuntu (Ubuntu) mobile version, tazier (Tizen) or the like, and a desktop operating system such as Windows, mac OS, linux or the like, but the present invention is not limited thereto.
In the embodiment of the present application, a terminal device may refer to an access terminal, a User Equipment (UE), a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a User terminal, a wireless communication device, a User agent, or a User Equipment. An access terminal may be a cellular telephone, a cordless telephone, a session initiation protocol (Session Initia tion Protocol, SIP) phone, a wireless local loop (Wireless Local Loop, WLL) station, a Personal digital assistant (Personal DIGITAL ASSISTANT, PDA), a handheld device with wireless communication capabilities, a computing device or other processing device connected to a wireless modem, an in-vehicle device, a wearable device, a terminal device in a 5G network or a terminal device in a future evolved public land mobile network (Public Land Mobile Network, PLMN), etc.
It should be understood that in the video conference system scenario shown in fig. 1, only two clients are illustrated, but the embodiments of the present application are not limited thereto, and in an actual real-time communication scenario, the number of clients may include any number, for example, 10, 50, 500, 5000, etc. according to the actual situation.
In order to prevent data loss caused by network faults and other factors in a conference system, a client needs to locally store conference related data, and in order to ensure the safety of the local storage, the client generally needs to encrypt and store the data. The existing client encryption scheme generally uses AES or DES symmetric encryption, and can also use base64 bit coding, and direct storage is realized after coding; however, the information after base64 encoding is about 1/3 larger than the original information, so that the space required for storage is larger than the original information; because AES and DES are symmetric encryption algorithms, relatively complex operations such as rectangular changes are involved, and files after encryption are also relatively large; meanwhile, the number of the encryption operations is relatively large, and the operation time and occupied space are relatively large.
In order to solve the problems in the prior art, the embodiment of the application provides a method for encrypting conference related data, which selects an encryption character according to time, uses the encryption character to perform bitwise exclusive-or operation on data to be processed to obtain encrypted data or decrypted data corresponding to the data to be processed, and can encrypt the data only by bitwise exclusive-or operation.
In the following, for ease of understanding and explanation, by way of example and not limitation, the execution process and actions of the method of real-time communication of the present application in a real-time communication system will be described.
A method for processing conference related data according to an embodiment of the present application is exemplarily described below with reference to fig. 2.
The method shown in fig. 2 is applied to a client in a real-time video conference system as shown in fig. 1 or a client in any other communication system, and the method shown in fig. 2 includes:
210, obtaining encryption time.
It is to be understood that the encryption time may be a time at which data is saved, or a preset time, for example, may be a time determined according to the saved time. For example, the encryption time is a time determined according to a time of encrypting the save data and a preset rule, for example, the preset rule is as follows: the encryption time is one of time points with continuous intervals of 5 minutes, for example, one of time points of 3:05 and 3:10 …, and the actual encryption time may be a preset time point nearest to the save time, for example, the save time is 3:06, and the encryption time is 3:05. Alternatively, the encryption time determination rule may be other rules, for example, the encryption time may be a time determined at two preset time points adjacent to the save time, for example, an intermediate time point between two adjacent time points, or the like. For example, the preset rule is a table with a preset correspondence between a save time and an encrypt time, where the encrypt time is an encrypt time corresponding to the save time determined by looking up a table, and the embodiment of the application is not limited thereto.
In practical application, after data encryption, the encrypted data and the time for storing the data can be stored, and when decryption, the encryption time is determined according to the time for storing the data. In correspondence with the above description, one case is that the encryption time is the time of saving the data, and the other case is that the encryption time is a time determined according to the time of saving the data. The specific determination method may correspond to the description in the previous paragraph, and will not be described herein. In the second case, since the encryption time and the data storage time are different, the data security can be improved, and even if the data storage time is stolen, the encryption time cannot be acquired and the data cannot be decrypted without knowing the rule, and the data security can be improved.
Alternatively, as an embodiment, the conference related data processed by the client in the embodiment of the present application may be any data that needs to be stored locally and related to the conference, for example, the video conference related data includes: at least one of historical meeting information, meeting account numbers, account passwords, meeting records and last meeting option information.
220, Performing operation according to the encryption time to obtain an operation result.
It should be understood that, in the embodiment of the present application, the encryption time may be calculated in a plurality of ways, so long as a unique encrypted string can be selected from the strings after the calculation.
For example, the operation may be a positive selection or a cosine operation.
As one embodiment, the calculating according to the encryption time to obtain an operation result includes:
Performing sine operation on the encryption time to obtain an initial value;
performing multiple rounding operation on the absolute value of the initial value to obtain the operation result;
Specifically, the application can ensure that the selected value is between-1 and 1 through mathematical function sin calculation, so that the random number is selected according to encryption time, sin removal operation is carried out, the obtained value is ensured to be a positive number by absolute value, then ten times is multiplied, and then the whole is obtained, and the obtained value, namely, the operation result is any number between 0 and 10. It should be understood that here, the multiple operation is multiplied by ten, and the corresponding character string may include 11, and the corresponding character is selected from the character string for data processing according to the operation result.
Alternatively, in practical application, the multiple operation may also be other values, for example, may be 20, 50, or 100, and the length of the corresponding string may also be correspondingly increased, for example, 21, 51, or 101.
230, Selecting an encrypted character from the encrypted character string according to the operation result.
After the operation result is determined, the corresponding encrypted character can be selected from the character string according to the result. For example, a character corresponding to the operation result is selected from the encrypted character string as the encrypted character. For example, if the operation result is 5, a character corresponding to 5 may be selected from the encrypted character string as the encrypted character, for example, the character string includes 11 characters in total of 0 to 10, and a character corresponding to 5, that is, the 6 th character from 0, is selected as the encrypted character.
The above describes a scheme of selecting only one encrypted character for data processing. In practical applications, a plurality of encrypted characters may be selected for multiple encryption or decryption processes.
Optionally, as an embodiment, the selecting, from the encrypted character string, a character corresponding to the operation result as the encrypted character includes:
And selecting a plurality of characters from the encrypted character string in sequence by taking the operation result as a starting point to serve as the encrypted characters.
It will be appreciated that if the number of characters selected exceeds the string length, the corresponding number of characters is sequentially removed from the beginning of the string. For example, the character string length is 11, including characters 0-10, the operation result is 10, 4 characters (i.e. 4 exclusive-or operations are performed) are needed to be used for encryption or decryption, and the 4 selected characters are character 9, character 10, character 0 and character 1.
According to the embodiment of the application, the data security can be improved through multiple times of encryption.
It should be understood that there may be only one encryption string in the embodiment of the present application, and the encryption string may be preset. Or in the embodiment of the application, a plurality of encryption character strings can be also provided, and one character string can be selected from the plurality of encryption character strings for encryption during actual encryption or decryption. For example, one character string may be selected from a plurality of encrypted character strings according to the encryption time, and then the encrypted character may be selected from the selected encrypted character strings according to the encryption time.
Correspondingly, as an embodiment, before selecting the encrypted character from the encrypted character string according to the operation result, the method further includes:
The encryption string is selected from a plurality of preset strings.
Optionally, the selecting the encrypted string from a plurality of preset strings includes:
And selecting the encryption character string from the plurality of preset character strings according to the selection operation result of the encryption time.
It should be understood that there may be various selection results, as long as one character string can be selected from the plurality of character strings after the operation according to the encryption time. The embodiments of the present application are not limited in this regard.
And 240, performing bit exclusive OR operation on the data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed, wherein the data to be processed comprises video conference related data.
It should be understood that in the embodiment of the present application, the data to be processed may be data before encryption, in which case, in the embodiment of the present application, the data is encrypted; alternatively, the data to be processed may be encrypted data, in which case the data is decrypted in the embodiment of the present application.
Correspondingly, as an embodiment, when the data to be processed is data to be encrypted, the encrypted character is used to perform bit exclusive or operation on the data to be processed to obtain encrypted data which is the data to be processed;
And when the data to be processed is encrypted data, performing bit exclusive OR operation on the data to be processed by using the encrypted character to obtain decrypted data of the data to be processed.
Specifically, after the encrypted character is determined, bitwise exclusive-or operation is performed on the data to be processed. When the bit of the encrypted character is smaller than the data to be processed, the bit exclusive or transportation is required to be carried out after the filling. For example, the data to be processed is 64 bits, and the encrypted character is 8 bits, and the encrypted character needs to be complemented by 64 bits and then subjected to bit exclusive or operation, where the complemented bits may be all 1 bits or all 0 bits, or the complemented bits may be performed according to a preset rule, for example, the complemented bits may be complemented according to an alternating sequence of 0, 1 or 1 and 0 bits, or the complemented bits may be performed according to other rules, and the embodiment of the present application is not limited thereto, as long as the same bit complemented rule is adopted when encrypting and decrypting.
Further, as another embodiment, when selecting a plurality of encrypted characters to perform the bitwise exclusive-or operation, the plurality of encrypted characters may be subjected to the bitwise exclusive-or operation one by one, and the result of the last operation is the final result. If the number of bits is insufficient, the bit-wise exclusive OR operation can be performed first and then with the description of the upper position.
Correspondingly, as an embodiment, the performing bitwise exclusive-or operation on the data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed includes:
and carrying out bit-wise exclusive-or operation on the data to be processed one by one according to the sequence of the plurality of characters, wherein the result of the previous bit-wise exclusive-or operation is used for carrying out the bit-wise exclusive-or operation on the next character, and after the last character bit-wise exclusive-or operation, obtaining the encrypted data or the decrypted data corresponding to the data to be processed, wherein the character sequence of the bit-wise exclusive-or operation corresponding to the obtained encrypted data is opposite to the character sequence of the bit-wise exclusive-or operation corresponding to the obtained decrypted data.
For example, when determining that the plurality of characters are A, B, C, performing a bitwise exclusive-or operation on the data to be encrypted by using a when performing the encryption sequence, then obtaining a first result, performing a bitwise exclusive-or operation on the first result by using B, obtaining a second result, and performing a bitwise exclusive-or operation on the first result by using C, thereby obtaining the encrypted data. Then, when decrypting again, the bit exclusive-or operation is performed according to the reverse order, namely according to the order C, B, A, namely, the bit exclusive-or operation is performed on the encrypted data by using the C to obtain a second result, the bit exclusive-or operation is performed on the second result by using the B to obtain a first result, and then the bit exclusive-or operation is performed on the first result by using the A to obtain decrypted data.
The embodiment of the application adopts the mode of bit exclusive OR to encrypt or decrypt the data, so as to realize the information needed by encryption; after exclusive-or one character, exclusive-or operation is carried out once again, so that the original character can be obtained; therefore, the simple encryption and decryption can be realized by only ensuring that the exclusive or characters are the same each time, the scheme has small calculated amount and fast operation, only needs to traverse the data to be encrypted once, and occupies less memory compared with the prior art.
Referring to fig. 3, fig. 3 is a block diagram illustrating an apparatus for processing conference related data according to an embodiment of the present application. The apparatus 300 shown in fig. 3 may be a client, and it should be understood that, corresponding to the client in the above method embodiment, the apparatus 300 is capable of executing each step executed by the client related to the above method embodiment, and specific functions of the apparatus 300 may be referred to the above description, and detailed descriptions are omitted herein as appropriate to avoid redundancy.
The apparatus 300 shown in fig. 3 includes at least one software functional module that can be stored in a memory in the form of software or firmware or cured in the apparatus, and the apparatus 300 shown in fig. 3 includes: an acquisition unit 310 for acquiring an encryption time; an operation unit 320, configured to perform an operation according to the encryption time to obtain an operation result; a selection unit 330 for selecting an encrypted character from the encrypted character string according to the operation result; and the processing unit 340 is configured to perform a bitwise exclusive-or operation on data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed, where the data to be processed includes data related to a video conference.
In one embodiment, the operation unit is specifically configured to perform sinusoidal operation on the encryption time to obtain an initial value; performing multiple rounding operation on the absolute value of the initial value to obtain the operation result; the selecting unit is specifically configured to select, from the encrypted character string, a character corresponding to the operation result as the encrypted character.
In one embodiment, the selecting unit is further configured to select the encrypted character string from a plurality of preset character strings before selecting the encrypted character from the encrypted character strings according to the operation result.
In one embodiment, the selecting unit is specifically configured to select the encrypted string from the plurality of preset strings according to a result of the selecting operation of the encryption time.
In one embodiment, the selecting unit is specifically configured to sequentially select, with the operation result as a starting point, a plurality of characters from the encrypted character string as the encrypted characters; the processing unit is specifically configured to perform a bitwise exclusive-or operation on the data to be processed one by one according to the sequence of the plurality of characters, where a result of a previous bitwise exclusive-or operation is used for performing a bitwise exclusive-or operation on a next character, and after a last character is subjected to the bitwise exclusive-or operation, encrypted data or decrypted data corresponding to the data to be processed is obtained, where an endian of the bitwise exclusive-or operation corresponding to the encrypted data is obtained and an endian of the bitwise exclusive-or operation corresponding to the decrypted data is opposite.
In one embodiment, the video conference related data includes: at least one of historical meeting information, meeting account numbers, account passwords, meeting records and last meeting option information.
In one embodiment, when the data to be processed is data to be encrypted, the encrypted character is used to perform bit exclusive or operation on the data to be processed to obtain encrypted data of the data to be processed; and when the data to be processed is encrypted data, performing bit exclusive OR operation on the data to be processed by using the encrypted character to obtain decrypted data of the data to be processed.
It will be clear to those skilled in the art that, for convenience and brevity of description, reference may be made to the corresponding procedure in the foregoing method for the specific working procedure of the apparatus described above, and this will not be repeated here.
As shown in fig. 4, one embodiment of the present application provides an electronic device 400, the electronic device 400 comprising: memory 410, processor 420, and a computer program stored on memory 410 and executable on processor 420, wherein processor 420, when reading the program from memory 410 and executing the program via bus 430, may implement a method performed by a client as in any of the embodiments described above. Optionally, the device shown in fig. 4 may further comprise a transceiver, which may be used for transmission and/or reception of data streams. Optionally, the apparatus shown in fig. 4 may further include a collector, which may be used to collect audio/video data. Alternative electronic device 400 may also include other input devices or other hardware devices, etc., and embodiments of the application are not limited in this regard.
The processor 420 may process the digital signals and may include various computing structures. Such as a complex instruction set computer architecture, a reduced instruction set computer architecture, or an architecture that implements a combination of instruction sets. In some examples, processor 420 may be a microprocessor.
Memory 410 may be used for storing instructions to be executed by processor 420 or data related to execution of the instructions. Such instructions and/or data may include code to implement some or all of the functions of one or more of the modules described in embodiments of the present application. The processor 420 of the disclosed embodiments may be configured to execute instructions in the memory 410 to implement the methods illustrated above as being performed by a control or client. Memory 410 includes dynamic random access memory, static random access memory, flash memory, optical memory, or other memory known to those skilled in the art.
An embodiment of the present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, can implement a method performed by a client in any of the above-described methods as provided in the above-described embodiments.
An embodiment of the present application also provides a computer program product, where the computer program product includes a computer program, where the computer program when executed by a processor may implement a method performed by a client in any of the above methods provided in the above embodiments.
It should be noted that the processor (e.g., the processor of fig. 4) in embodiments of the present invention may be an integrated circuit chip with signal processing capabilities. In implementation, the steps of the above method embodiments may be implemented by integrated logic circuits of hardware in a processor or instructions in software form. The processor may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (field programmable GATE ARRAY, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. The disclosed methods, steps, and logic blocks in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The software modules may be located in a random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as well known in the art. The storage medium is located in a memory, and the processor reads the information in the memory and, in combination with its hardware, performs the steps of the above method.
It will be appreciated that the memory in embodiments of the invention (e.g., the memory of FIG. 4) may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory. The nonvolatile memory may be a read-only memory (ROM), a Programmable ROM (PROM), an erasable programmable ROM (erasable PROM), an electrically erasable programmable EPROM (EEPROM), or a flash memory. The volatile memory may be random access memory (random access memory, RAM) which acts as external cache memory. By way of example, and not limitation, many forms of RAM are available, such as static random access memory (STATIC RAM, SRAM), dynamic random access memory (DYNAMIC RAM, DRAM), synchronous Dynamic Random Access Memory (SDRAM), double data rate synchronous dynamic random access memory (doubledata RATE SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (ENHANCED SDRAM, ESDRAM), synchronous link dynamic random access memory (SYNCHLINK DRAM, SLDRAM), and direct memory bus random access memory (direct rambus RAM, DR RAM). It should be noted that the memory of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
Applications to which embodiments of the present application relate include any application installed on a requesting end, including but not limited to, browser, email, instant messaging service, word processing, keyboard virtualization, widgets (widgets), encryption, digital rights management, voice recognition, voice replication, positioning (e.g., functions provided by the global positioning system), music playback, and so forth.
It should be understood that the transceiver unit or transceiver in the embodiments of the present invention may also be referred to as a communication unit.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present invention are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a high-density digital video disc (digital video disc, DVD)), or a semiconductor medium (e.g., a solid-state disk (solid-state drive STATE DISK, SSD)), or the like.
As used in this specification, the terms "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a computing device and the computing device can be a component. One or more components may reside within a process and/or thread of execution and a component may be localized on one computer and/or distributed between 2 or more computers. Furthermore, these components can execute from various computer readable media having various data structures stored thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from two components interacting with one another in a local system, distributed system, and/or across a network such as the internet with other systems by way of the signal).
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in various embodiments of the present invention, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
In addition, the terms "system" and "network" are often used interchangeably herein. The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the character "/" herein generally indicates that the front and rear associated objects are an "or" relationship.
It should be understood that in embodiments of the present invention, "B corresponding to a" means that B is associated with a, from which B may be determined. It should also be understood that determining B from a does not mean determining B from a alone, but may also determine B from a and/or other information.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices, or elements, or may be an electrical, mechanical, or other form of connection.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment of the present invention.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
In summary, the foregoing description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for processing conference related data, characterized by being applied to a client, the method comprising:
Obtaining encryption time;
calculating according to the encryption time to obtain an operation result;
selecting an encrypted character from the encrypted character string according to the operation result;
And performing bit exclusive OR operation on the data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed, wherein the data to be processed comprises video conference related data.
2. The method according to claim 1, wherein the calculating according to the encryption time to obtain the calculation result includes:
Performing sine operation on the encryption time to obtain an initial value;
performing multiple rounding operation on the absolute value of the initial value to obtain the operation result;
wherein the selecting the encrypted character from the encrypted character string according to the operation result includes:
And selecting a character corresponding to the operation result from the encryption character string as the encryption character.
3. The method according to claim 1 or 2, wherein before selecting an encrypted character from an encrypted character string according to the operation result, the method further comprises:
The encryption string is selected from a plurality of preset strings.
4. A method according to claim 3, wherein said selecting said encrypted string from a plurality of preset strings comprises:
And selecting the encryption character string from the plurality of preset character strings according to the selection operation result of the encryption time.
5. The method according to claim 2, wherein the selecting, as the encrypted character, a character corresponding to the operation result from the encrypted character string includes:
selecting a plurality of characters from the encrypted character string in sequence with the operation result as a starting point to serve as the encrypted characters;
The performing bitwise exclusive or operation on the data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed, where the method includes:
and carrying out bit-wise exclusive-or operation on the data to be processed one by one according to the sequence of the plurality of characters, wherein the result of the previous bit-wise exclusive-or operation is used for carrying out the bit-wise exclusive-or operation on the next character, and after the last character bit-wise exclusive-or operation, obtaining the encrypted data or the decrypted data corresponding to the data to be processed, wherein the character sequence of the bit-wise exclusive-or operation corresponding to the obtained encrypted data is opposite to the character sequence of the bit-wise exclusive-or operation corresponding to the obtained decrypted data.
6. The method according to claim 1 or 2, wherein the video conference related data comprises: at least one of historical meeting information, meeting account numbers, account passwords, meeting records and last meeting option information.
7. A method according to claim 1 or2, characterized in that,
When the data to be processed is the data to be encrypted, the encrypted character is used for carrying out bit exclusive OR operation on the data to be processed to obtain encrypted data which is the data to be processed;
And when the data to be processed is encrypted data, performing bit exclusive OR operation on the data to be processed by using the encrypted character to obtain decrypted data of the data to be processed.
8. An apparatus for processing conference related data, comprising:
an acquisition unit configured to acquire an encryption time;
The operation unit is used for carrying out operation according to the encryption time to obtain an operation result;
a selection unit for selecting an encrypted character from the encrypted character string according to the operation result;
And the processing unit is used for carrying out bitwise exclusive OR operation on the data to be processed by using the encrypted character to obtain encrypted data or decrypted data corresponding to the data to be processed, wherein the data to be processed comprises video conference related data.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the computer program when run by the processor performs the method of any one of claims 1-7.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program, wherein the computer program when run by a processor performs the method according to any of claims 1-7.
CN202410193667.1A 2024-02-21 2024-02-21 Method, device, equipment and medium for processing conference related data Pending CN117939057A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410193667.1A CN117939057A (en) 2024-02-21 2024-02-21 Method, device, equipment and medium for processing conference related data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410193667.1A CN117939057A (en) 2024-02-21 2024-02-21 Method, device, equipment and medium for processing conference related data

Publications (1)

Publication Number Publication Date
CN117939057A true CN117939057A (en) 2024-04-26

Family

ID=90751971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410193667.1A Pending CN117939057A (en) 2024-02-21 2024-02-21 Method, device, equipment and medium for processing conference related data

Country Status (1)

Country Link
CN (1) CN117939057A (en)

Similar Documents

Publication Publication Date Title
CN108629027B (en) User database reconstruction method, device, equipment and medium based on block chain
US9037870B1 (en) Method and system for providing a rotating key encrypted file system
CN110881063B (en) Storage method, device, equipment and medium of private data
CN111460453A (en) Machine learning training method, controller, device, server, terminal and medium
CN111404943B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN111464564B (en) Data high-speed encryption and decryption method and device based on symmetric cryptographic algorithm
CN110324321B (en) Data processing method and device
US20160134601A1 (en) Using a Hash of a Filename to Control Encoding/Decoding of a Digital File
WO2021017424A1 (en) Data preprocessing method and apparatus, ciphertext data obtaining method and apparatus, and electronic device
CN114826733B (en) File transmission method, device, system, equipment, medium and program product
CN110795747A (en) Data encryption storage method, device, equipment and readable storage medium
US20190065759A1 (en) Method for protecting data
CN114884675B (en) Multi-party privacy intersection method, device, equipment and medium based on bit transmission
CN116015767A (en) Data processing method, device, equipment and medium
CN110060055B (en) Digital asset hosting method and device in block chain and electronic equipment
CN111740815A (en) Ciphertext-based two-party secret sharing method, device, equipment and storage medium
CN112565656B (en) Video call method, device, system, electronic equipment and storage medium
CN113098938B (en) Video sharing method and device and electronic equipment
CN113051592A (en) File encryption method and device, electronic equipment and storage medium
CN108846296A (en) Data encryption method and device, computer equipment and readable storage medium
CN115412365B (en) Data privacy protection method based on multilayer encryption
CN113452649A (en) Secure multi-party computing method, device, system and storage medium
CN117939057A (en) Method, device, equipment and medium for processing conference related data
CN116248343A (en) Registration and login method and system for client
CN114611129A (en) Data privacy protection method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination