WO2010072179A1 - Method and device for encrypted recording and decrypted displaying network multimedia conference - Google Patents

Method and device for encrypted recording and decrypted displaying network multimedia conference Download PDF

Info

Publication number
WO2010072179A1
WO2010072179A1 PCT/CN2009/076098 CN2009076098W WO2010072179A1 WO 2010072179 A1 WO2010072179 A1 WO 2010072179A1 CN 2009076098 W CN2009076098 W CN 2009076098W WO 2010072179 A1 WO2010072179 A1 WO 2010072179A1
Authority
WO
WIPO (PCT)
Prior art keywords
conference
recording
content
encrypted
key
Prior art date
Application number
PCT/CN2009/076098
Other languages
French (fr)
Chinese (zh)
Inventor
汪红星
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2010072179A1 publication Critical patent/WO2010072179A1/en

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00413Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is input by a user
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/10527Audio or video recording; Data buffering arrangements
    • G11B2020/10537Audio or video recording
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B2020/10935Digital recording or reproducing wherein a time constraint must be met
    • G11B2020/10944Real-time recording or reproducing, e.g. for ensuring seamless playback of AV data

Definitions

  • the present invention relates to the field of network multimedia, and in particular, to an encrypted recording method, apparatus, and decryption playing method and apparatus for a network multimedia conference.
  • the conference system consists of conference participants, conference controllers, and conference mixers.
  • the conference service operator concentrates on deploying the network multimedia system.
  • the conference participants only use the conference service, and hand over the equipment maintenance and operation of the conference system to the operator. This reduces the cost of using a network multimedia system.
  • the embodiment of the present invention adopts the following technical solutions:
  • an embodiment of the present invention provides an encrypted recording method for network multimedia.
  • An encrypted recording method for a network multimedia conference comprising:
  • an embodiment of the present invention provides a method for decrypting and playing a network multimedia conference.
  • a method for decrypting and playing a network multimedia conference comprising:
  • an embodiment of the present invention provides an encrypted recording device for a network multimedia conference.
  • An encrypted recording device for a network multimedia conference comprising:
  • a recording module configured to record network multimedia real-time content
  • An encryption module for encrypting the above-mentioned conference recording.
  • an embodiment of the present invention provides a decryption and playback device for a network multimedia conference.
  • a decryption and playback device for a network multimedia conference comprising:
  • a decryption module configured to decrypt the encrypted content after the encrypted recording
  • the playing module is configured to play the decrypted content.
  • the user before the start of the network multimedia real-time conference or during the conference, the user sets the recording of the conference content and sets the key, and encrypts the recorded content of the conference by using the key; After the end, the user can replay the recorded meeting content according to the set key.
  • the embodiment of the present invention encrypts the recorded content of the conference, and only knows according to the key. The content of the meeting, thereby solving the problem that the recorded content of the network multimedia real-time conference may be improperly used.
  • FIG. 1 is a flowchart of a method for encrypting and recording a network multimedia conference according to an embodiment of the present invention
  • FIG. 1 is a flowchart of a method for recording a network multimedia according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of a media file based on I SO according to an embodiment of the present invention
  • FIG. 5 is a flowchart of a method for decrypting and playing a network multimedia conference according to an embodiment of the present invention
  • FIG. 6 is a flowchart of a method for decrypting a conference content after encryption and recording according to an embodiment of the present invention
  • FIG. 7 is a flowchart of a method for playing a decrypted content after decryption according to an embodiment of the present invention
  • FIG. 8 is a block diagram of an encrypted recording device of a network multimedia conference according to an embodiment of the present invention.
  • FIG. 9 is a block diagram of a decryption and playback device for a network multimedia conference according to an embodiment of the present invention.
  • an embodiment of the present invention provides an encrypted recording method of network multimedia.
  • the encrypted recording method includes two steps of 101 and 102:
  • 101 Record the network multimedia meaning. As shown in FIG. 2, 101 specifically includes four steps of 1011, 1012, 1013, and 1014:
  • the controller creates a network resource required for the recording and requests the network mixer to allocate the network endpoint.
  • the conference controller is separated from the conference mixer, and the conference controller and the conference mixer are connected through the Mp interface, and the Mp interface is followed. H248 agreement.
  • the user logs in to the conference terminal or passes Web interface, ready for real-time network multimedia.
  • the application server notifies the conference controller to create the network resources required for the conference recording, and then the conference controller sends a command through the Mp interface to request the network mixer to allocate the network endpoint.
  • the right mixer allocates network endpoints.
  • the controller starts the conference recording.
  • the application server After the network endpoint is assigned, the application server notifies the controller to initiate recording of the content.
  • the right mixer records the meaning content into the file on the network endpoint.
  • the conference controller sends a Mod command of the H248 protocol to request the conference mixer to record the conference content to the file on the network endpoint just assigned, and store it in the plaintext form on the file server, and carry the notification in the Mod command of the H248 protocol.
  • Recorded signal, recording signal including recording duration, recording content
  • 102 Encrypt the above-mentioned recording content. As shown in FIG. 3, 102 specifically includes two steps of 1021 and 1022:
  • the conference controller sends a Mod command of the H248 protocol to request the conference mixer to record the conference content into the file on the assigned network endpoint, and store the recorded file in plaintext to the file server.
  • the Mod command only carries the signal for notification recording.
  • the H248 protocol is defined as follows:
  • the recorded signals are as follows:
  • End Input Key (eik, 0x0010) Record end button
  • the Mp interface protocol between the conference controller and the conference mixer is extended, and the conference controller carries the encryption algorithm and the key input by the user in the Mod command while issuing the recording signal.
  • the expanded recording signals are as follows:
  • De s c r i p t i on: indicates the type of encryption algorithm needed for recording
  • the key for completing the recording content encryption is specified in the recording signal sent by the conference controller. 1022: Encrypt the conference recording content by using the above key.
  • the recording of the conference can be encrypted according to the key specified in the recording signal.
  • the files generated after the conference recording include WAV files and files evolved based on the ISO base media file format (hereinafter referred to as ISO files).
  • Chunk WAV file includes data block (Data Chunk) and format block (Fmt Chunk), Data Chunk is used to store sampled audio data, and Fmt Chunk is used to store codec and sample. Rate and other information.
  • Data Chunk is used to store sampled audio data
  • Fmt Chunk is used to store codec and sample. Rate and other information.
  • the Data Chunk format is as follows:
  • ID chunk ID (number of the block);
  • Encrypting audio data is to encrypt Data Chunk's content domain waveform Data.
  • the encryption method can be selected in the following three ways:
  • Method 1 Encrypted recording is performed in real time according to each sampled data. For sampling according to frames (for example, G.729, sampling with 20ms), this encryption method can be used for real-time encryption because the number of samples per second is small.
  • frames for example, G.729, sampling with 20ms
  • Method 2 Perform encrypted recording in real time at regular intervals. For example, G.711 can encrypt each 20ms of sampled data (including 20 samples of data in 20ms when it is 8KHz). This method can be compared to mode 1 Effectively control the number of real-time encryption and control the overhead of the encryption algorithm to achieve real-time encryption and decryption.
  • Method 3 Encrypt the audio data in the entire waveform Data at the end of the recording.
  • files evolved based on the ISO base media file format such as 3GP, Qui ckTime, MPEG
  • the basic format is shown in Figure 4. It can be seen that the ISO file consists of a series of objects (BOX), which can also be called boxes. There are two most important BOX in the ISO file: Movie Box (moov) for storing media control information and Media Data Box (mdat) for storing media audio and video data.
  • Encrypting the audio and video data of the content is to encrypt the content of mda t.
  • the encryption method can be selected as follows:
  • Method 1 Encrypted recording is performed in real time according to each sampled data. When the number of samples per second is small, real-time encryption can be implemented by using this encryption method.
  • Method 2 Perform real-time encrypted recording according to the trunk mode.
  • the trunk mode is to encrypt multiple samples as a whole, and the whole is encrypted.
  • the decryption is also performed in a trunk unit. This method can effectively control the number of real-time encryption and control encryption. The overhead of the algorithm, thus realizing real-time encryption and decryption.
  • Method 3 After the recording is finished, the content in the entire mda t is encrypted.
  • the embodiment of the invention further provides a method for decrypting and playing a network multimedia.
  • the method for decrypting playback includes two steps of 501, 502:
  • 501 Decrypt the content of the conference after the encrypted recording. As shown in FIG. 6, 501 specifically includes two steps of 5011 and 5012.
  • the conference controller sends a Mod command to the right mixer through the Mp interface, and the Mod command only carries a signal for notifying the playback of the recorded content.
  • the H248 protocol is defined as follows:
  • the signals played are as follows:
  • the main parameters of the signal are as follows:
  • the playback signal is as follows:
  • De s c r i p t i on: indicates the type of decryption algorithm needed for playback
  • the recording of the conference can be decrypted according to the key specified in the playback signal. Since there are two ways to encrypt the recording of the conference, there are two ways to decrypt the recording of the conference:
  • the audio and video data of the conference recording content is only encrypted when encrypting, the recording file itself is not encrypted as a whole, and the control information of the media file is not encrypted. Then, the audio and video of the recording content of the conference are decrypted. Data decryption can be played.
  • the files generated after the conference recording include WAV files and ISO files.
  • Chunk WAV file includes data block (Data Chunk) and format block (Fmt Chunk), Data Chunk is used to store sampled audio data, and Fmt Chunk is used to store codec and sample. Rate and other information.
  • Data Chunk is used to store sampled audio data
  • Fmt Chunk is used to store codec and sample. Rate and other information.
  • the Data Chunk format is as follows:
  • ID chunk ID (number of the block);
  • Decrypting audio data is to decrypt Data Chunk's content domain waveform Data. There are 3 ways to encrypt. Correspondingly, the following three methods can be used for decryption:
  • Method 1 Encrypted recording is performed for each sampled data during encryption, and decrypted according to each sampled data.
  • Method 2 Encrypted recording at a fixed interval during encryption, and at a fixed interval during decryption Secret.
  • G.711 can encrypt the sampled data every 20ms (including 20 samples of data in 20ms when it is 8KHz), and decrypts the sampled data every 20ms as a whole when decrypting.
  • mode 1 the number of real-time decryption can be effectively controlled, and the overhead of the decryption algorithm can be controlled, thereby realizing real-time decryption.
  • Method 3 When encrypting, the audio data in the entire waveform data is encrypted after the end of the recording, so that the decryption also needs to decrypt all the encrypted audio data after the end of the recording.
  • Decrypting the audio and video data of the content is to decrypt the content of mda t.
  • Method 1 Encrypted recording is performed for each sampled data during encryption, and decrypted according to each sampled data.
  • Method 2 When encrypting, perform real-time encrypted recording according to the trunk mode.
  • the trunk mode is to encrypt multiple samples as a whole, and the decryption is also performed in a trunk unit, and multiple samples are decrypted as a whole.
  • the number of real-time decryptions can be effectively controlled, and the overhead of the decryption algorithm can be controlled, thereby realizing real-time decryption.
  • Mode 3 Encryption encrypts the content of the entire mdat after the end of the recording, so that when decrypting, all the encrypted audio and video data needs to be decrypted after the recording is finished.
  • 502 specifically includes two steps of 5021, 5022: 5021.
  • the conference controller creates a network resource required for playing the conference recording file and requests the conference mixer to allocate the network endpoint.
  • the user logs in to the conference terminal or through the web interface, prepares to replay the recorded conference content.
  • the application server notifies the conference controller to create the network resources required for playing the conference recording file, and then the controller sends a command request to the network mixer through the Mp interface.
  • the right mixer allocates network endpoints.
  • the conference controller starts playback of the conference recording file.
  • the application server After the network endpoint is assigned, the application server notifies the conference controller to initiate playback of the recorded file.
  • the right mixer plays the recorded content to the network endpoint.
  • the conference controller sends the Mod command of the H248 protocol through the Mp interface, and requests the conference mixer to play the decrypted recording content to the network endpoint just allocated.
  • the user before the start of the network multimedia real-time conference or during the conference, the user sets the recording of the conference content and sets the key, and encrypts the recorded content of the conference by using the key; After the end, the user can replay the recorded meeting content according to the set key.
  • the recorded content of the conference is encrypted, and only the key can be obtained according to the key, thereby solving the problem that the recorded content of the network multimedia real-time is improperly used.
  • the embodiment of the invention further provides an encrypted recording device for a network multimedia conference.
  • the device includes:
  • the recording module 801 is configured to record the real-time content of the network multimedia
  • the encryption module 802 is configured to encrypt the recorded content.
  • the user logs in to the terminal or through the web interface to prepare for network multimedia. Real-time meeting.
  • the application server notifies the conference controller to create the network resources required for the conference recording, and then
  • the controller sends a command through the Mp interface to request the conference mixer to allocate network endpoints.
  • the application server After the conference mixer assigns a network endpoint, the application server notifies the controller that the recording of the conference content is initiated, and the conference mixer records the content on the assigned network endpoint into the file.
  • the encryption module 802 includes:
  • the key unit 803 is configured to acquire a key set by a user.
  • the conference controller sends a Mod command of the H248 protocol, and requests the conference mixer to record the conference content into the file on the allocated network endpoint.
  • the Mod command carries the signal for notifying the recording, and the encryption algorithm and the user are specified in the recording signal. The key entered.
  • the encryption unit 804 is configured to encrypt the conference recording content according to the foregoing key.
  • the recording of the conference can be encrypted according to the key specified in the recording signal.
  • the encrypted recording of the content of the network multimedia real-time conference can be completed by the device.
  • the embodiment of the invention further provides a network multimedia decryption and playback device.
  • the device includes:
  • the decryption module 01 is configured to decrypt the encrypted content after the encrypted recording
  • the playing module 902 is configured to play the decrypted content.
  • the decryption module 901 includes: The key unit 903 is configured to acquire a key set by a user.
  • the conference controller sends a Mod command of the H248 protocol, and requests the conference mixer to record the conference content into the file on the allocated network endpoint.
  • the Mod command carries the signal for notification playback, and the decryption algorithm and the user are specified in the playback signal.
  • the decryption key entered.
  • the decryption unit 904 is configured to decrypt the encrypted conference recording content according to the above key.
  • the encrypted conference recording can be decrypted according to the key specified in the playback signal. Since there are two ways to encrypt the recording of the conference, there are two ways to decrypt the recording of the conference:
  • the audio and video data of the conference recording content is only encrypted when encrypting, the recording file itself is not encrypted as a whole, and the control information of the media file is not encrypted. Then, the audio and video of the recording content of the conference are decrypted. Data decryption can be played.
  • the user logs in to the conference terminal or through the web interface, prepares to replay the recorded conference content.
  • the application server notifies the conference controller to create the network resources required for playing the conference recording file, and then the controller sends a command through the Mp interface to request the network to allocate the network endpoint.
  • the application server notifies the conference controller to start the playback of the recorded file, and the conference controller sends a command through the Mp interface to request the conference mixer to play the decrypted recording to the network endpoint just assigned. on.
  • the user before the start of the network multimedia real-time conference or during the conference, the user sets the recording of the conference content and sets the key, and uses the key to add the recorded content of the conference.
  • the user can replay the recorded conference content according to the set key.
  • the embodiment of the invention encrypts the recorded content of the conference, and only the key content can be obtained according to the key, thereby solving the problem that the recorded content of the network multimedia real-time meaning is improperly used.

Abstract

The embodiment of the present invention provides a method and a device for encrypted recording network multimedia conference, and a method and a device for decrypted displaying network multimedia conference. The invention relates to the network multimedia field and is invented to solve the problem that the recording content of the network multimedia real-time conference may be illegitimately used. In the embodiment of the present invention, before the beginning of the network multimedia conference or during the course of the conference the user sets to record the content of the conference and sets the key, encrypts the recording content of the conference using the key. And during the course of the conference or after the ending of the conference, the user can replay the recorded conference content according to the pre-set key. The embodiment of the invention can be applied in the network multimedia conference system.

Description

网络多媒体会议的加密录制和解密播放方法、 装置  Encrypted recording and decryption playing method and device for network multimedia conference
本申请要求于 2008 年 12 月 26 日提交中国专利局、 申请号为 200810188925.8、 发明名称为"网络多媒体会议的加密录制和解密播放方法、 装 置"的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。 This application claims priority to Chinese Patent Application No. 200810188925.8, entitled "Encrypted Recording and Decryption Playback Method and Device for Network Multimedia Conference" on December 26, 2008, the entire contents of which are hereby incorporated by reference. Combined in this application.
技术领域 Technical field
本发明涉及网络多媒体领域, 尤其涉及一种网絡多媒体会议的加密录制方 法、 装置和解密播放方法、 装置。  The present invention relates to the field of network multimedia, and in particular, to an encrypted recording method, apparatus, and decryption playing method and apparatus for a network multimedia conference.
背景技术 Background technique
随着企业的生产经营规模扩大, 往往需要召开跨地域的多方沟通会议以提 升工作效率, 此时会用到网络多媒体音频会议系统或者枧频会议系统。 在音频 会议中, 会议参与方一般使用固定或者移动电话终端, 在视频会议中, 会议参 与方一般使用专用视频会议终端。  As the scale of production and operation of enterprises expands, it is often necessary to hold cross-regional multi-party communication meetings to improve work efficiency. At this time, a network multimedia audio conference system or a frequency conference system will be used. In audio conferences, conference participants generally use fixed or mobile phone terminals. In video conferences, conference participants generally use dedicated video conference terminals.
会议系统由会议参与方、 会议控制器和会议混合器组成。 一般都是由会议 业务运营商来集中部署网络多媒体 ^义系统的, 会议参与方一一企业仅仅使用 会议业务, 而将会议系统的设备维护、 运营等工作交给运营商。 这样就降低了 使用网络多媒体^义系统的成本。  The conference system consists of conference participants, conference controllers, and conference mixers. Generally, the conference service operator concentrates on deploying the network multimedia system. The conference participants only use the conference service, and hand over the equipment maintenance and operation of the conference system to the operator. This reduces the cost of using a network multimedia system.
一些重要会议需要进行录制以用于后续存档和处理, 但是网络多媒体会议 系统往往不支持本地存储和录制, 而是通过会议混合器来录制会议过程, 将录 制后的数据以明文格式存储在文件服务器上。  Some important conferences need to be recorded for subsequent archiving and processing, but network multimedia conferencing systems often do not support local storage and recording, but instead record the conference process through the conference mixer, and store the recorded data in a clear text format on the file server. on.
但是, 上述对会议内容进行录制的过程中, 企业的会议内容是录制在会议 运营商的设备中, 而会议参与方对此并没有采取什么保密措施, 所以会议录制 内容有可能被非正当使用。 发明内容 However, in the process of recording the content of the conference, the content of the conference of the enterprise is recorded in the equipment of the conference operator, and the conference participants do not take any security measures, so the conference recording may be improperly used. Summary of the invention
为了避免网络多媒体会议的录制内容被非正当使用, 本发明的实施例采用 如下技术方案:  In order to prevent the recording content of the network multimedia conference from being improperly used, the embodiment of the present invention adopts the following technical solutions:
一方面, 本发明实施例提供一种网络多媒体^义的加密录制方法。  In one aspect, an embodiment of the present invention provides an encrypted recording method for network multimedia.
一种网络多媒体会议的加密录制方法, 包括:  An encrypted recording method for a network multimedia conference, comprising:
对网络多媒体会议进行录制;  Recording a network multimedia conference;
对上述会议录制内容进行加密。  Encrypt the recording of the above meeting.
一方面, 本发明实施例提供一种网络多媒体会汉的解密播放方法。  In one aspect, an embodiment of the present invention provides a method for decrypting and playing a network multimedia conference.
一种网络多媒体会议的解密播放方法, 包括:  A method for decrypting and playing a network multimedia conference, comprising:
对加密录制后的会议内容进行解密;  Decrypt the encrypted conference content;
播放解密后的会议内容。  Play the decrypted meeting content.
一方面, 本发明实施例提供一种网络多媒体会议的加密录制装置。  In one aspect, an embodiment of the present invention provides an encrypted recording device for a network multimedia conference.
一种网絡多媒体会议的加密录制装置, 包括:  An encrypted recording device for a network multimedia conference, comprising:
录制模块, 用于对网络多媒体实时^义内容进行录制;  a recording module, configured to record network multimedia real-time content;
加密模块 , 用于对上述会议录制内容进行加密。  An encryption module for encrypting the above-mentioned conference recording.
另一方面, 本发明实施例提供一种网络多媒体会议的解密播放装置。  In another aspect, an embodiment of the present invention provides a decryption and playback device for a network multimedia conference.
一种网络多媒体会议的解密播放装置, 包括:  A decryption and playback device for a network multimedia conference, comprising:
解密模块, 用于对加密录制后的 义内容进行解密;  a decryption module, configured to decrypt the encrypted content after the encrypted recording;
播放模块, 用于播放解密后的 ^义内容。  The playing module is configured to play the decrypted content.
本发明实施例中, 用户在网络多媒体实时会议开始前或者会议进行过程 中, 设定对会议内容进行录制并设置密钥, 利用密钥对会议的录制内容进行加 密; 同时在会议进行中或会议结束后, 用户可以根据所设置的密钥来重播录制 的会议内容。 本发明实施例对会议录制内容进行加密, 只有根据密钥才能获知 会议内容, 从而解决了网络多媒体实时会议的录制内容可能被非正当使用的问 题。 In the embodiment of the present invention, before the start of the network multimedia real-time conference or during the conference, the user sets the recording of the conference content and sets the key, and encrypts the recorded content of the conference by using the key; After the end, the user can replay the recorded meeting content according to the set key. The embodiment of the present invention encrypts the recorded content of the conference, and only knows according to the key. The content of the meeting, thereby solving the problem that the recorded content of the network multimedia real-time conference may be improperly used.
附图说明 DRAWINGS
图 1为本发明实施例所述网络多媒体会议的加密录制方法流程图; 图 1为本发明实施例所述对网络多媒体 ^义进行录制的方法流程图; 图 3为本发明实施例所述对会议录制内容进行加密的方法流程图; 图 4为本发明实施例所述基于 I SO 出的媒体文件基^ 式示意图; 图 5为本发明实施例所述网络多媒体会议的解密播放方法流程图; 图 6为本发明实施例所述对加密录制后的会议内容进行解密的方法流程图; 图 7为本发明实施例所述播放解密后的 ^义内容的方法流程图;  1 is a flowchart of a method for encrypting and recording a network multimedia conference according to an embodiment of the present invention; FIG. 1 is a flowchart of a method for recording a network multimedia according to an embodiment of the present invention; FIG. 4 is a schematic diagram of a media file based on I SO according to an embodiment of the present invention; FIG. 5 is a flowchart of a method for decrypting and playing a network multimedia conference according to an embodiment of the present invention; FIG. 6 is a flowchart of a method for decrypting a conference content after encryption and recording according to an embodiment of the present invention; FIG. 7 is a flowchart of a method for playing a decrypted content after decryption according to an embodiment of the present invention;
图 8为本发明实施例所述网络多媒体会议的加密录制装置框图;  8 is a block diagram of an encrypted recording device of a network multimedia conference according to an embodiment of the present invention;
图 9为本发明实施例所述网络多媒体会议的解密播放装置框图。  FIG. 9 is a block diagram of a decryption and playback device for a network multimedia conference according to an embodiment of the present invention.
具体实施方式 detailed description
为了避免网络多媒体会议的录制内容被非正当使用, 本发明的实施例提供 一种网络多媒体^义的加密录制方法。  In order to prevent the recording content of the network multimedia conference from being improperly used, an embodiment of the present invention provides an encrypted recording method of network multimedia.
如图 1所示, 该加密录制方法包括 101、 102两个步骤:  As shown in FIG. 1, the encrypted recording method includes two steps of 101 and 102:
101、对网络多媒体 义进行录制。如图 2所示, 101又具体包括 1011、 1012、 1013和 1014四个步骤:  101. Record the network multimedia meaning. As shown in FIG. 2, 101 specifically includes four steps of 1011, 1012, 1013, and 1014:
1011、 义控制器创建^义录制需要的网络资源并请求 ^义混合器分配网 络端点。  1011. The controller creates a network resource required for the recording and requests the network mixer to allocate the network endpoint.
在 IMS ( IP Mul t imedia Subsys tem, 网络多媒体系统)架构的 义系统中, 会议控制器是与会议混合器相分离的, 会议控制器与会议混合器之间通过 Mp接 口相连接, Mp接口遵循 H248协议。 在会议开始前, 用户登录会议终端或者通过 Web界面, 准备进行网络多媒体实时^义。 在 ^义开始时, 应用服务器通知会议 控制器创建会议录制需要的网络资源, 之后会议控制器通过 Mp接口下发命令请 求^义混合器分配网络端点。 In the IMS (IP Mul t imedia Subsystem, Network Multimedia System) architecture, the conference controller is separated from the conference mixer, and the conference controller and the conference mixer are connected through the Mp interface, and the Mp interface is followed. H248 agreement. Before the meeting starts, the user logs in to the conference terminal or passes Web interface, ready for real-time network multimedia. At the beginning of the test, the application server notifies the conference controller to create the network resources required for the conference recording, and then the conference controller sends a command through the Mp interface to request the network mixer to allocate the network endpoint.
1012、 义混合器分配网络端点。  1012. The right mixer allocates network endpoints.
1013、 义控制器启动会议录制。  1013. The controller starts the conference recording.
分配网络端点后, 应用服务器通知^义控制器启动对^义内容的录制。 After the network endpoint is assigned, the application server notifies the controller to initiate recording of the content.
1014、 ^义混合器在所述网络端点上将 义内容录制到文件中。 1014. The right mixer records the meaning content into the file on the network endpoint.
会议控制器下发 H248协议的 Mod命令请求会议混合器在刚才所分配的网络 端点上将会议内容录制到文件中, 并以明文的形式存储到文件服务器上在 H248 协议的 Mod命令中携带了通知录制的信号, 录制信号包括录制时长, 录制内容 The conference controller sends a Mod command of the H248 protocol to request the conference mixer to record the conference content to the file on the network endpoint just assigned, and store it in the plaintext form on the file server, and carry the notification in the Mod command of the H248 protocol. Recorded signal, recording signal including recording duration, recording content
ID和录制结束键。 ID and recording end button.
102、 对上述 ^义录制内容进行加密。 如图 3所示, 102又具体包括 1021、 1022两个步骤:  102. Encrypt the above-mentioned recording content. As shown in FIG. 3, 102 specifically includes two steps of 1021 and 1022:
1021、 获取用户所设置的密钥。  1021. Obtain the key set by the user.
在现有技术中, 会议控制器下发 H248协议的 Mod命令请求会议混合器在所 分配的网络端点上将会议内容录制到文件中, 并将录制的文件以明文的形式存 储到文件服务器。 Mod命令中仅仅携带了通知录制的信号, H248协议定义如下: In the prior art, the conference controller sends a Mod command of the H248 protocol to request the conference mixer to record the conference content into the file on the assigned network endpoint, and store the recorded file in plaintext to the file server. The Mod command only carries the signal for notification recording. The H248 protocol is defined as follows:
Package Name: AAS recording package Package Name: AAS recording package
Package-ID: aas rec (0x0035)  Package-ID: aas rec (0x0035)
录制的信号如下:  The recorded signals are as follows:
S i gna l Name: Play Record  S i gna l Name: Play Record
Si gna l ID: playrec (0x0002)  Si gna l ID: playrec (0x0002)
信号的主要参数如下: 信号参数 备注 The main parameters of the signal are as follows: Signal parameter note
Record Length Timer (rlt, 0x0008) 录制时长  Record Length Timer (rlt, 0x0008) recording duration
Recording Identifier (rid, 0x0009) 录制内容 ID  Recording Identifier (rid, 0x0009) Recording ID
End Input Key (eik, 0x0010) 录制结束键  End Input Key (eik, 0x0010) Record end button
这样会议录制内容有可能被会议参与方以外的人非正当使用。 在本发明实 施例中, 扩展会议控制器和会议混合器之间的 Mp接口协议, 会议控制器在下发 录制信号的同时, 在 Mod命令中携带加密算法和用户输入的密钥。 扩展后的录 制信号如下:  In this way, the recording of the meeting may be improperly used by someone other than the meeting participant. In the embodiment of the present invention, the Mp interface protocol between the conference controller and the conference mixer is extended, and the conference controller carries the encryption algorithm and the key input by the user in the Mod command while issuing the recording signal. The expanded recording signals are as follows:
File Encrypt ion Record Package  File Encrypt ion Record Package
Package ID: FER  Package ID: FER
Version: 1  Version: 1
Extends: aasrec vers ion 1 Si nal Name: Play Record  Extends: aasrec vers ion 1 Si nal Name: Play Record
Signal ID: playrec (0x0002) ,录制信号扩展一个参数如下:  Signal ID: playrec (0x0002), the recording signal is extended by one parameter as follows:
Parameter Name: Encrypt ion Type  Parameter Name: Encrypt ion Type
Parameter ID: Enc Type (0x0011)  Parameter ID: Enc Type (0x0011)
De s c r i p t i on:指示录制需要用到的加密算法类型  De s c r i p t i on: indicates the type of encryption algorithm needed for recording
Type: Octet string  Type: Octet string
Optional: Yes  Optional: Yes
Default: None  Default: None
Parameter Name: Encrypt ion Parameter ID: Enc Key (0x0012) Parameter Name: Encrypt ion Parameter ID: Enc Key (0x0012)
De s c r i p t i on:指示录制需要用到的加密密钥  De s c r i p t i on: indicates the encryption key required for recording
Type: Octet s tr ing (SIZE (0. . 65535) )  Type: Octet s tr ing (SIZE (0. . 65535) )
Opt iona l: Yes  Opt iona l: Yes
Defaul t: None  Defaul t: None
这样在会议控制器下发的录制信号中就指定了完成录制内容加密的密钥。 1022、 利用上述密钥对会议录制内容进行加密。  In this way, the key for completing the recording content encryption is specified in the recording signal sent by the conference controller. 1022: Encrypt the conference recording content by using the above key.
根据录制信号中指定的密钥, 就可以对会议的录制内容进行加密。 对会议 录制内容进行加密有两种方式:  The recording of the conference can be encrypted according to the key specified in the recording signal. There are two ways to encrypt meeting recordings:
1、 对会议内容进行录制, 在录制结束后, 生成明文的录制文件。 再利用上 述密钥调用指定的加密算法对明文文件的全文进行加密。  1. Record the content of the conference. After the recording is finished, generate a clear text recording file. The specified encryption algorithm is invoked by using the above key to encrypt the full text of the plaintext file.
2、 仅对会议录制内容音频和视频数据进行加密, 利用上述密钥调用指定的 加密算法对音频和视频数据进行加密, 对于录制文件本身不整体加密, 对媒体 文件的控制信息也不加密, 对音频和视频数据解密就可以进行播放。  2. Encrypt only the audio and video data of the conference recording content, and use the above-mentioned key to invoke the specified encryption algorithm to encrypt the audio and video data. The recording file itself is not encrypted as a whole, and the control information of the media file is not encrypted. Audio and video data can be decrypted for playback.
会议录制后生成的文件包括 WAV文件和基于 ISO基础媒体文件格式演进来 的文件(下文中用 ISO文件表示)。  The files generated after the conference recording include WAV files and files evolved based on the ISO base media file format (hereinafter referred to as ISO files).
( 1 )WAV文件的基本单元是块( Chunk ) WAV文件中包括数据块( Data Chunk ) 和格式块(Fmt Chunk ), Data Chunk 用于存储采样的音频数据, Fmt Chunk用 于存储编解码和采样率等信息。 Data Chunk格式如下:  (1) The basic unit of the WAV file is Chunk WAV file includes data block (Data Chunk) and format block (Fmt Chunk), Data Chunk is used to store sampled audio data, and Fmt Chunk is used to store codec and sample. Rate and other information. The Data Chunk format is as follows:
typedef s truct {  Typedef s truct {
ID chunk ID (块的序号) ;  ID chunk ID (number of the block);
long chunk Size (块的大小) ;  Long chunk Size (block size);
uns igned char waveform Da ta []; } Da ta Chunk; Uns igned char waveform Da ta []; } Da ta Chunk;
对音频数据进行加密就是对 Data Chunk 的内容域 waveform Data进行加 密, 加密方式可以选择如下 3种方式:  Encrypting audio data is to encrypt Data Chunk's content domain waveform Data. The encryption method can be selected in the following three ways:
方式 1: 按照每个采样数据实时进行加密录制, 对于按照帧进行采样的情况 (例如: G. 729 , 以 20ms作为采样) 由于每秒采样次数较少可以采用这种加密 方式实现实时加密。  Method 1: Encrypted recording is performed in real time according to each sampled data. For sampling according to frames (for example, G.729, sampling with 20ms), this encryption method can be used for real-time encryption because the number of samples per second is small.
方式 2: 按照固定间隔实时进行加密录制, 例如对 G. 711可以将每 20ms的 采样数据 (8KHz采样时, 20ms包含了 160个采样数据)作为一个整体加密一次, 这种方式相比方式 1 可以有效控制实时加密次数, 控制加密算法的开销, 从而 实现实时加解密。  Method 2: Perform encrypted recording in real time at regular intervals. For example, G.711 can encrypt each 20ms of sampled data (including 20 samples of data in 20ms when it is 8KHz). This method can be compared to mode 1 Effectively control the number of real-time encryption and control the overhead of the encryption algorithm to achieve real-time encryption and decryption.
方式 3: 在结束录制时对于整个 waveform Data内的音频数据进行加密。 ( 2 )对于基于 ISO基础媒体文件格式演进来的文件, 例如 3GP、 Qui ckTime, MPEG, 其基本格式如图 4所示。 可以看出, ISO文件由一系列的对象(BOX )组 成, 这里对象也可称为盒子。 ISO文件里有两个最重要的 BOX: 用于存储媒体控 制信息的 Movie Box (moov)和用于存储媒体音频和视频数据的 Media data Box (mdat)。  Method 3: Encrypt the audio data in the entire waveform Data at the end of the recording. (2) For files evolved based on the ISO base media file format, such as 3GP, Qui ckTime, MPEG, the basic format is shown in Figure 4. It can be seen that the ISO file consists of a series of objects (BOX), which can also be called boxes. There are two most important BOX in the ISO file: Movie Box (moov) for storing media control information and Media Data Box (mdat) for storing media audio and video data.
对^义内容的音频和视频数据进行加密 , 就是对 mda t的内容进行加密, 加 密方式可以选择如下 3种方式:  Encrypting the audio and video data of the content is to encrypt the content of mda t. The encryption method can be selected as follows:
方式 1: 按照每个采样数据实时进行加密录制, 当每秒采样次数较少时可以 采用这种加密方式实现实时加密。  Method 1: Encrypted recording is performed in real time according to each sampled data. When the number of samples per second is small, real-time encryption can be implemented by using this encryption method.
方式 2: 按照 Trunk方式进行实时加密录制, Trunk方式就是将多个采样作 为一个整体, 对这个整体进行加密, 解密时也以 Trunk为单位进行, 采用这种 方式可以有效控制实时加密次数, 控制加密算法的开销, 从而实现实时加解密。 方式 3: 在结束录制后, 对于整个 mda t里的内容进行加密。 Method 2: Perform real-time encrypted recording according to the trunk mode. The trunk mode is to encrypt multiple samples as a whole, and the whole is encrypted. The decryption is also performed in a trunk unit. This method can effectively control the number of real-time encryption and control encryption. The overhead of the algorithm, thus realizing real-time encryption and decryption. Method 3: After the recording is finished, the content in the entire mda t is encrypted.
这样就完成了对网络多媒体实时^义内容的加密录制过程。  This completes the encrypted recording process of the network multimedia real-time content.
本发明实施例还提供了一种网络多媒体的解密播放方法。  The embodiment of the invention further provides a method for decrypting and playing a network multimedia.
如图 5所示, 该解密播放的方法包括 501、 502两个步骤:  As shown in FIG. 5, the method for decrypting playback includes two steps of 501, 502:
501、 对加密录制后的会议内容进行解密。 如图 6所示, 501又具体包括 5011、 5012两个步骤。  501. Decrypt the content of the conference after the encrypted recording. As shown in FIG. 6, 501 specifically includes two steps of 5011 and 5012.
5011、 获取用户所设置的密钥。  5011. Obtain a key set by the user.
在现有技术中, 当需要对会议录制文件进行播放时, 由会议控制器通过 Mp 接口向 义混合器下发 Mod命令, Mod命令中仅仅携带了通知播放录制内容的信 号, H248协议定义如下:  In the prior art, when the conference recording file needs to be played, the conference controller sends a Mod command to the right mixer through the Mp interface, and the Mod command only carries a signal for notifying the playback of the recorded content. The H248 protocol is defined as follows:
Package Name: Advanced audio server base package  Package Name: Advanced audio server base package
Package ID: aasb (0x0033)  Package ID: aasb (0x0033)
播放的信号如下:  The signals played are as follows:
Si na l Name: P lay  Si na l Name: P lay
Si gna l ID: p lay (0x0001)  Si gna l ID: p lay (0x0001)
信号的主要参数如下:  The main parameters of the signal are as follows:
Figure imgf000010_0001
Figure imgf000010_0001
为了让 H. 248支持会议录制内容的解密播放, 需要扩展 Mp接口, 义控制器 在下发播放信号的同时, 在 Mod命令携带解密算法与用户输入的密钥, 扩展后的 播放信号如下: In order for H.248 to support the decryption and playback of the conference recording content, it is necessary to extend the Mp interface, and the controller outputs the decryption algorithm and the key input by the user in the Mod command while the playback signal is being transmitted. The playback signal is as follows:
File Encryption Play Package  File Encryption Play Package
Package ID: FEP  Package ID: FEP
Vers ion: 1  Vers ion: 1
Extends: aasb vers ion 1  Extends: aasb vers ion 1
Signal Name: Play Signal Name: Play
Signal ID: play (0x0001)  Signal ID: play (0x0001)
Parameter Name: Encrypt ion Type  Parameter Name: Encrypt ion Type
Parameter ID: Enc Type (0x0011)  Parameter ID: Enc Type (0x0011)
De s c r i p t i on:指示播放需要用到的解密算法类型  De s c r i p t i on: indicates the type of decryption algorithm needed for playback
Type: Octet string  Type: Octet string
O tional: Yes  O tional: Yes
Default: None  Default: None
Parameter Name: Encryption Key Parameter Name: Encryption Key
Parameter ID: Enc Key (0x0012)  Parameter ID: Enc Key (0x0012)
De s c r i p t i on:指示播放需要用到的解密密钥  De s c r i p t i on: indicates the decryption key required for playback
Type: Octet string (SIZE (0..65535))  Type: Octet string (SIZE (0..65535))
Optional: Yes  Optional: Yes
Default: None  Default: None
这样就荻知了解密需要用到的解密算法和解密密钥。  This tells us the decryption algorithm and decryption key that are needed for decryption.
5012、 利用得到的密钥对加密后的会议录制内容进行解密。 根据播放信号中指定的密钥, 就可以对会议的录制内容进行解密。 由于对 会议录制内容进行加密有两种方式, 所以对会议录制内容进行解密也有两种方 式: 5012. Decrypt the encrypted conference recording content by using the obtained key. The recording of the conference can be decrypted according to the key specified in the playback signal. Since there are two ways to encrypt the recording of the conference, there are two ways to decrypt the recording of the conference:
1、 对会议内容进行录制, 在录制结束后, 生成明文的录制文件。 加密时根 据指定的密钥调用指定的加密算法对明文文件的全文进行加密。 这样在解密播 放的时候, 需要对全文解密, 之后进行播放。  1. Record the content of the conference. After the recording is finished, generate a clear text recording file. When encrypting, the full text of the plaintext file is encrypted by calling the specified encryption algorithm according to the specified key. In this way, when decrypting the playback, the full text needs to be decrypted and then played.
2、 如果加密的时候仅对会议录制内容的音频和视频数据进行加密, 对于录 制文件本身不整体加密, 对媒体文件的控制信息也不加密, 那么解密的时候只 要对会议录制内容的音频和视频数据解密就可以进行播放。  2. If the audio and video data of the conference recording content is only encrypted when encrypting, the recording file itself is not encrypted as a whole, and the control information of the media file is not encrypted. Then, the audio and video of the recording content of the conference are decrypted. Data decryption can be played.
会议录制后生成的文件包括 WAV文件和 ISO文件。  The files generated after the conference recording include WAV files and ISO files.
( 1 )WAV文件的基本单元是块( Chunk ) WAV文件中包括数据块( Data Chunk ) 和格式块(Fmt Chunk ), Data Chunk 用于存储采样的音频数据, Fmt Chunk用 于存储编解码和采样率等信息。 Data Chunk格式如下:  (1) The basic unit of the WAV file is Chunk WAV file includes data block (Data Chunk) and format block (Fmt Chunk), Data Chunk is used to store sampled audio data, and Fmt Chunk is used to store codec and sample. Rate and other information. The Data Chunk format is as follows:
typedef s truct {  Typedef s truct {
ID chunk ID (块的序号) ;  ID chunk ID (number of the block);
long chunk Size (块的大小) ;  Long chunk Size (block size);
uns igned char waveform Da ta [];  Uns igned char waveform Da ta [];
} Da ta Chunk:  } Da ta Chunk:
对音频数据进行解密就是对 Data Chunk 的内容域 waveform Data进行解 密, 加密有 3种方式, 对应地, 解密的时候也可以采用以下 3种方式:  Decrypting audio data is to decrypt Data Chunk's content domain waveform Data. There are 3 ways to encrypt. Correspondingly, the following three methods can be used for decryption:
方式 1: 加密时按照每个采样数据进行加密录制, 解密的时候也按照每个采 样数据进行解密。  Method 1: Encrypted recording is performed for each sampled data during encryption, and decrypted according to each sampled data.
方式 2: 加密时按照固定间隔进行加密录制, 解密时也按照固定间隔进行解 密。 例如对 G. 711可以将每 20ms的采样数据 (8KHz采样时, 20ms包含了 160个 采样数据)作为一个整体加密一次, 解密的时候对每 20ms 的采样数据作为一个 整体解密一次, 采用这种方式相比方式 1 可以有效控制实时解密次数, 控制解 密算法的开销, 从而实现实时解密。 Method 2: Encrypted recording at a fixed interval during encryption, and at a fixed interval during decryption Secret. For example, G.711 can encrypt the sampled data every 20ms (including 20 samples of data in 20ms when it is 8KHz), and decrypts the sampled data every 20ms as a whole when decrypting. Compared with mode 1, the number of real-time decryption can be effectively controlled, and the overhead of the decryption algorithm can be controlled, thereby realizing real-time decryption.
方式 3: 加密时, 在结束录制后对于整个 waveform Data内的音频数据进行 加密, 这样解密也需要在结束录制后, 再对加密后的所有音频数据进行解密。  Method 3: When encrypting, the audio data in the entire waveform data is encrypted after the end of the recording, so that the decryption also needs to decrypt all the encrypted audio data after the end of the recording.
( 2 )对于基于 ISO基础媒体文件格式演进来的文件, 例如 3GP、 Qui ckTime, MPEG, 其基本格式如图 4所示。 可以看出, ISO文件由一系列的对象(BOX )组 成, 这里对象也可称为盒子。 ISO文件里有两个最重要的 BOX: 用于存储媒体控 制信息的 Movie Box (moov)和用于存储媒体音频和视频数据的 Media data Box (mdat)。  (2) For files evolved based on the ISO base media file format, such as 3GP, Qui ckTime, MPEG, the basic format is shown in Figure 4. It can be seen that the ISO file consists of a series of objects (BOX), which can also be called boxes. There are two most important BOX in the ISO file: Movie Box (moov) for storing media control information and Media Data Box (mdat) for storing media audio and video data.
对^义内容的音频和视频数据进行解密, 就是对 mda t的内容进行解密, 加 密有 3种方式, 对应地, 解密的时候也可以采用以下 3种方式:  Decrypting the audio and video data of the content is to decrypt the content of mda t. There are three ways to encrypt the content. Correspondingly, the following three methods can be used for decryption:
方式 1: 加密时按照每个采样数据进行加密录制, 解密的时候也按照每个采 样数据进行解密。  Method 1: Encrypted recording is performed for each sampled data during encryption, and decrypted according to each sampled data.
方式 2: 加密时, 按照 Trunk方式进行实时加密录制, Trunk方式就是将多 个采样作为一个整体, 对这个整体进行加密, 解密时也以 Trunk为单位进行, 将多个采样作为一个整体进行解密, 采用这种方式可以有效控制实时解密次 数, 控制解密算法的开销, 从而实现实时解密。  Method 2: When encrypting, perform real-time encrypted recording according to the trunk mode. The trunk mode is to encrypt multiple samples as a whole, and the decryption is also performed in a trunk unit, and multiple samples are decrypted as a whole. In this way, the number of real-time decryptions can be effectively controlled, and the overhead of the decryption algorithm can be controlled, thereby realizing real-time decryption.
方式 3 : 加密是在结束录制后, 对于整个 mdat里的内容进行加密, 这样在 解密时, 需要在结束录制后, 对加密后的所有音频和视频数据进行解密。  Mode 3: Encryption encrypts the content of the entire mdat after the end of the recording, so that when decrypting, all the encrypted audio and video data needs to be decrypted after the recording is finished.
502、 播放解密后的会议内容。 如图 7所示, 502具体包括 5021、 5022两个 步骤: 5021、 会议控制器创建播放会议录制文件所需要的网络资源并请求会议混 合器分配网络端点。 502. Play the decrypted conference content. As shown in FIG. 7, 502 specifically includes two steps of 5021, 5022: 5021. The conference controller creates a network resource required for playing the conference recording file and requests the conference mixer to allocate the network endpoint.
在会议进行中或会议结束后, 用户登录会议终端或者通过 Web界面, 准备 重播录制的会议内容。 应用服务器通知会议控制器创建播放会议录制文件所需 要的网络资源, 之后 义控制器通过 Mp接口下发命令请求^义混合器分配网絡 端点。  After the conference is in progress or after the conference ends, the user logs in to the conference terminal or through the web interface, prepares to replay the recorded conference content. The application server notifies the conference controller to create the network resources required for playing the conference recording file, and then the controller sends a command request to the network mixer through the Mp interface.
5022、 ^义混合器分配网络端点。  5022, the right mixer allocates network endpoints.
5023、 会议控制器启动对会议录制文件的播放。  5023. The conference controller starts playback of the conference recording file.
分配网络端点后, 应用服务器通知会议控制器启动对于录制文件的播放。  After the network endpoint is assigned, the application server notifies the conference controller to initiate playback of the recorded file.
5024、 ^义混合器将 ^义录制内容播放到所述网络端点上。  5024. The right mixer plays the recorded content to the network endpoint.
会议控制器通过 Mp接口下发 H248协议的 Mod命令, 请求会议混合器将解 密后的录制内容播放到在刚才所分配的网络端点上。  The conference controller sends the Mod command of the H248 protocol through the Mp interface, and requests the conference mixer to play the decrypted recording content to the network endpoint just allocated.
这样就完成了对网絡多媒体实时^义内容的解密播放过程。  This completes the decryption and playback process of the network multimedia real-time content.
本发明实施例中, 用户在网络多媒体实时会议开始前或者会议进行过程 中, 设定对会议内容进行录制并设置密钥, 利用密钥对会议的录制内容进行加 密; 同时在会议进行中或会议结束后, 用户可以根据所设置的密钥来重播录制 的会议内容。 本发明实施例对会议录制内容进行加密, 只有根据密钥才能获知 义内容, 从而解决了网络多媒体实时^ i义的录制内容被非正当使用的问题。 本发明实施例还提供了一种网络多媒体会议的加密录制装置。  In the embodiment of the present invention, before the start of the network multimedia real-time conference or during the conference, the user sets the recording of the conference content and sets the key, and encrypts the recorded content of the conference by using the key; After the end, the user can replay the recorded meeting content according to the set key. In the embodiment of the present invention, the recorded content of the conference is encrypted, and only the key can be obtained according to the key, thereby solving the problem that the recorded content of the network multimedia real-time is improperly used. The embodiment of the invention further provides an encrypted recording device for a network multimedia conference.
如图 8所示, 该装置包括:  As shown in Figure 8, the device includes:
录制模块 801 , 用于对网络多媒体实时^义内容进行录制;  The recording module 801 is configured to record the real-time content of the network multimedia;
加密模块 802 , 用于对所述^义录制内容进行加密。  The encryption module 802 is configured to encrypt the recorded content.
在 ^义开始前, 用户登录 ^义终端或者通过 Web界面, 准备进行网络多媒 体实时会议。 应用服务器通知会议控制器创建会议录制需要的网络资源, 之后Before the start of ^yi, the user logs in to the terminal or through the web interface to prepare for network multimedia. Real-time meeting. The application server notifies the conference controller to create the network resources required for the conference recording, and then
^义控制器通过 Mp接口下发命令请求会议混合器分配网络端点。 在会议混合器 分配网络端点后, 应用服务器通知 ^义控制器启动对会议内容的录制, 会议混 合器就在所分配的网络端点上将^ i义内容录制到文件中。 The controller sends a command through the Mp interface to request the conference mixer to allocate network endpoints. After the conference mixer assigns a network endpoint, the application server notifies the controller that the recording of the conference content is initiated, and the conference mixer records the content on the assigned network endpoint into the file.
加密模块 802包括:  The encryption module 802 includes:
密钥单元 803, 用于获取用户所设置的密钥。  The key unit 803 is configured to acquire a key set by a user.
会议控制器下发 H248协议的 Mod命令, 请求会议混合器在所分配的网络端 点上将会议内容录制到文件中, Mod命令中携带了通知录制的信号, 在录制信号 中指定了加密算法和用户输入的密钥。  The conference controller sends a Mod command of the H248 protocol, and requests the conference mixer to record the conference content into the file on the allocated network endpoint. The Mod command carries the signal for notifying the recording, and the encryption algorithm and the user are specified in the recording signal. The key entered.
加密单元 804 , 用于根据上述密钥对会议录制内容进行加密。  The encryption unit 804 is configured to encrypt the conference recording content according to the foregoing key.
根据录制信号中指定的密钥, 就可以对会议的录制内容进行加密。 对会议 录制内容进行加密有两种方式:  The recording of the conference can be encrypted according to the key specified in the recording signal. There are two ways to encrypt meeting recordings:
1、 对会议内容进行录制, 在录制结束后, 生成明文的录制文件。 再利用上 述密钥调用指定的加密算法对明文文件的全文进行加密。  1. Record the content of the conference. After the recording is finished, generate a clear text recording file. The specified encryption algorithm is invoked by using the above key to encrypt the full text of the plaintext file.
2、 仅对会议录制内容音频和视频数据进行加密, 利用上述密钥调用指定的 加密算法对音频和视频数据进行加密, 对于录制文件本身不整体加密, 对媒体 文件的控制信息也不加密, 对音频和视频数据解密就可以进行播放。  2. Encrypt only the audio and video data of the conference recording content, and use the above-mentioned key to invoke the specified encryption algorithm to encrypt the audio and video data. The recording file itself is not encrypted as a whole, and the control information of the media file is not encrypted. Audio and video data can be decrypted for playback.
这样通过该装置就可以完成对网络多媒体实时会议内容的加密录制。  In this way, the encrypted recording of the content of the network multimedia real-time conference can be completed by the device.
本发明实施例还提供了一种网络多媒体的解密播放装置。  The embodiment of the invention further provides a network multimedia decryption and playback device.
如图 9所示, 该装置包括:  As shown in Figure 9, the device includes:
解密模块 01 , 用于对加密录制后的 ^义内容进行解密;  The decryption module 01 is configured to decrypt the encrypted content after the encrypted recording;
播放模块 902 , 用于播放解密后的 ^义内容。  The playing module 902 is configured to play the decrypted content.
解密模块 901包括: 密钥单元 903 , 用于获取用户所设置的密钥。 The decryption module 901 includes: The key unit 903 is configured to acquire a key set by a user.
会议控制器下发 H248协议的 Mod命令, 请求会议混合器在所分配的网络端 点上将会议内容录制到文件中, Mod命令中携带了通知播放的信号, 在播放信 号中指定了解密算法和用户输入的解密密钥。  The conference controller sends a Mod command of the H248 protocol, and requests the conference mixer to record the conference content into the file on the allocated network endpoint. The Mod command carries the signal for notification playback, and the decryption algorithm and the user are specified in the playback signal. The decryption key entered.
解密单元 904 , 用于根据上述密钥对加密后的会议录制内容进行解密。 根据播放信号中指定的密钥, 就可以对加密后的会议录制内容进行解密。 由于对会议录制内容进行加密有两种方式, 所以对会议录制内容进行解密也有 两种方式:  The decryption unit 904 is configured to decrypt the encrypted conference recording content according to the above key. The encrypted conference recording can be decrypted according to the key specified in the playback signal. Since there are two ways to encrypt the recording of the conference, there are two ways to decrypt the recording of the conference:
1、 对会议内容进行录制, 在录制结束后, 生成明文的录制文件。 加密时根 据指定的密钥调用指定的加密算法对明文文件的全文进行加密。 这样在解密播 放的时候, 需要对全文解密, 之后进行播放。  1. Record the content of the conference. After the recording is finished, generate a clear text recording file. When encrypting, the full text of the plaintext file is encrypted by calling the specified encryption algorithm according to the specified key. In this way, when decrypting the playback, the full text needs to be decrypted and then played.
2、 如果加密的时候仅对会议录制内容的音频和视频数据进行加密, 对于录 制文件本身不整体加密, 对媒体文件的控制信息也不加密, 那么解密的时候只 要对会议录制内容的音频和视频数据解密就可以进行播放。  2. If the audio and video data of the conference recording content is only encrypted when encrypting, the recording file itself is not encrypted as a whole, and the control information of the media file is not encrypted. Then, the audio and video of the recording content of the conference are decrypted. Data decryption can be played.
在会议进行中或会议结束后, 用户登录会议终端或者通过 Web界面, 准备 重播录制的会议内容。 应用服务器通知会议控制器创建播放会议录制文件所需 要的网络资源, 之后 义控制器通过 Mp接口下发命令请求^ i义混合器分配网络 端点。 在会议混合器分配网络端点后, 应用服务器通知会议控制器启动对于录 制文件的播放, 会议控制器通过 Mp接口下发命令请求会议混合器将解密后的录 制内容播放到在刚才所分配的网络端点上。  After the conference is in progress or after the conference ends, the user logs in to the conference terminal or through the web interface, prepares to replay the recorded conference content. The application server notifies the conference controller to create the network resources required for playing the conference recording file, and then the controller sends a command through the Mp interface to request the network to allocate the network endpoint. After the conference mixer allocates the network endpoint, the application server notifies the conference controller to start the playback of the recorded file, and the conference controller sends a command through the Mp interface to request the conference mixer to play the decrypted recording to the network endpoint just assigned. on.
这样通过该装置就完成了对网络多媒体实时^义内容的解密播放。  In this way, the decryption and playing of the network multimedia real-time content is completed by the device.
本发明实施例中, 用户在网络多媒体实时会议开始前或者会议进行过程 中, 设定对会议内容进行录制并设置密钥, 利用密钥对会议的录制内容进行加 密; 同时在会议进行中或会议结束后, 用户可以根据所设置的密钥来重播录制 的会议内容。 本发明实施例对会议录制内容进行加密, 只有根据密钥才能获知 ^义内容, 从而解决了网络多媒体实时^ i义的录制内容被非正当使用的问题。 In the embodiment of the present invention, before the start of the network multimedia real-time conference or during the conference, the user sets the recording of the conference content and sets the key, and uses the key to add the recorded content of the conference. At the same time, after the conference is in progress or after the conference ends, the user can replay the recorded conference content according to the set key. The embodiment of the invention encrypts the recorded content of the conference, and only the key content can be obtained according to the key, thereby solving the problem that the recorded content of the network multimedia real-time meaning is improperly used.
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不局限于 此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到 变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保护范围应 以所述权利要求的保护范围为准。  The above is only the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of changes or substitutions within the technical scope of the present invention. It should be covered by the scope of the present invention. Therefore, the scope of the invention should be determined by the scope of the appended claims.

Claims

权利 要求 Rights request
1、 一种网络多媒体会议的加密录制方法, 其特征在于, 包括:  A method for encrypting and recording a network multimedia conference, comprising:
对网络多媒体会议进行录制;  Recording a network multimedia conference;
对所述会议录制内容进行加密。  Encrypt the conference recording.
2、 根据权利要求 1所述的网络多媒体会议的加密录制方法, 其特征在于, 所述对所述^义录制内容进行加密的步骤包括:  2. The method for encrypting a network multimedia conference according to claim 1, wherein the step of encrypting the recorded content comprises:
获取用户所设置的密钥;  Obtain the key set by the user;
利用所述密钥对所述^义录制内容进行加密。  The content recorded is encrypted using the key.
3、 根据权利要求 2所述的网络多媒体会议的加密录制方法, 其特征在于, 所述利用所述密钥对所述会议录制内容进行加密的步骤包括:  The method for encrypting a network multimedia conference according to claim 2, wherein the step of encrypting the conference recording content by using the key comprises:
录制结束后生成录制文件, 利用所述密钥对录制文件进行加密; 或 对所述会议录制内容的音频和视频数据进行加密。  After the recording ends, a recording file is generated, and the recording file is encrypted by using the key; or the audio and video data of the conference recording content is encrypted.
4、 根据权利要求 3所述的网络多媒体会议的加密录制方法, 其特征在于, 所述对所述会议录制内容的音频和视频数据进行加密的步骤包括:  The encryption recording method of the network multimedia conference according to claim 3, wherein the step of encrypting the audio and video data of the conference recording content comprises:
按照每个采样数据对所述会议录制内容的音频和视频数据进行实时加密录 制; 或  Performing real-time encrypted recording of the audio and video data of the conference recording according to each sampled data; or
按照固定间隔对所述^义录制内容的音频和视频数据进行实时加密录制; 或  Real-time encrypted recording of audio and video data of the recorded content at regular intervals; or
在录制结束后 , 对整个所述会议录制内容的音频和视频数据进行加密。  After the recording is finished, the audio and video data of the entire recording of the conference is encrypted.
5、 一种网络多媒体会议的解密播放方法, 其特征在于, 包括: 5. A method for decrypting and playing a network multimedia conference, characterized in that it comprises:
对加密录制后的会议内容进行解密;  Decrypt the encrypted conference content;
播放解密后的 ^义内容。  Play the decrypted ^ meaning content.
6、 根据权利要求 5所述的网络多媒体会议的解密播放方法, 其特征在于, 所述对加密录制后的会议内容进行解密的步骤包括: 6. The method for decrypting and playing a network multimedia conference according to claim 5, wherein: The step of decrypting the encrypted recorded conference content includes:
获取用户所设置的密钥;  Obtain the key set by the user;
利用所述密钥对加密后的会议录制内容进行解密。  The encrypted conference recording content is decrypted by using the key.
7、 根据权利要求 6所述的网络多媒体会议的解密播放方法, 其特征在于, 所述利用所述密钥对加密后的会议录制内容进行解密的步骤包括:  The decryption and playback method of the network multimedia conference according to claim 6, wherein the step of decrypting the encrypted conference recording content by using the key comprises:
录制结束后生成录制文件, >据所述密钥对加密后的录制文件进行解密; 或  After the recording ends, a recording file is generated, and the encrypted recording file is decrypted according to the key; or
根据所述密钥对加密后的会议录制内容的音频和视频数据进行解密。  The audio and video data of the encrypted conference recording content is decrypted according to the key.
8、 根据权利要求 7所述的网络多媒体会议的解密播放方法, 其特征在于, 所述根据所述密钥对加密后的会议录制内容的音频和视频数据进行解密的步骤 包括:  The decryption and playback method of the network multimedia conference according to claim 7, wherein the step of decrypting the audio and video data of the encrypted conference recording content according to the key comprises:
按照每个采样数据对加密后的所述音频和视频数据进行实时解密; 或 按照固定间隔对加密后的所述音频和视频数据进行实时解密; 或  Performing real-time decryption of the encrypted audio and video data according to each sampled data; or real-time decrypting the encrypted audio and video data at regular intervals; or
在录制结束后,对加密后的整个会议录制内容的音频和视频数据进行解密。  After the recording is finished, the encrypted audio and video data of the entire conference recording is decrypted.
9、 一种网络多媒体会议的加密录制装置, 其特征在于, 包括: 9. An encrypted recording device for a network multimedia conference, comprising:
录制模块, 用于对网络多媒体实时^义内容进行录制;  a recording module, configured to record network multimedia real-time content;
加密模块 , 用于对所述会议录制内容进行加密。  An encryption module, configured to encrypt the conference recording content.
10、 根据权利要求 9所述的网络多媒体会议的加密录制装置, 其特征在于, 所述加密模块包括:  The encryption recording device of the network multimedia conference according to claim 9, wherein the encryption module comprises:
密钥单元, 用于获取用户所设置的密钥;  a key unit, configured to acquire a key set by a user;
加密单元, 用于根据所述密钥对所述会议录制内容进行加密。  And an encryption unit, configured to encrypt the conference recording content according to the key.
11、 一种网络多媒体 ^义的解密播放装置, 其特征在于, 包括:  11. A network multimedia decryption playback device, comprising:
解密模块, 用于对加密录制后的 义内容进行解密; 播放模块, 用于播放解密后的 ^义内容。 a decryption module, configured to decrypt the encrypted content after the encrypted recording; The playing module is configured to play the decrypted content.
12、根据权利要求 11所述的网络多媒体^义的解密播放装置,其特征在于, 所述解密模块包括:  The decryption and playback device of the network multimedia device according to claim 11, wherein the decryption module comprises:
密钥单元, 用于获取用户所设置的密钥;  a key unit, configured to acquire a key set by a user;
解密单元, 用于根据所述密钥对加密后的会议录制内容进行解密。  And a decryption unit, configured to decrypt the encrypted conference recording content according to the key.
PCT/CN2009/076098 2008-12-26 2009-12-26 Method and device for encrypted recording and decrypted displaying network multimedia conference WO2010072179A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810188925.8 2008-12-26
CN2008101889258A CN101547196B (en) 2008-12-26 2008-12-26 Methods and devices for encrypting shooting and decrypting playing of network multimedia conference

Publications (1)

Publication Number Publication Date
WO2010072179A1 true WO2010072179A1 (en) 2010-07-01

Family

ID=41194085

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/076098 WO2010072179A1 (en) 2008-12-26 2009-12-26 Method and device for encrypted recording and decrypted displaying network multimedia conference

Country Status (2)

Country Link
CN (1) CN101547196B (en)
WO (1) WO2010072179A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10326803B1 (en) 2014-07-30 2019-06-18 The University Of Tulsa System, method and apparatus for network security monitoring, information sharing, and collective intelligence
CN115001860A (en) * 2022-07-20 2022-09-02 广州市保伦电子有限公司 Safety management system for paperless digital conference

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101547196B (en) * 2008-12-26 2012-11-07 华为技术有限公司 Methods and devices for encrypting shooting and decrypting playing of network multimedia conference
CN103166913B (en) * 2011-12-09 2015-10-21 华为技术有限公司 The method for recording of encrypted media streams and switch control device
CN105141637A (en) * 2015-09-25 2015-12-09 中铁工程装备集团有限公司 Transmission encryption method taking flows as granularity
CN108234922B (en) * 2016-12-14 2019-03-01 视联动力信息技术股份有限公司 A kind of recorded broadcast method and device
CN112135086B (en) * 2020-11-24 2021-02-09 全时云商务服务股份有限公司 Conference recording encryption method, system and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1383326A (en) * 2001-04-20 2002-12-04 安科数码媒体有限公司 Device and method for processing digital audio-video medium
CN101087399A (en) * 2006-06-09 2007-12-12 中兴通讯股份有限公司 A multi-media terminal and its method for conference recording and playing
US20080209516A1 (en) * 2007-02-23 2008-08-28 Nick Nassiri Signature and identity authentication and documentation using a third party witnessed authenticator via a video conference
CN101547196A (en) * 2008-12-26 2009-09-30 华为技术有限公司 Methods and devices for encrypting shooting and decrypting playing of network multimedia conference

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1383326A (en) * 2001-04-20 2002-12-04 安科数码媒体有限公司 Device and method for processing digital audio-video medium
CN101087399A (en) * 2006-06-09 2007-12-12 中兴通讯股份有限公司 A multi-media terminal and its method for conference recording and playing
US20080209516A1 (en) * 2007-02-23 2008-08-28 Nick Nassiri Signature and identity authentication and documentation using a third party witnessed authenticator via a video conference
CN101547196A (en) * 2008-12-26 2009-09-30 华为技术有限公司 Methods and devices for encrypting shooting and decrypting playing of network multimedia conference

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10326803B1 (en) 2014-07-30 2019-06-18 The University Of Tulsa System, method and apparatus for network security monitoring, information sharing, and collective intelligence
CN115001860A (en) * 2022-07-20 2022-09-02 广州市保伦电子有限公司 Safety management system for paperless digital conference

Also Published As

Publication number Publication date
CN101547196B (en) 2012-11-07
CN101547196A (en) 2009-09-30

Similar Documents

Publication Publication Date Title
WO2010072179A1 (en) Method and device for encrypted recording and decrypted displaying network multimedia conference
TWI760527B (en) Method and system to encrypt and decrypt audio and video file
CN102347943B (en) The method and apparatus sent based on RTSP session and receive streaming data
US7536470B2 (en) Random access read/write media format for an on-demand distributed streaming system
US9635335B2 (en) System and methods for recording a compressed video and audio stream
US8452008B2 (en) Content distributing method, apparatus and system
CN108881205B (en) HLS streaming media safe playing system and playing method
US11528128B2 (en) Encryption management, content recording management, and playback management in a network environment
JP2007014006A (en) Monitoring method of data packet transmitted across computer network
CA2511914A1 (en) System for secure decryption of streaming media using selective decryption of header information
US20100008506A1 (en) Method and apparatus for performing voip-based communication using bio keys
US20110194692A1 (en) Voice-over internet protocol (voip) scrambling mechanism
CN106941629B (en) Real-time live broadcast method based on SIP + RTP and RTMP protocol intercommunication
WO2009018738A1 (en) A method, related service device and system for providing video content
US10798067B2 (en) Recording encrypted media session
KR20060064469A (en) Apparatus and method for protecting multicast streamed motion picture files
CN108768920B (en) Recorded broadcast data processing method and device
WO2015196590A1 (en) Method and apparatus for playing desktop cloud video
CN108599928B (en) Key management method and device
WO2008089694A1 (en) A method, a system and an equipment for obtaining the media stream protecting key in ims network
US20110258657A1 (en) System and method for secured digital video broadcasting of instantaneous testimony
JP2003271530A (en) Communication system, inter-system relevant device, program and recording medium
EP2713576B1 (en) Method and device for processing streaming media content
RU2013127119A (en) OPTIMIZATION OF MULTIMEDIA IN REAL TIME DURING REMOTE SESSIONS
US7526072B2 (en) Audio device, system and method for archiving audio files based on distributed audio phone data received over a data network in encrypted or non-encrypted form

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09834132

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09834132

Country of ref document: EP

Kind code of ref document: A1