WO2021109998A1 - Procédé et appareil de transmission de contenu multimédia, et support de stockage - Google Patents

Procédé et appareil de transmission de contenu multimédia, et support de stockage Download PDF

Info

Publication number
WO2021109998A1
WO2021109998A1 PCT/CN2020/133132 CN2020133132W WO2021109998A1 WO 2021109998 A1 WO2021109998 A1 WO 2021109998A1 CN 2020133132 W CN2020133132 W CN 2020133132W WO 2021109998 A1 WO2021109998 A1 WO 2021109998A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
server
public key
media content
request signaling
Prior art date
Application number
PCT/CN2020/133132
Other languages
English (en)
Chinese (zh)
Inventor
卢正宇
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2021109998A1 publication Critical patent/WO2021109998A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems
    • H04N7/152Multipoint control units therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems

Definitions

  • the embodiments of the present disclosure relate to the field of communication technologies, and in particular, to a method for transmitting media content.
  • Video conference usually refers to a real-time, two-way or multi-party visual communication conference based on terminal equipment and a conference multipoint control unit MCU (Multipoint Control Unit).
  • MCU Multipoint Control Unit
  • video conferencing has gradually realized technical solutions such as large-capacity user access, high bandwidth occupancy, and one-key conference.
  • video conferencing is widely used in remote meetings, training and teaching.
  • the current video conferencing solutions in the industry have security risks.
  • the commonly used scheme is that the server sends the URL address to the terminal, and the terminal requests media content from the server through the URL address.
  • the illegal terminal can obtain the URL address of the media content through network packet interception or other means, and make an illegal media content request to the server through the URL address.
  • the existing solutions cannot meet the security requirements of the video conference.
  • the purpose of the embodiments of the present disclosure is to provide a media content transmission method, so that illegal terminals cannot learn the address of the media content, nor can they make illegal media content requests to the server, so as to meet the security requirements of media content network interaction.
  • the embodiments of the present disclosure provide a media content transmission method, including: generating a server public key private key pair, wherein the server public key private key pair includes a server public key and a server public key. Private key; send the server public key to the terminal, and receive the terminal public key generated by the terminal; use the terminal public key to encrypt the media address to obtain the encrypted media address, and send the encrypted media address to all The terminal; obtain the encryption request signaling sent by the terminal, where the encryption request signaling is the media content request signaling encrypted by the terminal using the server public key; the server private key is used to decrypt the The encryption request signaling, and push the media content requested by the encryption request signaling to the terminal after the decryption is completed.
  • Embodiments of the present disclosure also provide a method for transmitting media content, including: generating a terminal public key private key pair, wherein the terminal public key private key pair includes a terminal public key and a terminal private key; and sending the terminal public key and private key to the server.
  • Terminal public key and receiving the server public key generated by the server obtaining the encrypted media address sent by the server, where the encrypted media address is the media address encrypted by the server using the terminal public key;
  • the terminal private key decrypts the encrypted media address to generate media content request signaling for requesting media content from the media address; encrypts the media content request signaling by using the server public key to obtain an encryption request message Command, and send the encryption request signaling to the server; receive the media content pushed by the server.
  • Embodiments of the present disclosure also provide a media content delivery device, including: at least one processor; and, a memory communicatively connected with the at least one processor; wherein the memory stores the memory that can be processed by the at least one processor; The instructions are executed by the at least one processor, so that the at least one processor can execute the aforementioned media content delivery method.
  • the embodiment of the present disclosure also provides a media content transmission method, including: the server generates a server public key private key pair, and the terminal generates a terminal public key private key pair, wherein the server public key private key pair includes The server public key and the server private key, the terminal public key-private key pair includes the terminal public key and the terminal private key; the server sends the server public key to the terminal, and the terminal sends the terminal public key to the terminal The server; the server uses the terminal public key to encrypt the media address to obtain the encrypted media address, and sends the encrypted media address to the terminal; the terminal obtains the encrypted media address sent by the server and uses the terminal private Key to decrypt the encrypted media address, generate media content request signaling for requesting media content from the media address, encrypt the media content request signaling by using the server public key to obtain the encryption request signaling, and The encryption request signaling is sent to the server; the server obtains the encryption request signaling sent by the terminal, decrypts the encryption request signaling using the server private key, and encrypts the encryption
  • the embodiments of the present disclosure also provide a computer-readable storage medium that stores a computer program, and when the computer program is executed by a processor, the media content transmission method described above is implemented.
  • the embodiment of the present disclosure uses the terminal public key to encrypt the media address, so that the terminal needs to use the terminal private key for decryption to obtain the media address, thereby ensuring the transfer process of the media address from the server to the terminal
  • the media address will not be illegally intercepted;
  • the terminal uses the server public key to encrypt the request signaling, so that the server uses the server private key to decrypt the request signaling to ensure that the request signaling is transmitted from the terminal to the server Not to be monitored; so that illegal terminals can neither learn the address of the media content, nor can they make illegal media content requests to the server, so as to meet the security requirements of media content network interaction.
  • Fig. 1 is a flowchart of a media content delivery method according to a first embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of the process of the server sending the server public key to the terminal according to the first embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of the process of receiving the public key of the terminal by the server according to the first embodiment of the present disclosure
  • FIG. 4 is a schematic diagram of the process of sending a media address from a server to a terminal according to the first embodiment of the present disclosure
  • FIG. 5 is a schematic diagram of the process of decrypting the encrypted request signaling by the server according to the first embodiment of the present disclosure
  • Fig. 6 is a flowchart of a media content delivery method according to a second embodiment of the present disclosure.
  • FIG. 7 is a structural block diagram of a media content delivery apparatus according to a third embodiment of the present disclosure.
  • FIG. 8 is a flowchart of a media content delivery method according to a fourth embodiment of the present disclosure.
  • FIG. 9 is a schematic diagram of a process of sending a terminal public key to a server by a terminal according to a fourth embodiment of the present disclosure.
  • FIG. 10 is a schematic diagram of a process of decrypting an encrypted media address by a terminal according to a fourth embodiment of the present disclosure.
  • FIG. 11 is a schematic flowchart of a request signaling sent by a terminal according to a fourth embodiment of the present disclosure.
  • FIG. 12 is a flowchart of a media content delivery method according to a fifth embodiment of the present disclosure.
  • FIG. 13 is a structural block diagram of a media content transmission device according to a sixth embodiment of the present disclosure.
  • FIG. 14 is a flowchart of a media content delivery method according to a seventh embodiment of the present disclosure.
  • Fig. 15 is a network structure diagram of a video live broadcast system according to a seventh embodiment of the present disclosure.
  • the first embodiment of the present disclosure relates to a media content transmission method, including: generating a server public key private key pair, wherein the server public key private key pair includes the server public key and the server private key; sending to the terminal The server public key and receive the terminal public key generated by the terminal; use the terminal public key to encrypt the media address to obtain the encrypted media address, and send the encrypted media address to the terminal; obtain the The encryption request signaling sent by the terminal, where the encryption request signaling is media content request signaling encrypted by the terminal using the server public key; the encryption request signaling is decrypted using the server private key, And after the decryption is completed, the media content requested by the encryption request signaling is pushed to the terminal.
  • the media content delivery method in this embodiment is applied to the server. As shown in Figure 1, the method specifically includes the following steps:
  • Step 101 Generate a server-side public key and private key pair.
  • the server in this step, the server generates a server public key private key pair.
  • the public key private key pair is a key pair (that is, a public key and a private key) obtained through an algorithm.
  • the public is called the public key; the other reserved is called the private key.
  • the key pair obtained by this algorithm can be guaranteed to be unique in the world.
  • the server When using this key pair, if a piece of data is encrypted with a public key, to obtain this piece of data, it must be decrypted with a private key.
  • the server generates a server public key private key pair through a preset algorithm, and the public key private key pair includes the server public key and the server private key.
  • Step 102 Send the server public key to the terminal, and receive the terminal public key.
  • the received terminal public key is generated by the terminal, and the server uses the terminal public key to encrypt the data of the sending terminal, ensuring that only the terminal can obtain the data by decrypting with the corresponding terminal private key.
  • the process of the server sending the server public key to the terminal is shown in Figure 2.
  • the server and the terminal use TR069 (Technical Report-069) communication protocol to communicate. After the server generates the server public key, it sends the server public key to the terminal through a TR069 message. After the terminal successfully receives the server public key, it returns the successful reception through the TR069 message.
  • TR069 Technical Report-069
  • the server receives the registration information of the terminal, where the registration information carries the terminal public key; verifies whether the registration information is legal, and if so, records the terminal public key and feeds back the registration success information to the terminal.
  • the server and the terminal establish communication with the SIP (Session Initiation Protocol).
  • the terminal encapsulates the terminal public key in the SIP registration message sent to the server.
  • the server verifies whether the SIP registration message is legal. If it is, save the SIP registration message.
  • the public key of the terminal and feedback the successful registration message to the terminal.
  • Step 103 Use the terminal public key to encrypt the media address, and send the encrypted media address to the terminal.
  • the transmitted media content is the live media of the video conference
  • the server encrypts the media address and sends the media address to the terminal as shown in Figure 4.
  • the server includes a live broadcast platform and a service platform.
  • the live broadcast platform sends the media address to the service platform.
  • the service then uses the terminal public key to encrypt the media address and sends the encrypted media address to the terminal.
  • Step 104 Obtain the encryption request signaling sent by the terminal.
  • the encryption request signaling is obtained by the terminal encrypting the request signaling by using the server public key.
  • the media content requested by the request signaling is the media content requested by the encrypted media address sent by the server to the terminal in step 103.
  • Step 105 Use the private key of the server to decrypt the encryption request signaling, and push the media content requested by the encryption request signaling to the terminal after the decryption is completed.
  • the received encryption request signaling is encrypted by the server public key, and the server uses the server private key to decrypt the request signaling.
  • the server uses the server private key to decrypt the request signaling.
  • the server live broadcast platform receives the encryption After the request signaling, the server private key is used to decrypt the request signaling, and the media content is sent to the terminal after the decryption is successful.
  • the transmitted media content is the live content of the video conference.
  • the server uses the terminal public key to encrypt the media address, so that the terminal needs to use the terminal private key for decryption to obtain the media address, thereby ensuring that the media address is transmitted from the server to the terminal.
  • the media address will not be illegally intercepted; the terminal uses the server public key to encrypt the request signaling, so that the server uses the server private key to decrypt the request signaling to ensure that the request signaling is not transmitted from the terminal to the server.
  • the second embodiment of the present disclosure relates to a media content transmission method.
  • the second embodiment is roughly the same as the first embodiment, except that, before generating the server public key and private key pair, the method further includes: The terminal performs key agreement.
  • a media content transmission method in this embodiment is shown in FIG. 6. It includes the following steps:
  • Step 201 Perform key negotiation with the terminal.
  • the method provided in this embodiment is suitable for terminals that support key agreement through signaling.
  • the server and the terminal conduct key agreement through signaling.
  • Step 202 Generate a server public key and private key pair.
  • Step 203 Send the server public key to the terminal, and receive the terminal public key.
  • Step 204 Use the terminal public key to encrypt the media address, and send the encrypted media address to the terminal.
  • Step 205 Obtain the encryption request signaling sent by the terminal.
  • Step 206 Use the server private key to decrypt the encryption request signaling, and push the media content requested by the encryption request signaling to the terminal after the decryption is completed.
  • Steps 202 to 206 are substantially the same as steps 101 to 105 in the first embodiment, respectively, and in order to avoid repetition, they will not be repeated here.
  • the server performs key agreement with the terminal before generating the public key key pair, and establishes the session key together. Both the server and the terminal affect the result, and there is no need for any Trusted third party.
  • the third embodiment of the present disclosure relates to a media content transmission device. As shown in FIG. 7, it includes at least one processor 301; and a memory 302 communicatively connected with at least one processor 301; An instruction executed by one processor 301 is executed by at least one processor 301, so that at least one processor 301 can execute the media content transmission method in the first embodiment or the second embodiment.
  • the memory 302 and the processor 301 are connected in a bus manner, and the bus may include any number of interconnected buses and bridges, and the bus connects one or more various circuits of the processor 301 and the memory 302 together.
  • the bus can also connect various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are all well-known in the art, and therefore, no further description will be given herein.
  • the bus interface provides an interface between the bus and the transceiver.
  • the transceiver may be one element or multiple elements, such as multiple receivers and transmitters, providing a unit for communicating with various other devices on the transmission medium.
  • the data processed by the processor 301 is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor 301.
  • the processor 301 is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interfaces, voltage regulation, power management, and other control functions.
  • the memory 302 may be configured to store data used by the processor 301 when performing operations.
  • the fourth embodiment of the present disclosure relates to yet another media content transmission method, including: generating a terminal public key private key pair, wherein the terminal public key private key pair includes the terminal public key and the terminal private key; The terminal public key and receiving the server public key generated by the server; obtaining an encrypted media address sent by the server, where the encrypted media address is a media address encrypted by the server using the terminal public key; Use the terminal private key to decrypt the encrypted media address to generate media content request signaling for requesting media content from the media address; use the server public key to encrypt the media content request signaling to obtain an encryption request And send the encryption request signaling to the server; receive the media content pushed by the server.
  • the media content transmission method in this embodiment is applied to a terminal device. As shown in FIG. 8, the method specifically includes the following steps:
  • Step 401 Generate a terminal public key and private key pair.
  • Step 402 Send the terminal public key to the server, and receive the server public key.
  • the terminal and the server establish communication through the SIP protocol.
  • the terminal includes a key processing module and a protocol processing module.
  • the key processing module generates a terminal public key, and then sends the terminal public key to the protocol processing module.
  • the protocol processing module encapsulates the terminal public key in a SIP registration message and carries the terminal.
  • the SIP registration message of the public key is sent to the server, and the server receives the SIP registration message and extracts the terminal public key in the message, and then feeds back a message that the terminal is registered successfully.
  • Step 403 Obtain the encrypted media address sent by the server.
  • the encrypted media address is obtained by encrypting the media address by the server using the terminal public key.
  • Step 404 Decrypt the encrypted media address by using the private key of the terminal, and generate a request signaling for the media content of the media address.
  • the terminal uses the terminal private key to decrypt the encrypted media address as shown in Figure 10.
  • the key processing module of the terminal uses the private key of the terminal to decrypt the media address encrypted by the public key of the terminal, and sends the decrypted media address to the protocol processing module, and the protocol processing module generates a media content request message according to the media address. make.
  • Step 405 Use the server public key to encrypt the media content request signaling, and send the encrypted request signaling to the server.
  • the process in which the terminal uses the server public key to encrypt the media content request signaling is shown in Figure 11.
  • the key processing module of the terminal encrypts the media request signaling by using the server public key, and then sends the encrypted media request signaling to the protocol processing module, and the protocol processing module sends the encrypted media request signaling to the protocol processing module.
  • Media address the process in which the terminal uses the server public key to encrypt the media content request signaling.
  • Step 406 Receive media content pushed by the server.
  • the server uses the terminal public key to encrypt the media address, so that the terminal needs to use the terminal private key for decryption to obtain the media address, thereby ensuring that the media address is transmitted from the server to the terminal.
  • the media address will not be illegally intercepted; the terminal uses the server public key to encrypt the request signaling, so that the server uses the server private key to decrypt the request signaling to ensure that the request signaling is not transmitted from the terminal to the server.
  • the fifth embodiment of the present disclosure relates to a media content transmission method.
  • the fifth embodiment is substantially the same as the fourth embodiment, except that, before generating a terminal public key private key pair, it also includes: The end performs key agreement.
  • a media content transmission method in this embodiment is shown in FIG. 12. It includes the following steps:
  • Step 501 Perform key negotiation with the server.
  • the method provided in this embodiment is suitable for terminals that support key agreement through signaling.
  • the server and the terminal conduct key agreement through signaling.
  • Step 502 Generate a terminal public key and private key pair.
  • Step 503 Send the terminal public key to the server, and receive the server public key.
  • Step 504 Obtain the encrypted media address sent by the server.
  • Step 505 Use the private key of the terminal to decrypt the encrypted media address, and generate a request signaling for the media content of the media address.
  • Step 506 Use the server public key to encrypt the media content request signaling, and send the encrypted request signaling to the server.
  • Step 507 Receive media content pushed by the server.
  • Steps 502 to 507 are substantially the same as steps 401 to 406 in the fourth embodiment, respectively. To avoid repetition, they will not be repeated here.
  • the terminal conducts key agreement with the terminal before generating the public key key pair, and establishes the session key together. Both the server and the terminal affect the result, and there is no need for any data. Third party of the letter.
  • the sixth embodiment of the present disclosure relates to a media content transmission device. As shown in FIG. 13, it includes at least one processor 601; and, a memory 602 communicatively connected with at least one processor 601; An instruction executed by one processor 601 is executed by at least one processor 601, so that the at least one processor 601 can execute the media content transmission method in the fourth embodiment or the fifth embodiment.
  • the memory 602 and the processor 601 are connected in a bus manner.
  • the bus may include any number of interconnected buses and bridges, and the bus connects one or more various circuits of the processor 601 and the memory 602 together.
  • the bus can also connect various other circuits such as peripheral devices, voltage regulators, and power management circuits, etc., which are all known in the art, so they will not be further described in this article.
  • the bus interface provides an interface between the bus and the transceiver.
  • the transceiver may be one element or multiple elements, such as multiple receivers and transmitters, providing a unit for communicating with various other devices on the transmission medium.
  • the data processed by the processor 601 is transmitted on the wireless medium through the antenna, and further, the antenna also receives the data and transmits the data to the processor 601.
  • the processor 601 is responsible for managing the bus and general processing, and can also provide various functions, including timing, peripheral interfaces, voltage regulation, power management, and other control functions.
  • the memory 602 may be configured to store data used by the processor 601 when performing operations.
  • the seventh embodiment of the present disclosure relates to a media content transmission method, including: the server generates a server public key private key pair, and the terminal generates a terminal public key private key pair, wherein the server public key private key pair includes the service The terminal public key and the server private key, the terminal public key-private key pair includes the terminal public key and the terminal private key; the server sends the server public key to the terminal, and the terminal sends the terminal public key to the terminal Server; the server uses the terminal public key to encrypt the media address to obtain the encrypted media address, and sends the encrypted media address to the terminal; the terminal obtains the encrypted media address sent by the server and uses the terminal private key Decrypt the encrypted media address, generate media content request signaling for requesting media content from the media address, encrypt the media content request signaling by using the server public key to obtain the encryption request signaling, and combine all The encryption request signaling is sent to the server; the server obtains the encryption request signaling sent by the terminal, uses the server private key to decrypt the encryption request signaling, and sends
  • the media content transmission method in this embodiment is applied to a video conference system including a server and a terminal. As shown in FIG. 14, the method specifically includes the following steps:
  • Step 701 The server generates a server public key private key pair, and the terminal generates a terminal public key private key pair.
  • the server public key and private key pair includes the server public key and the server private key
  • the terminal public key and private key pair includes the terminal public key and the terminal private key
  • Step 702 The server sends the server public key to the terminal, and the terminal sends the terminal public key to the server.
  • Step 703 The server encrypts the media address using the terminal public key, and sends the encrypted media address to the terminal.
  • Step 704 The terminal obtains the encrypted media address, and decrypts the media address by using the private key of the terminal.
  • Step 705 The terminal generates the request signaling for the media content of the media address, encrypts the request signaling with the server public key, and sends it to the server.
  • Step 706 The server obtains the encrypted request signaling, decrypts the request signaling using the server private key, and then pushes the media content to the terminal.
  • Step 707 The terminal receives the media content pushed by the server.
  • Step 704 and step 706 are roughly the same as step 103 and step 105 in the first embodiment, respectively.
  • Step 704, step 705, and step 707 are roughly the same as step 404, step 405, and step 406 in the fourth embodiment, respectively. To avoid repetition, I will not repeat them one by one here.
  • the server generates the server public key and private key pair. Before the terminal generates the terminal public key and private key pair, it may also include: the server and the terminal perform key negotiation. For terminals that support the negotiation of secret keys through signaling, the server and terminal conduct key negotiation with the terminal before generating a public key key pair to jointly establish a session key. Both the server and the terminal affect the result, and there is no need Any trusted third party.
  • the media content transmitted in this embodiment is the live content of the video conference.
  • the server and multiple terminals constitute a video conference system.
  • the network structure of the system is shown in FIG. 15.
  • the server includes two modules, a live broadcast platform and a service platform.
  • One server establishes communication with multiple terminals, and each terminal transmits live media content to the server through the above-mentioned embodiment.
  • the server uses the terminal public key to encrypt the media address, so that the terminal needs to use the terminal private key for decryption to obtain the media address, thereby ensuring that the media address is transmitted from the server to the terminal.
  • the media address will not be illegally intercepted; the terminal uses the server public key to encrypt the request signaling, so that the server uses the server private key to decrypt the request signaling to ensure that the request signaling is not transmitted from the terminal to the server.
  • the eighth embodiment of the present disclosure relates to a computer-readable storage medium storing a computer program.
  • the computer program is executed by the processor, any one of the foregoing media content transmission method embodiments is implemented.
  • the program is stored in a storage medium and includes several instructions to enable a device ( It may be a single-chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present disclosure.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks and other media that can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Selon divers modes de réalisation, la présente invention se rapporte au domaine technique des communications. L'invention concerne un procédé de transmission de contenu multimédia, comprenant : la génération d'une paire clé publique-clé privée de serveur, la paire clé publique-clé privée de serveur comprenant une clé publique de serveur et une clé privée de serveur ; l'envoi de la clé publique de serveur à un terminal, et la réception d'une clé publique de terminal générée par le terminal ; le chiffrement d'une adresse de contenu multimédia à l'aide de la clé publique de terminal pour obtenir une adresse de contenu multimédia chiffrée, et l'envoi de l'adresse de contenu multimédia chiffrée au terminal ; l'obtention d'une signalisation de demande chiffrée envoyée par le terminal, la signalisation de demande chiffrée étant une signalisation de demande de contenu multimédia chiffrée par le terminal à l'aide de la clé publique de serveur ; le déchiffrement de la signalisation de demande chiffrée à l'aide de la clé privée de serveur, et la poussée vers le terminal du contenu multimédia demandé par la signalisation de demande chiffrée après que le déchiffrement a été achevé. La présente invention concerne également un appareil de transmission de contenu multimédia et un support de stockage. Le procédé et l'appareil de transmission de contenu multimédia ainsi que le support de stockage décrits par la présente invention peuvent améliorer la sécurité de l'interaction avec un réseau de contenu multimédia.
PCT/CN2020/133132 2019-12-05 2020-12-01 Procédé et appareil de transmission de contenu multimédia, et support de stockage WO2021109998A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911233173.7A CN112929593A (zh) 2019-12-05 2019-12-05 媒体内容传送方法、装置和存储介质
CN201911233173.7 2019-12-05

Publications (1)

Publication Number Publication Date
WO2021109998A1 true WO2021109998A1 (fr) 2021-06-10

Family

ID=76160978

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/133132 WO2021109998A1 (fr) 2019-12-05 2020-12-01 Procédé et appareil de transmission de contenu multimédia, et support de stockage

Country Status (2)

Country Link
CN (1) CN112929593A (fr)
WO (1) WO2021109998A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007066994A1 (fr) * 2005-12-07 2007-06-14 Electronics And Telecommunications Research Institute Dispositif et procede de fourniture de service de partage d'information personnelle utilisant un message a url de rappel signe
CN103281312A (zh) * 2013-05-10 2013-09-04 金硕澳门离岸商业服务有限公司 信息过滤方法
CN106792009A (zh) * 2016-11-30 2017-05-31 深圳前海弘稼科技有限公司 一种基于种植箱的植物图像传输方法及装置
KR20170084802A (ko) * 2016-01-13 2017-07-21 크루셜텍 (주) 단말기들 간의 보안 데이터 송수신 방법 및 시스템
CN109788002A (zh) * 2019-03-12 2019-05-21 北京首汽智行科技有限公司 一种Http请求加密、解密方法及系统
CN109787947A (zh) * 2018-04-03 2019-05-21 中建材信息技术股份有限公司 公有云的云安全加密系统及方法及存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007066994A1 (fr) * 2005-12-07 2007-06-14 Electronics And Telecommunications Research Institute Dispositif et procede de fourniture de service de partage d'information personnelle utilisant un message a url de rappel signe
CN103281312A (zh) * 2013-05-10 2013-09-04 金硕澳门离岸商业服务有限公司 信息过滤方法
KR20170084802A (ko) * 2016-01-13 2017-07-21 크루셜텍 (주) 단말기들 간의 보안 데이터 송수신 방법 및 시스템
CN106792009A (zh) * 2016-11-30 2017-05-31 深圳前海弘稼科技有限公司 一种基于种植箱的植物图像传输方法及装置
CN109787947A (zh) * 2018-04-03 2019-05-21 中建材信息技术股份有限公司 公有云的云安全加密系统及方法及存储介质
CN109788002A (zh) * 2019-03-12 2019-05-21 北京首汽智行科技有限公司 一种Http请求加密、解密方法及系统

Also Published As

Publication number Publication date
CN112929593A (zh) 2021-06-08

Similar Documents

Publication Publication Date Title
US9923877B2 (en) External indexing and search for a secure cloud collaboration system
RU2417532C2 (ru) Доставка обновлений политик для защищенного содержимого
US20150281185A1 (en) Cloud Collaboration System With External Cryptographic Key Management
EP1449347B1 (fr) Protocole de gestion des cles et systeme d'authentification destines a l'architecture de gestion des droits de protocole internet securise
CN113612605B (zh) 使用对称密码技术增强mqtt协议身份认证方法、系统和设备
US8738910B2 (en) Method and arrangement for enabling play-out of media
US20140169563A1 (en) Method for ensuring media stream security in ip multimedia sub-system
US20100005183A1 (en) Method, System and Apparatus for Converting Media Contents
EP4184821A1 (fr) Procédé et dispositif de communication à base d'un canal de données ims
CN109981271B (zh) 一种网络多媒体安全防护加密方法
CN111355921A (zh) 一种视频会议加密方法及系统
WO2023241176A1 (fr) Procédé et appareil de communication, dispositif, support de stockage et produit de programme
US10673629B2 (en) Data transmission and reception method and system
CN116709325A (zh) 一种基于高速加密算法的移动设备安全认证方法
CN109474667B (zh) 一种基于tcp和udp的无人机通信方法
CN101222612A (zh) 一种安全传输媒体流的方法和系统
WO2021109998A1 (fr) Procédé et appareil de transmission de contenu multimédia, et support de stockage
EP2713576B1 (fr) Système et procédé pour traiter un contenu multimédia en temps réel
CN112235320B (zh) 一种基于密码的视联网组播通信方法及装置
WO2008029853A1 (fr) Dispositif et procédé de livraison de clé de cryptage
CN112738560A (zh) 一种视频数据传输方法、接收方法、服务端以及客户端
CN116782210B (zh) 一种高速加密算法的动态加密密钥生成方法
KR101215802B1 (ko) 피투피 네트워크에 있어서 컨텐츠 서비스 제공 방법
CN107070912B (zh) 一种分布式系统的网络安全验证方法和系统
CN116032559A (zh) 一种信息加密方法、云视频会议系统和信息加密设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20896811

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20896811

Country of ref document: EP

Kind code of ref document: A1