WO2022135308A1 - Method and apparatus for detecting media data - Google Patents

Method and apparatus for detecting media data Download PDF

Info

Publication number
WO2022135308A1
WO2022135308A1 PCT/CN2021/139416 CN2021139416W WO2022135308A1 WO 2022135308 A1 WO2022135308 A1 WO 2022135308A1 CN 2021139416 W CN2021139416 W CN 2021139416W WO 2022135308 A1 WO2022135308 A1 WO 2022135308A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
information
media data
media
media server
Prior art date
Application number
PCT/CN2021/139416
Other languages
French (fr)
Chinese (zh)
Inventor
廖涛
耿峰
Original Assignee
华为云计算技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为云计算技术有限公司 filed Critical 华为云计算技术有限公司
Publication of WO2022135308A1 publication Critical patent/WO2022135308A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/07User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
    • H04L51/10Multimedia information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/647Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/647Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load, bridging between two different networks, e.g. between IP and wireless
    • H04N21/64715Protecting content from unauthorized alteration within the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark

Abstract

Disclosed are a method and apparatus for detecting media data, which relate to the field of conference communications. The method comprises: a detection device receiving media data sent by a first terminal, and then determining, according to first feature information carried in the media data, whether the act of the first terminal sending the media data is legitimate. By means of the method, not only can the identity of a user who discloses media data be determined, media data that is sent illegitimately can also be intercepted in real time, thereby reducing the risk of information leakage.

Description

一种检测媒体数据的方法及装置A method and device for detecting media data 技术领域technical field
本申请涉及会议通信领域,尤其涉及一种检测媒体数据的方法及装置。The present application relates to the field of conference communications, and in particular, to a method and apparatus for detecting media data.
背景技术Background technique
随着科技的进步,视频/语音会议已经成为了当代办公的新趋势。然而,部分网络会议的内容属于敏感信息,因此,会议的信息安全管控是非常关键的一个环节。With the advancement of technology, video/voice conferencing has become a new trend in contemporary office. However, the content of some online conferences is sensitive information. Therefore, the information security management and control of conferences is a very critical part.
为了减少信息泄露的可能性,一般会对接入会议的终端设备以及对应的与会人进行鉴权,但是这样的方法并不能保证有权限的与会人非法泄露会议内容。比如,该与会人可以在电脑上重新开启一个新会议,将当前机密会议的界面共享给其他用户观看。在这样的情况下,与会人将机密信息泄露出去将会导致不可预估的后果。因此,亟需一种信息安全管控方案以监测用户非法泄露机密信息的行为。In order to reduce the possibility of information leakage, the terminal devices accessing the conference and the corresponding participants are generally authenticated. However, this method cannot guarantee that the authorized participants illegally leak the conference content. For example, the participant can restart a new meeting on the computer and share the interface of the current confidential meeting to other users for viewing. Under such circumstances, the disclosure of confidential information by the participants will lead to unpredictable consequences. Therefore, an information security management and control scheme is urgently needed to monitor the behavior of users illegally leaking confidential information.
发明内容SUMMARY OF THE INVENTION
本申请提供了一种检测媒体数据的方法及装置,通过检测设备对媒体数据中的特征信息进行检测,以识别是否存在非法发送媒体数据的行为,降低了信息泄露的风险。The present application provides a method and apparatus for detecting media data. The feature information in the media data is detected by a detection device to identify whether there is an act of illegally sending the media data, thereby reducing the risk of information leakage.
第一方面,本申请提供了一种检测媒体数据的方法,检测设备接收第一终端发送的第一媒体数据,该第一媒体数据中包含第一特征信息,然后检测设备根据该第一特征信息确定第一终端发送第一媒体数据这一行为是否合法。其中,第一特征信息可以是水印标识或者其他任何可通过编解码媒体数据而添加或者获取的信息。媒体数据可以是音频数据或者视频数据。In a first aspect, the present application provides a method for detecting media data. A detection device receives first media data sent by a first terminal, the first media data includes first feature information, and then the detection device uses the first feature information according to the first feature information. Determine whether the act of sending the first media data by the first terminal is legal. The first feature information may be a watermark identifier or any other information that can be added or acquired by encoding and decoding media data. The media data may be audio data or video data.
上述方法中,检测设备通过媒体数据中包括的第一特征信息来验证第一终端发送第一媒体数据这一行为是否合法,该方法可以对泄露信息的行为进行实时检测,当发现存在非法发送的行为时,可以对非法发送的媒体数据进行实时拦截,减少信息泄露的风险。In the above method, the detection device verifies whether the behavior of the first terminal sending the first media data is legal through the first feature information included in the media data, and the method can perform real-time detection on the behavior of leaking information. During behavior, the illegally sent media data can be intercepted in real time to reduce the risk of information leakage.
在一种可能的实现方式中,第一终端发送的第一媒体数据是由第二终端通过第一媒体服务器发送给该第一终端的。In a possible implementation manner, the first media data sent by the first terminal is sent by the second terminal to the first terminal through the first media server.
上述实现方式中,第一终端向第二终端发送媒体数据时经由第一媒体服务器处理转发,第一媒体服务器为第一终端和第二终端提供会议媒体资源,提高了第一终端与第二终端之间通信的稳定性。In the above implementation manner, when the first terminal sends media data to the second terminal, it is processed and forwarded by the first media server. The stability of communication between them.
在另一种可能的实现方式中,第一特征信息是由第一媒体服务器添加的。In another possible implementation manner, the first feature information is added by the first media server.
上述实现方式中,第一媒体服务器可以接收会议调度服务器分发的第一特征信息,又或者第一媒体服务器可以自己生成第一特征信息。然后第一媒体服务器将第一特征信息添加到第一媒体数据中,以便于后续检测设备可以根据该第一特征信息判断第一终端发送第一媒体数据是否合法。In the above implementation manner, the first media server may receive the first feature information distributed by the conference scheduling server, or the first media server may generate the first feature information by itself. Then, the first media server adds the first feature information to the first media data, so that the subsequent detection device can judge whether the first media data sent by the first terminal is legal according to the first feature information.
在另一种可能的实现方式中,第一特征信息是由第二终端添加的。In another possible implementation manner, the first feature information is added by the second terminal.
上述实现方式中,第二终端可以接收会议调度服务器分发的第一特征信息,或者,第二终端可以接收经由第一媒体服务器转发的会议调度服务器分发的第一特征信息,又或者,第二终端可以自己生成第一特征信息。然后第二终端将第一特征信息添加到第一媒体数据中,以便于后续检测设备可以根据该第一特征信息判断第一终端发送第一媒体数据这一行为是否 合法。In the above implementation manner, the second terminal may receive the first feature information distributed by the conference scheduling server, or the second terminal may receive the first feature information distributed by the conference scheduling server forwarded by the first media server, or the second terminal The first feature information can be generated by itself. Then, the second terminal adds the first feature information to the first media data, so that the subsequent detection device can judge whether the behavior of the first terminal sending the first media data is legal according to the first feature information.
在另一种可能的实现方式中,第一特征信息还包括机密等级,该机密等级用于指示第一媒体源数据可以公开的范围。例如,机密等级可以为内部公开。In another possible implementation manner, the first feature information further includes a confidentiality level, where the confidentiality level is used to indicate a scope in which the first media source data can be disclosed. For example, the confidentiality level may be internal disclosure.
在另一种可能的实现方式中,第一特征信息包括合法发送者信息和/或合法接收者信息。In another possible implementation manner, the first characteristic information includes legal sender information and/or legal recipient information.
上述实现方式中,合法发送/接收者信息可以指合法发送/接收者的用户信息,例如用户账号、用户手机号等等。或者,合法发送/接收者信息还可以指合法发送/接收者所使用的终端信息,例如终端设备标识。又或者,合法发送者信息指的是发送数据的源地址或者源端口,合法接收者信息指的是发送数据的目的地址或者目的端口。在该实现方式下,通过在第一特征信息中添加合法发送/接收者信息来提高检测效率,减少误检的概率。In the above implementation manner, the legitimate sender/receiver information may refer to user information of the legitimate sender/receiver, such as a user account, a user mobile phone number, and the like. Alternatively, the legitimate sender/receiver information may also refer to terminal information used by the legitimate sender/receiver, such as a terminal device identifier. Alternatively, the legal sender information refers to the source address or source port of the sent data, and the legal receiver information refers to the destination address or destination port of the sent data. In this implementation manner, the detection efficiency is improved and the probability of false detection is reduced by adding legal sender/receiver information to the first feature information.
在另一种可能的实现方式中,合法接收者信息包括第一终端信息,合法发送者信息包括第二终端信息或者第一媒体服务器信息。In another possible implementation manner, the legal receiver information includes first terminal information, and the legal sender information includes second terminal information or first media server information.
上述实现方式中,第一终端在接收来自第二终端的媒体数据时为合法接收者,因此,合法接收者信息可以包括第一终端信息,该第一终端信息可以包括第一终端的IP(Internet Protocol)地址或者MAC(Media Access Control)地址等,还可以包括第一终端对应的用户信息。而第二终端信息也可以是第二终端的IP地址或者MAC地址,还可以包括第二终端对应的用户信息。第一媒体服务器信息也可以是第一媒体服务器的IP地址或者MAC地址。In the above implementation manner, the first terminal is a legal recipient when receiving media data from the second terminal, therefore, the legal recipient information may include first terminal information, and the first terminal information may include the IP (Internet) of the first terminal. Protocol) address or MAC (Media Access Control) address, etc., and may also include user information corresponding to the first terminal. The second terminal information may also be an IP address or a MAC address of the second terminal, and may also include user information corresponding to the second terminal. The first media server information may also be an IP address or a MAC address of the first media server.
在另一种可能的实现方式中,合法发送者信息包括第一媒体服务器信息,当检测设备根据第一特征信息确定所述第一终端发送所述第一媒体数据非法时,检测设备根据所述第一特征信息向所述第一媒体服务器发送第一告警信息。In another possible implementation manner, the legitimate sender information includes first media server information, and when the detection device determines according to the first feature information that the first media data sent by the first terminal is illegal, the detection device The first feature information sends first alarm information to the first media server.
上述实现方式中,检测设备可以从合法发送者信息中获取第一媒体服务器信息,当确认第一终端发送第一媒体数据这一行为存在异常时,即向第一媒体服务器告警,以提升数据通信的安全性。In the above implementation manner, the detection device can obtain the first media server information from the legal sender information, and when it is confirmed that the behavior of the first terminal sending the first media data is abnormal, it will alert the first media server to improve data communication. security.
在另一种可能的实现方式中,第一特征信息包括合法发送者信息和合法接收者信息,其中,合法发送者信息包括第一媒体服务器信息,当检测设备根据第一特征信息确定第一终端发送第一媒体数据非法时,检测设备根据第一特征信息向第一媒体服务器发送第二告警信息,第二告警信息用于指示所述第一终端为异常终端。In another possible implementation manner, the first feature information includes legal sender information and legal receiver information, wherein the legal sender information includes first media server information, and when the detection device determines the first terminal according to the first feature information When sending the first media data is illegal, the detection device sends second alarm information to the first media server according to the first feature information, where the second alarm information is used to indicate that the first terminal is an abnormal terminal.
上述实现方式中,检测设备根据第一特征信息可以直接确定第一终端非法终端,并通知第一媒体服务器该第一终端存在异常。即根据第一特征信息即可确定当前数据通信中哪一个终端存在信息泄漏风险,进而可以确定泄露者的相关信息。In the above implementation manner, the detection device can directly determine the illegal terminal of the first terminal according to the first characteristic information, and notify the first media server that the first terminal is abnormal. That is, according to the first characteristic information, it can be determined which terminal in the current data communication has the risk of information leakage, and then the relevant information of the leaker can be determined.
在另一种可能的实现方式中,第一特征信息包括合法发送者信息和合法接收者信息,所述合法发送者信息包括第一媒体服务器信息,当检测设备根据第一特征信息确定第一终端发送所述第一媒体数据非法时,检测设备根据所述第一特征信息指示所述第一媒体服务器停止向所述第一终端发送第二媒体数据。In another possible implementation manner, the first feature information includes legal sender information and legal receiver information, and the legal sender information includes first media server information. When the detection device determines the first terminal according to the first feature information When the sending of the first media data is illegal, the detection device instructs the first media server to stop sending the second media data to the first terminal according to the first feature information.
上述实现方式中,检测设备根据第一特征信息可以直接确定第一终端存在异常,并且通知第一媒体服务器停止向该第一终端发送媒体数据。该方法可以使得异常终端不再获取新的媒体数据,从源头上减少信息泄露的风险。In the above implementation manner, the detection device can directly determine that the first terminal is abnormal according to the first feature information, and notify the first media server to stop sending media data to the first terminal. The method can prevent the abnormal terminal from acquiring new media data and reduce the risk of information leakage from the source.
在另一种可能的实现方式中,检测设备不直接向第一媒体服务器发送告警信息,而是先向会议调度服务器发送告警信息,然后由会议调度服务器通知第一媒体服务器当前存在信息泄露的风险。In another possible implementation manner, the detection device does not directly send the alarm information to the first media server, but first sends the alarm information to the conference scheduling server, and then the conference scheduling server notifies the first media server that there is currently a risk of information leakage .
在另一种可能的实现方式中,检测设备接收第一终端向第三终端发送的第一媒体数据, 第三终端与第一终端通过该检测设备通信。In another possible implementation manner, the detection device receives the first media data sent by the first terminal to the third terminal, and the third terminal communicates with the first terminal through the detection device.
上述实现方式中,第一终端向第三终端发送第一媒体数据时经过该检测设备,进而检测设备可以检测第一媒体数据,当发现存在非法发送行为时可以进行实时拦截,减少信息泄露造成的损失。In the above implementation manner, when the first terminal sends the first media data to the third terminal, it passes through the detection device, and then the detection device can detect the first media data, and can perform real-time interception when it finds that there is an illegal sending behavior, so as to reduce the risk of information leakage. loss.
在另一种可能的实现方式中,检测设备可以是第一媒体服务器,或者,检测设备可以是一个与第一媒体服务器不同的第二媒体服务器,又或者,检测设备可以是媒体代理网关。又或者,检测设备可以是边界防火墙。In another possible implementation manner, the detection device may be a first media server, or the detection device may be a second media server different from the first media server, or the detection device may be a media proxy gateway. Alternatively, the detection device may be a border firewall.
在另一种可能的实现方式中,第一媒体数据由第一终端根据第四终端接收的第三媒体数据生成,第三媒体数据中包括第一特征信息。In another possible implementation manner, the first media data is generated by the first terminal according to third media data received by the fourth terminal, and the third media data includes the first feature information.
在上述实现方式中,第四终端为合法的会议接收端,其接收到的第三媒体数据中包含第一特征信息,进而当第一终端通过各种途径将第四终端接收到的信息泄露出去时,检测设备可以根据第一媒体数据中包括的第一特征信息识别该行为非法发送行为,然后进行实时拦截,减少信息泄露的风险。In the above implementation manner, the fourth terminal is a legitimate conference receiving terminal, and the third media data it receives includes the first feature information, and then when the first terminal leaks the information received by the fourth terminal through various channels , the detection device can identify the illegal sending behavior according to the first feature information included in the first media data, and then intercept in real time to reduce the risk of information leakage.
在另一种可能的实现方式中,第一媒体数据包括数字签名,该数字签名用于确定第一媒体数据未被篡改。在传输的数据中添加数字签名可以保证整个通信系统中传输通道的安全性In another possible implementation manner, the first media data includes a digital signature, and the digital signature is used to determine that the first media data has not been tampered with. Adding a digital signature to the transmitted data can ensure the security of the transmission channel in the entire communication system
以上所描述的方法,通过在媒体数据中添加特征信息以使得检测设备可以根据该特征信息检测数据发送的合法性,当出现非法发送行为时,可以对数据进行实时截断,将信息泄露所造成的损失减少到最低。另一方面,还可以根据特征信息确定泄露者身份,在实时截断非法发送的数据的基础之上,还可以追踪信息泄露的源头。In the method described above, by adding characteristic information to the media data, the detection device can detect the legitimacy of data transmission according to the characteristic information. Losses are minimized. On the other hand, the identity of the leaker can also be determined according to the characteristic information, and the source of the information leak can also be traced on the basis of truncating the illegally sent data in real time.
第二方面,本申请提供一种检测媒体数据的装置,该装置包括用于执行第一方面或第一方面任一种可能实现方式中的媒体数据通信检测方法的各个模块。In a second aspect, the present application provides an apparatus for detecting media data. The apparatus includes various modules for executing the media data communication detection method in the first aspect or any possible implementation manner of the first aspect.
第三方面,本申请提供一种检测媒体数据的设备,该设备包括处理器、存储器、通信接口、总线,所述处理器、存储器和通信接口之间通过总线连接并完成相互间的通信,所述存储器中用于存储计算机执行指令,所述设备运行时,所述处理器执行所述存储器中的计算机执行指令以利用所述设备中的硬件资源执行第一方面或第一方面任一种可能实现方式中所述方法。In a third aspect, the present application provides a device for detecting media data. The device includes a processor, a memory, a communication interface, and a bus. The processor, the memory, and the communication interface are connected through a bus and complete mutual communication. The memory is used to store computer-executed instructions, and when the device is running, the processor executes the computer-executed instructions in the memory to use the hardware resources in the device to execute the first aspect or any possibility of the first aspect. method described in the implementation.
第四方面,本申请提供了一种计算机可读存储介质,当所述计算机可读存储介质存储的程序指令在计算机上运行时,所述计算机执行前述第一方面或第一方面的任意可能的实现方式中提供的方法。该存储介质包括但不限于易失性存储器,例如随机访问存储器,非易失性存储器,例如快闪存储器、硬盘(hard disk drive,HDD)、固态硬盘(solid state drive,SSD)。In a fourth aspect, the present application provides a computer-readable storage medium. When the program instructions stored in the computer-readable storage medium are executed on a computer, the computer executes the first aspect or any possible implementation of the first aspect. methods provided in the implementation. The storage medium includes, but is not limited to, volatile memory, such as random access memory, non-volatile memory, such as flash memory, hard disk drive (HDD), solid state drive (solid state drive, SSD).
第五方面,本申请提供了一种包含程序指令的计算机程序产品,当程序指令在计算机上运行时,使得计算机执行上述第一方面以及第一方面中任一种可能的实现方式所述的方法。In a fifth aspect, the present application provides a computer program product comprising program instructions, when the program instructions are run on a computer, the computer executes the method described in the first aspect and any possible implementation manner of the first aspect .
本申请在上述各方面提供的实现方式的基础上,还可以进行进一步组合以提供更多实现方式。On the basis of the implementation manners provided by the above aspects, the present application may further combine to provide more implementation manners.
附图说明Description of drawings
图1为本申请实施例提供的本申请实施例提供的应用系统架构示意图。FIG. 1 is a schematic diagram of an application system architecture provided by an embodiment of the present application according to an embodiment of the present application.
图2为本申请实施例提供的另一应用系统架构示意图。FIG. 2 is a schematic diagram of another application system architecture provided by an embodiment of the present application.
图3为本申请实施例提供的另一应用系统架构示意图。FIG. 3 is a schematic diagram of another application system architecture provided by an embodiment of the present application.
图4为本申请实施例提供的检测媒体数据的方法整体流程图。FIG. 4 is an overall flowchart of a method for detecting media data provided by an embodiment of the present application.
图5为本申请实施例提供的检测媒体数据方法的流程图。FIG. 5 is a flowchart of a method for detecting media data provided by an embodiment of the present application.
图6为本申请实施例提供的另一检测媒体数据方法的流程图。FIG. 6 is a flowchart of another method for detecting media data according to an embodiment of the present application.
图7为本申请实施例提供的检测媒体数据的装置的示意图。FIG. 7 is a schematic diagram of an apparatus for detecting media data according to an embodiment of the present application.
图8为本申请实施例提供的检测媒体数据的设备的示意图。FIG. 8 is a schematic diagram of a device for detecting media data according to an embodiment of the present application.
具体实施方式Detailed ways
本申请提供了一种检测媒体数据的方法、装置及系统。通过检测媒体数据中的特征信息以识别非法泄露信息的行为。The present application provides a method, device and system for detecting media data. By detecting the characteristic information in the media data, it can identify the behavior of illegally leaking information.
为了增强本申请的可读性,首先对在本申请中出现的名词进行解释。In order to enhance the readability of the present application, the terms appearing in the present application are first explained.
特征信息:在本申请提供的实施例中,特征信息被媒体服务器或者终端添加在媒体数据中,起到对媒体数据进行标识的作用。特征信息可以是水印标识或者其他任何可以通过对媒体数据编解码以实现添加或者获取的信息。特征信息的鲁棒性可以使得非法发送的媒体数据中依旧包括该特征信息,进而检测设备可以根据该特征信息确定数据发送行为的合法性。特征信息可以包括用户信息、数据发送的源地址/端口、数据发送的目的地址/端口以及机密等级等。其中,机密等级代表着该媒体数据可以公开的范围,例如当机密等级为“2”时,代表着该媒体数据可以在内部公开。在接下来的具体实施例中,为了方便描述,以“水印标识”代替“特征信息”。Feature information: In the embodiments provided in this application, the feature information is added to the media data by the media server or the terminal, and plays a role of identifying the media data. The feature information can be a watermark or any other information that can be added or acquired by encoding and decoding the media data. The robustness of the feature information can make the illegally sent media data still include the feature information, and then the detection device can determine the legitimacy of the data sending behavior according to the feature information. The characteristic information may include user information, source address/port for data transmission, destination address/port for data transmission, and confidentiality level. The confidentiality level represents the range that the media data can be disclosed. For example, when the confidentiality level is "2", it means that the media data can be disclosed internally. In the following specific embodiments, for the convenience of description, "feature information" is replaced by "watermark identification".
媒体服务器:媒体服务器主要是对音视频码流进行编解码处理、混流或者转发等操作。例如可以是多媒体控制单元(Multimedia Control Unit,MCU)。媒体服务器可以部署在云端也可以部署在本地机房。在一种可能的实现方式中,媒体服务器用于向接收到的媒体数据中添加水印。在另一种可能的实现方式中,媒体服务器还包括检测模块,用于检测媒体数据中是否包含水印以及水印的具体内容。Media server: The media server mainly performs encoding and decoding processing, mixing or forwarding of audio and video streams. For example, it may be a multimedia control unit (Multimedia Control Unit, MCU). The media server can be deployed in the cloud or in the local computer room. In a possible implementation manner, the media server is configured to add a watermark to the received media data. In another possible implementation manner, the media server further includes a detection module for detecting whether the media data contains a watermark and the specific content of the watermark.
会议调度服务器:具有资源调度功能。当终端向会议调度服务器发起会议请求时,会议调度服务器依据终端的需求以及各个媒体服务器的能力为每个会议分配媒体服务器。在一种可能的实现方式中,会议调度服务器与某一个媒体服务器为同一个服务器,即该媒体服务器具备会议调度的功能。会议调度服务器存储有各个会议的信息,例如每个会议中与会终端的地址,与会人的用户信息等等。Conference scheduling server: with resource scheduling function. When a terminal initiates a conference request to the conference scheduling server, the conference scheduling server allocates a media server for each conference according to the terminal's requirement and the capabilities of each media server. In a possible implementation manner, the conference scheduling server and a certain media server are the same server, that is, the media server has the function of conference scheduling. The conference scheduling server stores information about each conference, such as addresses of participating terminals in each conference, user information of participants, and the like.
数字水印(Digital Watermark):是指将特定的信息嵌入数字信号中,数字信号可能是音频、图片或是视频等。数字水印的鲁棒性较强,若拷贝了一段具有数字水印的视频,该副本视频中也可以被检测出同样的数字水印。数字水印可分为浮现式和隐藏式两种,前者是可见水印(visible watermarking),其所包含的信息可在观看图片或视频时同时被看见。隐藏式的水印是以数字资料的方式加入音频、图片或视频中,但在一般的状况下无法被看见。隐藏式水印的重要应用之一是保护著作权,期望能借此避免或阻止数字媒体未经授权的复制和拷贝。在本申请实施例中,数字水印为特征信息的一种。Digital Watermark: It refers to the embedding of specific information into a digital signal, which may be audio, picture or video. The robustness of digital watermarks is strong. If a video with a digital watermark is copied, the same digital watermark can also be detected in the copied video. Digital watermarks can be divided into two types: emergent and hidden. The former is visible watermarking, and the information it contains can be seen at the same time when viewing pictures or videos. Hidden watermarks are digital data added to audio, pictures or videos, but cannot be seen under normal circumstances. One of the important applications of hidden watermarking is to protect copyright, which is expected to avoid or prevent unauthorized copying and copying of digital media. In the embodiments of the present application, the digital watermark is a type of feature information.
会议接收端/发送端:在每一个远程会议中,都存在一个会议发送端以及会议接收端。示例性的,在一个视频会议中,会议发送端是会议主讲人拥有的终端,假设是一个进行画面共享的终端;会议接收端是会议与会者拥有的终端,与会者通过各自的终端观看主讲人共享的画面。在接下来的实施例中,使用“接收端”以及“发送端”分别替代“会议接收端”以及“会议发送端”。需要说明的是,在本申请提供的实施例中,接收端与发送端均指初始会 议(机密会议)的接收端与发送端。Conference receiver/sender: In each remote conference, there is a conference sender and a conference receiver. Exemplarily, in a video conference, the conference sender is a terminal owned by the presenter of the conference, assuming that it is a terminal for screen sharing; the conference receiver is a terminal owned by the conference participants, and the participants watch the presenter through their respective terminals. shared screen. In the following embodiments, "receiving end" and "sending end" are used to replace "conference receiving end" and "conference sending end", respectively. It should be noted that, in the embodiments provided in this application, both the receiving end and the sending end refer to the receiving end and the sending end of the initial conference (confidential conference).
合法发送者,是指有权限发送机密媒体数据的发送方。合法发送者信息:在本申请提供的实施例中,合法发送者信息可以包括会议发送端的信息或者会议所涉及的媒体服务器的信息。当合法发送者信息包括会议发送端的信息时,对应于下面实施例一、二、三、四中的终端1的设备信息、网络地址(IP地址或者MAC地址)或者用户1的个人信息,例如账号名称、手机号、工号等等;当合法发送者信息包括媒体服务器的信息时,对应于实施例一中的媒体服务器1的网络地址,或者对应与实施例二中的媒体服务器21的地址等等,在此不多做赘述。A legitimate sender is a sender who has the authority to send confidential media data. Legal sender information: In the embodiments provided in this application, the legal sender information may include information of a conference sender or information of a media server involved in the conference. When the legitimate sender information includes the information of the conference sender, it corresponds to the device information, network address (IP address or MAC address) of the terminal 1 in the following embodiments 1, 2, 3, and 4, or the personal information of the user 1, such as an account number Name, mobile phone number, work number, etc.; when the legitimate sender information includes the information of the media server, it corresponds to the network address of the media server 1 in the first embodiment, or corresponds to the address of the media server 21 in the second embodiment, etc. Wait, I won't go into details here.
合法接收者:是指有权限接收机密媒体数据的接收方。合法接收者信息:在本申请提供的实施例中,合法接收者信息即为会议接收端的信息。对应于下面实施例一、二、三、四中终端2的设备信息、网络地址(IP地址或者MAC地址)或者用户2的个人信息,例如账号名称、手机号、工号等等。Legitimate recipient: Refers to a recipient who has permission to receive confidential media data. Legal recipient information: In the embodiments provided in this application, the legal recipient information is the information of the conference recipient. Corresponding to the device information, network address (IP address or MAC address) of the terminal 2 in the following embodiments 1, 2, 3, and 4, or the personal information of the user 2, such as account name, mobile phone number, work number, etc.
媒体会话信息:在本申请提供的实施例中,媒体会话信息可以包括媒体数据传输的源地址、源端口、目的地址、目的端口等中的一个或多个。其中,端口可以是TCP(Transmission Control Protocol)端口或者UDP(User Datagram Protocol)端口,地址可以是IP地址或者MAC地址。另外,媒体会话信息中还可以包括Session ID(Session Identification会话标识)。在一个会议中,假设会议发送端和会议接收端通过媒体服务器1进行会议通信,会议媒体服务器会分别记录发送端与媒体服务器1、媒体服务器1与接收端这两个媒体会话对应的Session ID。Media session information: In the embodiments provided in this application, the media session information may include one or more of the source address, source port, destination address, destination port, etc. of the media data transmission. The port can be a TCP (Transmission Control Protocol) port or a UDP (User Datagram Protocol) port, and the address can be an IP address or a MAC address. In addition, the media session information may further include a Session ID (Session Identification). In a conference, it is assumed that the conference sender and the conference receiver communicate through the media server 1, and the conference media server will record the Session IDs corresponding to the two media sessions of the sender and the media server 1, and the media server 1 and the receiver respectively.
安全组网:一种可以管控用户行为的网络环境。在该网络环境中包括多个终端或者网元,终端以及组网中网元的媒体数据传输都处于监控范围内。在本申请提供的实施例中,安全组网包括多个终端以及至少一个媒体服务器。在一种可能的实现方式中,该安全组网的边界还设置了边界防火墙或者通用防火墙用于拦截非法转发的媒体数据。在另一种可能的实现方式中,该安全组网内或者边界上还部署有媒体代理网关。当媒体代理网关部署在安全组网的边界时,其功能与边界防火墙一样,用于监控流出安全组网的媒体数据;当媒体代理网关部署在安全组网内时,用于监控在安全组网内传输的媒体数据。Secure networking: A network environment that can control user behavior. The network environment includes multiple terminals or network elements, and the media data transmission of the terminals and the network elements in the networking are all within the monitoring range. In the embodiments provided in this application, the secure networking includes multiple terminals and at least one media server. In a possible implementation manner, a border firewall or a general firewall is further set on the border of the security network to intercept illegally forwarded media data. In another possible implementation manner, a media proxy gateway is further deployed in the security network or on the border. When the media proxy gateway is deployed at the border of the security network, its function is the same as that of the border firewall, and it is used to monitor the media data flowing out of the security network; when the media proxy gateway is deployed in the security network, it is used to monitor the media data in the security network. media data transferred within.
随着时代的快速发展,视频/语音会议已经成为当今办公场景下的重要组成部分。然而,部分会议涉及的内容属于机密信息,被非法泄露的话将会产生不可预估的后果。在一般情况下,为了确保会议的信息安全,会议系统会在媒体数据中添加与会议接收者的个人信息相关的可见水印,这可以起到一定的震慑作用,并且根据该可见水印后续可以追查泄露者的身份。然而,这样的方式所起到的效果十分有限,因为这种方式并不能阻止信息的实时泄露只能用于事后追责。With the rapid development of the times, video/voice conferencing has become an important part of today's office scene. However, some of the content involved in the meeting is classified information, and if it is illegally disclosed, it will have unpredictable consequences. In general, in order to ensure the information security of the conference, the conference system will add a visible watermark related to the personal information of the conference recipients in the media data, which can play a certain deterrent effect, and the leakage can be traced later according to the visible watermark. the identity of the person. However, the effect of this method is very limited, because this method cannot prevent the real-time leakage of information and can only be used for accountability afterwards.
本申请提供了一种检测媒体数据的方法,通过在媒体数据传输的过程中设置检测模块以验证该媒体数据传输的合法性。该种检测媒体数据的方法可以对非法传输的媒体数据进行实时拦截,降低信息泄露的风险。The present application provides a method for detecting media data, by setting a detection module in the process of media data transmission to verify the legitimacy of the media data transmission. The method for detecting media data can intercept illegally transmitted media data in real time, thereby reducing the risk of information leakage.
结合图1介绍本申请实施例提供的应用系统架构示意图。该系统架构主要分为两个网络环境,一个是安全组网内,另一个是安全组网外。在安全组网内传输的媒体数据以及流向安全组网边界外的媒体数据都处于管控范围内。在图1所示的系统架构中,发送端与接收端处于同一个安全组网内。例如,发送端与接收端处于同一家公司的安全组网内。A schematic diagram of an application system architecture provided by an embodiment of the present application is introduced with reference to FIG. 1 . The system architecture is mainly divided into two network environments, one is inside the security network and the other is outside the security network. The media data transmitted within the security network and the media data flowing outside the boundary of the security network are all within the scope of control. In the system architecture shown in FIG. 1 , the sender and the receiver are in the same security network. For example, the sender and receiver are in the same company's security network.
图1所示的系统架构包括媒体服务器1、媒体服务器2、会议调度服务器、会议发送端、 会议接收端、边界防火墙、媒体代理网关以及外部媒体服务器。发送端与接收端进行会议通信,会议调度服务器为该会议分配媒体服务器1,用于对会议中的媒体数据进行处理及转发。即,媒体服务器1为会议使用的媒体服务器。而媒体服务器2为安全组网内的一个随机的媒体服务器,其不参与发送端与接收端之间的会议通信。边界防火墙位于安全组网的边界,可以监控从组网内流向组网外的媒体数据。外部媒体服务器处于安全组网外。The system architecture shown in FIG. 1 includes a media server 1, a media server 2, a conference scheduling server, a conference sending end, a conference receiving end, a border firewall, a media proxy gateway, and an external media server. The sending end and the receiving end conduct conference communication, and the conference scheduling server allocates a media server 1 to the conference for processing and forwarding the media data in the conference. That is, the media server 1 is the media server used for the conference. The media server 2 is a random media server in the security network, which does not participate in the conference communication between the sender and the receiver. The border firewall is located at the border of the security network and can monitor the media data flowing from the inside of the network to the outside of the network. The external media server is outside the security network.
基于图1所示的架构,发送端经由媒体服务器1向接收端发送媒体数据,接收端在接收到媒体数据以后再通过各种途径进行非法转发,该行为将会被组网内的媒体服务器1、2或者边界上的防火墙所监测到,并且该次媒体数据的传输将被实时截断。Based on the architecture shown in Figure 1, the sending end sends media data to the receiving end via the media server 1, and the receiving end illegally forwards the media data through various channels after receiving the media data, which will be blocked by the media server 1 in the network. , 2 or the firewall on the border, and the transmission of this media data will be intercepted in real time.
结合图2介绍本申请实施例提供的另一应用系统架构示意图。该系统架构主要分成三个网络环境,一个是安全组网1内,一个安全组网2内,另一个是安全组网外。也就是说,在图2所示的系统架构中,发送端与接收端处于两个不同的安全组网内。例如,发送端处于公司A的安全组网1内,接收端处于公司B的安全组网2内。A schematic diagram of another application system architecture provided by an embodiment of the present application is introduced with reference to FIG. 2 . The system architecture is mainly divided into three network environments, one is within the security network 1, one is within the security network 2, and the other is outside the security network. That is to say, in the system architecture shown in FIG. 2 , the sending end and the receiving end are in two different security networks. For example, the sender is in the security network 1 of company A, and the receiver is in the security network 2 of company B.
图2所示的系统架构中包括媒体服务器11、媒体服务器21、媒体服务器22、会议调度服务器、边界防火墙1、边界防火墙2、会议接收端、会议发送端、媒体代理网关以及外部媒体服务器。依旧是发送端与接收端进行会议通信,会议调度服务器为该会议分配的媒体服务器为媒体服务器11和媒体服务器21,以实现对会议中的媒体数据进行处理及转发。媒体服务器22为接收端所处的安全组网2中的随机的一台媒体服务器。边界防火墙1、2分别位于安全组网1、2的边界上,用于监测从组网内流向组网外的媒体数据。外部媒体服务器位于安全组网外。The system architecture shown in FIG. 2 includes a media server 11, a media server 21, a media server 22, a conference scheduling server, a border firewall 1, a border firewall 2, a conference receiver, a conference sender, a media proxy gateway, and an external media server. The sending end and the receiving end still communicate in the conference, and the media servers allocated by the conference scheduling server for the conference are the media server 11 and the media server 21 to process and forward the media data in the conference. The media server 22 is a random media server in the secure networking 2 where the receiving end is located. The border firewalls 1 and 2 are located on the borders of the security networks 1 and 2 respectively, and are used to monitor the media data flowing from the inside of the network to the outside of the network. The external media server is located outside the security network.
基于图2所示的架构,发送端经由媒体服务器11和媒体服务器21向接收端发送媒体数据,途中依次穿过边界防火墙1和边界防火墙2。接收端在接收到媒体数据以后再进行非法转发,该行为会被安全组网2内的媒体服务器21、媒体服务器22、媒体代理网关或者边界防火墙2探测到,并且该次媒体数据的传输将被实时截断。Based on the architecture shown in FIG. 2 , the sending end sends media data to the receiving end via the media server 11 and the media server 21 , and passes through the border firewall 1 and the border firewall 2 in turn on the way. After the receiving end receives the media data and then illegally forwards it, this behavior will be detected by the media server 21, media server 22, media proxy gateway or border firewall 2 in the security network 2, and the media data transmission will be blocked. Truncate in real time.
结合图3介绍本申请实施例提供的另一应用系统架构示意图。该系统架构主要分成两个网络环境,一个是安全组网内,另一个是安全组网外。在图3所示的架构中,会议接收端位于安全组网内,会议发送端位于安全组网外。例如,发送端对应的用户在家办公,而接收端处于公司的安全组网内。A schematic diagram of another application system architecture provided by an embodiment of the present application is introduced with reference to FIG. 3 . The system architecture is mainly divided into two network environments, one is inside the security network and the other is outside the security network. In the architecture shown in FIG. 3 , the conference receiving end is located in the security network, and the conference sending end is located outside the security network. For example, the user corresponding to the sender works from home, while the receiver is in the company's security network.
图3所示的系统架构中包括会议调度服务器、媒体服务器3、媒体服务器4、媒体服务器5、外部媒体服务器、边界防火墙、会议发送端和会议接收端。依旧是发送端与接收端进行会议通信,会议调度服务器为该会议分配的媒体服务器为媒体服务器3和媒体服务器4,以实现对会议中的媒体数据进行处理及转发。媒体服务器5为接收端所处的安全组网中的一台随机的媒体服务器。边界防火墙位于安全组网的边界,用于监测从组网内流向组网外的媒体数据。The system architecture shown in FIG. 3 includes a conference scheduling server, a media server 3, a media server 4, a media server 5, an external media server, a border firewall, a conference sending end and a conference receiving end. The sending end and the receiving end still communicate in the conference, and the media servers allocated by the conference scheduling server for the conference are the media server 3 and the media server 4, so as to process and forward the media data in the conference. The media server 5 is a random media server in the secure networking where the receiving end is located. The border firewall is located at the border of the security network and is used to monitor the media data flowing from the inside of the network to the outside of the network.
基于图3所示的架构,发送端经由媒体服务器3和媒体服务器4向接收端发送媒体数据,途中穿越了边界防火墙。接收端在接收到媒体数据以后在组网内进行非法转发,媒体服务器4、媒体服务器5或者媒体代理网关会探测到该非法行为并实行实时截断机制;接收端向外部媒体服务器进行非法转发,边界防火墙会探测到该非法行为并实行实时截断机制。Based on the architecture shown in FIG. 3 , the sending end sends media data to the receiving end via the media server 3 and the media server 4 , passing through the border firewall on the way. After receiving the media data, the receiving end illegally forwards it in the network, and the media server 4, media server 5 or media proxy gateway will detect the illegal behavior and implement a real-time truncation mechanism; The firewall will detect this illegal behavior and implement a real-time truncation mechanism.
需要说明的是,本申请实施例提供的三个系统架构中所示的会议所涉及的媒体服务器的数量只是用于示例。例如,在图2所示的系统架构中,会议发送端可以直接穿过边界防火墙1将媒体数据发送给媒体服务器21而无需经过媒体服务器11。又例如,在图3所示的系统架 构中,会议发送端可以直接穿过边界防火墙将媒体数据发送给媒体服务器4而无需经过媒体服务器3。It should be noted that the number of media servers involved in the conference shown in the three system architectures provided in the embodiments of the present application is only for example. For example, in the system architecture shown in FIG. 2 , the conference sending end can directly pass through the border firewall 1 to send the media data to the media server 21 without going through the media server 11 . For another example, in the system architecture shown in FIG. 3 , the conference sending end can send media data to the media server 4 directly through the border firewall without going through the media server 3.
另外,本申请实施例不限定会议调度服务器所处的位置,即会议调度服务器可以处于接收端的安全组网内,也可以处于发送端的安全组网内,还可以处于安全组网外。在一种可能的实现方式中,会议调度服务器与某一媒体服务器为同一个服务器。In addition, the embodiment of the present application does not limit the location of the conference scheduling server, that is, the conference scheduling server may be located in the security network of the receiving end, or in the security network of the transmitting end, or outside the security network. In a possible implementation manner, the conference scheduling server and a certain media server are the same server.
上述三种系统架构中的媒体服务器、媒体代理网关、边界防火墙均具有识别水印的能力(对外部媒体服务器的能力不做具体限定)。例如,媒体服务器中可以包括水印检测模块,该模块通常可以和媒体服务器中的解码模块合并,用于解码媒体流数据并且从中提取相关特征以识别该媒体数据中的水印信息。又例如,媒体代理网关或者边界防火墙可以安装水印检测组件,该组件可以理解为一种软件程序,媒体代理网关或者边界防火墙可以利用该水印检测组件对媒体数据中的水印进行检测以及识别。因此,媒体服务器、媒体代理网关、边界防火墙均可以作为本申请实施例中的检测设备。The media server, the media proxy gateway, and the border firewall in the above three system architectures all have the capability of identifying watermarks (the capability of the external media server is not specifically limited). For example, a watermark detection module may be included in the media server, which may usually be combined with a decoding module in the media server for decoding media stream data and extracting relevant features therefrom to identify watermark information in the media data. For another example, the media proxy gateway or border firewall can install a watermark detection component, which can be understood as a software program, and the media proxy gateway or border firewall can use the watermark detection component to detect and identify watermarks in media data. Therefore, the media server, the media proxy gateway, and the border firewall can all be used as detection devices in the embodiments of the present application.
需要说明的是,安全组网只是用于限定会议接收端在向外泄露信息时需要经过具有检测能力的媒体服务器、媒体代理网关或者边界防火墙等网元而已,任何能达到与安全组网相同效果的方案均处在本发明所保护的范围之内。It should be noted that the security networking is only used to limit the media server, media proxy gateway, or border firewall and other network elements with detection capability when the conference receiving end leaks information to the outside world. Anything that can achieve the same effect as the security networking The solutions are all within the scope of protection of the present invention.
在本申请提供的实施例中,媒体数据被添加了水印,然后再利用具有水印识别能力的网元(例如媒体服务器、边界防火墙或者媒体代理网关等)来判断媒体数据传输的合法性。该方法可以监测非法转发机密信息的行为,并且对于信息的泄露可以做到实时截断,然后还可以根据水印所包含的信息确定泄露者。In the embodiments provided in this application, the media data is watermarked, and then a network element (such as a media server, border firewall, or media proxy gateway, etc.) with watermark identification capability is used to determine the legitimacy of media data transmission. The method can monitor the behavior of illegally forwarding confidential information, and can truncate the leakage of information in real time, and then the leaker can be determined according to the information contained in the watermark.
下面结合图4介绍本申请实施例提供的检测媒体数据的方法的整体流程。假设终端A与终端B通过媒体服务器通信,终端A作为会议发起端,终端B作为会议接收端。The following describes the overall flow of the method for detecting media data provided by the embodiment of the present application with reference to FIG. 4 . It is assumed that terminal A communicates with terminal B through a media server, terminal A acts as a conference initiator, and terminal B acts as a conference receiver.
步骤S41:检测设备接收终端A发送的媒体数据,该媒体数据中包括特征信息。Step S41: The detection device receives media data sent by terminal A, where the media data includes feature information.
终端在接收到终端B通过媒体服务器合法发送的媒体数据以后,通过各种途径将接收到的媒体数据再发送给其他人,在向其他人发送媒体数据的过程中经过了检测设备。正如上面所描述的那样,当该媒体数据是泄露给组网内的终端时,所述检测设备可以是媒体代理网关或者媒体服务器;当该媒体数据是泄露给组网外的终端时,所述检测设备可以是边界防火墙。After receiving the media data legally sent by the terminal B through the media server, the terminal sends the received media data to other people through various channels, and passes the detection device in the process of sending the media data to other people. As described above, when the media data is leaked to a terminal within the network, the detection device may be a media proxy gateway or a media server; when the media data is leaked to a terminal outside the network, the detection device can be The detection device can be a border firewall.
另外,该媒体数据中的特征信息可以由终端A添加也可以由媒体服务器添加。In addition, the feature information in the media data can be added by the terminal A or added by the media server.
步骤S42:检测设备确定终端B发送该媒体数据是否合法。Step S42: The detection device determines whether the media data sent by the terminal B is legal.
检测设备根据媒体数据中包含的特征信息可以确定终端B发送该媒体数据这一行为是否是合法的。当确定终端B发送该媒体数据的行为是合法时,执行步骤S45;当确定终端B发送该媒体数据的行为非法时,执行步骤S43-44。The detection device can determine whether the act of terminal B sending the media data is legal according to the feature information contained in the media data. When it is determined that the behavior of the terminal B to send the media data is legal, step S45 is performed; when it is determined that the behavior of the terminal B to send the media data is illegal, steps S43-44 are performed.
步骤S43:检测设备拦截该第一媒体数据。Step S43: The detection device intercepts the first media data.
在确认终端B发送该媒体数据的行为非法时,检测设备会第一时间拦截该媒体数据,停止向下转发或者不让该媒体数据通过。When it is confirmed that the behavior of terminal B sending the media data is illegal, the detection device will intercept the media data at the first time, stop the downward forwarding or prevent the media data from passing through.
步骤S44:检测设备向会议调度服务器或者媒体服务器发送告警提示。Step S44: The detection device sends an alarm prompt to the conference scheduling server or the media server.
步骤S45:当检测设备为媒体服务器或者媒体代理网关时,将继续向下转发该媒体数据;当检测设备为边界防火墙时,将让该媒体数据通过组网的边界。Step S45: When the detection device is a media server or a media proxy gateway, it will continue to forward the media data downward; when the detection device is a border firewall, the media data will pass through the network boundary.
上述方法中,检测设备通过检测媒体数据中的特征信息来识别终端发送媒体数据的行为是否合法,进而保证了媒体通信的数据安全,减少了信息泄露的风险。In the above method, the detection device identifies whether the behavior of the terminal sending the media data is legal by detecting the characteristic information in the media data, thereby ensuring the data security of the media communication and reducing the risk of information leakage.
在本申请提供的实施例中,添加水印标识(特征信息)主要有两种方式:一种是媒体服务器在媒体数据中添加水印标识,另一种是会议终端在媒体数据中添加水印标识,下面分别介绍采用这两种方式时的具体实现方法。In the embodiment provided by this application, there are mainly two ways to add watermark identification (feature information): one is that the media server adds the watermark identification to the media data, and the other is that the conference terminal adds the watermark identification to the media data. The following The specific implementation methods when using these two methods are introduced respectively.
实施例一:终端1与终端2进行会议通信,终端1作为会议发送端,终端2作为会议接收端,终端1对应的使用者为用户1,终端2对应的使用者为用户2。终端1与终端2处于同一个安全组网内(参考图1),且水印标识由媒体服务器添加。下面结合图5,介绍具体的检测媒体数据的方法。Embodiment 1: Terminal 1 and Terminal 2 perform conference communication. Terminal 1 serves as a conference sending end, and Terminal 2 serves as a conference receiving end. The user corresponding to Terminal 1 is User 1, and the user corresponding to Terminal 2 is User 2. Terminal 1 and Terminal 2 are in the same secure network (refer to FIG. 1 ), and the watermark is added by the media server. The following describes a specific method for detecting media data with reference to FIG. 5 .
步骤S51:终端1向会议调度服务器发送会议请求,该会议请求中携带终端1以及终端2的地址,该地址可以是MAC地址或者IP地址。可选的,会议请求中还包括会议业务内容,例如是语音会议或者视频会议;或者,会议请求中还包括会议时长等各种与会议相关的信息。可选的,该会议请求中还包括终端1相关信息和终端2相关信息,例如,终端1、终端2的设备标识,或者终端1、终端2对应的用户信息,比如会议账号信息、私人信息(例如手机号码、用户姓名)等可以表明用户身份的信息。Step S51: The terminal 1 sends a meeting request to the meeting scheduling server, where the meeting request carries the addresses of the terminal 1 and the terminal 2, and the addresses may be a MAC address or an IP address. Optionally, the conference request further includes conference service content, such as a voice conference or a video conference; or, the conference request also includes various conference-related information such as conference duration. Optionally, the meeting request also includes information about terminal 1 and information about terminal 2, for example, the device identifiers of terminal 1 and terminal 2, or user information corresponding to terminal 1 and terminal 2, such as meeting account information, private information ( Such as mobile phone number, user name) and other information that can indicate the user's identity.
步骤S52:会议调度服务器接收会议请求,为该会议分配媒体资源。会议调度服务器根据会议请求确定媒体服务器1为该会议提供服务,即,由媒体服务器1对会议中的媒体数据进行处理及转发。在一种实现方式中,会议调度服务器将媒体服务器1、终端1、终端2的地址绑定在一起记录在列表中,并且分配一个会议标识。Step S52: The conference scheduling server receives the conference request and allocates media resources for the conference. The conference scheduling server determines that the media server 1 provides services for the conference according to the conference request, that is, the media server 1 processes and forwards the media data in the conference. In an implementation manner, the conference scheduling server binds the addresses of the media server 1, the terminal 1, and the terminal 2 together and records them in a list, and assigns a conference identifier.
确定了提供服务的媒体服务器之后,会议调度服务器分别向终端1以及终端2发送媒体服务器1的地址和会议标识。同时,会议调度服务器还向媒体服务器1发送会议标识以及终端2、终端1的地址。至此,终端1、终端2以及媒体服务器1建立了会议通信连接。步骤S51-S52的目的主要是为会议分配媒体服务器以及建立发送端与接收端之间的连接通道,其他任何可实现该目的的方法均可替换步骤S51-S52。After the media server providing the service is determined, the conference scheduling server sends the address of the media server 1 and the conference ID to the terminal 1 and the terminal 2 respectively. At the same time, the conference scheduling server also sends the conference identification and the addresses of the terminal 2 and the terminal 1 to the media server 1 . So far, the terminal 1, the terminal 2 and the media server 1 have established a conference communication connection. The purpose of steps S51-S52 is mainly to allocate a media server for the conference and establish a connection channel between the sending end and the receiving end, and any other method that can achieve this purpose can replace steps S51-S52.
步骤S53:会议调度服务器生成终端2水印标识并将其发送给会议所涉及的媒体服务器。Step S53: The conference scheduling server generates a watermark identifier of the terminal 2 and sends it to the media server involved in the conference.
会议调度服务器生成终端2水印标识。在一种实现方式中,会议调度服务器基于终端2相关信息(例如用户信息)生成终端2水印标识。在另一种实现方式中,会议调度服务器基于媒体会话信息生成终端2水印标识。其中,媒体会话信息指示数据发送的源地址为媒体服务器1的地址或者终端1的地址;又或者,媒体会话信息用于指示数据发送的目的地址为终端2的地址。在另一种实现方式中,会议调度服务器基于媒体会话信息以及终端2相关信息(例如用户信息)生成接收端水印标识。The conference scheduling server generates the terminal 2 watermark identifier. In an implementation manner, the conference scheduling server generates a watermark identifier of the terminal 2 based on the relevant information of the terminal 2 (eg, user information). In another implementation manner, the conference scheduling server generates a watermark identifier of the terminal 2 based on the media session information. The media session information indicates that the source address of data transmission is the address of the media server 1 or the address of the terminal 1; or, the media session information is used to indicate that the destination address of the data transmission is the address of the terminal 2. In another implementation manner, the conference scheduling server generates the receiver watermark identifier based on the media session information and related information of the terminal 2 (eg, user information).
会议调度服务器将生成的终端2水印标识发送给会议所涉及的媒体服务器。在本申请提供的实施例中,会议调度服务器将生成的终端2水印标识发送给了媒体服务器1。The conference scheduling server sends the generated watermark identifier of the terminal 2 to the media server involved in the conference. In the embodiment provided in this application, the conference scheduling server sends the generated watermark identifier of the terminal 2 to the media server 1 .
步骤S53’:该步骤为步骤S43的替换步骤,与步骤S43不同的是,在该步骤中,由会议涉及的媒体服务器生成水印标识。在本申请提供的实施例中,是媒体服务器1生成了水印标识。且水印标识包含的内容与步骤S43的描述相同。Step S53': This step is an alternative step to step S43. The difference from step S43 is that in this step, the media server involved in the conference generates a watermark identifier. In the embodiment provided in this application, it is the media server 1 that generates the watermark. And the content contained in the watermark is the same as the description in step S43.
步骤S54:终端1向媒体服务器1发送媒体数据。示例性的,终端1进行桌面共享,终端2作为与会者观看终端1的共享画面,媒体服务器1作为中间的处理转发单元。Step S54 : the terminal 1 sends the media data to the media server 1 . Exemplarily, terminal 1 performs desktop sharing, terminal 2 serves as a participant to view the shared screen of terminal 1, and media server 1 serves as an intermediate processing and forwarding unit.
步骤S55:媒体服务器1接收终端1发送的媒体数据后,在该媒体数据中添加终端2水印标识。Step S55: After receiving the media data sent by the terminal 1, the media server 1 adds the watermark of the terminal 2 to the media data.
向媒体流中添加水印有多种方式:例如,利用帧间频率变换嵌入水印,该方法鲁棒性 好、稳定、不易察觉;又例如,利用双树复小波变换(DT CWT)等方法嵌入几何不变水印,该方法能抵抗常见的水印攻击。本申请实施例对于嵌入水印的方式不做具体限定。There are many ways to add watermarks to media streams: for example, using inter-frame frequency transform to embed watermarks, which is robust, stable, and imperceptible; another example, using methods such as dual-tree complex wavelet transform (DT CWT) to embed geometric Invariant watermarking, this method can resist common watermarking attacks. The embodiments of the present application do not specifically limit the manner of embedding the watermark.
步骤S56:媒体服务器1向终端2发送携带终端2水印标识的媒体数据。Step S56: The media server 1 sends the media data carrying the watermark identifier of the terminal 2 to the terminal 2.
当用户2向组网内其他用户转发该媒体数据时,执行步骤S57-S59;当用户2向组网外的其他用户转发该媒体数据时,执行步骤S510-步骤S512。When user 2 forwards the media data to other users in the network, steps S57-S59 are performed; when user 2 forwards the media data to other users outside the network, steps S510-S512 are performed.
步骤S57:用户2向组网内的其他用户泄露接收到的携带终端2水印标识的媒体数据。Step S57: The user 2 leaks the received media data carrying the watermark identifier of the terminal 2 to other users in the network.
用户2可以采用多种方式向其他用户泄露该媒体数据。例如,用户2在终端2上开启一个新会议,将终端1的发送的媒体数据作为共享画面共享给新会议的与会者观看,由于数字水印的鲁棒性很高,因此,新会议的媒体数据中依旧会检测出媒体服务器1添加的水印标识。在该种泄露方式下,泄露信息的终端与会议接收端为同一终端,即终端2在接收到媒体数据以后使用了相同的终端去泄露会议信息,正如图5所示的那样。而在另一种可能的实现方式中,用户2还可以采用除了终端2以外的其他终端泄露会议信息,当然,该其他终端必须处于安全组网内。例如,用户2使用了自己的手机开启了一个新会议,依旧是将原始会议的画面通过新会议共享给其他人。在这样的情况下,手机发送的媒体数据中依旧会存在数字水印,后续还是会被检测设备识别并且拦截。 User 2 can divulge the media data to other users in various ways. For example, user 2 starts a new conference on terminal 2, and shares the media data sent by terminal 1 as a shared screen to the participants of the new conference. Due to the high robustness of digital watermarking, the media data of the new conference The watermark added by the media server 1 will still be detected. In this leakage mode, the terminal that leaks the information and the conference receiving terminal are the same terminal, that is, the terminal 2 uses the same terminal to leak the conference information after receiving the media data, as shown in FIG. 5 . In another possible implementation manner, the user 2 may also use other terminals other than the terminal 2 to leak the conference information. Of course, the other terminals must be in a secure network. For example, user 2 uses his mobile phone to start a new meeting, and still shares the original meeting image with others through the new meeting. In such a case, there will still be a digital watermark in the media data sent by the mobile phone, which will be identified and intercepted by the detection device in the future.
步骤S58:媒体服务器2检测到媒体数据中携带水印标识,确认该媒体数据传输异常并向会议调度服务器发送告警提示。Step S58: The media server 2 detects that the media data carries the watermark, confirms that the media data transmission is abnormal, and sends an alarm prompt to the conference scheduling server.
用户2在向内网中的其他用户泄露媒体数据时,会经由媒体服务器转发。假设用户2向内网中的其他用户泄露媒体数据时是经由媒体服务器2转发,媒体服务器2在接收到该非法传输的媒体数据时检测到其中存在水印标识,则说明该次媒体数据传输非法。也就是说,在本申请实施例中,媒体服务器只要接收到包含水印标识的媒体数据,则说明该次媒体数据的传输不合法。当媒体服务器2确定接收到的媒体数据不合法时,将不会向任何终端转发该媒体数据。When user 2 leaks media data to other users in the intranet, it will be forwarded through the media server. Suppose that when user 2 leaks media data to other users on the intranet, it is forwarded through media server 2. When media server 2 receives the illegally transmitted media data, it detects that there is a watermark in it, indicating that the media data transmission is illegal. That is to say, in the embodiment of the present application, as long as the media server receives the media data including the watermark identifier, it means that the transmission of the media data is illegal. When the media server 2 determines that the received media data is illegal, it will not forward the media data to any terminal.
在另一种可能的实现方式中,为了提高检测媒体数据的正确率,媒体服务器2在确定接收到的媒体数据中包含水印标识以后,还可以进一步判断水印标识所包含的信息是否正确。在这样的实现方式下,终端2水印标识需要包括媒体会话信息。正如步骤S43所描述的那样,终端2水印标识中的媒体会话信息指示了该媒体数据的源地址为媒体服务器1的地址或者终端1的地址。又或者该媒体会话信息指示了该媒体数据的目的地址为终端2的地址。当媒体服务器2解析了媒体数据中的水印标识以后,发现水印标识指示的源地址(媒体服务器1的地址或终端1的地址)与当前发送该媒体数据的源地址(终端2的地址)不同,则媒体服务器2可以确定该媒体数据的传输存在异常。当然,媒体服务器也可以根据水印中的目的地址(终端2的地址)与当前接收该媒体数据的目的地址(媒体服务器2的地址)来判断,或者结合源地址和目的地址一起判断。In another possible implementation manner, in order to improve the accuracy of detecting media data, after determining that the received media data contains a watermark, the media server 2 may further determine whether the information contained in the watermark is correct. In such an implementation manner, the watermark identifier of the terminal 2 needs to include media session information. As described in step S43, the media session information in the watermark of the terminal 2 indicates that the source address of the media data is the address of the media server 1 or the address of the terminal 1. Alternatively, the media session information indicates that the destination address of the media data is the address of the terminal 2 . After the media server 2 parses the watermark in the media data, it finds that the source address (the address of the media server 1 or the address of the terminal 1) indicated by the watermark is different from the source address (the address of the terminal 2) currently sending the media data, Then the media server 2 can determine that there is an abnormality in the transmission of the media data. Of course, the media server can also judge according to the destination address in the watermark (the address of the terminal 2) and the destination address currently receiving the media data (the address of the media server 2), or combine the source address and the destination address.
当判断该次媒体数据传输行为存在异常时,媒体服务器2(检测设备)可以向会议调度服务器发送告警提示。当水印标识中包括了媒体服务器1的地址时,媒体服务器2可以直接向媒体服务器1发送告警提示。进一步的,当水印标识中还包括终端2的相关信息时,媒体服务器2可以直接确定终端2为异常终端,然后直接向媒体服务器1发送告警提示以指示其停止向终端2发送媒体数据。When it is determined that the media data transmission behavior is abnormal, the media server 2 (detection device) may send an alarm prompt to the conference scheduling server. When the address of the media server 1 is included in the watermark identifier, the media server 2 may directly send an alarm prompt to the media server 1 . Further, when the watermark identifier also includes related information of the terminal 2, the media server 2 can directly determine that the terminal 2 is an abnormal terminal, and then directly send an alarm prompt to the media server 1 to instruct it to stop sending media data to the terminal 2.
需要说明的是,在本申请提供的实施例中,会议只涉及一个媒体服务器(即媒体服务器1),但在实际情况中一个会议可能存在两个媒体服务器。例如,终端1依次经由媒体服务器 A、媒体服务器B向终端2传输媒体数据,且终端1、终端2、媒体服务器A、媒体服务器B处于同一个安全组网内。在这样的情况下,可以由靠近接收端的媒体服务器(媒体服务器B)给媒体数据打上与接收端信息相关的水印标识。终端2将终端1发送的媒体数据再转发给其他用户,只要安全组网内的媒体服务器检测到接收的媒体数据中包含水印标识,即可说明此次媒体数据的传输存在异常,或者,还可以进一步地根据水印内容进行判断。总之,本申请对于一个会议所涉及的媒体服务器的数量不做具体限制。It should be noted that, in the embodiment provided in this application, only one media server (ie, media server 1 ) is involved in a conference, but in an actual situation, two media servers may exist in a conference. For example, terminal 1 transmits media data to terminal 2 via media server A and media server B in sequence, and terminal 1, terminal 2, media server A, and media server B are in the same security network. In such a case, the media server (media server B) close to the receiving end may mark the media data with a watermark identification related to the information of the receiving end. Terminal 2 forwards the media data sent by terminal 1 to other users. As long as the media server in the secure network detects that the received media data contains a watermark, it can indicate that there is an abnormality in the transmission of the media data. Further judgment is made according to the watermark content. In conclusion, this application does not specifically limit the number of media servers involved in a conference.
步骤S59:会议调度服务器向媒体服务器1发送通知,以指示其停止向终端2发送来自终端1的媒体数据。Step S59 : the conference scheduling server sends a notification to the media server 1 to instruct it to stop sending the media data from the terminal 1 to the terminal 2 .
当水印标识中还包括终端2的相关信息时,媒体服务器2向会议调度服务器发送的告警提示中可以携带终端2的相关信息用于指示其为异常终端。进而会议调度服务器可以根据该告警提示确认终端2属于异常终端,然后立即向媒体服务器1发送指示信息,以指示其停止向终端2转发来自终端1的媒体数据。When the watermark identifier also includes the relevant information of the terminal 2, the alarm prompt sent by the media server 2 to the conference scheduling server may carry the relevant information of the terminal 2 to indicate that it is an abnormal terminal. Furthermore, the conference scheduling server can confirm that the terminal 2 is an abnormal terminal according to the alarm prompt, and then immediately send the instruction information to the media server 1 to instruct it to stop forwarding the media data from the terminal 1 to the terminal 2 .
步骤S510:用户2向组网外的其他用户泄露接收到的携带终端2水印标识的媒体数据。Step S510: The user 2 leaks the received media data carrying the watermark identifier of the terminal 2 to other users outside the network.
同步骤S57中所述的那样,用户2有多种可能的泄露途径:例如,用户2在终端2上开启一个新会议,将终端1的发送的媒体数据作为共享画面共享给新会议的与会者观看(如图4所示)。由于数字水印的鲁棒性很高,新会议的媒体数据中依旧会检测出水印标识。在另一种可能的实现方式中,用户2可采用除了终端2以外的其他终端向组网内的用户泄露信息。例如使用自己的手机开启一个新会议,将与终端1的会议画面共享给新会议的与会者。在手机发送的媒体数据中依旧会包括终端2水印标识,后续可以被检测设备识别并且实时拦截。As described in step S57, user 2 has multiple possible leakage paths: for example, user 2 opens a new conference on terminal 2, and shares the media data sent by terminal 1 as a shared image to the participants of the new conference. Watch (shown in Figure 4). Due to the high robustness of digital watermarks, the watermarks will still be detected in the media data of new conferences. In another possible implementation manner, user 2 may use other terminals other than terminal 2 to leak information to users in the network. For example, use your own mobile phone to start a new conference, and share the conference screen with terminal 1 to the participants of the new conference. The media data sent by the mobile phone will still include the terminal 2 watermark, which can be subsequently identified by the detection device and intercepted in real time.
步骤S511:当终端2向外发送媒体数据时,边界防火墙检测到媒体数据中包含水印标识,确定该次媒体数据的传输存在异常。Step S511: When the terminal 2 sends the media data to the outside, the border firewall detects that the media data contains a watermark identifier, and determines that there is an abnormality in the transmission of the media data.
媒体服务器1在向终端2发送媒体数据时已经打上了包含终端2水印标识,当终端2再向外非法转发时,由于数字水印的鲁棒性,边界防火墙可以检测到媒体数据中包含的水印标识。只要边界防火墙在媒体数据中检测到水印标识即可说明该媒体数据的传输存在异常。当边界防火墙确定该次媒体数据传输存在异常时,将会阻断该媒体数据的通过,并且向会议调度服务器发送告警提示。When the media server 1 sends the media data to the terminal 2, it has already marked the watermark containing the terminal 2. When the terminal 2 illegally forwards it to the outside, due to the robustness of the digital watermark, the border firewall can detect the watermark contained in the media data. . As long as the border firewall detects the watermark in the media data, it means that there is an abnormality in the transmission of the media data. When the border firewall determines that the media data transmission is abnormal, it will block the passage of the media data, and send an alarm prompt to the conference scheduling server.
在另一种可能的实现方式中,为了提高检测的准确率,在检测到水印标识以后还可以进一步根据水印标识的内容来最终确定该次媒体数据的传输是否存在异常。在这样的实现方式下,会议调度服务器在生成终端2水印标识的时候必须使用媒体会话信息,例如源地址或者目的地址等。当边界防火墙接收到终端2向外发送的媒体数据时,识别水印标识中包括的媒体会话信息,该会话信息指示了源地址是媒体服务器1的地址或者终端1的地址,目的地址是终端2的地址,但当前防火墙接收的媒体数据的源地址是终端2的地址,目的地址是其他终端,则可说明该次媒体数据传输不合法。或者,也可以只根据目的地址或者源地址来判断该次媒体数据的传输是否存在异常。In another possible implementation manner, in order to improve the detection accuracy, after the watermark identification is detected, it is further possible to finally determine whether there is an abnormality in the transmission of the media data according to the content of the watermark identification. In such an implementation manner, the conference scheduling server must use the media session information, such as the source address or the destination address, when generating the watermark identifier of the terminal 2 . When the border firewall receives the media data sent by the terminal 2, it identifies the media session information included in the watermark identifier. The session information indicates that the source address is the address of the media server 1 or the address of the terminal 1, and the destination address is the address of the terminal 2. If the source address of the media data currently received by the firewall is the address of terminal 2 and the destination address is another terminal, it means that the media data transmission is illegal. Alternatively, it is also possible to judge whether there is an abnormality in the transmission of the media data only according to the destination address or the source address.
同步骤S58,当确定存在异常传输时,边界防火墙会向会议调度服务器发送告警提示。当水印标识中还包括媒体服务器1的地址以及终端2相关信息时,边界防火墙可以直接向媒体服务器1发送告警提示以指示其停止向终端2发送媒体数据。Similar to step S58, when it is determined that there is abnormal transmission, the border firewall will send an alarm prompt to the conference scheduling server. When the watermark identifier also includes the address of the media server 1 and related information of the terminal 2 , the border firewall can directly send an alarm prompt to the media server 1 to instruct it to stop sending media data to the terminal 2 .
步骤S512:会议调度服务器向媒体服务器1发送通知,以指示其停止向终端2发送来自终端1的媒体数据。Step S512 : the conference scheduling server sends a notification to the media server 1 to instruct it to stop sending the media data from the terminal 1 to the terminal 2 .
当告警提示中携带了信息指示终端2为异常终端,则当会议调度服务器接收到来自媒体服务器2的告警提示以后会立即向媒体服务器1发送指示信息,以指示其停止向终端2转发来自终端1的媒体数据。When the alarm prompt carries information indicating that terminal 2 is an abnormal terminal, when the conference scheduling server receives the alarm prompt from media server 2, it will immediately send instruction information to media server 1 to instruct it to stop forwarding to terminal 2 from terminal 1. media data.
在上述步骤S51-S512中,水印标识(终端2水印标识)主要包括的是终端2相关信息以及媒体会话信息,在另一种可能实现的方式中,水印标识还可以包括机密等级。示例性的,水印标识中携带了信息指示机密等级为“内部公开”,那么当媒体数据在内网中被二次转发或者二次共享(步骤S57-步骤S59)时,媒体服务器2不会拦截该媒体数据;但是当该媒体数据向外转发时(步骤S510-步骤S512),边界防火墙会拦截该媒体数据。In the above steps S51-S512, the watermark identifier (terminal 2 watermark identifier) mainly includes terminal 2 related information and media session information. In another possible implementation manner, the watermark identifier may also include a confidentiality level. Exemplarily, the watermark identifier carries information indicating that the confidentiality level is "internal disclosure", then when the media data is re-forwarded or re-shared in the intranet (step S57-step S59), the media server 2 will not intercept. The media data; but when the media data is forwarded to the outside (step S510-step S512), the border firewall will intercept the media data.
上述方法中,会议所涉及的媒体服务器(媒体服务器1)在向会议接收端转发来自会议发送端的媒体数据之前,在媒体数据中添加了水印标识。然后,当会议接收端进行二次共享或者二次转发时,组网内的媒体服务器以及组网边界上的防火墙会检测到媒体数据中携带有水印标识即可确认该次媒体数据传输存在异常。当检测到水印标识,或者确定水印标识所包含的内容与真实情况不匹配时,组网内的媒体服务器或者边界上的防火墙会向会议调度服务器发送告警提示,进而指示会议所涉及的媒体服务器停止向会议接收端发送媒体数据。上述方法中,不管用户是在组网内泄露信息还是向组网外泄露信息,都可以被实时拦截,不会产生由于信息泄露而导致的恶性后果;进一步的,由于媒体数据中添加了包含用户信息的水印标识,当组网内的媒体服务器或者边界上的防火墙拦截了包含水印标识的媒体数据时,分析水印标识的内容即可确定泄露者。In the above method, the media server (media server 1) involved in the conference adds a watermark to the media data before forwarding the media data from the conference sender to the conference receiver. Then, when the conference receiving end performs secondary sharing or secondary forwarding, the media server in the networking and the firewall on the networking boundary will detect that the media data carries the watermark to confirm that the media data transmission is abnormal. When the watermark is detected, or it is determined that the content contained in the watermark does not match the real situation, the media server in the network or the firewall on the border will send an alarm to the conference scheduling server, and then instruct the media server involved in the conference to stop Send media data to the conference receiver. In the above method, no matter whether the user leaks information within the network or leaks information outside the network, it can be intercepted in real time, and there will be no malignant consequences caused by information leakage; Information watermark identification. When the media server in the network or the firewall on the border intercepts the media data containing the watermark identification, the leaker can be determined by analyzing the content of the watermark identification.
上述检测信息泄露的关键是水印标识,为了确保水印标识本身未被篡改,在一种可能的实现方式中,需要利用数字签名来确保媒体数据传输通道的安全性。数字签名往往被携带在媒体数据报文的头部。在每一次的媒体会话中都可使用数字签名来确保传输通道的安全性。例如,终端1向终端2进行桌面共享时,总共存在两个媒体会话,一个是从终端1到媒体服务器,另一个是从媒体服务器1到终端2。另外,终端2向外泄露时的媒体会话也可以使用数字签名来确保通道传输的安全。每个媒体会话使用数字签名的原理是类似的。The key to the above detection information leakage is the watermark identification. In order to ensure that the watermark identification itself has not been tampered with, in a possible implementation manner, a digital signature needs to be used to ensure the security of the media data transmission channel. Digital signatures are often carried in the header of media data packets. Digital signatures can be used in every media session to ensure the security of the transmission channel. For example, when terminal 1 performs desktop sharing with terminal 2, there are two media sessions in total, one is from terminal 1 to the media server, and the other is from the media server 1 to terminal 2. In addition, the media session when the terminal 2 leaks to the outside may also use a digital signature to ensure the security of channel transmission. The principle of using digital signatures for each media session is similar.
以从终端1到媒体服务器1使用数字签名来确保传输通道的安全性为例,具体介绍数字签名的使用方法。会议调度服务器向组网内的所有媒体服务器以及边界上的防火墙分发密钥,并且会议调度服务器使用该密钥对媒体会话信息和/或终端1的用户信息加密生成数字签名。需要说明的是,会议调度服务器与组网内的媒体服务器以及边界防火墙可以提前协商数字签名的算法。数字签名的算法有多种:包括RSA(Rivest,Shamir,Adleman)、DSA(DIgital Signature Algorithm)等等。会议调度服务器将生成数字签名颁发给终端1,终端1在向媒体服务器传输媒体数据时(步骤S44)将该数字签名携带在媒体数据的报文头部。媒体服务器1在接收到终端1发送的媒体数据时,获取该媒体数据中携带的数字签名。然后媒体服务器1再基于会议调度服务器分发的密钥以及事先协商的算法计算数字签名。媒体服务器1将计算出来的数字签名与媒体数据中携带的数字签名进行比较,一致则说明该传输通道安全,即传输数据未被篡改。Taking the use of a digital signature from the terminal 1 to the media server 1 to ensure the security of the transmission channel as an example, the method of using the digital signature is introduced in detail. The conference scheduling server distributes a key to all media servers in the network and firewalls on the border, and the conference scheduling server uses the key to encrypt the media session information and/or user information of the terminal 1 to generate a digital signature. It should be noted that the conference scheduling server, the media server and the border firewall in the network can negotiate the algorithm of the digital signature in advance. There are many kinds of digital signature algorithms: including RSA (Rivest, Shamir, Adleman), DSA (DIgital Signature Algorithm) and so on. The conference scheduling server issues the generated digital signature to the terminal 1, and the terminal 1 carries the digital signature in the packet header of the media data when the terminal 1 transmits the media data to the media server (step S44). When receiving the media data sent by the terminal 1, the media server 1 obtains the digital signature carried in the media data. Then, the media server 1 calculates the digital signature based on the key distributed by the conference scheduling server and the algorithm negotiated in advance. The media server 1 compares the calculated digital signature with the digital signature carried in the media data, and if they are consistent, the transmission channel is safe, that is, the transmission data has not been tampered with.
再以终端2经过媒体服务器2向组网内的其他用户泄露信息为例,介绍使用数字签名来确保传输通道的安全性的方法。同样的,会议调度服务器向组网内的所有媒体服务器以及边界上的防火墙分发密钥,并且会议调度服务器使用该密钥对媒体会话信息和/或终端2的用户信息加密生成数字签名。会议调度服务器将该数字签名颁发给终端2,终端2在向外二次共享或者二次转发媒体数据时,在其中携带该数字签名。媒体服务器2在接收到终端2发送 的媒体数据时,根据与会议调度服务器协商的算法以及密钥计算数字签名,将计算的数字签名与接收到的媒体数据中携带的数字签名相比较,确定该传输通道是否安全。当不存在数字签名或者数字签名无效时,媒体服务器2将不会向任何终端转发给媒体数据,并且也会向会议调度服务器发送告警提示以反馈终端2为异常终端。Taking the terminal 2 leaking information to other users in the network through the media server 2 as an example, the method of using a digital signature to ensure the security of the transmission channel is introduced. Similarly, the conference scheduling server distributes a key to all media servers in the network and firewalls on the border, and the conference scheduling server uses the key to encrypt the media session information and/or user information of the terminal 2 to generate a digital signature. The conference scheduling server issues the digital signature to the terminal 2, and the terminal 2 carries the digital signature in it when sharing or re-forwarding the media data externally. When the media server 2 receives the media data sent by the terminal 2, it calculates the digital signature according to the algorithm negotiated with the conference scheduling server and the key, and compares the calculated digital signature with the digital signature carried in the received media data to determine the digital signature. Whether the transmission channel is secure. When there is no digital signature or the digital signature is invalid, the media server 2 will not forward the media data to any terminal, and will also send an alarm prompt to the conference scheduling server to feedback that the terminal 2 is an abnormal terminal.
在实施例一中,由会议所涉及的媒体服务器在媒体数据中添加水印标识,当该媒体数据被二次转发或者共享时,检测设备会检测到二次转发或者二次共享的媒体数据中包含的水印标识,进而进行实时拦截,减少由于信息泄露而导致的损失。并且,检测设备可以根据水印标识中包含的信息来追踪泄露者。In Embodiment 1, the media server involved in the conference adds a watermark to the media data. When the media data is re-forwarded or shared, the detection device will detect that the re-forwarded or re-shared media data contains The watermark is identified, and then real-time interception is performed to reduce the loss caused by information leakage. Moreover, the detection device can track the leaker according to the information contained in the watermark identification.
实施例二:终端1与终端2进行会议通信,终端1作为会议发送端,终端2作为会议接收端,终端1对应的使用者为用户1,终端2对应的使用者为用户2。终端1与终端2处于同一个安全组网内(参考图1),且会议中的每个终端在向外发送媒体数据时,都会向媒体数据中添加与自身信息相关或者与媒体会话信息相关的水印。下面结合图6,介绍具体的检测媒体数据的方法。Embodiment 2: Terminal 1 and Terminal 2 perform conference communication, Terminal 1 serves as a conference sender, and Terminal 2 serves as a conference receiver. The user corresponding to Terminal 1 is User 1, and the user corresponding to Terminal 2 is User 2. Terminal 1 and Terminal 2 are in the same security network (refer to Figure 1), and each terminal in the conference will add information related to its own information or related to media session information to the media data when sending media data. watermark. The following describes a specific method for detecting media data with reference to FIG. 6 .
步骤S61-S62:与步骤S51-S52所起到的作用相同,在此不多做赘述。Steps S61-S62: have the same functions as steps S51-S52, and are not repeated here.
步骤S63:会议调度服务器生成终端1水印标识,并将其发送给会议所涉及的媒体服务器,然后由会议所涉及的媒体服务器将终端1水印标识转发给终端1。Step S63 : the conference scheduling server generates the watermark identifier of terminal 1 and sends it to the media server involved in the conference, and then the media server involved in the conference forwards the watermark identifier of terminal 1 to terminal 1 .
在另一种可能的实现方式中,会议调度服务器将生成的终端1水印标识直接发送给终端1,无需经由MCU转发。In another possible implementation manner, the conference scheduling server directly sends the generated watermark identifier of the terminal 1 to the terminal 1 without forwarding through the MCU.
与在实施例一中的描述类似,终端1水印标识可以基于终端1相关信息(例如用户信息)生成,也可以基于媒体会话信息生成,或者基于终端1相关信息以及媒体会话信息生成。其中,媒体会话信息用于指示数据发送的源地址为媒体服务器1的地址或者终端1的地址;又或者媒体会话信息用于指示数据发送的目的地址为终端2的地址。Similar to the description in Embodiment 1, the terminal 1 watermark can be generated based on terminal 1 related information (eg user information), media session information, or terminal 1 related information and media session information. The media session information is used to indicate that the source address of data transmission is the address of media server 1 or the address of terminal 1; or the media session information is used to indicate that the destination address of data transmission is the address of terminal 2.
步骤S63’:该步骤为步骤S63的替换步骤,与步骤S63不同的是,在该步骤中,由会议涉及的媒体服务器生成终端1水印标识。在本申请提供的实施例中,由媒体服务器1生成了终端1水印标识,然后媒体服务器1将生成的终端1水印标识发送给了终端1。Step S63': This step is an alternative step to step S63. Different from step S63, in this step, the media server involved in the conference generates the terminal 1 watermark. In the embodiment provided in this application, the media server 1 generates the watermark identifier of the terminal 1, and then the media server 1 sends the generated watermark identifier of the terminal 1 to the terminal 1.
步骤S64:终端1向媒体服务器1发送添加了终端1水印标识的媒体数据。Step S64: The terminal 1 sends the media data to which the watermark of the terminal 1 is added to the media server 1.
在该步骤中,终端1在向媒体服务器1发送媒体数据之前,先将接收到的水印标识添加到媒体数据中然后再将媒体数据发送给媒体服务器1。终端1向媒体数据中添加水印的方式有多种,可以参考步骤S55。In this step, before sending the media data to the media server 1 , the terminal 1 first adds the received watermark identifier to the media data, and then sends the media data to the media server 1 . There are many ways for the terminal 1 to add a watermark to the media data, and reference may be made to step S55.
步骤S65:媒体服务器1接收到终端1发送的媒体数据以后,根据其中包含的终端1水印标识确定该媒体数据合法。Step S65: After receiving the media data sent by the terminal 1, the media server 1 determines that the media data is legal according to the watermark identifier of the terminal 1 contained therein.
媒体服务器1在接收到终端1的媒体数据以后,确定其中只包含一个水印标识,根据水印标识中包含的媒体会话信息以及实际的传输情况,确定该次媒体数据的传输正常。After receiving the media data of the terminal 1, the media server 1 determines that it contains only one watermark, and determines that the transmission of the media data is normal according to the media session information contained in the watermark and the actual transmission situation.
需要说明的是,该步骤为可选步骤,媒体服务器1根据步骤S61-步骤S62已经确定了终端1为会议的发送端,终端2为会议的接收端,当接收到会议发送端发送的媒体流时可以直接转发给会议接收端,无需解析媒体数据,以减少对媒体服务器计算资源的占用。It should be noted that this step is an optional step. The media server 1 has determined that the terminal 1 is the sender of the conference and the terminal 2 is the receiver of the conference according to steps S61 to S62. It can be directly forwarded to the conference receiver without parsing the media data, so as to reduce the occupation of the computing resources of the media server.
步骤S66:媒体服务器1向终端2发送来自终端1的媒体数据。Step S66 : the media server 1 sends the media data from the terminal 1 to the terminal 2 .
当用户2向组网内其他用户转发该媒体数据时,执行步骤S57-S59;当用户2向组网外的其他用户转发该媒体数据时,执行步骤S610-步骤S612。When user 2 forwards the media data to other users in the network, steps S57-S59 are performed; when user 2 forwards the media data to other users outside the network, steps S610-S612 are performed.
步骤S67:用户2向组网内其他用户泄露接收到的携带终端1水印标识的媒体数据。用户2存在多种向组网内其他用户泄露的方式:Step S67: User 2 leaks the received media data carrying the watermark of terminal 1 to other users in the network. There are multiple ways for user 2 to leak to other users in the network:
方式1:用户2在终端2上通过同一个会议系统,开启一个新的会议,将与终端1的会议画面共享给新会议的与会者。其中,同一个会议系统可以理解为同一家会议服务供应商。Mode 1: User 2 starts a new conference on terminal 2 through the same conference system, and shares the conference screen with terminal 1 to the participants of the new conference. Among them, the same conference system can be understood as the same conference service provider.
方式2:用户2在终端2上通过另一种会议系统开启一个新会议。Mode 2: User 2 starts a new conference on terminal 2 through another conference system.
方式3:用户2在终端3上通过同一个会议系统开启一个新会议。例如,当终端2为用户2的电脑时,终端3可以是用户2的手机。Mode 3: User 2 starts a new conference on terminal 3 through the same conference system. For example, when the terminal 2 is the computer of the user 2, the terminal 3 may be the mobile phone of the user 2.
方式4:用户2在终端3上通过另一种会议系统开启一个新会议。Mode 4: User 2 starts a new conference on terminal 3 through another conference system.
上述开启新会议的方法只是作为一种示例,其他任何通过媒体流形式向其他用户泄露数据的行为都在本申请保护的范围内。另外,终端3也必须处于安全组网内,例如,终端3连接了公司的Wi-Fi。The above method for opening a new conference is only an example, and any other behavior of leaking data to other users in the form of media streaming is within the scope of protection of this application. In addition, the terminal 3 must also be in a secure network. For example, the terminal 3 is connected to the company's Wi-Fi.
在方式1的情况下,假设新会议所使用的媒体服务器为媒体服务器2,终端2发起新会议时,会议调度服务器或者媒体服务器2会为终端2分发终端2水印标识。终端2水印标识包括的内容请参考步骤S63。在该种情况下,由于使用的是同一个会议系统,终端2在向外发送新会议的媒体数据时还会给该媒体数据打上终端2水印标识。也就是说,终端2向外发送的媒体数据中包括了两个水印标识(终端1水印标识、终端2水印标识)。In the case of mode 1, it is assumed that the media server used for the new conference is the media server 2. When the terminal 2 initiates a new conference, the conference scheduling server or the media server 2 will distribute the terminal 2 watermark to the terminal 2. For the content included in the watermark identifier of the terminal 2, please refer to step S63. In this case, since the same conference system is used, the terminal 2 will also mark the media data with the terminal 2 watermark when sending the media data of the new conference to the outside. That is to say, the media data sent out by the terminal 2 includes two watermark identifiers (the watermark identifier of the terminal 1 and the watermark identifier of the terminal 2).
在方式2的情况下,假设新会议所使用的媒体服务器为媒体服务器2,由于使用的不是同一个会议系统,终端2在向外发送媒体数据时不会打上自身的水印标识,也就是说,终端2向外发送的媒体数据中只包括终端1水印标识。In the case of Mode 2, it is assumed that the media server used in the new conference is Media Server 2. Since the same conference system is not used, Terminal 2 will not mark its own watermark when sending media data to the outside world, that is, The media data sent by the terminal 2 to the outside only includes the watermark of the terminal 1.
在方式3的情况下,假设新会议所使用的媒体服务器为媒体服务器2,由于使用的是同一个会议系统,终端3在建立新会议时,会议调度服务器或者媒体服务器2会向终端3发送终端3水印标识。终端3水印标识包括的内容请参考步骤S63。也就是说,在该种方式下,用户2向外泄露的媒体数据中包括两个水印标识(终端1水印标识、终端3水印标识)。In the case of mode 3, it is assumed that the media server used for the new conference is the media server 2. Since the same conference system is used, when the terminal 3 establishes a new conference, the conference scheduling server or the media server 2 will send the terminal to the terminal 3. 3 watermark logo. For the content included in the watermark of the terminal 3, please refer to step S63. That is to say, in this manner, the media data leaked by the user 2 to the outside includes two watermarks (the watermark of the terminal 1 and the watermark of the terminal 3).
在方式4的情况下,假设新会议所使用的媒体服务器为媒体服务器2,由于使用的是不同系统,终端3在向外发送媒体数据时不会打上自身的水印标识,也就是说终端3向外发送的媒体数据中只包括终端1水印标识。In the case of mode 4, it is assumed that the media server used in the new conference is media server 2. Since the media server is used in a different system, terminal 3 will not mark its own watermark when sending media data to the outside world, that is to say, terminal 3 sends media data to Only the watermark of terminal 1 is included in the media data sent outside.
步骤S68:媒体服务器2检测并识别媒体数据中的水印标识,确认该媒体数据传输异常。Step S68: The media server 2 detects and identifies the watermark in the media data, and confirms that the media data is abnormally transmitted.
媒体服务器2在接收到该非法传输的媒体数据时会检测并识别其中包含的水印,根据水印的内容来判断该次媒体数据传输是否合法。在方式1和方式3的情况下,媒体服务器2检测到媒体数据中包含两个水印标识,即可直接说明该次媒体数据的传输非法。而当媒体服务器2只检测到一个水印标识时,需要根据水印标识所包含的媒体会话信息来确定该次媒体数据传输是否合法。示例性的,在方式2的情况下,媒体服务器2检测到媒体数据中包括的终端1水印标识中媒体会话信息指示了目的地址为终端2的地址,而实际情况中该媒体数据的目的地址应该为媒体服务器2的地址,即可判断该次媒体数据的传输为非法传输。其余的情况在此不多做赘述。When receiving the illegally transmitted media data, the media server 2 will detect and identify the watermark contained therein, and judge whether the media data transmission is legal according to the content of the watermark. In the case of Mode 1 and Mode 3, if the media server 2 detects that the media data contains two watermarks, it can directly indicate that the transmission of the media data is illegal. However, when the media server 2 detects only one watermark, it needs to determine whether the media data transmission is legal or not according to the media session information contained in the watermark. Exemplarily, in the case of Mode 2, the media server 2 detects that the media session information in the watermark identifier of the terminal 1 included in the media data indicates that the destination address is the address of the terminal 2, and the destination address of the media data should be is the address of the media server 2, it can be determined that the media data transmission is illegal transmission. The rest of the situation will not be repeated here.
同步骤S58,当检测到该次媒体数据传输存在异常时,媒体服务器2会向会议调度服务器或者媒体服务器1发送告警提示。Similar to step S58, when it is detected that the media data transmission is abnormal, the media server 2 will send an alarm prompt to the conference scheduling server or the media server 1.
步骤S69:会议调度服务器接收到告警提示后指示媒体服务器1停止向终端2发送媒体数据。Step S69: After receiving the alarm prompt, the conference scheduling server instructs the media server 1 to stop sending media data to the terminal 2.
检测设备根据水印标识中所包含的信息可以确定出终端2为异常终端,检测设备在向会 议调度服务器发送的告警提示中会携带终端2的相关信息。进而会议调度服务器根据该告警提示会通知媒体服务器1终止向终端2发送新的媒体数据。The detection device can determine that the terminal 2 is an abnormal terminal according to the information contained in the watermark identifier, and the detection device will carry the relevant information of the terminal 2 in the alarm prompt sent to the conference scheduling server. Further, the conference scheduling server will notify the media server 1 to stop sending new media data to the terminal 2 according to the alarm prompt.
步骤S610:用户2向组网外的其他用户泄露接收到的携带终端1水印标识的媒体数据。Step S610: User 2 leaks the received media data carrying the watermark of terminal 1 to other users outside the network.
同步骤S67一样,用户2可能存在多种泄露途径。不管用户2采用何种方式泄露接收到的媒体数据,基于数字水印的鲁棒性,该用户的非法泄露行为都可以被检测设备(媒体服务器2)检测出来并且实时拦截。As in step S67, there may be multiple leakage paths for user 2. No matter what method the user 2 uses to leak the received media data, based on the robustness of the digital watermark, the user's illegal leaking behavior can be detected by the detection device (media server 2 ) and intercepted in real time.
步骤S611:当终端2向外发送媒体数据时,边界防火墙检测并识别媒体数据中包含的水印标识,确定该次媒体数据传输为非法传输。Step S611: When the terminal 2 sends the media data to the outside, the border firewall detects and identifies the watermark identifier contained in the media data, and determines that the media data transmission is illegal transmission.
在本申请提供的实施例中,检测设备(边界防火墙)检测到媒体数据中包含了两个水印标识即可直接确定该次媒体数据传输为非法传输。边界防火墙检测到媒体数据中只包含一个水印标识,需要基于该水印标识中的媒体会话信息以及真实的情况来判断该次媒体传输是否合法。In the embodiment provided in this application, the detection device (border firewall) can directly determine that the media data transmission is illegal transmission after detecting that the media data contains two watermarks. The border firewall detects that the media data contains only one watermark, and needs to judge whether the media transmission is legal based on the media session information in the watermark and the actual situation.
当确定该次媒体数据传输为非法传输时,边界防火墙可以向会议调度服务器发送告警提示。当边界防火墙基于水印标识的内容可以确定出终端2为异常终端时,该告警提示中可以携带终端2的相关信息。When it is determined that the media data transmission is illegal transmission, the border firewall may send an alarm prompt to the conference scheduling server. When the border firewall can determine that the terminal 2 is an abnormal terminal based on the content of the watermark identification, the alarm prompt can carry the relevant information of the terminal 2 .
步骤S612:会议调度服务器基于该告警提示控制媒体服务器1停止向终端2发送媒体数据。Step S612: The conference scheduling server controls the media server 1 to stop sending media data to the terminal 2 based on the alarm prompt.
当会议调度服务器基于该告警提示可以确定终端2为异常终端时,会议调度服务器会通知媒体服务器1终止向终端2发送新的媒体数据。When the conference scheduling server can determine that the terminal 2 is an abnormal terminal based on the alarm prompt, the conference scheduling server will notify the media server 1 to stop sending new media data to the terminal 2 .
与实施例一类似,水印标识中还可以包括机密等级。依据不同的机密等级,不同的检测设备会采取不同的策略。例如,当水印标识中携带了信息指示该媒体数据的机密等级为内部公开时,处于组网内的媒体服务器2在接收到该媒体数据时,将不会拦截该媒体数据;而处于组网边界的防火墙将会拦截该媒体数据,最终确保该媒体数据的公开范围为内部公开。Similar to the first embodiment, the watermark identification may also include a confidentiality level. According to different confidentiality levels, different detection equipment will adopt different strategies. For example, when the watermark identifier carries information indicating that the confidentiality level of the media data is internal disclosure, the media server 2 in the network will not intercept the media data when it receives the media data; The firewall will intercept the media data, and ultimately ensure that the media data's disclosure scope is internal disclosure.
上述实施例中,终端在发送媒体数据时就会给该媒体数据打上水印标识,当后续该媒体数据被泄露时,检测设备可以根据水印标识的内容来判断媒体数据的传输是否合法,保证了数据通信的安全性。In the above embodiment, the terminal will mark the media data with a watermark when sending the media data. When the media data is subsequently leaked, the detection device can judge whether the transmission of the media data is legal according to the content of the watermark, which ensures the data. Security of communications.
实施例三:终端1与终端2进行会议通信,终端1作为会议发送端,终端2作为会议接收端,终端1对应的使用者为用户1,终端2对应的使用者为用户2。终端1与终端2处于两个不同的安全组网内(参考图2),水印标识可以由靠近接收端的媒体服务器(媒体服务器21)添加也可以由靠近发送端的媒体服务器(媒体服务器11)添加。为了简化流程,在本实施例中,默认防火墙只检测流向组网外的媒体流。下面将介绍具体的检测信息泄露的方法。Embodiment 3: Terminal 1 and Terminal 2 perform conference communication, Terminal 1 serves as a conference sender, and Terminal 2 serves as a conference receiver. The user corresponding to Terminal 1 is User 1, and the user corresponding to Terminal 2 is User 2. Terminal 1 and Terminal 2 are in two different security networks (refer to Figure 2), and the watermark can be added by the media server (media server 21) close to the receiving end or by the media server (media server 11) close to the sending end. In order to simplify the process, in this embodiment, the default firewall only detects media streams that flow outside the network. The following will introduce a specific method for detecting information leakage.
步骤S71-S72:参考步骤S51-步骤S52,该步骤主要用于会议调度服务器为该会议分配媒体服务器。在本实施例中,媒体服务器11以及媒体服务器21为会议调度服务器为会议分配的媒体服务器。Steps S71-S72: refer to steps S51-S52, this step is mainly used by the conference scheduling server to allocate a media server for the conference. In this embodiment, the media server 11 and the media server 21 are media servers allocated by the conference scheduling server for the conference.
步骤S73:媒体服务器21接收会议调度服务器生成的终端2水印标识,或者媒体服务器21直接生成终端2水印标识。Step S73: The media server 21 receives the terminal 2 watermark identifier generated by the conference scheduling server, or the media server 21 directly generates the terminal 2 watermark identifier.
与步骤S53类似,终端2水印标识可以包括终端2相关信息(例如用户信息),或者终端2水印标识可以包括媒体会话信息,又或者,终端2水印标识可以包括终端2相关信息以及媒体会话信息。其中,媒体会话信息用于指示,该媒体数据的目的地址为终端2的地址。 又或者,当水印标识为媒体服务器11添加时,媒体会话信息用于指示该媒体数据的源地址为终端1的地址或媒体服务器11的地址;当水印标识为媒体服务器21添加时,媒体会话信息用于指示该媒体数据的源地址为终端1的地址、媒体服务器11的地址或者媒体服务器21的地址。Similar to step S53, the terminal 2 watermark identifier may include terminal 2 related information (eg user information), or the terminal 2 watermark identifier may include media session information, or the terminal 2 watermark identifier may include terminal 2 related information and media session information. The media session information is used to indicate that the destination address of the media data is the address of the terminal 2 . Or, when the watermark is identified as being added by the media server 11, the media session information is used to indicate that the source address of the media data is the address of the terminal 1 or the address of the media server 11; when the watermark is identified as being added by the media server 21, the media session information The source address used to indicate the media data is the address of the terminal 1 , the address of the media server 11 or the address of the media server 21 .
步骤S74:终端1依次经过媒体服务器11、防火墙1、防火墙2向媒体服务器21发送媒体数据。Step S74: The terminal 1 sends media data to the media server 21 through the media server 11, the firewall 1, and the firewall 2 in sequence.
步骤S75:媒体服务器21接收到从媒体服务器11发来的媒体数据以后,向其中添加终端2水印标识。添加水印标识的方式可参考步骤S55。Step S75: After the media server 21 receives the media data sent from the media server 11, it adds the watermark of the terminal 2 to the media data. For the method of adding a watermark, reference may be made to step S55.
步骤S76:媒体服务器21向终端2发送携带终端2水印标识的媒体数据。Step S76: The media server 21 sends the media data carrying the watermark identifier of the terminal 2 to the terminal 2.
当用户2向组网内其他用户转发该媒体数据时,执行步骤S77-S79;当用户2向组网外的其他用户转发该媒体数据时,执行步骤S710-步骤S712。When user 2 forwards the media data to other users in the network, steps S77-S79 are performed; when user 2 forwards the media data to other users outside the network, steps S710-S712 are performed.
步骤S77:用户2向组网内的其他用户泄露接收到的携带终端2水印标识的媒体数据。Step S77: The user 2 leaks the received media data carrying the watermark identifier of the terminal 2 to other users in the network.
步骤S78:媒体服务器22接收用户2向其他用户泄露的媒体数据,根据该媒体数据中的水印标识来确定该次媒体数据传输不合法。其中,媒体服务器22为用户2向内网中其他用户发送媒体数据时所经过的媒体服务器。与实施例一类似,确定该次媒体传输不合法的方式有多种,当检测到水印标识时可以直接确定该次媒体传输不合法;又或者,为了提高检测的准确率可以基于水印标识中的媒体会话信息以及真实传输情况来确定该次媒体数据的传输是否合法。Step S78: The media server 22 receives the media data leaked by the user 2 to other users, and determines that the media data transmission is illegal according to the watermark identifier in the media data. The media server 22 is the media server through which the user 2 sends media data to other users in the intranet. Similar to Embodiment 1, there are many ways to determine that the media transmission is illegal. When the watermark is detected, it can be directly determined that the media transmission is illegal; The media session information and the actual transmission situation are used to determine whether the media data transmission is legal.
步骤S79:媒体服务器22向会议调度服务器发送告警提示。当终端2水印标识中包括媒体服务器21的地址时,媒体服务器22也可以直接向媒体服务器21发送告警提示。进一步的,水印标识中还包括终端2相关信息,媒体服务器22可以确定终端2为异常终端。进而告警提示中可以携带终端2的相关信息,以通知媒体服务22停止向终端2发送新的媒体数据。Step S79: The media server 22 sends an alarm prompt to the conference scheduling server. When the address of the media server 21 is included in the watermark identifier of the terminal 2 , the media server 22 may also directly send an alarm prompt to the media server 21 . Further, the watermark identifier also includes information about the terminal 2, and the media server 22 can determine that the terminal 2 is an abnormal terminal. Furthermore, the relevant information of the terminal 2 may be carried in the alarm prompt to notify the media service 22 to stop sending new media data to the terminal 2 .
步骤S710:用户2向组网外的其他用户泄露接收到的携带终端2水印标识的媒体数据。多种泄露途径可参考步骤S510。Step S710: The user 2 leaks the received media data carrying the watermark identifier of the terminal 2 to other users outside the network. For various leakage paths, please refer to step S510.
步骤S711:边界防火墙2检测到接收的媒体数据中包括水印标识,确定该次媒体数据传输存在异常。Step S711: The border firewall 2 detects that the received media data includes a watermark, and determines that the media data transmission is abnormal.
当用户2通过各种途径向组往外发送媒体数据时,边界防火墙2会检测到其中的水印标识,进而确定该发送行为非法。进一步的,为了提高检测的准确率,还会基于水印标识中所包含的内容来判断该发送行为是否非法。具体的判断过程请参考步骤S511。When the user 2 sends media data to the group through various channels, the border firewall 2 will detect the watermark in it, and then determine that the sending behavior is illegal. Further, in order to improve the detection accuracy, it is also determined whether the sending behavior is illegal based on the content contained in the watermark identifier. For the specific determination process, please refer to step S511.
步骤S712:边界防火墙2向会议调度服务器发送告警提示。当水印标识中还包括媒体服务器21时,边界防火墙2可以直接向媒体服务器21发送告警提示。进一步的,当水印标识中包括终端2相关信息时,边界防火墙可以直接确定终端2为异常终端,进而可以通知媒体服务器21停止向终端2发送新的媒体数据。Step S712: The border firewall 2 sends an alarm prompt to the conference scheduling server. When the media server 21 is also included in the watermark identifier, the border firewall 2 may directly send an alarm prompt to the media server 21 . Further, when the watermark identifier includes information about the terminal 2, the border firewall can directly determine that the terminal 2 is an abnormal terminal, and then can notify the media server 21 to stop sending new media data to the terminal 2.
实施例三与实施例一的区别仅仅在于终端1和终端2是否在同一个安全组网内,因为处于不同的组网,所以终端1向终端2发送媒体数据时的转发路径不相同。但是检测媒体数据的思路是一样的。为了监测终端2的非法泄露行为,终端2需要处于安全组网内,或者说,终端2需要处于一个被监控的网络环境内。The difference between the third embodiment and the first embodiment is only whether the terminal 1 and the terminal 2 are in the same security network. Because they are in different networks, the forwarding paths when the terminal 1 sends the media data to the terminal 2 are different. But the idea of detecting media data is the same. In order to monitor the illegal leakage behavior of the terminal 2, the terminal 2 needs to be in a secure network, or in other words, the terminal 2 needs to be in a monitored network environment.
对于系统架构2(图2),实施例三仅以媒体服务器添加水印标识为例,当水印标识为终端设备添加时,请参考系统架构2以及实施例二。For the system architecture 2 (FIG. 2), the third embodiment only takes the media server adding the watermark as an example. When the watermark is added by the terminal device, please refer to the system architecture 2 and the second embodiment.
实施例四:终端1与终端2进行会议通信,终端1作为会议发送端,终端2作为会议接收端,终端1对应的使用者为用户1,终端2对应的使用者为用户2。终端1处于安全组网外,终端2处于安全组网内(参考图3),水印标识可以由靠近接收端的媒体服务器(媒体服务器4)也可以由靠近发送的媒体服务器(媒体服务器3)添加。在本实施例中,默认防火墙只检测流向组网外的媒体数据。Embodiment 4: Terminal 1 and Terminal 2 perform conference communication, Terminal 1 serves as a conference sending end, Terminal 2 serves as a conference receiving end, the user corresponding to Terminal 1 is User 1, and the user corresponding to Terminal 2 is User 2. Terminal 1 is outside the security network, and Terminal 2 is within the security network (refer to Figure 3). The watermark can be added by the media server (media server 4) close to the receiving end or by the media server (media server 3) close to the sending end. In this embodiment, the default firewall only detects media data that flows outside the network.
在这样的情况下,水印标识可以包括终端2相关信息,或者,水印标识可以包括媒体会话信息,又或者,水印标识可以包括终端2相关信息和媒体会话信息。其中,媒体会话信息用于指示该媒体数据的目的地址为终端2的地址。当水印标识由媒体服务器3添加时,媒体会话信息还用于指示该媒体数据的源地址为终端1的地址或者媒体服务器3的地址;当水印标识由媒体服务器4添加时,媒体会话信息还用于指示该媒体数据的源地址为终端1的地址、媒体服务器3的地址或者媒体服务器4的地址。在这样的情况下,才可以使得终端1顺利将媒体数据发送给终端2,然后终端2再向外泄露该媒体数据时可以被检测设备拦截。In this case, the watermark identifier may include terminal 2 related information, or the watermark identifier may include media session information, or the watermark identifier may include terminal 2 related information and media session information. The media session information is used to indicate that the destination address of the media data is the address of the terminal 2 . When the watermark is added by the media server 3, the media session information is also used to indicate that the source address of the media data is the address of the terminal 1 or the address of the media server 3; when the watermark is added by the media server 4, the media session information is also used for to indicate that the source address of the media data is the address of the terminal 1, the address of the media server 3 or the address of the media server 4. Only in this case can the terminal 1 successfully send the media data to the terminal 2, and then the terminal 2 can be intercepted by the detection device when it leaks the media data to the outside.
实施例四与实施例三或实施例一的区别主要在于系统架构,但是检测媒体数据传输是否合法的思路是一致的。The difference between the fourth embodiment and the third embodiment or the first embodiment mainly lies in the system architecture, but the idea of detecting whether the media data transmission is legal is the same.
对于系统架构3(图3),实施例四仅以媒体服务器添加水印标识为例,当水印标识为终端设备添加时,请参考系统架构3以及实施例二。For the system architecture 3 (FIG. 3), the fourth embodiment only takes the media server adding a watermark as an example. When the watermark is added by a terminal device, please refer to the system architecture 3 and the second embodiment.
上述所有的实施例均以终端2在接收到合法传输的媒体数据之前就添加了水印为例,而在另一种可能的实现方式中,水印标识在终端2向外转发时由终端2添加水印标识。示例性的,会议系统可以为用户提供一键转发或者一键共享的功能。在这样的情况下,当终端2接收到了终端1发送的媒体数据(此时该媒体数据中不含水印标识)以后再通过一键转发功能向外转发时再添加终端2水印标识,该水印标识可以包括终端2的用户信息或者终端2的网络地址,或者机密等级。检测设备当接收到终端2发送的媒体数据时,基于水印标识的内容判断该次媒体数据的传输是否合法。All the above embodiments take the terminal 2 adding a watermark before receiving the legally transmitted media data as an example, and in another possible implementation manner, the watermark is added by the terminal 2 when the terminal 2 forwards the watermark to the outside. logo. Exemplarily, the conference system may provide the user with a one-click forwarding or one-click sharing function. In this case, when the terminal 2 receives the media data sent by the terminal 1 (the media data does not contain a watermark identifier at this time) and then forwards it to the outside through the one-key forwarding function, the terminal 2 watermark identifier is added. The watermark identifier It may include user information of the terminal 2 or a network address of the terminal 2, or a confidentiality level. When receiving the media data sent by the terminal 2, the detection device judges whether the transmission of the media data is legal based on the content of the watermark identification.
本发明另一实施例,检测设备可以检测终端2发送的媒体数据是否包含权限信息以判断终端2发送媒体数据的行为是否合法。例如,权限信息可以为转发权限等。当媒体数据中不包含权限信息,则认为终端2发送媒体数据的行为不合法。In another embodiment of the present invention, the detection device can detect whether the media data sent by the terminal 2 contains permission information to determine whether the behavior of the terminal 2 to send the media data is legal. For example, the permission information may be forwarding permission or the like. When the media data does not contain permission information, it is considered that the behavior of the terminal 2 to send the media data is illegal.
上文结合了图1-6介绍了检测媒体数据的方法,下面将结合图7-8介绍用于执行上述方法的装置及设备。The method for detecting media data is described above with reference to FIGS. 1-6 , and the apparatus and device for performing the above method will be described below with reference to FIGS. 7-8 .
本申请实施例提供一种检测媒体数据的装置700,该装置包括通信模块710和处理模块711,其中,通信模块710用于,接收第一终端发送的第一媒体数据,所述第一媒体数据包含第一特征信息;处理模块711用于,根据所述第一特征信息确定所述第一终端发送所述第一媒体数据是否合法。An embodiment of the present application provides an apparatus 700 for detecting media data, the apparatus includes a communication module 710 and a processing module 711, wherein the communication module 710 is configured to receive first media data sent by a first terminal, the first media data It includes first feature information; the processing module 711 is configured to determine, according to the first feature information, whether the first media data sent by the first terminal is legal.
可选的,所述第一终端发送的第一媒体数据是由第二终端通过第一媒体服务器发送给所述第一终端的。在该种情况下,第一终端为会议接收端,对应着实施例一、二、三、四中的终端2,第二终端为会议发送端,对应着实施例一、二、三、四中的终端1。Optionally, the first media data sent by the first terminal is sent by the second terminal to the first terminal through the first media server. In this case, the first terminal is the conference receiving end, corresponding to the terminal 2 in the first, second, third, and fourth embodiments, and the second terminal is the conference sending end, corresponding to the first, second, third, and fourth embodiments. terminal 1.
可选的,所述第一特征信息是由所述第一媒体服务器添加的。Optionally, the first feature information is added by the first media server.
可选的,所述第一特征信息是由所述第二终端添加的。Optionally, the first feature information is added by the second terminal.
可选的,所述第一特征信息包括合法发送者信息或者合法接收者信息。Optionally, the first feature information includes legal sender information or legal receiver information.
可选的,所述第一特征信息包括所述合法发送者信息,所述合法发送者信息包括所述第一媒体服务器信息,所述通信模块710还用于:当根据所述第一特征信息确定所述第一终端 发送所述第一媒体数据非法时,根据所述第一特征信息向所述第一媒体服务器发送第一告警信息。Optionally, the first feature information includes the legal sender information, the legal sender information includes the first media server information, and the communication module 710 is further configured to: when according to the first feature information When it is determined that the first media data sent by the first terminal is illegal, first alarm information is sent to the first media server according to the first feature information.
可选的,所述第一特征信息包括所述合法发送者信息和所述合法接收者信息,所述合法发送者信息包括所述第一媒体服务器信息,所述通信模块710还用于:当根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,根据所述第一特征信息向所述第一媒体服务器发送第二告警信息,所述第二告警信息用于指示所述第一终端为异常终端。Optionally, the first feature information includes the legal sender information and the legal receiver information, the legal sender information includes the first media server information, and the communication module 710 is further configured to: when When it is determined that the first media data sent by the first terminal is illegal according to the first feature information, second alarm information is sent to the first media server according to the first feature information, and the second alarm information uses for indicating that the first terminal is an abnormal terminal.
可选的,所述第一特征信息包括所述合法发送者信息和所述合法接收者信息,所述合法发送者信息包括所述第一媒体服务器信息,所述通信模块710还用于:当根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,根据所述第一特征信息指示所述第一媒体服务器停止向所述第一终端发送第二媒体数据。Optionally, the first feature information includes the legal sender information and the legal receiver information, the legal sender information includes the first media server information, and the communication module 710 is further configured to: when When it is determined according to the first feature information that the first media data sent by the first terminal is illegal, the first media server is instructed to stop sending the second media data to the first terminal according to the first feature information.
可选的,通信模块710还用于:接收第一终端向第三终端发送的第一媒体数据,所述第三终端与所述第一终端通过所述装置通信。Optionally, the communication module 710 is further configured to: receive first media data sent by the first terminal to a third terminal, where the third terminal communicates with the first terminal through the apparatus.
可选的,检测媒体数据的装置700可以为所述第一媒体服务器,或者所述装置为第二媒体服务器,所述第二媒体服务器与所述第一媒体服务器不同,或者,所述装置为防火墙,或者所述装置为媒体代理网关。Optionally, the apparatus 700 for detecting media data may be the first media server, or the apparatus may be a second media server, and the second media server is different from the first media server, or the apparatus may be Firewall, or the device is a media proxy gateway.
可选的,所述第一媒体数据是由所述第一终端根据第四终端接收的第三媒体数据生成的,所述第三媒体数据包含所述第一特征信息。在该种情况下,第四终端为会议接收端,第一终端通过各种途径将第四终端接收的数据泄露出去,检测设备可以基于数据中包括的特征信息对该行为进行检测,当确定该行为非法时,可以实时拦截该数据的发送。Optionally, the first media data is generated by the first terminal according to third media data received by the fourth terminal, where the third media data includes the first feature information. In this case, the fourth terminal is the conference receiving terminal, the first terminal leaks the data received by the fourth terminal through various channels, and the detection device can detect the behavior based on the feature information included in the data. When the behavior is illegal, the transmission of the data can be intercepted in real time.
可选的,第一媒体数据包括数字签名,所述数字签名用于确定所述第一媒体数据未被篡改。Optionally, the first media data includes a digital signature, and the digital signature is used to determine that the first media data has not been tampered with.
图8为本申请实施例提供的一种媒体数据检测的设备80,如图所示,所述设备80包括处理器81、存储器82、通信接口83。其中,处理器81、存储器82、通信接口83通过有线或者无线传输等手段实现通信连接。该存储器82用于存储指令,该处理器81用于执行该指令。该存储器82存储程序指令,且处理器81可以调用存储器82中存储的程序指令执行以下操作:FIG. 8 is a device 80 for detecting media data provided by an embodiment of the present application. As shown in the figure, the device 80 includes a processor 81 , a memory 82 , and a communication interface 83 . Among them, the processor 81, the memory 82, and the communication interface 83 realize the communication connection by means such as wired or wireless transmission. The memory 82 is used to store instructions, and the processor 81 is used to execute the instructions. The memory 82 stores program instructions, and the processor 81 can invoke the program instructions stored in the memory 82 to perform the following operations:
接收第一终端发送的第一媒体数据,所述第一媒体数据包含第一特征信息;根据所述第一特征信息确定所述第一终端发送所述第一媒体数据是否合法。Receive first media data sent by a first terminal, where the first media data includes first feature information; and determine whether the first media data sent by the first terminal is legal according to the first feature information.
可选的,该处理器81运行所述程序指令还用于完成:Optionally, the processor 81 executes the program instructions to complete:
当根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,根据所述第一特征信息向所述第一媒体服务器发送第一告警信息。When it is determined according to the first feature information that the first media data sent by the first terminal is illegal, first alarm information is sent to the first media server according to the first feature information.
可选的,该处理器81运行所述程序指令还用于完成:Optionally, the processor 81 executes the program instructions to complete:
当根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,根据所述第一特征信息向所述第一媒体服务器发送第二告警信息,所述第二告警信息用于指示所述第一终端为异常终端。When it is determined according to the first feature information that the first media data sent by the first terminal is illegal, send second alarm information to the first media server according to the first feature information, the second alarm information It is used to indicate that the first terminal is an abnormal terminal.
可选的,该处理器81运行所述程序指令还用于完成:Optionally, the processor 81 executes the program instructions to complete:
当根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,根据所述第一特征信息指示所述第一媒体服务器停止向所述第一终端发送第二媒体数据。When it is determined according to the first feature information that the first media data sent by the first terminal is illegal, instruct the first media server to stop sending the second media data to the first terminal according to the first feature information .
应理解,在本申请实施例中,该处理器81可以是CPU,或者其他可执行存储的程序指令的通用处理器。该存储器82可以包括只读存储器和随机存取存储器,并向处理器81提供指令和数据。存储器82还可以包括非易失性随机存取存储器。例如,存储器82还可以存储设 备类型的信息。该存储器82可以是易失性存储器或非易失性存储器,或可包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(read-only memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(random access memory,RAM)。通过示例性但不是限制性说明,许多形式的RAM可用,例如动态随机存取存储器(DRAM)、同步动态随机存取存储器(synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(double data date SDRAM,DDR SDRAM)、增强型同步动态随机存取存储器(enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(synchlink DRAM,SLDRAM)和直接内存总线随机存取存储器(direct rambus RAM,DR RAM)。该总线94除包括数据总线之外,还可以包括电源总线、控制总线和状态信号总线等。但是为了清楚说明起见,在图中将各种总线都标为总线84。It should be understood that, in this embodiment of the present application, the processor 81 may be a CPU, or other general-purpose processors that can execute stored program instructions. The memory 82 , which may include read-only memory and random access memory, provides instructions and data to the processor 81 . Memory 82 may also include non-volatile random access memory. For example, memory 82 may also store device type information. The memory 82 may be volatile memory or non-volatile memory, or may include both volatile and non-volatile memory. Among them, the non-volatile memory may be read-only memory (ROM), programmable read-only memory (PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically programmable Erase programmable read-only memory (electrically EPROM, EEPROM) or flash memory. Volatile memory may be random access memory (RAM). By way of example and not limitation, many forms of RAM are available, such as dynamic random access memory (DRAM), synchronous dynamic random access memory (SDRAM), double data rate synchronous dynamic random access memory (double data date SDRAM, DDR SDRAM), enhanced synchronous dynamic random access memory (enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (synchlink DRAM, SLDRAM) and direct memory bus random access memory (direct rambus RAM, DR RAM). In addition to the data bus, the bus 94 may also include a power bus, a control bus, a status signal bus, and the like. However, for the sake of clarity, the various buses are designated as bus 84 in the figure.
上述实施例,可以全部或部分地通过软件、硬件、固件或其他任意组合来实现。当使用软件实现时,上述实施例可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个程序指令。在计算机上加载或执行所述程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以为通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集合的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质。半导体介质可以是固态硬盘(solid state drive,SSD)。The above embodiments may be implemented in whole or in part by software, hardware, firmware or any other combination. When implemented in software, the above-described embodiments may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more program instructions. When the program instructions are loaded or executed on a computer, all or part of the processes or functions described in the embodiments of the present application are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server, or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, or the like that contains one or more sets of available media. The usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVDs), or semiconductor media. The semiconductor medium may be a solid state drive (SSD).
以上所述,仅为本申请的具体实施方式。熟悉本技术领域的技术人员根据本申请提供的具体实施方式,可想到变化或替换,都应涵盖在本申请的保护范围之内。The above descriptions are merely specific embodiments of the present application. Those skilled in the art can think of changes or substitutions based on the specific embodiments provided by the present application, which should all fall within the protection scope of the present application.

Claims (28)

  1. 一种检测媒体数据的方法,其特征在于,所述方法包括:A method for detecting media data, characterized in that the method comprises:
    检测设备接收第一终端发送的第一媒体数据,所述第一媒体数据包含第一特征信息;The detection device receives first media data sent by the first terminal, where the first media data includes first feature information;
    所述检测设备根据所述第一特征信息确定所述第一终端发送所述第一媒体数据是否合法。The detection device determines, according to the first feature information, whether the first media data sent by the first terminal is legal.
  2. 根据权利要求1所述的方法,其特征在于,所述第一终端发送的第一媒体数据是由第二终端通过第一媒体服务器发送给所述第一终端的。The method according to claim 1, wherein the first media data sent by the first terminal is sent by the second terminal to the first terminal through a first media server.
  3. 根据权利要求2所述的方法,其特征在于,所述第一特征信息是由所述第一媒体服务器添加的。The method according to claim 2, wherein the first characteristic information is added by the first media server.
  4. 根据权利要求2所述的方法,其特征在于,所述第一特征信息是由所述第二终端添加的。The method according to claim 2, wherein the first characteristic information is added by the second terminal.
  5. 根据权利要求1-4任一所述的方法,其特征在于,所述第一特征信息包括合法发送者信息和/或合法接收者信息。The method according to any one of claims 1-4, wherein the first characteristic information includes legal sender information and/or legal receiver information.
  6. 根据权利要求5所述的方法,其特征在于,所述合法接收者信息包括第一终端信息,所述合法发送者信息包括第二终端信息或者第一媒体服务器信息。The method according to claim 5, wherein the legal recipient information includes first terminal information, and the legal sender information includes second terminal information or first media server information.
  7. 根据权利要求6所述的方法,其特征在于,所述第一特征信息包括所述合法发送者信息,所述合法发送者信息包括所述第一媒体服务器信息,所述方法还包括:The method according to claim 6, wherein the first characteristic information comprises the legal sender information, the legal sender information comprises the first media server information, and the method further comprises:
    当所述检测设备根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,所述检测设备根据所述第一特征信息向所述第一媒体服务器发送第一告警信息。When the detection device determines according to the first feature information that the first media data sent by the first terminal is illegal, the detection device sends a first alarm to the first media server according to the first feature information information.
  8. 根据权利要求6所述的方法,其特征在于,所述第一特征信息包括所述合法发送者信息和所述合法接收者信息,所述合法发送者信息包括所述第一媒体服务器信息,所述方法还包括:The method according to claim 6, wherein the first characteristic information comprises the legal sender information and the legal receiver information, the legal sender information comprises the first media server information, and the The method also includes:
    当所述检测设备根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,所述检测设备根据所述第一特征信息向所述第一媒体服务器发送第二告警信息,所述第二告警信息用于指示所述第一终端为异常终端。When the detection device determines according to the first feature information that the first media data sent by the first terminal is illegal, the detection device sends a second alarm to the first media server according to the first feature information information, the second alarm information is used to indicate that the first terminal is an abnormal terminal.
  9. 根据权利要求6所述的方法,其特征在于,所述第一特征信息包括所述合法发送者信息和所述合法接收者信息,所述合法发送者信息包括所述第一媒体服务器信息,所述方法还包括:The method according to claim 6, wherein the first characteristic information comprises the legal sender information and the legal receiver information, the legal sender information comprises the first media server information, and the The method also includes:
    当所述检测设备根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,所述检测设备根据所述第一特征信息指示所述第一媒体服务器停止向所述第一终端发送第二媒体数据。When the detection device determines according to the first feature information that the first media data sent by the first terminal is illegal, the detection device instructs the first media server to stop sending data to the first media server according to the first feature information The first terminal sends the second media data.
  10. 根据权利要求1-9任一所述的方法,其特征在于,所述检测设备接收第一终端发送的第一媒体数据,具体包括:The method according to any one of claims 1-9, wherein the detection device receiving the first media data sent by the first terminal specifically includes:
    所述检测设备接收第一终端向第三终端发送的第一媒体数据,所述第三终端与所述第一终端通过所述检测设备通信。The detection device receives first media data sent by the first terminal to a third terminal, and the third terminal communicates with the first terminal through the detection device.
  11. 根据权利要求1-10任一所述的方法,其特征在于,所述检测设备为所述第一媒体服务器,或者,所述检测设备为第二媒体服务器,所述第二媒体服务器与所述第一媒体服务器不同,或者,所述检测设备为防火墙,或者,所述检测设备为媒体代理网关。The method according to any one of claims 1-10, wherein the detection device is the first media server, or the detection device is a second media server, and the second media server and the The first media servers are different, or the detection device is a firewall, or the detection device is a media proxy gateway.
  12. 根据权利要求1所述的方法,其特征在于,所述第一媒体数据是由所述第一终端根据第四终端接收的第三媒体数据生成的,所述第三媒体数据包含所述第一特征信息。The method according to claim 1, wherein the first media data is generated by the first terminal according to third media data received by a fourth terminal, and the third media data includes the first media data. characteristic information.
  13. 根据权利要求1-12任一所述的方法,其特征在于,所述第一媒体数据包括数字签名,所述数字签名用于确定所述第一媒体数据未被篡改。The method according to any one of claims 1-12, wherein the first media data includes a digital signature, and the digital signature is used to determine that the first media data has not been tampered with.
  14. 一种检测媒体数据的装置,其特征在于,所述装置包括通信模块和处理模块:A device for detecting media data, characterized in that the device comprises a communication module and a processing module:
    所述通信模块用于,接收第一终端发送的第一媒体数据,所述第一媒体数据包含第一特征信息;The communication module is configured to receive first media data sent by a first terminal, where the first media data includes first feature information;
    所述处理模块用于,根据所述第一特征信息确定所述第一终端发送所述第一媒体数据是否合法。The processing module is configured to determine, according to the first feature information, whether the first media data sent by the first terminal is legal.
  15. 根据权利要求14所述的装置,其特征在于,所述第一终端发送的第一媒体数据是由第二终端通过第一媒体服务器发送给所述第一终端的。The apparatus according to claim 14, wherein the first media data sent by the first terminal is sent by the second terminal to the first terminal through a first media server.
  16. 根据权利要求15所述的装置,其特征在于,所述第一特征信息是由所述第一媒体服务器添加的。The apparatus according to claim 15, wherein the first characteristic information is added by the first media server.
  17. 根据权利要求15所述的装置,其特征在于,所述第一特征信息是由所述第二终端添加的。The apparatus according to claim 15, wherein the first characteristic information is added by the second terminal.
  18. 根据权利要求14-17任一所述的装置,其特征在于,所述第一特征信息包括合法发送者信息和/或合法接收者信息。The apparatus according to any one of claims 14-17, wherein the first characteristic information includes legal sender information and/or legal receiver information.
  19. 根据权利要求18所述的装置,其特征在于,所述合法接收者信息包括第一终端信息,所述合法发送者信息包括第二终端信息或者第一媒体服务器信息。The apparatus according to claim 18, wherein the legal recipient information includes first terminal information, and the legal sender information includes second terminal information or first media server information.
  20. 根据权利要求19所述的装置,其特征在于,所述第一特征信息包括所述合法发送者信息,所述合法发送者信息包括所述第一媒体服务器信息,所述通信模块还用于:The apparatus according to claim 19, wherein the first characteristic information comprises the legal sender information, the legal sender information comprises the first media server information, and the communication module is further configured to:
    当根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,根据所述第一特征信息向所述第一媒体服务器发送第一告警信息。When it is determined according to the first feature information that the first media data sent by the first terminal is illegal, first alarm information is sent to the first media server according to the first feature information.
  21. 根据权利要求19所述的装置,其特征在于,所述第一特征信息包括所述合法发送者信息和所述合法接收者信息,所述合法发送者信息包括所述第一媒体服务器信息,所述通信模块还用于:The apparatus according to claim 19, wherein the first characteristic information comprises the legal sender information and the legal receiver information, the legal sender information comprises the first media server information, and the The communication module described above is also used to:
    当根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,根据所述第一特征信息向所述第一媒体服务器发送第二告警信息,所述第二告警信息用于指示所述第一终端为异常终端。When it is determined according to the first feature information that the first media data sent by the first terminal is illegal, send second alarm information to the first media server according to the first feature information, the second alarm information It is used to indicate that the first terminal is an abnormal terminal.
  22. 根据权利要求19所述的装置,其特征在于,所述第一特征信息包括所述合法发送者信息和所述合法接收者信息,所述合法发送者信息包括所述第一媒体服务器信息,所述通信模块还用于:The apparatus according to claim 19, wherein the first characteristic information comprises the legal sender information and the legal receiver information, the legal sender information comprises the first media server information, and the The communication module described above is also used to:
    当根据所述第一特征信息确定所述第一终端发送所述第一媒体数据非法时,根据所述第一特征信息指示所述第一媒体服务器停止向所述第一终端发送第二媒体数据。When it is determined according to the first feature information that the first media data sent by the first terminal is illegal, instruct the first media server to stop sending the second media data to the first terminal according to the first feature information .
  23. 根据权利要求14-22任一所述的装置,其特征在于,所述通信模块还用于:The device according to any one of claims 14-22, wherein the communication module is further configured to:
    接收第一终端向第三终端发送的第一媒体数据,所述第三终端与所述第一终端通过所述装置通信。Receive first media data sent by the first terminal to a third terminal, where the third terminal communicates with the first terminal through the device.
  24. 根据权利要求14-23任一所述的装置,其特征在于,所述装置为所述第一媒体服务器,或者,所述装置为第二媒体服务器,所述第二媒体服务器与所述第一媒体服务器不同,或者,所述装置为防火墙,或者,所述装置为媒体代理网关。The device according to any one of claims 14-23, wherein the device is the first media server, or the device is a second media server, the second media server and the first media server The media servers are different, or the device is a firewall, or the device is a media proxy gateway.
  25. 根据权利要求14所述的装置,其特征在于,所述第一媒体数据是由所述第一终端根据第四终端接收的第三媒体数据生成的,所述第三媒体数据包含所述第一特征信息。The apparatus according to claim 14, wherein the first media data is generated by the first terminal according to third media data received by a fourth terminal, and the third media data includes the first media data. characteristic information.
  26. 根据权利要求14-25任一所述的装置,其特征在于,所述第一媒体数据包括数字签名,所述数字签名用于确定所述第一媒体数据未被篡改。The apparatus according to any one of claims 14-25, wherein the first media data includes a digital signature, and the digital signature is used to determine that the first media data has not been tampered with.
  27. 一种检测媒体数据的设备,所述设备包括处理器和存储器,所述存储器存储有计算机指令,所述处理器执行所述存储器中的计算机指令以实现权利要求1-13中任一项所述的方法。A device for detecting media data, the device includes a processor and a memory, the memory stores computer instructions, the processor executes the computer instructions in the memory to implement any one of claims 1-13. Methods.
  28. 一种计算机可读存储介质,所述计算机可读存储介质中存储有程序指令,当所述程序指令在计算机上运行时,使得所述计算机执行如权利要求1-13任一所述的方法。A computer-readable storage medium, storing program instructions in the computer-readable storage medium, when the program instructions are executed on a computer, the computer can execute the method according to any one of claims 1-13.
PCT/CN2021/139416 2020-12-21 2021-12-18 Method and apparatus for detecting media data WO2022135308A1 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN202011514088.0 2020-12-21
CN202011514088 2020-12-21
CN202011620230.X 2020-12-30
CN202011620230.XA CN114650275A (en) 2020-12-21 2020-12-30 Method and device for detecting media data

Publications (1)

Publication Number Publication Date
WO2022135308A1 true WO2022135308A1 (en) 2022-06-30

Family

ID=81991807

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/139416 WO2022135308A1 (en) 2020-12-21 2021-12-18 Method and apparatus for detecting media data

Country Status (2)

Country Link
CN (1) CN114650275A (en)
WO (1) WO2022135308A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116488943A (en) * 2023-06-19 2023-07-25 杭州海康威视数字技术股份有限公司 Multimedia data leakage tracing detection method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242516A (en) * 2006-12-30 2008-08-13 法国电信公司 Coding for protecting multimedia preview and method for protecting and recovering multimedia data in multimedia broadcast, corresponding code, protection and receiving device
CN107483422A (en) * 2017-08-03 2017-12-15 深信服科技股份有限公司 Leakage of data retroactive method, equipment and computer-readable recording medium
CN108289254A (en) * 2018-01-30 2018-07-17 北京小米移动软件有限公司 Web conference information processing method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242516A (en) * 2006-12-30 2008-08-13 法国电信公司 Coding for protecting multimedia preview and method for protecting and recovering multimedia data in multimedia broadcast, corresponding code, protection and receiving device
CN107483422A (en) * 2017-08-03 2017-12-15 深信服科技股份有限公司 Leakage of data retroactive method, equipment and computer-readable recording medium
CN108289254A (en) * 2018-01-30 2018-07-17 北京小米移动软件有限公司 Web conference information processing method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116488943A (en) * 2023-06-19 2023-07-25 杭州海康威视数字技术股份有限公司 Multimedia data leakage tracing detection method, device and equipment
CN116488943B (en) * 2023-06-19 2023-08-25 杭州海康威视数字技术股份有限公司 Multimedia data leakage tracing detection method, device and equipment

Also Published As

Publication number Publication date
CN114650275A (en) 2022-06-21

Similar Documents

Publication Publication Date Title
US11100197B1 (en) Secure web RTC real time communications service for audio and video streaming communications
Keromytis A comprehensive survey of voice over IP security research
CN106164922B (en) Self-organizing one-time pairing of remote devices using online audio fingerprinting
CN112235608B (en) Data encryption transmission method, device and medium based on video network
US10164958B2 (en) Open access network secure authentication systems and methods
US11290465B1 (en) Systems and methods for signed contact lists for user authentication in video conferences
US20070208932A1 (en) Method and system for cloned cable modem detection
CN111953656B (en) Method, device, equipment and medium for monitoring video encryption transmission
US11750578B2 (en) Locking encrypted video conferences
JP2024504750A (en) System and method for securely recording and retrieving encrypted video conferences
US20220247588A1 (en) Systems and methods for identifying at-risk meetings
WO2022135308A1 (en) Method and apparatus for detecting media data
US20240031345A1 (en) Securing Videoconferencing Meetings
US8301895B2 (en) Identity based network policy enablement
US20220247796A1 (en) Electronic conferencing
EP3148185B1 (en) Accessing method, system and storage medium for video conference
TW201216660A (en) Method and system for handling security in an IP multimedia gateway
US20230188543A1 (en) Video conferencing systems featuring end-to-end encryption watchdog
EP4341835A1 (en) Signed contact lists for user authentication in video conferences
CN111770048B (en) Method for preventing SIP equipment from being attacked, calling equipment and called equipment
Truong et al. On Using Cryptographic Technologies in Privacy Protection of Online Conferencing Systems
WO2023236617A1 (en) Meeting data transmission method and apparatus, and device
Brown End-to-end security in active networks
WO2009143750A1 (en) Methods, devices and systems for terminal data management and terminal security evaluation based on tnc
CN116743401A (en) Verification method and related equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21909304

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21909304

Country of ref document: EP

Kind code of ref document: A1