[go: up one dir, main page]

CN115589504B - Data processing method, device, equipment and storage medium - Google Patents

Data processing method, device, equipment and storage medium

Info

Publication number
CN115589504B
CN115589504B CN202211212958.8A CN202211212958A CN115589504B CN 115589504 B CN115589504 B CN 115589504B CN 202211212958 A CN202211212958 A CN 202211212958A CN 115589504 B CN115589504 B CN 115589504B
Authority
CN
China
Prior art keywords
key
conference
encrypted
video
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211212958.8A
Other languages
Chinese (zh)
Other versions
CN115589504A (en
Inventor
陈浩然
符刚
彭成智
王亮
刘牧寅
李蔚然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
China Information Technology Designing and Consulting Institute Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
China Information Technology Designing and Consulting Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, China Information Technology Designing and Consulting Institute Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202211212958.8A priority Critical patent/CN115589504B/en
Publication of CN115589504A publication Critical patent/CN115589504A/en
Application granted granted Critical
Publication of CN115589504B publication Critical patent/CN115589504B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/15Conference systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a data processing method, a device, equipment and a storage medium, relates to the technical field of communication, and is used for guaranteeing the safety of a video conference and reducing resource consumption. The data processing method is applied to the transmitting end equipment and comprises the steps that the transmitting end equipment encrypts a conference key to obtain the encrypted conference key. The sending terminal equipment sends a first message to the receiving terminal equipment, wherein the first message carries the encrypted conference key. Further, after receiving the second message, the sending end device encrypts the acquired original video data of the video conference based on the conference key to obtain encrypted video data, wherein the second message is used for indicating that the receiving end device has acquired the conference key. And finally, the sending end equipment sends the encrypted video data to the receiving end equipment through the server, so that the receiving end equipment decrypts the received data based on the conference secret key, and the original video data is obtained.

Description

Data processing method, device, equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a data processing method, apparatus, device, and storage medium.
Background
Video conferences are real-time communication systems based on image and sound communication and are widely applied to scenes such as remote response, online command, mobile office collaboration and the like, but the security of video data of the video conferences is particularly important because conference contents of the video conferences may involve confidentiality, personal privacy and the like.
In the prior art, in a video conference scene, a channel encryption mode is generally adopted, video data of the video conference is decrypted by a server, then encrypted again, and then sent to a receiving end device. However, in the case of channel encryption, the encryption object for the server is all internet protocol (internet protocol, IP) packets, and besides video data of the video conference, the server encrypts a message such as signaling sent by the sender device and forwards the message to the receiver device, which consumes a relatively large amount of resources.
Disclosure of Invention
The application provides a data processing method, a device, equipment and a storage medium, which are used for guaranteeing the safety of a video conference and reducing resource consumption.
In order to achieve the above purpose, the application adopts the following technical scheme:
The first aspect provides a data processing method which is applied to a sending end device, and comprises the steps that the sending end device generates a key digest of a conference key, the key digest is used for verifying the conference key, encryption is conducted on the key digest based on a private key of the sending end device to obtain an encrypted key digest, and the conference key and the encrypted key digest are encrypted based on a public key of a receiving end device to obtain an encrypted conference key. Further, the sending end device sends a first message to the receiving end device, wherein the first message carries the encrypted conference key. Further, after receiving the second message, the sending end device encrypts the acquired original video data of the video conference based on the conference key to obtain encrypted video data, wherein the second message is used for indicating that the receiving end device has acquired the conference key. And finally, the sending end equipment sends the encrypted video data to the receiving end equipment through the server, so that the receiving end equipment decrypts the received data based on the conference secret key, and the original video data is obtained.
In the data processing method provided by the application, the conference key and the original video data of the video conference are encrypted at the transmitting end equipment, the server is not required to encrypt or decrypt the conference key, the end-to-end encryption is realized, the encrypted conference key is received by the receiving end equipment and verified, the encrypted video data is sent to the receiving end equipment, and the safety of the video conference is ensured under the condition of saving resources.
In one possible design, the sending end device encrypts the collected original video data of the video conference based on the conference key to obtain encrypted video data, and the method comprises the steps that the sending end device encodes the original video data to obtain a plurality of video coding streams, wherein video parameters of each video coding stream in the plurality of video coding streams are different, and the video parameters comprise at least one of resolution and frame rate. Further, the transmitting end device encrypts the plurality of video encoding streams based on the conference key respectively to obtain a plurality of encrypted video encoding streams, and determines the plurality of encrypted video encoding streams as encrypted video data. According to the design, the video coding streams are respectively coded according to the video parameters and are respectively encrypted, so that only one video coding stream can be selected for transmission in the subsequent transmission process, and transmission resources in a channel are saved.
In one possible design, a sender device sends a first indication message to a server, where the first indication message includes a plurality of encrypted video encoded streams and video parameter identifiers for each of the encrypted video encoded streams, the video parameter identifiers are used to identify video parameters corresponding to the encrypted video encoded streams, and the first indication message is used to instruct the server to determine a target encrypted video encoded stream sent to the receiver device from the plurality of encrypted video encoded streams based on channel quality between the sender device and the receiver device, where the video parameter identifiers for the target encrypted video encoded streams correspond to the channel quality. The design realizes the reduction of channel transmission resources consumed by the server when transmitting the encrypted video data.
In a second aspect, a data processing method is provided and applied to a receiving end device, where the receiving end device receives a first message sent by a sending end device, and the first message carries an encrypted conference key. Further, the receiving end device decrypts the encrypted conference key based on the private key of the receiving end device to obtain a conference key and an encrypted key abstract, decrypts the encrypted key abstract based on the public key of the sending end device to obtain a key abstract, and the key abstract is used for verifying the conference key. Further, the receiving end device sends a second message to the sending end device, where the second message is used to indicate that the receiving end device has acquired the conference key. The receiving end equipment receives the encrypted video data transmitted by the transmitting end equipment forwarded by the server. Further, the receiving end device decrypts the encrypted video data based on the conference key to obtain the original video data of the video conference.
In the data processing method provided by the application, the conference key and the original video data of the video conference are encrypted at the transmitting end equipment, the server is not required to encrypt or decrypt the conference key, the end-to-end encryption is realized, and the encrypted video data is sent to the receiving end equipment after the encrypted conference key is received and verified by the receiving end equipment, so that the safety of the video conference is ensured under the condition of saving resources.
In a third aspect, a data processing apparatus is provided, disposed on a transmitting device, where the data processing apparatus includes a generating unit, an encrypting unit, a transmitting unit, and a receiving unit. The generation unit is used for generating a key digest of the conference key, and the key digest is used for verifying the conference key. The encryption unit is also used for encrypting the key digest based on the private key of the sending end device to obtain an encrypted key digest. The encryption unit is further used for encrypting the conference key and the encryption key digest based on the public key of the receiving end device to obtain an encrypted conference key. The sending unit is used for sending a first message to the receiving end equipment, wherein the first message carries the encrypted conference key. The receiving unit is used for receiving the second message. The encryption unit is further used for encrypting the acquired original video data of the video conference based on the conference key after the receiving unit receives the second message, so as to obtain encrypted video data, and the second message is used for indicating that the receiving end equipment has acquired the conference key. The sending unit is further configured to send the encrypted video data to the receiving end device through the server, so that the receiving end device decrypts the received data based on the conference key, and obtains the original video data.
In a possible design, the data processing device further comprises a processing unit and a determination unit. The processing unit is used for encoding the original video data to obtain a plurality of video encoding streams, and video parameters of each video encoding stream in the plurality of video encoding streams are different, wherein the video parameters comprise at least one of resolution and frame rate. The encryption unit is further used for encrypting the plurality of video coding streams based on the conference key respectively to obtain a plurality of encrypted video coding streams. The determination unit is configured to determine a plurality of encrypted video encoding streams as encrypted video data.
In one possible design, the sending unit is specifically configured to send a first indication message to the server, where the first indication message includes a plurality of encrypted video encoding streams and a video parameter identifier of each encrypted video encoding stream, the video parameter identifier is used to identify a video parameter corresponding to the encrypted video encoding stream, and the first indication message is used to instruct the server to determine, based on a channel quality between the sending end device and the receiving end device, a target encrypted video encoding stream sent to the receiving end device from the plurality of encrypted video encoding streams, where the video parameter identifier of the target encrypted video encoding stream corresponds to the channel quality.
In a fourth aspect, a data processing apparatus disposed on a receiving end device is provided, where the data processing apparatus includes a receiving unit, a decrypting unit, an obtaining unit, and a transmitting unit. The receiving unit is used for receiving a first message sent by the sending terminal equipment, wherein the first message carries the encrypted conference key. The decryption unit is used for decrypting the encrypted conference key based on the private key of the receiving end device to obtain the conference key and the encryption key abstract. The decryption unit is used for decrypting the encryption key digest based on the public key of the sending end device to obtain the key digest, and the key digest is used for verifying the conference key. The acquisition unit is used for acquiring the conference key under the condition that the conference key is verified to be correct based on the key digest. The sending unit is used for sending a second message to the sending terminal equipment, and the second message is used for indicating that the receiving terminal equipment has acquired the conference key. The receiving unit is also used for receiving the encrypted video data sent by the sending end device forwarded by the server. The decryption unit is also used for decrypting the encrypted video data based on the conference key to obtain the original video data of the video conference.
In a fifth aspect, there is provided a sender device comprising a memory and a processor, the memory and the processor being coupled, the memory being for storing computer program code comprising computer instructions which, when executed by the processor, perform a data processing method as provided by the first aspect or any one of its possible designs.
In a sixth aspect, there is provided a receiver device comprising a memory and a processor, the memory and processor being coupled, the memory being for storing computer program code comprising computer instructions which, when executed by the processor, perform a data processing method as provided by the second aspect or any one of its possible designs.
In a seventh aspect, a computer readable storage medium is provided, in which instructions are stored which, when run on a sender device, cause the sender device to perform a data processing method as provided in the first aspect or any one of its possible implementations.
In an eighth aspect, a computer readable storage medium is provided, in which instructions are stored which, when run on a receiving device, cause the receiving device to perform a data processing method as provided in the second aspect or any one of its possible implementations.
Drawings
Fig. 1 is a schematic diagram of a communication system according to an embodiment of the present application;
FIG. 2 is a flowchart illustrating a data processing method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a data processing method according to an embodiment of the present application;
fig. 4 is a schematic diagram of a communication system according to a second embodiment of the present application;
FIG. 5 is a flowchart illustrating a data processing method according to an embodiment of the present application;
FIG. 6 is a flowchart illustrating a data processing method according to an embodiment of the present application;
FIG. 7 is a flowchart of a data processing method according to an embodiment of the present application;
FIG. 8 is a flowchart of a data processing method according to an embodiment of the present application;
FIG. 9 is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
FIG. 10 is a schematic diagram of a data processing apparatus according to a second embodiment of the present application;
fig. 11 is a schematic diagram of a transmitting device according to an embodiment of the present application;
Fig. 12 is a schematic diagram of a transmitting device according to a second embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application.
In embodiments of the application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
In the description of the present application, "/" means "or" unless otherwise indicated, for example, A/B may mean A or B. The term "and/or" herein is merely an association relation describing the association object, and means that three kinds of relations may exist, for example, a and/or B may mean that a exists alone, a and B exist together, and B exists alone. Further, "at least one", "a plurality" means two or more. The terms "first," "second," and the like do not limit the number and order of execution, and the terms "first," "second," and the like do not necessarily differ.
In the prior art, in a video conference scene, a channel encryption mode is generally adopted, video data of the video conference is decrypted by a server, then encrypted again, and then sent to a receiving end device. However, in the case of channel encryption, the encryption object for the server is all IP packets, and besides video data of the video conference, the server encrypts a message such as signaling sent by the sender device and forwards the message to the receiver device, so that the resource consumption is relatively high.
In order to solve the problems, the application provides a data processing method, a device, equipment and a storage medium, which are applied to a sending end device, wherein the sending end device generates a key digest of a conference key, the key digest is used for verifying the conference key, the key digest is encrypted based on a private key of the sending end device to obtain an encrypted key digest, and the conference key and the encrypted key digest are encrypted based on a public key of a receiving end device to obtain an encrypted conference key. The sending terminal equipment sends a first message to the receiving terminal equipment, wherein the first message carries the encrypted conference key. Further, after receiving the second message, the sending end device encrypts the acquired original video data of the video conference based on the conference key to obtain encrypted video data, wherein the second message is used for indicating that the receiving end device has acquired the conference key. And finally, the sending end equipment sends the encrypted video data to the receiving end equipment through the server, so that the receiving end equipment decrypts the received data based on the conference secret key, and the original video data is obtained. In this way, in the data processing method provided by the application, the conference key and the original video data of the video conference are encrypted at the transmitting end device, the server is not required to encrypt or decrypt the conference key and the end-to-end encryption is realized, and the encrypted video data is transmitted to the receiving end device after the conference key is determined to be received by the receiving end device, so that the safety of the video conference is ensured under the condition of saving resources.
Fig. 1 shows a communication system, and the data processing method, apparatus, device and storage medium provided by the embodiment of the application may be applied to the communication system shown in fig. 1, so as to reduce resource consumption while guaranteeing video conference security. As shown in fig. 1, a communication system 10 includes a transmitting-end device 11, a server 12, and a receiving-end device 13.
The sending end device 11, the server 12, and the receiving end device 13 may be connected in a wired manner or a wireless manner, which is not particularly limited in the embodiment of the present application.
The sender device 11 may be configured to generate a conference key and encrypt the conference key in case the user initiates a video conference. Further, the transmitting-end device 11 transmits the encrypted conference key to the receiving-end device 13 through the connection with the receiving-end device 13.
The receiving end device 13 may be configured to decrypt the encrypted conference key after receiving the first message carrying the encrypted conference key sent by the sending end device, and obtain the conference key. Further, the receiving end device 13 sends a second message to the sending end device 11 through the connection with the sending end device 11, so that the sending end device 11 determines that the receiving end device 13 has acquired the conference key.
The sending end device 11 may be further configured to encrypt the collected original video data of the video conference based on the conference key after receiving the second packet, to obtain encrypted video data.
The sender device 11 may also be used to send encrypted video data to the receiver device 13 via the server 12.
The receiving end device 13 may be further configured to decrypt the received data based on the conference key after receiving the data sent by the sending end device 11 forwarded by the server 12, to obtain the original video data.
The receiving end device 13 may also be configured to display the video conference content according to the original video data through a display unit of the receiving end device 13 after obtaining the original video data.
The server 12 may be configured to receive the encrypted video data transmitted from the transmitting-end device 11 and transmit the encrypted video data to the receiving-end device 13.
The server 12 may also be used to detect the channel quality between the sender device 11 and the receiver device 13.
FIG. 2 is a flow diagram illustrating a method of data processing according to some example embodiments. In some embodiments, the above described data processing method may be applied to a transmitting end device 11 in a communication system 10 as shown in fig. 1. Hereinafter, the data processing method will be described by taking the application of the data processing method to the transmitting device 11 as an example.
As shown in fig. 2, the data processing method provided in the embodiment of the present application includes the following steps S201 to S205.
S201, the sender device encrypts the conference key to obtain the encrypted conference key.
As a possible implementation manner, the sending end device generates a conference key based on information of the video conference after detecting that the user initiates the video conference. Further, the sending end device encrypts the conference key to obtain the encrypted conference key.
The generating of the conference key by the sending end device based on the information of the video conference may be that the information of the video conference includes user information of the sending end device, time of initiating the video conference, user information of the receiving end device, and the like, and the sending end device combines the information of the video conference to generate the conference key.
The sending end device generating the conference key based on the information of the video conference may also be that the sending end device generates the conference key randomly after the user initiates the video conference.
The sending end device generating the conference key based on the information of the video conference may further be that the sending end device determines the content input by the user as the conference key in response to the user input after the user initiates the video conference.
In the embodiment of the present application, how the sending end device generates the conference key based on the information of the video conference may be implemented as described above, or may be implemented as other implementations in the prior art, which is not specifically limited in the embodiment of the present application.
The sending end device may encrypt the conference key by using a private key of the sending end device or may encrypt the conference key by using a public key of the receiving end device, which is not particularly limited in the embodiment of the present application.
In some embodiments, in order to ensure the security of the conference key and avoid interception or tampering of the conference key, S201, the sending end device encrypts the conference key to obtain an encrypted conference key, as shown in fig. 3, specifically including S2011-S2013.
And S2011, the sending end equipment generates a key abstract of the conference key.
Wherein the key digest is used to verify the conference key.
As a possible implementation manner, the sending end device determines a summary obtained by processing the conference key by adopting a data signing algorithm as a key summary of the conference key.
And 2012, the sending end equipment encrypts the key digest based on the private key of the sending end equipment to obtain an encrypted key digest.
As a possible implementation manner, the sending end device obtains the private key of the device from the digital certificate system, encrypts the key digest by using the obtained private key, and obtains an encrypted key digest, where the encrypted key digest is the signature in the current transmission process.
It should be noted that the digital certificate system provides a digital certificate for a device, and the digital certificate contains the public key and the private key of the device itself, and the public keys of other devices.
Illustratively, as shown in FIG. 4, in the communication system 30 shown in FIG. 4, a digital certificate system 31 may be used to send digital certificates to each device under the system to cause each device to determine the public and private keys of its own device, as well as the public keys of other devices. The video conference server 32 provides conference reservation, conference management, call information negotiation, audio and video forwarding, and the like. Each device is a transmitting device when it is a video conference initiator, and is a receiving device when it is not a video conference initiator, and the devices may be both the transmitting device and the receiving device.
S2013, the sending terminal device encrypts the conference key and the encryption key abstract based on the public key of the receiving terminal device to obtain an encrypted conference key.
As a possible implementation manner, after obtaining the encryption key digest, the sending end device encrypts the conference key and the encryption key digest together by using the public key of the receiving end device, so as to obtain the encrypted conference key.
It can be understood that in the data processing method provided by the embodiment of the application, because the encrypted conference key is obtained by encrypting the public key of the receiving end device, after the receiving end device receives the encrypted conference key, the receiving end device can decrypt the encrypted conference key through the private key of the receiving end device to obtain the conference key, and the conference key is verified through the key abstract, so that the conference key is ensured not to be tampered. If the non-receiving end equipment intercepts the encrypted conference key, the private key of the receiving end equipment cannot be obtained because the private key of the receiving end equipment is not clear, so that the safety of the conference key is ensured.
S202, the sending end equipment sends a first message to the receiving end equipment.
The first message carries the encrypted conference key.
As a possible implementation manner, after obtaining the encrypted conference key, the sending end device carries the encrypted conference key in a first message, and sends the first message to the receiving end device.
It should be noted that, the sending end device may directly send the first message to the receiving end device through connection with the receiving end device, or may forward the first message through the server, and send the first message to the receiving end device.
In some embodiments, if the video conference includes a plurality of participants, including a transmitting end device and at least two receiving end devices, the transmitting end device may send a first message to each receiving end device through a connection with each receiving end device, respectively, so that each participant of the video conference obtains a conference key.
The sending end device may also send the first message to a server, where the server forwards the first message to each receiving end device, so that each participant in the video conference obtains the conference key.
Correspondingly, the receiving terminal equipment receives the first message sent by the sending terminal equipment.
S203, the sending terminal equipment receives the second message.
The second message is used for indicating that the receiving end equipment has acquired the conference key.
As a possible implementation manner, after receiving the first message and obtaining the conference key by decrypting the encrypted conference key, the receiving end device sends a second message to the sending end device, and correspondingly, the sending end device receives the second message sent by the receiving end device.
S204, after receiving the second message, the sending end device encrypts the acquired original video data of the video conference based on the conference key to obtain encrypted video data.
As a possible implementation manner, the sending end device determines that the receiving end device has acquired the conference key after receiving the second message. Further, the transmitting end equipment collects original video data of the video conference frame by frame, encrypts the original video data of each frame based on the conference key, and obtains encrypted video data.
S205, the transmitting terminal equipment transmits the encrypted video data to the receiving terminal equipment through the server.
As a possible implementation manner, after obtaining the encrypted video data, the sending end device sends the encrypted video data and the device identifier of the receiving end device to the server, and the server forwards the encrypted video data to the receiving end device according to the device identifier of the receiving end device.
In some embodiments, if the video conference includes a plurality of participants, including a transmitting device and at least two receiving devices, the transmitting device sends the encrypted video data to the server, and simultaneously sends the device identifiers of the at least two receiving devices to the server together, so that the server sends the encrypted video data to the at least two receiving devices after identifying the device identifiers of the at least two receiving devices.
In some other embodiments, the sender device, after obtaining the encrypted video data, determines a communication channel with the receiver device and sends the encrypted video data to the receiver device based on the communication channel with the receiver device.
Correspondingly, the receiving terminal equipment receives the encrypted video data forwarded by the transmitting terminal equipment through the server, and decrypts the received data based on the conference key to obtain the original video data.
It can be understood that in the data processing method provided by the embodiment of the application, the sending end device encrypts the conference key and the original video data of the video conference and sends the encrypted original video data to the receiving end device only when the receiving end is determined to be capable of acquiring the key, and the server only needs to forward the encrypted original video data without encrypting or decrypting the data, so that the resource consumption is reduced under the condition of guaranteeing the safety of the video conference.
In one design, in order to reduce channel resources consumed in transmitting encrypted video data, in the data processing method provided by the embodiment of the present application, a sending end device encrypts acquired original video data of a video conference based on a conference key to obtain encrypted video data, as shown in fig. 5, and further includes S401-S403.
S401, the transmitting terminal equipment encodes the original video data to obtain a plurality of video encoding streams.
Wherein the video parameters of each of the plurality of video encoded streams are different, the video parameters including at least one of resolution and frame rate.
As a possible implementation manner, the transmitting end device does not acquire original data of one frame based on a plurality of preset video parameters, and encodes the acquired original video data of one frame to obtain a video encoding stream corresponding to each video parameter in the plurality of preset video parameters.
For example, in the case where the video parameters include only resolution, the preset plurality of video parameters may be 360P (progressive scanning, progressive scan), 480P, 720P, 1080P, and the like. In the case where the video parameters include only the frame rate, the preset plurality of video parameters may be 30FPS (frame per second, frame number of transmission per second), 60FPS, 90FPS, 120FPS, and the like. In the case where the video parameters include resolution and frame rate, the preset plurality of video parameters may be 480P, 30FPS,720P, 60FPS,1080P, 90FPS, etc. Any of the above-mentioned settings of video parameters may be used in the embodiments of the present application, which is not limited in particular.
S402, the sending end equipment encrypts the plurality of video coding streams based on the conference key respectively to obtain a plurality of encrypted video coding streams.
As a possible implementation manner, the sending end device encrypts, based on the conference key, for a plurality of video encoding streams, to obtain a plurality of encrypted video encoding streams.
For example, if the plurality of video encoded streams are respectively a video encoded stream a:360P, a video encoded stream B:480P, a video encoded stream C:720P, and a video encoded stream D:1080P, the transmitting end device encrypts the plurality of video encoded streams based on the conference key, and then obtains a plurality of encrypted video encoded streams respectively an encrypted video encoded stream a:360P, an encrypted video encoded stream B:480P, an encrypted video encoded stream C:720P, and an encrypted video encoded stream D:1080P.
S403, the transmitting end device determines a plurality of encrypted video coding streams as encrypted video data.
As a possible implementation manner, after determining that the plurality of encrypted video encoding streams are obtained, the transmitting end device determines the plurality of encrypted video encoding streams as encrypted video data, and sends the encrypted video data to the receiving end device through the server.
In some embodiments, the sender device sends a first indication message to the server. The first indication message is used for indicating the server to determine a target encrypted video coding stream sent to the receiving end device from the plurality of encrypted video coding streams based on channel quality between the sending end device and the receiving end device, and the video parameter identification of the target encrypted video coding stream corresponds to the channel quality.
Further, after receiving the first indication message sent by the sending end device, the server detects the channel quality of the communication channel between the server and the receiving end device, determines a target video parameter corresponding to the channel quality based on the mapping relation between the channel quality and the video parameter, and sends an encrypted video coding stream with the video parameter as the target video parameter to the receiving end device. In this way, in the channel between the server and the receiving end device, only one encrypted video encoding stream needs to be transmitted, and all the encrypted video encoding streams with different video parameters do not need to be sent to the receiving end device, so that transmission resources in the communication channel are saved.
It should be noted that, the mapping relationship between the channel quality and the video parameters is stored in the server in advance, so that the server can detect the channel quality after receiving a plurality of encrypted video coding streams, and select the encrypted video coding stream of the corresponding video parameters to send to the receiving end device.
FIG. 6 is a flow diagram illustrating a method of data processing according to some example embodiments. In some embodiments, the above described data processing method may be applied to a receiving end device 13 in a communication system 10 as shown in fig. 1. Hereinafter, the data processing method will be described by taking the application of the data processing method to the receiving end device 13 as an example.
As shown in fig. 6, the data processing method provided in the embodiment of the present application includes the following steps S501 to S505.
S501, receiving end equipment receives a first message sent by sending end equipment.
The first message carries the encrypted conference key.
As a possible implementation manner, the receiving end device receives the first message sent by the sending end device in a communication channel between the receiving end device and the sending end device, and obtains the encrypted conference key.
In some embodiments, the receiving end device receives the first message sent by the sending end device forwarded by the server, and obtains the encrypted conference key.
S502, the receiving end equipment decrypts the encrypted conference key to obtain the conference key.
It should be noted that, a specific implementation manner of how the receiving end device decrypts the encrypted conference key includes S5021 to S5023 shown in fig. 7.
S5021, the receiving end equipment decrypts the encrypted conference key based on the private key of the receiving end equipment to obtain the conference key and the encryption key abstract.
As a possible implementation manner, the receiving end device obtains the private key of the device from the digital certificate system, and decrypts the encrypted conference key by using the obtained private key to obtain the conference key and the encrypted key digest.
S5022, the receiving end equipment decrypts the encryption key abstract based on the public key of the sending end equipment to obtain the key abstract.
Wherein the key digest is used to verify the conference key.
As one possible implementation manner, the receiving end device decrypts the encryption key digest based on the public key of the transmitting end device obtained from the digital certificate system, and obtains the key digest.
S5023, the receiving end equipment acquires the conference key under the condition that the conference key is verified to be correct based on the key abstract.
As a possible implementation manner, the receiving end device verifies whether the conference key is correct based on the key digest, and if the conference key is verified to be correct, the conference key is saved for decrypting the encrypted video data in a subsequent process.
It can be understood that in the data processing method provided by the embodiment of the application, because the encrypted conference key is obtained by encrypting the public key of the receiving end device, after the receiving end device receives the encrypted conference key, the receiving end device can decrypt the encrypted conference key through the private key of the receiving end device to obtain the conference key, and the conference key is verified through the key abstract, so that the conference key is ensured not to be tampered. If the non-receiving end equipment intercepts the encrypted conference key, the private key of the receiving end equipment cannot be obtained because the private key of the receiving end equipment is not clear, so that the safety of the conference key is ensured.
S503, the receiving end equipment sends a second message to the sending end equipment.
The second message is used for indicating that the receiving end equipment has acquired the conference key.
As a possible implementation manner, after the receiving end device obtains the conference key, the receiving end device generates a second message and sends the second message to the sending end device, so that the sending end device determines that the receiving end device has obtained the conference key, and further encrypts the original video data of the video conference through the conference key.
Correspondingly, the sending terminal equipment receives the second message.
S504, the receiving end equipment receives the encrypted video data transmitted by the transmitting end equipment forwarded by the server.
In some embodiments, a receiving end device receives encrypted video data transmitted by a transmitting end device in a communication channel with the transmitting end device.
S505, the receiving end equipment decrypts the encrypted video data based on the conference key to obtain the original video data of the video conference.
As a possible implementation manner, after receiving the encrypted video data, the receiving end device decrypts the encrypted video data through the conference key to obtain the original video data of the video conference.
In some embodiments, the receiving end device decodes the original video data after it has been acquired, so as to reach the video of the video conference, and plays the video so that the receiving end user can participate in the video conference.
FIG. 8 is a flow diagram illustrating a method of data processing according to some example embodiments. In some embodiments, the data processing method described above may be applied to a communication system 10 as shown in fig. 1. Hereinafter, the data processing method will be described by taking the application of the data processing method to the communication system 10 as an example.
As shown in fig. 8, the data processing method provided in the embodiment of the present application includes the following steps S601 to S615.
S601, the sender device generates a conference key.
S602, the sender device generates an encrypted conference key.
The sending end equipment generates a first encrypted conference key according to the public key of the first receiving end equipment, and generates a second encrypted conference key according to the public key of the second receiving end equipment.
S603, the sending end device sends a first encrypted conference key to the first receiving end device.
S604, the first receiving end equipment verifies the conference key.
S605, the first receiving end equipment sends a meeting key confirmation message to the sending end equipment.
S606, the sending end device sends a second encrypted conference key to the second receiving end device.
S607, the second receiving end equipment verifies the conference key.
And S608, the second receiving end equipment sends a meeting key confirmation message to the sending end equipment.
S609, the server performs channel detection.
The server determines to send a channel detection message to the first receiving end device, and determines the first channel quality based on a channel state feedback message sent by the first receiving end device.
The server determines to send a channel detection message to the second receiving end device and determines a second channel quality based on the channel state feedback message sent by the second receiving end device.
S610, the transmitting end equipment codes the original video data of the video conference and encrypts the original video data independently to obtain encrypted video data.
S611, the transmitting terminal equipment transmits the encrypted video data to the server.
S612, the server selects the encrypted video coding stream of the corresponding video parameter according to the first channel quality, and sends the encrypted video coding stream to the first receiving terminal equipment.
S613, the first receiving end equipment decrypts the encrypted video coding stream based on the conference key, and decodes the encrypted video coding stream according to the resolution or the frame rate of the video parameter to obtain the video of the video conference.
S614, the server selects the encrypted video coding stream of the corresponding video parameter according to the second channel quality, and sends the encrypted video coding stream to the second receiving end equipment.
S615, the second receiving end equipment decrypts the encrypted video coding stream based on the conference key, and decodes the encrypted video coding stream according to the resolution or the frame rate of the video parameter to obtain the video of the video conference.
In the data processing method provided by the application, the conference key and the original video data of the video conference are encrypted at the transmitting end equipment, the server is not required to encrypt or decrypt the video data, the end-to-end encryption is realized, the encrypted video data is transmitted to the receiving end equipment after the conference key is determined to be received by the receiving end equipment, and the safety of the video conference is ensured under the condition of saving resources.
The foregoing description of the solution provided by the embodiments of the present application has been mainly presented in terms of a method. To achieve the above functions, it includes corresponding hardware structures and/or software modules that perform the respective functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is implemented as hardware or computer software driven hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The embodiment of the application can divide the functional modules of the user equipment according to the method example, for example, each functional module can be divided corresponding to each function, and two or more functions can be integrated in one processing module. The integrated modules may be implemented in hardware or in software functional modules. Optionally, the division of the modules in the embodiment of the present application is schematic, which is merely a logic function division, and other division manners may be implemented in practice.
Fig. 9 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application. The data processing device is used for executing the data processing method. As shown in fig. 9, the data processing apparatus 70 includes a generation unit 701, an encryption unit 702, a transmission unit 703, and a reception unit 704.
A generating unit 701, configured to generate a key digest of the conference key, where the key digest is used to verify the conference key. For example, as shown in fig. 3, the generation unit 701 may be used to perform S2011.
The encryption unit 702 is further configured to encrypt the key digest based on the private key of the sender device, to obtain an encrypted key digest. For example, as shown in fig. 3, the encryption unit 702 may be used to perform S2012.
The encryption unit 703 is further configured to encrypt the conference key and the encrypted key digest based on the public key of the receiving device, to obtain an encrypted conference key. For example, as shown in fig. 3, the encryption unit 702 may be used to perform S2013.
The sending unit 703 is configured to send a first message to the receiving end device, where the first message carries the encrypted conference key. For example, as shown in fig. 2, the transmission unit 703 may be used to perform S202.
A receiving unit 704, configured to receive the second packet. For example, as shown in fig. 2, the receiving unit 704 may be used to perform S203.
The encryption unit 702 is further configured to encrypt the collected original video data of the video conference based on the conference key after the receiving unit receives the second message, to obtain encrypted video data, where the second message is used to indicate that the receiving end device has obtained the conference key. For example, as shown in fig. 2, the encryption unit 702 may be used to perform S204.
The sending unit 703 is further configured to send, by the server, the encrypted video data to the receiving end device, so that the receiving end device decrypts the received data based on the conference key, and obtains the original video data. For example, as shown in fig. 2, the transmission unit 703 may be used to perform S205.
Optionally, as shown in fig. 9, an embodiment of the present application provides the data processing apparatus 70, further including a processing unit 705 and a determining unit 706.
The processing unit 705 is configured to encode the original video data to obtain a plurality of video encoded streams, where video parameters of each of the plurality of video encoded streams are different, and the video parameters include at least one of resolution and frame rate. For example, as shown in fig. 5, the processing unit 705 may be used to perform S401.
The encryption unit 702 is further configured to encrypt the plurality of video encoding streams based on the conference key, respectively, to obtain a plurality of encrypted video encoding streams. For example, as shown in fig. 5, the encryption unit 702 may be used to perform S402.
A determining unit 706 for determining the plurality of encrypted video encoding streams as encrypted video data. For example, as shown in fig. 5, the determination unit 706 may be used to perform S403.
Optionally, as shown in fig. 9, in the data processing apparatus 70, the sending unit 703 is specifically configured to send a first indication message to the server, where the first indication message includes a plurality of encrypted video encoding streams and video parameter identifiers of each encrypted video encoding stream, the video parameter identifiers are used to identify video parameters corresponding to the encrypted video encoding streams, the first indication message is used to instruct the server to determine, based on channel quality between the sending end device and the receiving end device, a target encrypted video encoding stream sent to the receiving end device from the plurality of encrypted video encoding streams, and the video parameter identifiers of the target encrypted video encoding stream correspond to the channel quality.
Fig. 10 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application. The data processing device is used for executing the data processing method. As shown in fig. 10, the data processing apparatus 80 includes a receiving unit 801, a decrypting unit 802, an acquiring unit 803, and a transmitting unit 804.
The receiving unit 801 is configured to receive a first message sent by a sending end device, where the first message carries an encrypted conference key. For example, as shown in fig. 6, the receiving unit 801 may be used to perform S501.
The decryption unit 802 is configured to decrypt the encrypted conference key based on the private key of the receiving end device, to obtain the conference key and the encrypted key digest. For example, as shown in fig. 7, the decryption unit 802 may be used to perform S5021.
The decryption unit 802 is configured to decrypt the encrypted key digest based on the public key of the sender device, to obtain a key digest, where the key digest is used to verify the conference key. For example, as shown in fig. 7, the decryption unit 802 may be used to perform S5022.
An obtaining unit 803 is configured to obtain the conference key in a case where the conference key is verified to be correct based on the key digest. For example, as shown in fig. 7, the acquisition unit 803 may be used to perform S5023.
A sending unit 804, configured to send a second message to the sending end device, where the second message is used to indicate that the receiving end device has acquired the conference key. For example, as shown in fig. 6, the transmission unit 804 may be used to perform S503.
The receiving unit 801 is further configured to receive encrypted video data sent by a sending end device forwarded by the server. For example, as shown in fig. 6, the receiving unit 801 may be used to perform S504.
The decryption unit 802 is further configured to decrypt the encrypted video data based on the conference key, to obtain the original video data of the video conference. For example, as shown in fig. 6, the decryption unit 802 may be used to perform S505.
In the case of implementing the functions of the integrated modules in the form of hardware, an embodiment of the present application provides a possible structural schematic diagram of a transmitting end device. The transmitting device is configured to execute the data processing method executed by the transmitting device in the foregoing embodiment. As shown in fig. 11, the transmitting-side apparatus 90 includes a processor 901, a memory 902, and a bus 903. The processor 901 and the memory 902 may be connected by a bus 903.
The processor 901 is a control center of the transmitting device, and may be one processor or a collective name of a plurality of processing elements. For example, the processor 901 may be a general-purpose central processing unit (central processing unit, CPU), or may be another general-purpose processor. Wherein the general purpose processor may be a microprocessor or any conventional processor or the like.
As one example, processor 901 may include one or more CPUs, such as CPU 0 and CPU 1 shown in fig. 11.
The memory 902 may be, but is not limited to, read-only memory (ROM) or other type of static storage device that can store static information and instructions, random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or electrically erasable programmable read-only memory (EEPROM), magnetic disk storage or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
As a possible implementation, the memory 902 may exist separately from the processor 901, and the memory 902 may be connected to the processor 901 by a bus 903 for storing instructions or program code. The data processing method provided by the embodiment of the present application can be implemented when the processor 901 calls and executes instructions or program codes stored in the memory 902.
In another possible implementation, the memory 902 may also be integrated with the processor 901.
Bus 903 may be an industry standard architecture (Industry Standard Architecture, ISA) bus, a peripheral component interconnect (PERIPHERAL COMPONENT INTERCONNECT, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 11, but not only one bus or one type of bus.
Note that the structure shown in fig. 11 does not constitute a limitation of the transmitting-end apparatus 90. In addition to the components shown in fig. 11, the sender device 90 may include more or fewer components than shown in fig. 11, or may combine certain components, or may have a different arrangement of components.
As an example, in connection with fig. 11, the generating unit 701, the encrypting unit 702, the transmitting unit 703, the receiving unit 704, the processing unit 705, and the determining unit 706 in the transmitting-end apparatus 70 realize the same functions as those of the processor 901 in fig. 11.
Optionally, as shown in fig. 11, a sending end device provided in an embodiment of the present application may further include a communication interface 904.
A communication interface 904 for connecting with other devices via a communication network. The communication network may be an ethernet, a radio access network, a wireless local area network (wireless local area networks, WLAN), etc. The communication interface 904 may include an acquisition unit for receiving data, and a transmission unit for transmitting data.
In one design, in the transmitting end device provided by the embodiment of the present application, the communication interface may also be integrated in the processor.
Fig. 12 shows another hardware structure of a transmitting end device in an embodiment of the present application. As shown in fig. 12, the transmitting-end apparatus 100 may include a processor 1001 and a communication interface 1002. The processor 1001 is coupled to a communication interface 1002.
The function of the processor 1001 may be as described above with reference to the processor 901. The processor 1001 also has a memory function, and the function of the memory 902 can be referred to.
The communication interface 1002 is for providing data to the processor 1001. The communication interface 1002 may be an internal interface of the transmitting device or an external interface of the transmitting device (corresponding to the communication interface 904).
It should be noted that the structure shown in fig. 12 does not constitute a limitation of the transmitting-end apparatus, and the transmitting-end apparatus 100 may include more or less components than those shown in fig. 12, or may combine some components, or may be a different arrangement of components.
Meanwhile, the schematic structural diagram of one hardware of the receiving end device provided in the embodiment of the present application may refer to the description of the transmitting end device in fig. 11 or fig. 12, which is not described herein again. Except that the server includes a processor for performing the steps performed by the server in the above-described embodiments.
From the above description of embodiments, it will be apparent to those skilled in the art that the foregoing functional unit divisions are merely illustrative for convenience and brevity of description. In practical applications, the above-mentioned function allocation may be performed by different functional units, i.e. the internal structure of the device is divided into different functional units, as needed, to perform all or part of the functions described above. The specific working processes of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which are not described herein.
The embodiment of the application also provides a computer readable storage medium, wherein the computer readable storage medium stores instructions, when the computer executes the instructions, the computer executes each step in the method flow shown in the method embodiment.
Embodiments of the present application provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the data processing method of the method embodiments described above.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include an electrical connection having one or more wires, a portable computer diskette, and a hard disk. Random access Memory (Random Access Memory, RAM), read-Only Memory (ROM), erasable programmable Read-Only Memory (Erasable Programmable Read Only Memory, EPROM), registers, hard disk, optical fiber, portable compact disc Read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any other form of computer-readable storage medium suitable for use by a person or persons of skill in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor. The processor and the storage medium may reside in an Application SPECIFIC INTEGRATED Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
Since the apparatus, the device computer readable storage medium, and the computer program product in the embodiments of the present application can be applied to the above-mentioned method, the technical effects that can be obtained by the apparatus, the device computer readable storage medium, and the computer program product can also refer to the above-mentioned method embodiments, and the embodiments of the present application are not described herein again.
The foregoing is merely illustrative of specific embodiments of the present application, and the scope of the present application is not limited thereto, but any changes or substitutions within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application should be subject to the protection scope of the claims.

Claims (12)

1. A data processing method, applied to a transmitting device, the method comprising:
Generating a key digest of a conference key, the key digest being used to verify the conference key;
encrypting the key digest based on the private key of the transmitting end device to obtain an encrypted key digest;
encrypting the conference key and the encryption key abstract based on a public key of receiving end equipment to obtain an encrypted conference key;
Sending a first message to the receiving end equipment, wherein the first message carries the encrypted conference key;
After receiving a second message, encrypting the acquired original video data of the video conference based on the conference key to obtain encrypted video data, wherein the second message is used for indicating that the receiving end equipment has acquired the conference key;
and sending the encrypted video data to the receiving end equipment through a server, so that the receiving end equipment decrypts the received data based on the conference key to obtain the original video data.
2. The method for processing data according to claim 1, wherein encrypting the collected original video data of the video conference based on the conference key to obtain encrypted video data comprises:
Encoding the original video data to obtain a plurality of video encoding streams, wherein video parameters of each video encoding stream in the plurality of video encoding streams are different, and the video parameters comprise at least one of resolution and frame rate;
Encrypting the plurality of video coding streams based on the conference key respectively to obtain a plurality of encrypted video coding streams;
The plurality of encrypted video encoded streams are determined as the encrypted video data.
3. The data processing method according to claim 2, wherein the transmitting, by the server, the encrypted video data to the receiving end device includes:
The method comprises the steps of sending a first indication message to a server, wherein the first indication message comprises a plurality of encrypted video coding streams and video parameter identifiers of each encrypted video coding stream, the video parameter identifiers are used for identifying video parameters corresponding to the encrypted video coding streams, the first indication message is used for indicating the server to determine a target encrypted video coding stream sent to the receiving end device from the plurality of encrypted video coding streams based on channel quality between the sending end device and the receiving end device, and the video parameter identifiers of the target encrypted video coding streams correspond to the channel quality.
4. A data processing method, applied to a receiving end device, the method comprising:
receiving a first message sent by a sending terminal device, wherein the first message carries an encrypted conference key;
Decrypting the encrypted conference key based on the private key of the receiving end device to obtain the conference key and the encryption key abstract;
Decrypting the encryption key digest based on the public key of the sending end device to obtain a key digest, wherein the key digest is used for verifying the conference key;
acquiring the conference key under the condition that the conference key is verified to be correct based on the key digest;
sending a second message to the sending terminal equipment, wherein the second message is used for indicating that the receiving terminal equipment has acquired the conference key;
receiving the encrypted video data transmitted by the transmitting terminal equipment and forwarded by a server;
And decrypting the encrypted video data based on the conference key to obtain the original video data of the video conference.
5. The data processing device is characterized by being deployed on a transmitting end device and comprises a generating unit, an encrypting unit, a transmitting unit and a receiving unit;
the generation unit is used for generating a key digest of the conference key, and the key digest is used for verifying the conference key;
The encryption unit is further configured to encrypt the key digest based on a private key of the sender device, to obtain an encrypted key digest;
The encryption unit is further used for encrypting the conference key and the encryption key abstract based on the public key of the receiving end device to obtain an encrypted conference key;
The sending unit is used for sending a first message to the receiving end equipment, wherein the first message carries the encrypted conference key;
The receiving unit is used for receiving the second message;
The encryption unit is further configured to encrypt the collected original video data of the video conference based on the conference key after the receiving unit receives the second message, to obtain encrypted video data;
The sending unit is further configured to send the encrypted video data to the receiving end device through a server, so that the receiving end device decrypts the received data based on the conference key, and obtains the original video data.
6. The data processing apparatus according to claim 5, further comprising a processing unit and a determining unit;
The processing unit is configured to encode the original video data to obtain a plurality of video encoded streams, where video parameters of each video encoded stream in the plurality of video encoded streams are different, and the video parameters include at least one of resolution and frame rate;
The encryption unit is further configured to encrypt the plurality of video encoding streams based on the conference key respectively, to obtain a plurality of encrypted video encoding streams;
The determining unit is configured to determine the plurality of encrypted video encoding streams as the encrypted video data.
7. The data processing apparatus according to claim 6, wherein the transmitting unit is configured to transmit a first indication message to the server, the first indication message including the plurality of encrypted video encoded streams and a video parameter identifier of each encrypted video encoded stream, the video parameter identifier being used to identify a video parameter corresponding to the encrypted video encoded stream, the first indication message being used to instruct the server to determine a target encrypted video encoded stream to be transmitted to the receiving device from the plurality of encrypted video encoded streams based on a channel quality between the transmitting device and the receiving device, the video parameter identifier of the target encrypted video encoded stream corresponding to the channel quality.
8. The data processing device is characterized by being deployed on receiving terminal equipment and comprises a receiving unit, a decrypting unit, an acquiring unit and a transmitting unit;
the receiving unit is used for receiving a first message sent by the sending end equipment, wherein the first message carries an encrypted conference key;
The decryption unit is used for decrypting the encrypted conference key based on the private key of the receiving end device to obtain the conference key and the encryption key abstract;
The decryption unit is configured to decrypt the encrypted key digest based on the public key of the sender device to obtain a key digest, where the key digest is used to verify the conference key;
The acquiring unit is used for acquiring the conference key under the condition that the conference key is verified to be correct based on the key digest;
The sending unit is configured to send a second message to the sending end device, where the second message is used to indicate that the receiving end device has acquired the conference key;
The receiving unit is further configured to receive encrypted video data sent by the sending end device and forwarded by the server;
The decryption unit is further configured to decrypt the encrypted video data based on the conference key, to obtain original video data of the video conference.
9. A transmitting device, comprising a memory and a processor;
The memory is coupled to the processor;
the memory is used for storing computer program codes, and the computer program codes comprise computer instructions;
the transmitting device performs the data processing method according to any one of claims 1-3 when the processor executes the computer instructions.
10. A receiving-side apparatus, comprising a memory and a processor;
The memory is coupled to the processor;
the memory is used for storing computer program codes, and the computer program codes comprise computer instructions;
the receiving end device performs the data processing method of claim 4 when the processor executes the computer instructions.
11. A computer readable storage medium having instructions stored therein, which when run on a sender device cause the sender device to perform the data processing method of any one of claims 1-3.
12. A computer readable storage medium having instructions stored therein, which when run on a receiving device cause the receiving device to perform the data processing method of claim 4.
CN202211212958.8A 2022-09-30 2022-09-30 Data processing method, device, equipment and storage medium Active CN115589504B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211212958.8A CN115589504B (en) 2022-09-30 2022-09-30 Data processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211212958.8A CN115589504B (en) 2022-09-30 2022-09-30 Data processing method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115589504A CN115589504A (en) 2023-01-10
CN115589504B true CN115589504B (en) 2025-09-05

Family

ID=84773268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211212958.8A Active CN115589504B (en) 2022-09-30 2022-09-30 Data processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115589504B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112671691A (en) * 2019-10-16 2021-04-16 重庆傲雄在线信息技术有限公司 Data verification system
CN115022102A (en) * 2022-08-10 2022-09-06 广东电网有限责任公司佛山供电局 Transmission line monitoring data transmission method and device, computer equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104993928A (en) * 2015-05-11 2015-10-21 昆明理工大学 Unmanned plane safe communication link encryption method based on real-time embedded control system
CN111756535A (en) * 2020-06-30 2020-10-09 北京海泰方圆科技股份有限公司 Communication key negotiation method, device, storage medium and electronic equipment
US11637818B2 (en) * 2021-01-29 2023-04-25 Zoom Video Communications, Inc. Securely recording and retrieving encrypted video conferences

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112671691A (en) * 2019-10-16 2021-04-16 重庆傲雄在线信息技术有限公司 Data verification system
CN115022102A (en) * 2022-08-10 2022-09-06 广东电网有限责任公司佛山供电局 Transmission line monitoring data transmission method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN115589504A (en) 2023-01-10

Similar Documents

Publication Publication Date Title
US20250184169A1 (en) Video conference acceleration
US12549354B2 (en) Handling joining and leaving of participants in videoconferencing with end-to-end encryption
US12316618B2 (en) Securely recording and retrieving encrypted video conferences
US12088960B2 (en) Enabling sub-meetings in encrypted video conferences
JP6800169B2 (en) Systems and methods for making secure VOIP multi-party calls
US12074855B2 (en) Securing videoconferencing meetings
CN113347215B (en) Encryption method for mobile video conference
CN109408015A (en) A kind of multimedia file processing method sends terminal and display terminal
CN114866234B (en) Voice communication method, device, equipment and storage based on quantum key encryption and decryption
US12231813B1 (en) Bridging video conference connections
CN112202882B (en) Transmission method, client and transmission system
CN104243146A (en) Encryption communication method and device and terminal
US8745382B2 (en) Method, apparatus, computer program, data storage medium and computer program product for preventing reception of media data from a multicast service by an unauthorized apparatus
CN101505462B (en) Authentication method and system for mobile multimedia broadcast conditional reception
CN115589504B (en) Data processing method, device, equipment and storage medium
EP3979656A1 (en) Encrypted group video system and method
US9461974B2 (en) System and method to merge encrypted signals in distributed communication system
CN106714150B (en) Method for encrypting communication connection and intelligent terminal
US12137072B1 (en) Duplicate message filtering in a multi-region active-active architecture
US20250088607A1 (en) Content stream distribution for videoconferencing via dynamic mesh technology
CN101399960B (en) Method and system for program stream key encryption in broadcast mobile TV service
Kunkelmann et al. Scalable Security Mechanisms in Transport Systems for

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant