Video conference encryption method and systemTechnical Field
The invention relates to the technical field of network multimedia, in particular to a video conference encryption method and system.
Background
In the communication process of various video conferences in the current market, in a meeting system, communication is generally carried out through a network when a network video conference is carried out, and because various network security problems exist, such as leakage of account passwords, interception of conference contents and other security risks.
Although there are many encryption methods, many are not suitable for the encryption process of the video conference.
Especially for video communication between organizations related to national security, encryption based on national secrets is required, and no encryption method is available at present in the face of such encryption methods.
Disclosure of Invention
In order to solve the defects in the prior art, the invention aims to provide a video conference encryption method and system, after symmetrically encrypting a conference media stream, asymmetrically encrypting a symmetric key again, and particularly based on a national cryptographic algorithm, so that the security of a conference is improved, the possibility of being cracked is greatly reduced, and the leakage risk is reduced.
In order to achieve the above object, the present invention provides a video conference encryption method, which comprises the following steps:
1) a client initiates a request for reserving a conference to an conference control server, and the conference control server generates a symmetric key corresponding to the conference;
2) the conference participating client sends a conference joining request to the conference control server;
3) the conference participating client acquires the symmetric key subjected to asymmetric encryption from the conference control server;
4) the participating client carries out asymmetric decryption on the symmetric key subjected to asymmetric encryption to obtain the symmetric key;
5) and the participating client encrypts and/or decrypts the media stream by using the symmetric key.
Further, before the step 2), further comprising,
each participating client sends the identity identification and the password of the participating client to an identity authentication server, and the identity authentication server generates a participating client public key and a participating client private key corresponding to the participating client;
and the participating client acquires the participating client private key from the identity authentication server.
Further, after the step 2), further comprising,
and the conference control server acquires the public key of the conference participating client from the identity authentication server according to the identity of the conference participating client, and asymmetrically encrypts the symmetric key.
Further, in the step 4), further comprising,
and the participating client side carries out asymmetric decryption by using the participating client side private key to obtain the symmetric key.
Further, the conference control server adopts a symmetric key randomly generated by a cryptographic algorithm.
Further, the participating clients comprise a master client and a slave client;
the main client encrypts the media stream by using the symmetric key and sends the encrypted media stream to the media stream server,
one or more of the slave clients obtain the symmetrically encrypted media stream from the media stream server and decrypt the media stream using the symmetric key.
Furthermore, the conference control server asymmetrically encrypts the symmetric key by using a public key of the host client acquired from the identity authentication server and sends the symmetric key to the host client;
the host client obtains the symmetric key by performing asymmetric decryption using a host client private key obtained from the authentication server,
the conference control server asymmetrically encrypts the symmetric key by using a slave client public key acquired from the identity authentication server and then sends the symmetric key to the slave client;
the slave client performs asymmetric decryption by using a slave client private key acquired from the identity authentication server to acquire the symmetric key.
In order to achieve the above object, the present invention further provides a video conference encryption system, which comprises an conference control server, an identity authentication server, a media stream server and a client, wherein,
the conference control server receives the conference reservation request of the client, generates a symmetric key corresponding to the conference, and sends the asymmetric encrypted symmetric key to the conference participating client;
the identity authentication server receives the identity and the password of the participation client and generates a participation client public key and a participation client private key corresponding to the participation client;
and the participating client encrypts the media stream by using the symmetric key and then sends the encrypted media stream to the media stream server, and acquires the media stream encrypted by using the symmetric key from the media stream server for decryption.
Furthermore, the conference control server acquires a conference client public key corresponding to the conference client from the identity authentication server according to the conference access request of the conference client, and asymmetrically encrypts the symmetric key;
and the participating client acquires the participating client private key corresponding to the participating client from the identity authentication server and decrypts the symmetric key.
To achieve the above object, the present invention further provides a computer readable storage medium having stored thereon computer instructions which, when executed, perform the steps of the video conference encryption method as described above.
The video conference encryption method and the system have the following beneficial effects:
1) the conference media stream is symmetrically encrypted, and the symmetric key is asymmetrically encrypted, so that the security of the conference is improved.
2) The possibility of being cracked is greatly reduced, and the leakage risk is reduced.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flow chart of a video conference encryption method according to the present invention;
fig. 2 is a schematic structural diagram of a video conference encryption system according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example 1
Fig. 1 is a flowchart of a video conference encryption method according to the present invention, and the video conference encryption method of the present invention will be described in detail with reference to fig. 1.
First, instep 101, thehost client 40 of the video conference encryption system initiates a reservation request of a symmetric encrypted conference to theconference control server 10, and applies for generating a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference.
In this embodiment, the reservation request sent by thehost client 40 of the video conference encryption system includes the identification ID _ a of thehost client 40 and the symmetric encrypted conference type.
Instep 102, theconference control server 10 of the video conference encryption system generates a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference according to the reservation request sent by thehost client 40.
In this embodiment, the symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference is generated by theconference control server 10 according to the symmetric encrypted conference type in the reservation request of each symmetric encrypted conference, and is only effective for the symmetric encrypted conference process. Preferably, the symmetric KEY (SYM _ KEY) is generated by using a cryptographic algorithm, such as the cryptographic SM4 algorithm, so that the possibility of being cracked is greatly reduced.
Instep 103, thehost client 40 of the videoconference encryption system sends a request to obtain the asymmetric private KEY (PRI _ KEY _ a) to the authentication server 20, and obtains its corresponding asymmetric private KEY (PRI _ KEY _ a) from the authentication server 20.
In this embodiment, the request for obtaining the asymmetric private KEY (PRI _ KEY _ a) sent by thehost client 40 includes an identity (ID _ a) of thehost client 40 and a password for identity identification.
The authentication server 20 generates an asymmetric public KEY (PUB _ KEY _ a) and an asymmetric private KEY (PRI _ KEY _ a) corresponding to thehost client 40 according to the identity and the password of thehost client 40.
In this embodiment, the authentication server 20 generates the asymmetric public KEY (PUB _ KEY _ a) and the asymmetric private KEY (PRI _ KEY _ a) by using a cryptographic algorithm, such as the cryptographic SM9 algorithm.
Preferably, in order to ensure the secure transmission of the asymmetric private key corresponding to the client, the asymmetric private key may be transmitted in a non-network manner.
Preferably, in order to ensure that the sending client receives the corresponding asymmetric private key, when the client obtains the asymmetric private key, the identity authentication server performs identity verification by comparing the identity and the password thereof with information already registered on the identity authentication server.
Atstep 104, thehost client 40 sends a conference entry request and an identification to theconference server 10 of the video conference encryption system.
In this embodiment, thehost client 40 sends its own identity (ID _ a) to theconference control server 10 of the video conference encryption system to request for conference entry.
Instep 105, theconference control server 10, after receiving the conference joining request from thehost client 40, obtains the asymmetric public KEY (PUB _ KEY _ a) corresponding to thehost client 40 from the authentication server 20 by using the identification (ID _ a) of thehost client 40.
Instep 106, theconference control server 10 encrypts the symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference by using the asymmetric public KEY (PUB _ KEY _ a) corresponding to thehost client 40 and sends the encrypted symmetric KEY (SYM _ KEY) to thehost client 40.
In this embodiment, the symmetric KEY is encrypted according to the corresponding asymmetric public KEY (PUB _ KEY _ a) of the client that makes the request after being generated, which ensures that the symmetric KEY is not leaked during transmission, and even if the corresponding public KEY is leaked, the corresponding private KEY cannot be decrypted without the corresponding private KEY.
Instep 107, thehost client 40 receives the encrypted symmetric KEY, and decrypts the encrypted symmetric KEY using the asymmetric private KEY (PRI _ KEY _ a) obtained instep 103 to obtain the original symmetric KEY (SYM _ KEY).
Instep 108, thehost client 40 encrypts the media stream of the symmetric encrypted conference using the symmetric KEY (SYM KEY) and transmits the encrypted media stream to themedia stream server 30 of the symmetric encrypted conference.
In this embodiment, thehost client 40 directly encrypts the media stream after obtaining the symmetric KEY (SYM _ KEY).
Instep 109, a get asymmetric private KEY (PRI _ KEY _ B) request is sent from the client 50 to the authentication server 20, and the corresponding asymmetric private KEY (PRI _ KEY _ B) is obtained from the authentication server 20.
In this embodiment, the request for obtaining the asymmetric private KEY (PRI _ KEY _ B) sent from the client 50 to the authentication server 20 includes the identity (ID _ B) of the client 50 and the password used for identification from the client 50.
In this embodiment, the slave client 50 applies for joining the symmetric encrypted conference initiated by themaster client 40, sends its own ID _ B and password to the authentication server 20 of the video conference encryption system, and obtains its corresponding asymmetric private KEY PRI _ KEY _ B. In this step, the step is the same as the step in which thehost client 40 obtains its corresponding asymmetric private KEY (PRI _ KEY _ a) in step 203.
Instep 110, a conference entry request and an identification (ID _ B) are sent from the client 50 to theconference server 10 of the videoconference encryption system.
In this embodiment, the client 50 sends its own identification (ID _ B) to theconference control server 10 of the video conference encryption system to request for conference entry.
Instep 111, after receiving the conference entry request from the client 50, theconference control server 10 of the video conference encryption system obtains the asymmetric public KEY PUB _ KEY _ B corresponding to the slave client 50 from the authentication server 20 by using the identification ID _ B and the password of the slave client 50.
Instep 112, theconference control server 10 of the video conference encryption system encrypts the symmetric KEY SYM _ KEY of the conference using the asymmetric public KEY PUB _ KEY _ B and sends the encrypted symmetric KEY SYM _ KEY to the slave client 50. In this step, the encrypted symmetric key is obtained from the client 50.
Instep 113, the encrypted symmetric KEY is received from the client 50, and decrypted by using the asymmetric private KEY (PRI _ KEY _ B) obtained instep 109 to obtain the original symmetric KEY SYM _ KEY, in which the symmetric KEY is obtained from the client 50.
Instep 114, the slave client 50 receives the media stream of the video conference encrypted by themaster client 40 from the video conferencemedia stream server 30, and decrypts the media stream using the symmetric KEY SYM _ KEY. In this step, the process of decrypting the symmetric key from the client 50 further reduces the risk of leakage.
Example 2
Fig. 2 is a schematic structural diagram of a video conference encryption system according to the present invention, and as shown in fig. 2, the video conference encryption system of the present invention includes aconference control server 10, an authentication server 20, amedia streaming server 30, amaster client 40, and a slave client 50, wherein,
theconference control server 10 receives a reservation request of themain client 40 requesting the symmetric encrypted conference, and generates a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference; receiving a conference joining request of thehost client 40, and acquiring an asymmetric public KEY (PUB _ KEY _ a) corresponding to thehost client 40 from the authentication server 20 by using the identification (ID _ a) of thehost client 40; receiving a conference-in request from the client 50, acquiring an asymmetric public KEY (PUB _ KEY _ B) corresponding to the slave client 50 from the authentication server 20 using the identification (ID _ B) of the slave client 50; encrypting a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference by using an asymmetric public KEY (PUB _ KEY _ A) corresponding to thehost client 40 and sending the encrypted symmetric KEY (SYM _ KEY) to thehost client 40; encrypting a symmetric KEY (SYM _ KEY) corresponding to the symmetric encrypted conference by using an asymmetric public KEY (PUB _ KEY _ B) corresponding to the slave client 50 and transmitting the encrypted symmetric KEY (SYM _ KEY) to the slave client 50;
in this embodiment, theconference control server 10 generates a symmetric KEY (SYM _ KEY) by using a cryptographic algorithm (e.g., the cryptographic SM4 algorithm).
The identity authentication server 20 receives a request for acquiring an asymmetric private KEY (PRI _ KEY _ a) sent by theprimary client 40, and generates an asymmetric private KEY (PRI _ KEY _ a) corresponding to theprimary client 40 according to the identity and the password of theprimary client 40; receiving a request for obtaining the asymmetric private KEY (PRI _ KEY _ B) from the client 50, and generating the asymmetric private KEY (PRI _ KEY _ B) corresponding to the client 50 according to the identity and the password of the client 50.
In this embodiment, the request for obtaining the asymmetric private KEY (PRI _ KEY _ a) sent by theprimary client 40 includes the identity (ID _ a) of theprimary client 40 and the corresponding password that has been registered on the authentication server for identity identification; the request for obtaining the asymmetric private KEY (PRI _ KEY _ B) sent from the client 50 includes the identity (ID _ B) of the client 50 and the corresponding password that has been registered to the authentication server for identification.
In this embodiment, the asymmetric private key method generated by the identity authentication server 20 is generated by using a cryptographic algorithm, such as the cryptographic SM9 algorithm.
Amedia stream server 30 for storing the media stream encrypted by using a symmetric KEY (SYM _ KEY) transmitted by thehost client 40; the media stream encrypted using the symmetric KEY (SYM KEY) is transmitted to the slave client 50.
Amaster client 40, which sends a symmetric encrypted conference reservation request to theconference control server 10, and applies for generating a symmetric KEY (SYM _ KEY); acquiring a corresponding asymmetric private KEY (PRI _ KEY _ a) from the authentication server 20; sending a conference entering request to theconference control server 10, and receiving a symmetric KEY (SYM _ KEY) encrypted by theconference control server 10 by using an asymmetric public KEY (PUB _ KEY _ a) corresponding to thehost client 40; decrypting the symmetric KEY (SYM _ KEY) by using the corresponding asymmetric private KEY (PRI _ KEY _ A) to obtain the symmetric KEY (SYM _ KEY); the media stream is encrypted using a symmetric KEY (SYM KEY) and transmitted to themedia streaming server 30.
Acquiring a corresponding asymmetric private KEY (PRI _ KEY _ B) from the authentication server 20 from the client 50; sending a conference entry request to theconference control server 10, and receiving a symmetric KEY (SYM _ KEY) encrypted by theconference control server 10 using a corresponding asymmetric public KEY (PUB _ KEY _ B) from the client 50; decrypting the symmetric KEY (SYM _ KEY) by using the corresponding asymmetric private KEY (PRI _ KEY _ B) to obtain the symmetric KEY (SYM _ KEY); the media stream encrypted using the symmetric KEY (SYM KEY) sent by themedia stream server 30 is received and decrypted.
Example 3
In an embodiment of the present invention, a computer-readable storage medium is further provided, on which a computer program is stored, where the computer program executes the steps of the video conference encryption method described above.
Those of ordinary skill in the art will understand that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.