Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those skilled in the art are not having
Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
In the description of the present invention, it should be noted that term " center ", "upper", "lower", "left", "right", "vertical",
The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to
Convenient for description the present invention and simplify description, rather than the device or element of indication or suggestion meaning must have a particular orientation,
It is constructed and operated in a specific orientation, therefore is not considered as limiting the invention.In addition, term " first ", " second ",
" third " is used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance.
In the description of the present invention, it should be noted that unless otherwise clearly defined and limited, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
To be mechanical connection, it is also possible to be electrically connected;It can be directly connected, can also indirectly connected through an intermediary, it can be with
It is the connection inside two elements, can be wireless connection, be also possible to wired connection.For those of ordinary skill in the art
For, the concrete meaning of above-mentioned term in the present invention can be understood with concrete condition.
As long as in addition, the non-structure each other of technical characteristic involved in invention described below different embodiments
It can be combined with each other at conflict.
Fig. 1 is the application scenarios schematic diagram of the embodiment of the present invention.First terminal and second terminal can be mobile phone or plate
Computer etc. has the mobile terminal of WIFI module, is interacted between first terminal and second terminal by server, and first eventually
End and second terminal are each equipped with the first encrypting module (such as TF card encryption chip), and server is also configured with the second encrypting module
(such as high-speed encryption card).In order to realize electric power scene remote collaboration guide message communication security, need in first terminal, second
The structural data transmitted between terminal and server carries out encrypted transmission, to improve the safety of message communicating;Together
When in order to realize the high-speed transfer of audio/video flow, need directly to transmit between first terminal, second terminal and server
The individual transmission that is not encrypted of unstructured data (such as audio-visual message), to realize the real-time of unstructured data
Communication.
The present embodiment provides a kind of data safe transmission methods, can be applied in the guidance of electric power scene remote collaboration, to electricity
The message communicating of field of force scape remote collaboration guidance carries out safe encryption, carries out non-encrypted transmission to audio/video flow, solves existing
The high-speed transfer of the encryption of electric power scene remote collaboration guide message communication security and audio/video flow is not can be implemented simultaneously in technology
Problem.Fig. 2 is the flow chart of a specific example of data safe transmission method in the present embodiment, as shown in Fig. 2, the data are pacified
Full transmission method is applied to terminal side, includes the following steps S1-S3.
Step S1: first terminal obtains first message communication structure data;Wherein, first message communication structure data
Including at least one of call request message, control signaling request message.
In an alternative embodiment, the control signaling request message that first terminal obtains may include the user name of first terminal
(UserName), User ID (UserID), IP address, message sending end slogan, message sink port numbers, audio video transmission port
Number;In another alternative embodiment, control signaling request message may also comprise a part in above-mentioned message, as needed rationally
Setting;Certainly, in other embodiments, control signaling request message may also include other letters in addition to above-mentioned message
It ceases, specific message included by control signaling request message can be determined rationally according to actual needs.
In an alternative embodiment, first message communication structure data include call request message and control signaling request
Message;In other alternative embodiments, first message communication structure data may also include part messages among the above, may be used also
Including other message in addition to above-mentioned message, rationally setting as needed.
In an alternative embodiment, first terminal first can send call request message to second terminal by server;
And then the corresponding call answering message of second terminal feedback is obtained by server;Then, then pass through server to second
Terminal sends control signaling request message;Finally, obtaining the call answering message of second terminal feedback by server, calling is answered
Answering message may include the IP address of second terminal, message sending end slogan and message sink port numbers, audio video transmission port numbers.
Certainly, in other embodiments, call request message and control signaling request message can also be sent to second terminal simultaneously, according to
It needs rationally to be arranged, the present embodiment is not construed as limiting this.
Step S2: first terminal encrypts first message communication structure data.
It, can be by the TF card encryption chip that is configured in first terminal to first message communication structure in an alternative embodiment
Change data to be encrypted.Certainly, in other embodiments, first terminal also can be used other encrypting modules in the prior art into
Row encryption, as needed rationally setting.
In an alternative embodiment, the key of rivest, shamir, adelman management symmetry algorithm is can be used in first terminal, symmetrically
Encryption Algorithm encrypts first message communication structure data;Rivest, shamir, adelman can be RSA, DSA or ECC etc., symmetrically add
Close algorithm can be DES, 3DES or AES etc..Certainly, in other embodiments, other encryptions in the prior art also can be used
Mode encrypts first message communication structure data, reasonably selects cipher mode, this implementation according to actual needs
Example is not construed as limiting this.
Step S3: encrypted first message communication structure data are sent to server by first terminal, to pass through clothes
Business device establishes the connection of first terminal and second terminal.
In an alternative embodiment, specifically, first terminal sends encrypted first message communication structure data
To server, server forwards it to second terminal again and just establishes communication link between first terminal and second terminal in this way
It connects.Server can be according to User ID and user name Query IP address, video calling port numbers, meeting room ID and meeting
The information such as room title, and user message table is opened in cache maintenance one, after server receives first message communication structure data
The relevant information of the second terminal of connection is established needed for can finding in user message table, and eventually according to second inquired
First message communication structure data are sent to second terminal by the relevant information at end.
For example, one-to-one message call: it is assumed that first terminal A wants to establish connection with second terminal B, first terminal A to
Second terminal B initiates message call, and first terminal A sends message related to calls to server, and server can pass through disappearing in server
Message is forwarded by breath service module gives second terminal B, after second terminal B receives message, receives or refusal carries out calling and disappears
Breath.
In another example one-to-many message call: it is assumed that first terminal A wants to establish connection with second terminal B, third terminal C,
First terminal A initiates message call to second terminal B, third terminal C, and first terminal A sends message related to calls, service to server
Message is forwarded to second terminal B and third terminal C by device messaging service module, and second terminal B and third terminal C reception disappear
After breath, receives or refusal carries out call request.
It should be noted that, although first terminal, second terminal in the present embodiment etc. is by taking a mobile terminal as an example
It is described, the present embodiment only schematically illustrates, and is not limited thereto.It should be understood by those skilled in the art that being first
Terminal A may include several mobile terminals, and second terminal B may also comprise several mobile terminals, first terminal A and second terminal
The specific number of B can be rationally arranged according to actual needs.
Above-mentioned data safe transmission method, first terminal are sent to after being encrypted first message communication structure data
Encrypted communication structure data are sent to second terminal by server, to establish first terminal and second by server
Connection between terminal.The message communication structure data transmitted between first terminal and server are passed in a manner of encrypting
It is defeated, improve the safety of message communicating;Meanwhile directly to the unstructured data transmitted between first terminal and server
The individual transmission that (such as audio-visual message) is not encrypted improves sound to realize the real time communication of unstructured data
The high-speed transfer of video flowing.
In an alternative embodiment, as shown in figure 3, obtaining first message communication structure data in step S1 first terminal
The step of before, further include step S4-S7.
Step S4: first terminal obtains second message communication structure data;Wherein, second message communication structure data
Including at least one of endpoint to register message, heartbeat message.
In an alternative embodiment, endpoint to register message may include ID users, user name;In another alternative embodiment
In, endpoint to register message may also comprise a part in above-mentioned message, as needed rationally setting;Certainly, in other realities
It applies in example, endpoint to register message may also include the other information in addition to above-mentioned message, specific included by endpoint to register message
Message can be determined rationally according to actual needs.
In an alternative embodiment, second message communication structure data include the endpoint to register message and the heart of first terminal
Jump message;In other alternative embodiments, first message communication structure data may also include part messages among the above, also
It may include other message in addition to above-mentioned message, rationally setting as needed.
It should be noted that the endpoint to register message and heartbeat message of second terminal can be also sent to service by second terminal
Device;Similarly, itself terminal volume message and heartbeat message can be also sent to clothes by other terminals such as third terminal, the 4th terminal
Business device, will pass through the communication connection that server is established between different terminals.
Step S5: first terminal encrypts second message communication structure data.
It, can be by the TF card encryption chip that is configured in first terminal to second message communication structure in an alternative embodiment
Change data to be encrypted.Certainly, in other embodiments, first terminal also can be used other encrypting modules in the prior art into
Row encryption, as needed rationally setting.
In an alternative embodiment, the key of rivest, shamir, adelman management symmetry algorithm is can be used in first terminal, symmetrically
Encryption Algorithm encrypts second message communication structure data;Rivest, shamir, adelman can be RSA, DSA or ECC etc., symmetrically add
Close algorithm can be DES, 3DES or AES etc..Certainly, in other embodiments, other encryptions in the prior art also can be used
Mode encrypts second message communication structure data, reasonably selects cipher mode, this implementation according to actual needs
Example is not construed as limiting this.
Step S6: encrypted second message communication structure data are sent to server by first terminal;So that service
Device establishes the online list of terminal according to second message communication structure data, and encrypts to the online list of terminal.
In an alternative embodiment, the second message communication structure data that server is sent according to first terminal are being cached
One online list of terminal (the online table of user) of middle maintenance, newly increases user's registration every time, to the whole network broadcasting user online information,
Heartbeat function is kept with each user, when user offline or abnormal disconnection, then to the offline message of the whole network broadcasting user.Specifically
Ground, after each meeting is initiated, server safeguards a meeting room lists of persons (the online list of terminal) in the buffer, is added when new
Meeting room to meeting room line personnel multicast, while being had lists of persons and issued newly into personnel, when useful by meeting personnel's message
Meeting is exited at family, then message server will move out meeting personnel message to meeting room other staff's multicast.
Step S7: first terminal receives the online list of encrypted terminal that server is sent.
In an alternative embodiment, specifically, first terminal receives the encrypted terminal of server transmission in alignment
Table, second terminal can the client configuration interface of terminal can see in user list user whether online message, according to
Other terminals that the online list of terminal connects needed for determining.
In alternative embodiment, as shown in figure 3, in step S3 by encrypted first message communication structure data
It further include step S8-S10 after the step of being sent to server.
Step S8: first terminal receives the encrypted third message communication structure for the second terminal feedback that server is sent
Change data;Wherein, third message communication structure data include call answering message, in control signaling response message at least it
One.
In an alternative embodiment, third message communication structure data include call answering message and control signaling response
Message;In other alternative embodiments, third message communication structure data may also include part messages among the above, may be used also
Including other message in addition to above-mentioned message, rationally setting as needed.
In an alternative embodiment, call answering message may include the IP address of second terminal, message sending end slogan, disappear
Cease receiving port number, audio video transmission port numbers;In other embodiments, the particular content that call answering message is included can root
According to needs rationally setting.
Step S9: first terminal obtains the first audio/video flow unstructured data, and the first audio/video flow is unstructured
Data are sent to server.
In an alternative embodiment, the first audio/video flow unstructured data can be the first voice and video telephone.
Step S10: first terminal receives the unstructured number of the second audio/video flow for the second terminal feedback that server is sent
According to.Second terminal receives the second audio/video flow unstructured data of first terminal feedback, shows first terminal and second eventually
End can carry out smooth voice and video telephone.
Above-mentioned data safe transmission method carries out non-encrypted transmission to unstructured datas such as audio/video flows, sets in electric power
Standby electromagnetism, noise etc. interfere larger and wireless network unstable, especially in the lower situation of mobile terminal hardware handles performance, protect
The high speed facile transport of audio/video flow is demonstrate,proved.
In alternative embodiment, as shown in figure 3, second in the reception server transmission of step S10 first terminal is whole
It further include step S11-S12 after the step of holding the second audio/video flow unstructured data of feedback.
Step S11: first terminal obtains the 4th message communication structure data;Wherein, the 4th message communication structure number
At least one of markup information, target following markup information, exit message are instructed according to including drawing.
In an alternative embodiment, the 4th message communication structure data include drawing to instruct markup information, target following
Markup information, exit message;In other alternative embodiments, the 4th message communication structure data may also include among the above
Part messages may also include other message in addition to above-mentioned message, as needed rationally setting.
Specifically, first terminal can by server first to second terminal send draw instruct markup information, target with
Track markup information;And then exit message is first sent to second terminal by server.
In an alternative embodiment, first terminal carries out drawing guidance to target first, then uses the mesh based on feature
Mark tracks and identifies algorithm, carries out identification matching and tracking to target object, realizes drawing guidance and target following identification mark.
Step S12: first terminal encrypts the 4th message communication structure data, and by encrypted 4th message
Communication structure data are sent to server.
In an alternative embodiment, during voice and video telephone, first terminal A is at second terminal B video display interface
Picture and text tutorial message is sent to server by upper progress picture and text mark, first terminal A, and server is transmitted to second terminal B,
Graph text information is carried out on two terminal B to redraw, and realizes target following identification mark.
Above-mentioned data safe transmission method, by instructing the electric power such as markup information, target following markup information real drawing
Border guide message is transmitted after being encrypted, and electric power scene remote collaboration instructs end-user listening data, message communicating, control signaling etc.
Structural data carries out secure encrypted transmission, it is therefore prevented that data are stolen, and have ensured information communications safety, have further increased
The safety of data communication.
As a specific embodiment of the present embodiment, as shown in figure 4, the data safe transmission method, including configuration
Three interface manager module, message processing module and medium process module parts.
Configuration interface management module includes terminal management, management and group, video display interface, draw mark, multi-channel video
It is laid out the parts such as displaying, terminal log management.Message processing module includes endpoint to register, message generates, message is sent, message connects
It receives, Message Processing, the online heartbeat message of user, picture and text instruct drawing message, target following annotated message, audio-video control signaling
The parts such as negotiation information.Medium process module includes audio/video flow, audio coding decoding, coding and decoding video, audio/video flow synchronization, sound
Pushing video streaming, audio/video flow reception, video comfort and quality enhancing, audio echo cancellation, the superposition of picture and text tutorial message, target
The superposition of tracking mark, audio-video play in real time, multi-channel video implements the parts such as switching.Wherein, audio coding decoding using AAC,
The audio coding decodings agreement such as PUS, PCM, coding and decoding video use H264 video encoding protocol, and video resolution supports vga
(640x480), svga (800x600), 720p (1280x720) etc..
The data safe transmission method carries out non-encrypted transmission to unstructured datas such as audio/video flows, in power equipment
Electromagnetism, noise etc. interfere larger and wireless network unstable, especially in the lower situation of mobile terminal hardware handles performance, guarantee
The high speed facile transport of audio/video flow.Electric power scene remote collaboration instructs the user data, message communicating, control signaling of terminal
Equal structural datas carry out secure encrypted transmission, it is therefore prevented that data are stolen, and have ensured information communications safety.
The present embodiment also provides a kind of data safe transmission method, is applied to server side, as shown in figure 5, including as follows
Step S13-S14.
Step S13: encrypted first message communication structure data are received from first terminal;Wherein, first message is logical
Believe that structural data includes at least one of call request message, control signaling request message.
In an alternative embodiment, first message communication structure data are the data that first terminal is sent to server,
It specifically is detailed in step S1, details are not described herein.
Step S14: the company of first terminal and second terminal is established according to encrypted first message communication structure data
It connects.
In an alternative embodiment, server receives encrypted first message by radio receiving transmitting module (such as WIFI) and leads to
Believe structural data, and first terminal is sent the data to by radio receiving transmitting module.
Above-mentioned data safe transmission method is moved applied in the electric power scene remote collaboration guidance of hardware security encryption
There are a large amount of real-time unstructured datas in internet audiovisual applications, voice and video telephone data should be prevented to be easy to be stolen, again
Ensure message communicating and secure user data transmission.It therefore, is that message communication structure data and sound regard by sub-data transmission
Frequency stream unstructured data, and individual transmission is carried out to the data of both types, realize the guidance of electric power scene remote collaboration
Message communicating encrypts safely, has ensured data transmission security.
In an alternative embodiment, as shown in fig. 6, step S13 receives encrypted first message communication from first terminal
It further include step S15-S18 before the step of structural data.
Step S15: encrypted second message communication structure data are received from first terminal;Wherein, second message is logical
Believe that structural data includes at least one of endpoint to register message, heartbeat message.
In an alternative embodiment, second message communication structure data are the data that first terminal is sent to server,
It specifically is detailed in step S4, details are not described herein.
Step S16: the online list of terminal is established according to encrypted second message communication structure data.
In an alternative embodiment, the second message communication structure data that server is sent according to first terminal are being cached
One online list of terminal (the online table of user) of middle maintenance, newly increases user's registration every time, to the whole network broadcasting user online information,
Heartbeat function is kept with each user, when user offline or abnormal disconnection, then to the offline message of the whole network broadcasting user.Specifically
Ground, after each meeting is initiated, server safeguards a meeting room lists of persons (the online list of terminal) in the buffer, is added when new
Meeting room to meeting room line personnel multicast, while being had lists of persons and issued newly into personnel, when useful by meeting personnel's message
Meeting is exited at family, then message server will move out meeting personnel message to meeting room other staff's multicast.
Step S17: the online list of terminal is encrypted.
In an alternative embodiment, server can be encrypted the online list of terminal by the high-speed encryption card configured,
The code key that specifically symmetry algorithm can be managed by disposing rivest, shamir, adelman (RSA, DSA, ECC etc.) in encrypted card, symmetrically
Encryption Algorithm (DES, 3DES, AES etc.) encrypts audio-visual message communication data, passes through WIFI/4G virtual Private Network and each terminal
Establish encrypted tunnel.
Step S18: the online list of encrypted terminal is sent to first terminal and second terminal.
In an alternative embodiment, the online list of encrypted terminal is sent to each terminal, each terminal by server
The online situation of different terminals can be learnt according to this list information, and establishes the connection between different terminals according to this.
In an alternative embodiment, as shown in fig. 6, step S14 is according to encrypted first message communication structure data
It further include step S19-S22 after the step of establishing the connection of first terminal and second terminal.
Step S19: encrypted third message communication structure data are received from second terminal;Wherein, third message is logical
Believe that structural data includes at least one of call answering message, control signaling response message.
In an alternative embodiment, third message communication structure data are the data that first terminal is sent to server,
It specifically is detailed in step S8, details are not described herein.
Step S20: encrypted third message communication structure data are sent to first terminal.
In an alternative embodiment, encrypted third message communication structure data that server sends second terminal
It is sent to first terminal, first terminal just receives the response feedback of second terminal, in this way can be whole in first terminal and second
It is communicatively coupled between end.
Step S21: the first audio/video flow unstructured data is received from first terminal, and the first audio/video flow is non-structural
Change data and is sent to second terminal.
In an alternative embodiment, the first audio/video flow unstructured data may include audio data and video data;?
In another alternative embodiment, the first audio/video flow unstructured data can also only include audio data or video data, specifically
The content for being included can be determined rationally according to actual needs.
Step S22: the second audio/video flow unstructured data is received from second terminal, and the second audio/video flow is non-structural
Change data and is sent to first terminal.
In an alternative embodiment, the second audio/video flow unstructured data may include audio data and video data;?
In another alternative embodiment, the first audio/video flow unstructured data can also only include audio data or video data, specifically
The content for being included can be determined rationally according to actual needs.
In an alternative embodiment, server can ensure that transmission speed by transmitting audio/video flow on non-encrypted channel
Rate;Message communicating is transmitted on safe encrypted tunnel, ensure that the safety of message communicating.
In an alternative embodiment, as shown in fig. 6, the second audio/video flow unstructured data is sent in step S22
It further include step S23-S24 after the step of first terminal.
Step S23: encrypted 4th message communication structure data are received from first terminal;Wherein, the 4th message is logical
Letter structural data includes drawing to instruct at least one of markup information, target following markup information, exit message.
In an alternative embodiment, the 4th message communication structure data are the data that first terminal is sent to server,
It specifically is detailed in step S11, details are not described herein.
Step S24: encrypted 4th message communication structure data are sent to second terminal.
By step S23 and S24, picture and text mark is carried out to the video of second terminal acquisition on first terminal, passes through clothes
Markup information is sent to second terminal by business device;Second terminal carries out redrawing picture and text mark, realizes picture and text guidance and target following
Mark instructs the electric operating of second terminal to realize first terminal.
As a specific embodiment of the present embodiment, as shown in fig. 7, the data safe transmission method, including system
Three management module, messaging service module and media services module parts.
System management module includes terminal management, management and group, Role Management, rights management, history video management, log
The parts such as management.Messaging service module includes endpoint to register, message sink, message forwarding, Message Processing, the online list dimension of user
Shield, picture and text instruct the parts such as drawing message, target following identification message, the negotiation of audio-video control signaling.Media services module packet
Include transmission process control, Bandwidth Management, congestion control, multi-channel video receive, multi-channel video forwarding, multi-channel video synthetic recording and
The parts such as storage, terminal access.
Wherein, messaging service module concrete function is as follows:
(a) endpoint to register
On the basis of TCP connection, client initiates registering functional to message server, and ID users, user name are issued
Message server, server is according to User ID and user name Query IP address, video calling port numbers, meeting room ID
With the information such as conference room name, and user message table is opened in cache maintenance one, after succeeding in registration, it is true that message server returns to ACK
Recognize information.
(b) the online list maintenance of user
Message server safeguards the online table of user in the buffer, newly increases user's registration every time, broadcasts and uses to the whole network
Family online information keeps heartbeat function with each user, when user offline or abnormal disconnection, then offline to the whole network broadcasting user
Message, client configuration interface can see in user list personnel whether online message.
(c) one-to-one and one-to-many message call
One-to-one message call: it is assumed that first terminal A, second terminal B, first terminal A initiates message to second terminal B and exhales
It cries, first terminal A sends message related to calls to video server, and message is forwarded to second eventually by server message service module
After holding B, second terminal B to receive message, receives or refusal carries out video calling.
One-to-many message call: it is assumed that first terminal A, second terminal B, third terminal C, first terminal A is to second terminal
B, third terminal C initiates message call, and first terminal A sends message related to calls, video server messaging service to video server
Message is forwarded to second terminal B, third terminal C by module, after second terminal B, third terminal C receive message, receive or
Refusal carries out video calling.
(d) personnel enter or exit in meeting room
After each meeting is initiated, message server safeguards a meeting room lists of persons in the buffer, when newly addition meeting
Meeting room to meeting room line personnel multicast, while being had lists of persons and issued newly into personnel by personnel's message, when there is user to move back
Meeting out, then message server will move out meeting personnel message to meeting room other staff's multicast.
(e) picture and text guidance and target identification track markup information
It is assumed that terminal A, B, C, during video collaboration: carrying out picture and text mark to the video of B acquisition on intelligent terminal A
Note, is sent to B, C for markup information by message server;Terminal B, C carries out redrawing picture and text mark, realizes picture and text guidance and mesh
Mark tracking mark.Drawing guidance is carried out to target first, the target following recognizer based on feature is then used, to object
Body carries out identification matching and tracking, realizes drawing guidance and target following identification mark.
Fig. 8 is the flow chart of the specific example communicated between terminal and server in the present embodiment, with first
It carries out being described in detail for One-to-one communication between terminal A and second terminal B.As shown in figure 12, whole flow process is specifically wrapped
It includes:
(a) endpoint to register: first terminal A registers UserName and UserID, video server end dimension to video server
Protect terminal list.
(b) heartbeat message: first terminal A timing sends heartbeat message, video server updating maintenance to video server
The online list of terminal, and timing pushes the online list of terminal to first terminal A and second terminal B.
(c) message related to calls: first terminal A initiates audio-video call request, video server forwarding request to second terminal B
After message gives second terminal B, second terminal B to receive message, call request is responded.
(d) control signaling message: first terminal A is initiated in audio-video request message to second terminal B, includes control letter
Message is enabled, as UserName, UserID of first terminal A, IP address, message send and receive port numbers, audio video transmission end
Slogan, UserName, UserID of audio-video second terminal B), IP in second terminal B response message comprising second terminal B
Location, message send and receive port numbers, audio video transmission port numbers.
(e) voice and video telephone: if second terminal B receives first terminal A message related to calls, according to negotiate control signaling, into
The call of row audio/video flow.
(f) picture and text guidance and target following markup information
During voice and video telephone, first terminal A carries out picture and text mark on second terminal B video display interface, the
Picture and text tutorial message is sent to video server by one terminal A, and server is transmitted to second terminal B, is carried out on second terminal B
Graph text information is redrawn, and realizes target following identification mark.
Fig. 9 is the schematic diagram of the specific example communicated between terminal and server in the present embodiment.Such as Fig. 9 institute
Show, the structural datas such as message communicating are transmitted on safe encrypted tunnel, and the unstructured datas such as audio/video flow add non-
It is transmitted on close channel.
The secret of rivest, shamir, adelman (RSA, DSA, ECC etc.) management symmetry algorithm specifically can be used in message communicating encryption
Key, then symmetric encipherment algorithm (DES, 3DES, AES etc.) encryption data.Mobile terminal configuration TF card encryption chip, Video service
Device configuration high-speed encrypted card establishes hardware encrypted tunnel by WIFI/4G wireless network.Added using hardware cipher mode
It is close, on encrypted tunnel transmit endpoint to register, heartbeat message, message related to calls, control signaling negotiation message, picture and text guidance draw and
Target following markup information;The transmission of the unstructured datas such as audio-video is then transmitted by non-encrypted channel;It both realizes in this way
Electric power scene remote collaboration guide message communication security encrypted transmission, and realize the high speed facile transport of audio/video flow.
A kind of data safe transmission system is additionally provided in the present embodiment, and the system is for realizing above-described embodiment and excellent
Embodiment is selected, the descriptions that have already been made will not be repeated.As used below, predetermined function may be implemented in term " module "
Software and/or hardware combination.Although device described in following embodiment is preferably realized with software, hardware,
Or the realization of the combination of software and hardware is also that may and be contemplated.
As shown in Figure 10, the data safe transmission system provided in the present embodiment is applied to terminal side, comprising: first obtains
Modulus block 1, first processing module 2 and the first sending module 3.
First obtains module 1, obtains first message communication structure data for first terminal;Wherein, first message is logical
Believe that structural data includes at least one of call request message, control signaling request message;Detailed content refers to step S1
It is described.
First processing module 2 encrypts first message communication structure data for first terminal;Detailed content ginseng
It examines described in step S2.
Encrypted first message communication structure data are sent to service for first terminal by the first sending module 3
Device, to establish the connection of the first terminal and second terminal by server;Detailed content is with reference to described in step S3.
In an alternative embodiment, the data safe transmission system further include: third obtain module, Second processing module,
Third sending module and the first receiving module.
Third obtains module, obtains second message communication structure data for first terminal;Wherein, second message communicates
Structural data includes at least one of endpoint to register message, heartbeat message;Detailed content is with reference to described in step S4.
Second processing module encrypts the second message communication structure data for first terminal;In in detail
Hold with reference to described in step S5.
Encrypted second message communication structure data are sent to service for first terminal by third sending module
Device;So that server establishes the online list of terminal according to second message communication structure data, and carries out to the online list of terminal
Encryption;Detailed content is with reference to described in step S6.
First receiving module receives the online list of encrypted terminal that the server is sent for first terminal;In detail
Thin content is with reference to described in step S7.
In alternative embodiment, data safe transmission system further include: the second receiving module, third processing module
With third receiving module.
Second receiving module, the encrypted third for receiving the second terminal feedback that server is sent for first terminal disappear
Message communication structural data;Wherein, third message communication structure data include call answering message, control signaling response message
At least one of;Detailed content is with reference to described in step S8.
Third processing module obtains the first audio/video flow unstructured data for first terminal, and by the first audio-video
Stream unstructured data is sent to server;Detailed content is with reference to described in step S9.
Third receiving module, the second audio/video flow for receiving the second terminal feedback that server is sent for first terminal are non-
Structural data;Detailed content is with reference to described in step S10.
In another alternative embodiment, the data safe transmission system further include: the 4th obtains module and fourth process
Module.
4th obtains module, obtains the 4th message communication structure data for first terminal;Wherein, the 4th message communicating
Structural data includes drawing to instruct at least one of markup information, target following markup information, exit message;Detailed content
With reference to described in step S11.
Fourth processing module encrypts the 4th message communication structure data for first terminal, and will be after encryption
The 4th message communication structure data be sent to server;Detailed content is with reference to described in step S12.
As shown in figure 11, the data safe transmission system provided in the present embodiment is applied to server side, comprising: second
Obtain module 4 and the second sending module 5.
Second obtains module 4, for receiving encrypted first message communication structure data from first terminal;Wherein,
First message communication structure data include at least one of call request message, control signaling request message;Detailed content
With reference to described in step S13.
Second sending module 5, for establishing first terminal and according to encrypted first message communication structure data
The connection of two terminals;Detailed content is with reference to described in step S14.
In an alternative embodiment, the data safe transmission system further include: the 4th receiving module, the 5th processing module,
6th processing module and the 4th sending module.
4th receiving module, for receiving encrypted second message communication structure data from first terminal;Wherein, institute
Stating second message communication structure data includes at least one of endpoint to register message, heartbeat message;Detailed content is with reference to step
Described in rapid S15.
5th processing module, for establishing terminal in alignment according to the encrypted second message communication structure data
Table;Detailed content is with reference to described in step S16.
6th processing module, for being encrypted to the online list of the terminal;Detailed content is with reference to described in step S17.
4th sending module, for the online list of encrypted terminal to be sent to first terminal and second terminal;In detail
Content is with reference to described in step S18.
In alternative embodiment, which further includes, further includes: the 5th receiving module, the 5th
Sending module, the 7th processing module and the 8th processing module.
5th receiving module, for receiving encrypted third message communication structure data from second terminal;Wherein,
Three message communication structure data include at least one of call answering message, control signaling response message;Detailed content ginseng
It examines described in step S19.
5th sending module, for the encrypted third message communication structure data to be sent to first terminal;
Detailed content is with reference to described in step S20.
7th processing module, for receiving the first audio/video flow unstructured data from first terminal, and by described first
Audio/video flow unstructured data is sent to the second terminal;Detailed content is with reference to described in step S21.
8th processing module, for receiving the second audio/video flow unstructured data from second terminal, and by described second
Audio/video flow unstructured data is sent to the first terminal;Detailed content is with reference to described in step S22.
In another alternative embodiment, the data safe transmission system further include: the 6th receiving module and the 6th is sent
Module.
6th receiving module, for receiving encrypted 4th message communication structure data from first terminal;Wherein,
Four message communication structure data include draw instruct markup information, target following markup information, in exit message at least it
One;Detailed content is with reference to described in step S23.
6th sending module, for encrypted 4th message communication structure data to be sent to second terminal;In detail
Content is with reference to described in step S24.
The further function description of above-mentioned modules is identical as above method corresponding embodiment, no longer superfluous herein
It states.
The embodiment of the invention also provides a kind of electronic equipment, and as shown in figure 12, which may include processor
121 and memory 122, wherein processor 121 can be connected with memory 122 by bus or other way, in Figure 12 with
For being connected by bus.
Processor 121 can be central processing unit (CentralProcessingUnit, CPU).Processor 121 can be with
For other general processors, digital signal processor (DigitalSignalProcessor, DSP), specific integrated circuit (App
LicationSpecificIntegratedCircuit, ASIC), field programmable gate array (Field-
ProgrammableGateArray, FPGA) either other programmable logic device, discrete gate or transistor logic, point
The combination of the chips such as vertical hardware component or above-mentioned all kinds of chips.
Memory 122 is used as a kind of non-transient computer readable storage medium, can be used for storing non-transient software program, non-
Transient computer executable program and module, as the corresponding program of data safe transmission system in the embodiment of the present invention refers to
Order/module is (for example, shown in Fig. 10 first obtains module 1, first processing module 2 and the first sending module 3;Or Figure 11 institute
Second shown obtains module 4 and the second sending module 5).Processor 121 is stored in non-transient in memory 122 by operation
Software program, instruction and module, thereby executing the various function application and data processing of processor, i.e. the realization above method
Data safe transmission method in embodiment.
Memory 122 may include storing program area and storage data area, wherein storing program area can store operation system
System, at least one application program required for function;It storage data area can the data etc. that are created of storage processor 121.In addition,
Memory 122 may include high-speed random access memory, can also include non-transient memory, and one of for example, at least disk is deposited
Memory device, flush memory device or other non-transient solid-state memories.In some embodiments, it includes opposite that memory 122 is optional
In the remotely located memory of processor 121, these remote memories can pass through network connection to processor 121.Above-mentioned net
The example of network includes but is not limited to internet, intranet, local area network, mobile radio communication and combinations thereof.
One or more of modules are stored in the memory 122, when being executed by the processor 121, are held
Data safe transmission method in row embodiment as in Figure 2-4;Or the data executed in embodiment as illustrated in figs. 5-7 are pacified
Full transmission method;Or the data safe transmission method in execution embodiment as shown in Figure 8.
Above-mentioned data safe transmission system detail can correspond to corresponding into embodiment shown in Fig. 8 refering to Fig. 2
Associated description and effect are understood that details are not described herein again.
It is that can lead to it will be understood by those skilled in the art that realizing all or part of the process in above-described embodiment method
Computer program is crossed to instruct relevant hardware and complete, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for magnetic disk,
CD, read-only memory (Read-Only Memory, ROM), random access memory (Random Access
Memory, RAM), flash memory (Flash Memory), hard disk (Hard Disk Drive, abbreviation: HDD) or solid state hard disk
(Solid-State Drive, SSD) etc.;The storage medium can also include the combination of the memory of mentioned kind.
Although being described in conjunction with the accompanying the embodiment of the present invention, those skilled in the art can not depart from the present invention
Spirit and scope in the case where various modifications and variations can be made, such modifications and variations are each fallen within by appended claims institute
Within the scope of restriction.