Streaming data security vulnerability tracing method and system in video conference scene

A technology of video conferencing and streaming data, which is applied in the field of information security and can solve problems such as low data security and leakage of user behavior privacy

Active Publication Date: 2021-01-29
北京电信易通信息技术股份有限公司
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the transmitted stream data carries a large amount of user behavior information. Once it is deeply excavated, the user's behavior privacy will be leaked. For example, when the user performs video and voice, the size of the generated data packet and the length of time for sending the dat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Streaming data security vulnerability tracing method and system in video conference scene
  • Streaming data security vulnerability tracing method and system in video conference scene
  • Streaming data security vulnerability tracing method and system in video conference scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0057] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0058] figure 1 It is a schematic flowchart of the method for tracing the source of security vulnerabilities of streaming data in the video conferencing scenario of the present invention. Such as figure 1 As sho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a streaming data security vulnerability tracing method and system in a video conference scene. The method comprises the following steps: video conference stream data acquisition: by an analyzer, simulating an attacker to monitor a video conference by using a traffic analysis tool; video conference stream data feature extraction: extracting feature vectors of the video conference stream data according to a feature value extraction scheme; characteristic vector grouping analysis: grouping the characteristic vectors according to a certain rule to ensure that the characteristic vectors are mapped to certain data characteristics in the group; and mapping vulnerabilities and tracing back: positioning key features, and tracing back a problem corresponding to the feature group with the highest privacy exposure. According to the method, traceability of security holes can be realized, and the data security performance of video conferences is improved.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and system for tracing the source of security vulnerabilities of streaming data in a video conferencing scene. Background technique [0002] The large-scale commercialization of the fifth-generation mobile communication technology not only improves the user experience quality of the mobile Internet, but also provides a technical basis for low-latency, high-capacity business scenarios. With the continuous deepening of 5G applications in various industries, the development of Internet office has also ushered in new opportunities, especially for the important scene of Internet office - the video conferencing industry has brought a great impact. Video conferencing refers to an application system for intelligent real-time communication and sharing and collaborative work that integrates multiple types of data transmission technologies such as multi-person video tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N7/15H04L29/06
CPCH04L63/1433H04N7/15
Inventor 王帅朱敏
Owner 北京电信易通信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products