A method and system for tracing the source of streaming data security vulnerabilities in a video conferencing scenario

A technology for video conferencing and streaming data, applied in the field of information security, which can solve the problems of user behavior privacy leakage and low data security.

Active Publication Date: 2021-03-26
北京电信易通信息技术股份有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the transmitted stream data carries a large amount of user behavior information. Once it is deeply excavated, the user's behavior privacy will be leaked. For example, when the user performs video and voice, the size of the generated data packet and the length of time for sending the data packet It is different. If the statistical characteristics of these network traffic are illegally stolen, the network behavior of the participating users will be analyzed, and then the privacy behind the specific behavior can be analyzed, resulting in low data security in the video conference scenario.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for tracing the source of streaming data security vulnerabilities in a video conferencing scenario
  • A method and system for tracing the source of streaming data security vulnerabilities in a video conferencing scenario
  • A method and system for tracing the source of streaming data security vulnerabilities in a video conferencing scenario

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0057] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0058] figure 1 It is a schematic flowchart of the method for tracing the source of security vulnerabilities of streaming data in the video conferencing scenario of the present invention. Such as figure 1 As sho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a source tracing method and system for security vulnerabilities of streaming data in a video conferencing scene. The method includes: video conference stream data acquisition: the analyst simulates an attacker using a traffic analysis tool to monitor the video conference; video conference stream data feature extraction: the video conference stream data extracts a feature vector according to a feature value extraction scheme; feature vector group analysis: the The feature vectors are grouped according to certain rules to ensure that the group is mapped to certain data features; mapping vulnerabilities and traceability feedback: locate key features and trace the issues corresponding to the highest feature group of privacy exposure. The invention can realize the traceability of security loopholes and improve the data security performance of the video conference.

Description

technical field [0001] The present invention relates to the field of information security, in particular to a method and system for tracing the source of security vulnerabilities of streaming data in a video conferencing scene. Background technique [0002] The large-scale commercialization of the fifth-generation mobile communication technology not only improves the user experience quality of the mobile Internet, but also provides a technical basis for low-latency, high-capacity business scenarios. With the continuous deepening of 5G applications in various industries, the development of Internet office has also ushered in new opportunities, especially for the important scene of Internet office - the video conferencing industry has brought a great impact. Video conferencing refers to an application system for intelligent real-time communication and sharing and collaborative work that integrates multiple types of data transmission technologies such as multi-person video tran...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04N7/15H04L29/06
CPCH04L63/1433H04N7/15
Inventor 王帅朱敏
Owner 北京电信易通信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products