Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections

A transmission method and data security technology, applied in the field of data security transmission, can solve the problems of unavailability, unavoidable data theft, malicious attack of information tampering, etc., and achieve the effect of small processing load impact and high processing efficiency

Active Publication Date: 2016-08-10
HANGZHOU SHISHUO EDUCATION TECH CO LTD
View PDF3 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the RTMP protocol itself does not have a data security protection mechanism, the data is transmitted in plain text on the channel established by the sending and receiving parties. In addition to the openness of the protocol, the data can be easily obtained and analyzed by a third party during the transmission process. Therefore, using the standard RTMP protocol for data transmission has a very high risk in terms of information security. It is difficult to avoid malicious attacks such as data theft and information tampering from the outside. It is not usable in scenarios that require security for data transmission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections
  • Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections
  • Safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0039] A kind of data security transmission method based on RTMP connection provided by the present invention, the method comprises the following steps:

[0040] (1) The client initiates an RTMP connection request to the server, and the server receives the RTMP connection request from the client, and establishes a connection with the client after verifying that the request is legal.

[0041] (2) After the connection is established, the client requests the key information from the server. The client adds a message body for requesting keys, named AskKeys, which is used to request the server for the encryption algorithm of the current session and the corresponding key information. Such as figure 1 As shown, the composition of the AskKeys message body and the meaning of each component are as follows:

[0042] Message type MessageType: ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe data transmission method based on Real-Time Messaging Protocol (RTMP) connections. The method has the advantages that functional extensions of the RTMP are carried out, and through a key negotiation process between a client and a server, an encryption algorithm and a key adopted by each connection are random, so that external cracking analysis of encrypted data is much more difficult; the symmetrical encryption algorithms are adopted for encryption processing, so that the encryption and decryption processing efficiencies are high, real-time performance of data transmission and user experience are not obviously affected, and the effects on the processing load of the server are small; meanwhile, the server can flexibly select an encryption mode, and, according to a user type or a resource type requested by a user, can determine whether encrypted transmission is needed or not or select one specific encryption algorithm and a key length (the keys with a length of 64 bytes or more can be provided, and the number of the encryption algorithms can reach 255).

Description

technical field [0001] The invention belongs to the technical field of data security transmission, in particular to an RTMP connection-based data security transmission method. Background technique [0002] With the rapid development of the Internet, people are also facing information security issues while enjoying the convenient services brought by the Internet. The rapid development of teleconferencing, online transactions, online banking and other fields has led to the increasing importance of data security. more and more prominent. Data encrypted transmission is a very important and commonly used technical means in the field of information security. The key data is encrypted by the sender through a certain algorithm, and becomes unrecognizable ciphertext data to reach the destination through the Internet. The decryption method decrypts the ciphertext data and restores it to readable data. Encrypted data transmission can greatly increase the difficulty of data being anal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/0442H04L63/062H04L65/65
Inventor 彭勇陈勇赵云锋
Owner HANGZHOU SHISHUO EDUCATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products