Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video conference data security sharing method

A technology for video conferencing and data security, applied in the field of information security transmission, can solve the problems of lack of data relevance, unwillingness to participate, and departure from the purpose of big data services, and achieve the effect of solving security threats and improving security.

Active Publication Date: 2021-09-17
北京电信易通信息技术股份有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This kind of mass data circulation and sharing that gathers the wisdom of the public is undoubtedly necessary for the development of the video conferencing industry ecological chain. However, due to (1) all parties in the video conferencing industry application ecological chain (network operators, cloud service providers, Vertical industry application providers and industry customers, etc.) often share video conference terminal (referred to as terminal) data according to their own needs, and the cross-domain flow of data will increase the risk of terminal privacy data exposure
(2) The video conferencing data using 5G communication has the characteristics of rapid dissemination and rapid spread of behavior, which increases the risk of terminal shared data carrying private information being coveted, stolen, and analyzed by others for profit
The potential safety hazards of the above parties in sharing terminal privacy data will make users feel insecure and unwilling to participate, resulting in: (1) In video conferencing scenarios, data is like an isolated island because the data of various departments of the enterprise cannot be shared The same lack of relevance, unable to give full play to the value of massive data
(2) On the application ecological chain of the video conferencing industry, many companies refuse to share their private information and sensitive data due to terminal data security issues, thus failing to improve the data quality and terminal experience of video conferencing applications, which deviates from the purpose of big data services and the development of the 5G era need

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video conference data security sharing method
  • Video conference data security sharing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0047] The purpose of the present invention is to provide a video conference data security sharing method, which improves the security of shared data.

[0048] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0049] figure 1 It is a schematic flow chart of a video co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a video conference data security sharing method. The method comprises the following steps: determining a k value through a privacy disclosure threshold value and a data quality threshold value; performing k-anonymization operation on the terminal data set by using the determined k value to obtain a k-anonymized data set; randomly selecting a tuple from each anonymous group of the k-anonymized data set to form a recombined data set; encrypting each data subset in the recombined data set by using a randomly selected key, storing the encrypted recombined data set in a content server, and splitting the randomly selected key into n sub-keys; generating a mapping position of each sub-key in the DHT network; and when the application applies for data to be shared to the sharing party, accessing the mapping position of each sub-key in the DHT network according to the applied access key, determining the key of each data subset corresponding to the data to be shared, and obtaining corresponding shared data. According to the invention, the security of shared data is improved.

Description

technical field [0001] The invention relates to the technical field of information security transmission, in particular to a video conference data security sharing method. Background technique [0002] With the development of the times, the public's communication method is forced to change rapidly from face-to-face to digital, which makes the application of video conferencing more and more extensive. The widespread deployment of 5G communication applications has accelerated the iterative upgrade of the application ecological chain of the video conferencing industry in a more intelligent, efficient, and faster direction, which has become the core and key to firmly grasping users. As a communication method that allows all parties to transmit video and audio data in real time through the network and terminal communication equipment, video conferencing has unique advantages in continuously improving user communication efficiency, reducing corporate travel costs, and improving ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L9/32H04L29/06H04N7/15
CPCH04L9/085H04L9/0662H04L9/3236H04L63/0421H04N7/15H04L2209/42
Inventor 沈玉勤杨涛赵文登焦显伟
Owner 北京电信易通信息技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products