CN106209896A - Streaming media encryption method based on audio frequency and video form and module - Google Patents

Streaming media encryption method based on audio frequency and video form and module Download PDF

Info

Publication number
CN106209896A
CN106209896A CN201610613721.9A CN201610613721A CN106209896A CN 106209896 A CN106209896 A CN 106209896A CN 201610613721 A CN201610613721 A CN 201610613721A CN 106209896 A CN106209896 A CN 106209896A
Authority
CN
China
Prior art keywords
audio
encryption
video
video document
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610613721.9A
Other languages
Chinese (zh)
Other versions
CN106209896B (en
Inventor
洪珂
邓独
雷振
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wangsu Science and Technology Co Ltd
Original Assignee
Wangsu Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wangsu Science and Technology Co Ltd filed Critical Wangsu Science and Technology Co Ltd
Priority to CN201610613721.9A priority Critical patent/CN106209896B/en
Publication of CN106209896A publication Critical patent/CN106209896A/en
Application granted granted Critical
Publication of CN106209896B publication Critical patent/CN106209896B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/70Media network packetisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/75Media network packet handling

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application relates to method and the module of a kind of encryption Streaming Media based on audio frequency and video form.Its scheme includes: the audio-video document receiving needs encryption and the key for encryption provided by user;According to the encryption level set, audio-video document described in the described double secret key that the AES that is associated with described encryption level provides based on user is used to be encrypted;Export encrypted audio-video document.

Description

Streaming media encryption method based on audio frequency and video form and module
Technical field
The application relates to the summarization of encryption techniques field, particularly relates to streaming media encryption method based on audio frequency and video form And module.
Background technology
Along with the development of Internet technology and continuing to increase of the network bandwidth, user has been become by internet viewing video Daily habits for a kind of trend having and replacing tradition viewing TV.Increasing user selects the content from the Internet to carry Various video file is watched at business.Although it is all free that content supplier is provided a lot of content, but in order to content carries For the demand of self economic interests of business, multitude of video is still had to need could to be seen smoothly after collecting certain expense to user See.This charging mechanism relates to the copyright protection to video content.And the most all lacked at Chinese internet arena Kind video content copyright protection regime, therefore, it is very easy to carry out bootlegging propagation to charge video content.
Relaying to solve described bootlegging, especially for streaming medium content, existing the Internet also provides one The copyright protection regime of encryption/decryption technique, such as MPEG, H26x, WMV is utilized to both provide corresponding video-encryption machine a bit System.But, current media stream encryption scheme is the most more complicated, requires higher to calculating disposal ability.But along with communication technology Development, increasing user begins with mobile terminal equipment, such as mobile phone, smart mobile phone, individual digital and helps Reason, flat board etc. access the video content on the Internet.Compared with personal computer (such as desktop computer or notebook), these Mobile device disposal ability is limited to the calculating disposal ability of video file, so the complexity of streaming media encryption and deciphering is not Can be the highest.This also makes these Streaming Medias freely propagate after being easy to be cracked, and causes content supplier's benefit damage.
And, existing encrypt/decrypt scheme, after being encrypted audio-video document, destroys audio-video document itself Structure, this just requires that follow-up network transmission link can structure after compatible this destruction.Especially to content delivery network For network (CDN), owing to the audio-video document structure after encrypted is destroyed, also it is accomplished by CDN and can again resolve this Form is to identify its true content, and this brings much inconvenience to CDN so that the content storage of CDN and the efficiency of distribution are big Big reduction.Bring obstruction the most also to the popularization of whole encrypt/decrypt scheme.
Accordingly, it is desirable to provide the encrypt/decrypt scheme of a kind of novelty solves above-mentioned problems of the prior art.
Summary of the invention
The purpose of the application is the existing encryption/decryption side solving to use during the copyright protection of streaming medium content Various not convenient in case.
The application is a kind of streaming media encryption method based on audio frequency and video form and system.
First aspect in the application, it is provided that a kind of method of encryption Streaming Media based on audio frequency and video form, including: connect The audio-video document needing encryption and the key for encryption provided by user are provided;According to the encryption level set, use Audio-video document described in the described double secret key that the AES being associated with described encryption level provides based on user adds Close;Export encrypted audio-video document.
Second aspect in the application, it is provided that a kind of watch the stream matchmaker that method according to claim 1 is encrypted The method of body, including: initiating the request of the audio-video document of encryption to be play, described request includes that storing encrypted sound regards The key that the URL of frequency file and user provide;Send the request to the player with deciphering module, and by described broadcasting Device resolves described request to obtain described URL and key;Described player is initiated warp to cloud service computer based on described URL The download request of the audio-video document of encryption;Described player is while from encrypted sound described in described cloud service downloaded The data of video file while the data of the encrypted audio-video document downloaded based on described double secret key are decrypted and with Time the data of decrypted audio-video document are returned to user for broadcasting.
The third aspect in the application, it is provided that the encrypting module of a kind of encryption Streaming Media based on audio frequency and video form, its It is characterised by, including: input port, described input port is for receiving the audio-video document needing encryption and being provided by user For encryption key;Encryption level port, described encryption level port is adapted to assist in user and sets encryption level, in order to make Audio-video document described in the described double secret key provided based on user with the AES being associated with described encryption level is carried out Encryption;Output port, described output port is used for exporting encrypted audio-video document.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of system running environment according to an embodiment of the invention.
Fig. 2 is the operating diagram of encrypting module according to an embodiment of the invention.
Fig. 3 is according to an embodiment of the invention for encrypting the flow chart of the method for audio-video document.
Fig. 4 is that the request of based on Client-initiated viewing encryption according to an embodiment of the invention audio-video document is User provides the flow chart of the audio-video document asked.
Detailed description of the invention
The application mainly solves the Copyright Protection of video, specifically, only obtains decipherment algorithm and the use of key The encrypted video of viewing could be deciphered in family.
Current media stream encryption scheme is the most more complicated, requires higher to the calculating disposal ability of equipment, thus takies Higher cpu load.When particularly playing in mobile terminal, owing to device resource is limited, described solution secret meeting causes video playback The problem such as have time delay, Ka Dun or sound picture asynchronous, this has had a strong impact on user's viewing experience.Even at PC end, working as PC When performing the operation of multitask consuming relatively multiple resource, the deciphering scheme of described complexity also can affect the viewing experience of user.Separately Outward, after audio-video document is encrypted by existing encipherment scheme, destroying the structure of audio-video document itself, this will give net Network transmission link brings compatibility issue.Particularly, when described audio-video document is streaming medium content, described file structure Destruction may make the sequencing of Stream Data Transmission originally that confusion occurs, and causes cannot normally watching described stream by network Media content.
Two subject matters existed for current media stream encryption scheme, present applicant proposes a kind of based on audio frequency and video lattice The streaming media encryption method of formula and system.The method and system provide following improvement relative to existing scheme:
(1) on the premise of ensureing identical audio-video document level of security, the complexity of encryption is minimized.
(2) on the premise of the experience not affecting user and watching audio-video document, the complexity of deciphering is minimized.
(3) file size before and after encryption keeps consistent, thus does not increase the flow uploaded, download.
(4) do not change original audio-video document structure after encryption, reduce the compatibility issue that network transmission link brings.
First, as it is shown in figure 1, disclose the schematic diagram of system running environment 100 according to an embodiment of the invention.Institute State in system running environment 100, include the cloud service computer 110 and client source station 120 being connected by network 130.Described Cloud service computer 110 provides the user required service by network with on-demand, easy extension way.Such as, at the present embodiment In, cloud service computer 110 can provide cloud storage service and cloud cryptographic services.Cloud storage service can receive from client source The audio-video document that the needs of 120 of standing are encrypted, and save it in the cloud storage module in cloud service computer 110, meanwhile, The URL that will be stored in the audio-video document in cloud storage module returns to client source station 120.Cloud cryptographic services can take according to cloud Cloud storage service is stored by the request from the encryption audio-video document of client source station 120 that business computer 110 receives Corresponding audio-video document be encrypted after be then stored into cloud storage module, and would correspond to the warp being stored in cloud storage module The URL of the audio-video document of encryption returns to client source station 120.Owing to make use of " cloud " technology, in an embodiment, audio frequency and video literary composition Storage and the encryption of part can be completed by cloud service computer 110, and therefore, the calculating greatly reducing client source station processes Capability Requirement so that, user even with having the mobile device of limited processing capacity, such as smart phone, it is also possible to real The best viewing experience.
Then, in fig. 2, the operating diagram of encrypting module 200 according to an embodiment of the invention is disclosed.Encryption mould The unit that block 200 can use CPU, microprocessor, coprocessor etc. to have calculation function realizes.Specifically, add described in Close module includes: input port, and described input port is for receiving the audio-video document needing encryption and being provided by user Key for encryption;Encryption level port, described encryption level port is adapted to assist in user and sets encryption level, in order to use Audio-video document described in the described double secret key that the AES being associated with described encryption level provides based on user adds Close;And output port, described output port is used for exporting encrypted audio-video document.It is provided solely for of the prior art A kind of encipherment scheme of encryption mechanism except that, the encrypting module of the present invention, according to the different use scene of user, carries Supply multiple encryption level.
For example, in one embodiment, need audio-video document is entered iff the purpose being in order at charge Row encryption, then the encryption level that rank can be provided to be 0.In this encryption level, encrypting module is only in audio-video document Some key message is encrypted, without destroying the integrity of audio/video frames data.So, when deciphering, the generation spent Valency is minimum, and the process resource of the such as CPU etc consumed almost is negligible.In concrete practice, this encryption level Can be used to limit encrypted audio-video document play by universal player.The most only there is the deciphering function of correspondence Special player could play the encrypted audio-video document of this type of rank.But described special player only needs to spend less Permitted just to play whole audio-video document smoothly after the key message in audio-video document is decrypted by resource and without from Whole file is decrypted by head to tail.Owing to this encryption level 0 has consumption very small amount resource, therefore, it is non- Often it is suitable for being dissolved in the Video Applications for the mobile device with limited processing resources.Many is opened specially for mobile device Send out media player can use this encryption level with ensure audio-video document enough level of securitys on the premise of, By reducing encryption/deciphering, the resource consumption of mobile device is provided the user good video tastes.It addition, this encryption Rank will not change the structure of original audio-video document, thus reduces the compatibility issue that network transmission link brings.
Secondly, in another embodiment, when audio-video document contains the feelings of the important content can not known to other people During condition, it is also possible to providing rank is the encryption level of 1.Under this rank, add adding the appointment data in audio/video frames Close, to reach to destroy the purpose of the integrity of audio/video frames data file.Due to destroyed while file is encrypted The integrity of this document, therefore, if user does not have the key of correspondence, just cannot full backup from encrypted data Go out original audio-video document.It is additionally, since the integrity violations of audio-video document, therefore, even if this user just wants to Certain section of video in audio-video document is also impossible, which greatly enhances the level of security of audio-video document, well Protect important content contained in audio-video document.But, compared with the encipherment scheme of rank 0, the encipherment scheme of rank 1 Needing relatively complicated, need consumption more to process resource, therefore, it is relatively suitable for by having the cloud enough processing resource Service computer realizes or is realized by the server that could be equally attached to cloud service computer on network.
The AES that the most just can realize described rank 0 and rank 1 is specifically described.In described explanation, with Modal mp4 video file is discussed as example.It will be appreciated by those skilled in the art that described mp4 video file It is merely for illustrative purposes and have to be limit the invention to this.It practice, any other video and audio format file It is suitable for the solution of the present invention, such as RMVB, AVI, WMV, MKV, MPG etc. video format and MP3, WAV, WMA, APE etc. Deng audio format.
1. AES (encryption of present examples mp4 video file), including:
The value of 1.1 amendment Major brand is the value that AES is specified, and whether this value indicates described video file The file of encryption;
The value of 1.2 amendment Minor version is to represent the encryption level of this video file, and such as, 0 represents rank 0,1 Represent rank 1, by that analogy;
The title that 1.3 amendment Avc1 box, accC box, mp4a box, the entitled AES of mp4v box are specified, Initialize owing to ordinary playing device to resolve this field, therefore the title destroying this field just can cause described ordinary playing Device cannot find described field thus the most just cannot parse the content of these fields, to reach the effect tentatively encrypted;
The key that the content of each box specified for 1.4 couples 1.3 and client provide carries out Custom Encryption computing (such as position fortune Calculate), obtained encrypted content is replaced original content, wherein at this in encryption before and after byte number keep constant, therefore The purpose of structure and the size not changing video file can be realized;
The AES of encryption level 0 is belonged to, in other words, if user selects described video from 1.1 to 1.4 steps It is the encryption of 0 that file performs encryption level, and the most described ciphering process leaves it at that.
And if user have selected the encryption of encryption level 1, in addition to comprising these encrypting steps above-mentioned, described in add Close algorithm also includes:
1.5 for the data of the designated word joint number of key frame of video, perform operations described below:
Use client provide double secret key its carry out AES (Advanced Encryption Standard) encryption, AES adds Close is block encryption, so the byte number specified must be the integral multiple of 16.Owing to the non-key frame of video is necessarily dependent upon key Frame could decode, therefore only needs cryptography key frame;As a example by the audio-video document that key frame size is more than 10000 byte, it regards Byte number specified by Pin is 128 bytes, and the designated word joint number of audio frequency is 64 bytes.In other embodiments, such as to sound In the case of the data of the audio frame designated word joint number in video file carry out AES encryption, owing to the decoding of audio frame need not Rely on adjacent audio frame, so every frame audio frame all need to be carried out AES encryption;Byte count sizes is not changed due to AES encryption, Therefore it is also ensured that do not change structure and the size of video file;Although it is pointed out that and saying with AES encryption technology Bright, but described example is merely for illustrative purposes, and other suitable encryption technologies can also be applied at above-mentioned encryption In reason.
1.6 for each key frame in video, successively circulation perform to key frame of video (in the case of audio frame, Then to each audio frame) AES encryption until end-of-file, the ciphering process to this rank 1 completes.
It is pointed out that above-mentioned AES is merely for illustrative purposes to be described, and have to be to this Bright AES carries out any restriction.Other suitable AESs also apply be applicable in the present invention.
It should be understood that the explanation that the encryption level of above-mentioned rank 0 and rank 1 is merely exemplary, and have to be by this Shen Scheme please is confined to the two rank.It practice, in other embodiments, according to the difference of the security requirement of scene, also More encryption level can be provided to realize different secrecy purposes.Such as, in certain encryption level, when the key of user Time not pair, can actively destroy audio-video document, even in some encryption level, when key is incorrect, can actively to Corresponding content provider or the police send alarm (such as by modes such as notice, message, links) to be had audio frequency and video to remind Unauthorized access of file etc..The encryption of other ranks can be compiled by those skilled in the art according to concrete demand Journey is to realize the most above-mentioned additional security requirement.For the purpose saved space, no longer describe in detail one by one at this.
Superincumbent content describes the multi-level encryption technology that the encrypting module of the application is used, described multi-level Encryption technology can be applicable to various device resource and user's request very well, thus provide and encrypt solution party more flexibly Case.
After the encipherment scheme having understood the application, describe with reference now to Fig. 3 and use according to an embodiment of the invention Flow chart in the method 300 of encryption audio-video document.First, 310, the encrypting module user from client source station receives needs The corresponding key for encryption that the audio-video document of encryption and this user are provided.In step 320, come by an interface Transmit encryption level to encrypting module, such as, select the encryption stage of needs for user by presenting a user interface to user Not.It should be noted that this step is optional rather than necessary, because encrypting module can have the encryption stage of acquiescence , do not specify without user.Only when user's other encryption levels of specific appointment, encrypting module just can use specified Encryption level encrypts audio-video document.Subsequently, in step 330, the encryption level that encrypting module selects according to user, use with The double secret key audio-video document that the AES that this encryption level is associated inputs based on user is encrypted.According to selected The complexity of the AES that the encryption level selected is associated and the demand to process resource, described encryption can be by mobile device The encrypting module at place performs, it is also possible to performed by the encryption server in cloud service computer.Then, in step 340, After completing the encryption to audio-video document, encrypting module by encrypted audio-video document output with, such as, storage to cloud take In the memory module of business computer.Alternatively, after exporting and stored encrypted audio-video document in step 340, Step 350, instruction can be completed the response of encryption and preservation audio-video document and return to user to inform this use by encrypting module The cryptographic tasks that family is asked is complete.Client source station, after receiving encryption successfully response, updates the file of client source station List is to record completing of this cryptographic tasks.
In another embodiment, in addition to receive the audio-video document needing encryption from the user of client source station, institute State encrypting module and can also receive a URL being associated with the audio-video document needing encryption from the user of client source station, and Download at the network site specified by this URL and need the audio-video document of encryption, or, the user of client source station can shift to an earlier date The audio-video document needing encryption is stored in the memory module at cloud service computer, in order at cloud service computer Calling of encrypting module.
In yet another embodiment, when the encrypting module at cloud service computer performs described cryptographic tasks and stores During encrypted audio-video document, in addition in step 350 place to the return success response of client source station, it is also possible to by encrypted The URL of audio-video document together return to client source station.
Then, based on Client-initiated viewing encryption according to an embodiment of the invention audio frequency and video it are described with reference to Figure 4 The request of file provides the user the flow chart of asked audio-video document.First, in step 410, the use of client source station The icon of the audio-video document on described client source station is clicked on to initiate in an application (such as browser, file manager) in family Video playback is asked.In step 420, the request of described video playback is sent to the player with deciphering module by client source station, Described request contains URL and the key of user's offer of encrypted audio-video document.In step 430, described in receiving After video playback request, player resolves described request to obtain URL and the key of encrypted audio-video document therein. In step 440, player URL based on described encrypted audio-video document initiates encrypted sound to cloud service computer The GET of video file downloads request.In step 450, cloud service computer downloads request according to the GET received, and returns and institute State encrypted audio-video document that URL is associated to player.In step 460, player starts to calculate from cloud service Machine is downloaded the audio-video document data that audio-video document data are downloaded based on described double secret key on one side and is decrypted and general simultaneously Decrypted audio-video document data return to user for broadcasting.Continue whole process, until whole audio-video document is play Complete.In such scheme, described player is installed in client's source.And in another embodiment, cloud service computer Can also have described deciphering module.Because, when encrypted audio-video document be based on rank 0 encrypted time, described deciphering Process can't consume the resource of too much client's source, also would not have any impact the viewing experience of user, therefore, The player of client's source is had the ability the viewing experience that decoding limit, limit provides smooth.But when described encrypted audio-video document is Based on rank 1 or higher rank encrypted time, the most described deciphering module can utilize this cloud service at cloud service computer The powerful process resource of computer completes the more complicated decrypting process of described encrypted audio-video document, subsequently will be through The audio-video document of deciphering returns to the player of client's source, and now, the deciphering module of described player is big without expending again The audio-video document received is decrypted by amount limited resources, but is directly play described decrypted audio frequency and video literary composition by player Part, thus also ensure that the viewing experience of smoothness.In following content, illustrate the process of a kind of concrete decipherment algorithm. As it has been described above, described decrypting process is still discussed using mp4 video file as example, and, other suitable videos It is applied equally to the application with audio format file:
2. decipherment algorithm (deciphering of present examples mp4 video file), including:
2.1 values recovering Major brand are the original value before encryption;
2.2 resolve Minor version obtains the rank of encryption, value original before returning to encryption;
2.3 recover AES to Avc1 box, accC box, mp4a box, the amendment of mp4v box title so that its Return to original title;
The encrypted content of the 2.4 above-mentioned box of secret key decryption provided according to user is to obtain original content, to this for adding The decrypting process of level of confidentiality other 0 completes.
And if user is the encryption that have selected encryption level 1 carrys out encrypted video file, except comprise above-mentioned these Outside decryption step, described decipherment algorithm also includes:
2.5 according to user provide key continue deciphering key frame of video (be then each audio frequency in the case of audio frame Frame) encrypted data of designated word joint number to be to obtain initial data;
2.5 circulations perform the deciphering to key frame of video (being then each audio frame in the case of audio frame) until file Tail, completes to this decrypting process.
As it has been described above, above-mentioned decrypting process can be embedded in player execution.
It is pointed out that above-mentioned decipherment algorithm is merely for illustrative purposes to be described, and have to be to this Bright decipherment algorithm carries out any restriction.Other suitable decipherment algorithms also apply be applicable in the present invention.
By combining the various embodiments described by above-mentioned accompanying drawing, it will be understood to those skilled in the art that the present invention can There is following benefit:
(1) according to the use scene that client is different, different encryption levels is set, to realize Information Security and playing body The optimal compromise tested.
(2) key encrypted is provided by client, there is not conflict between different clients, and i.e. one client can not watch use The audio-video document of another client, to ensure the safety of each client's audio-video document.
(3) file size before and after encryption is consistent, does not increase client and flow that user uploads, downloads, it is ensured that Ke Huji The interests of user.
(4) do not change original audio-video document structure after encryption, reduce the compatibility issue that network transmission link brings.
(5) minimize the complexity of encryption, such user side deciphering Least-cost, the viewing experience of user can be promoted.
The theme of the application is described herein to meet legal requirements by details.But, this description itself is not intended to limit The scope of this patent processed.On the contrary, inventor imagines and required for protection targeted may also be combined with other present or future technology Embody otherwise, to include different steps or to be similar to the step combination of step described herein.This Outward, although the different elements of method that term " step " and/or " frame " can be used for instruction herein, but unless and only When clearly describing the order of each step, this term should not be construed as to imply that among each step disclosed herein or Between any particular order.
Although the language special by architectural feature and/or method action describes this theme, it is to be understood that, appended right Theme defined in claim is not necessarily limited to features described above or action or the order of above-mentioned action.More specifically, described Feature and action are as realizing the exemplary forms of claims and disclosed.The application can be embodied as other concrete form Without departing from its spirit or essential characteristics.Described embodiment the most all should be to be considered merely as illustrative and unrestricted Property.Therefore, scope of the present application is by appended claims rather than instruction described above.Fall into claims waits efficacious prescriptions Being changed in the implication of case and scope is all contained by the scope of claims.

Claims (10)

1. the method for an encryption Streaming Media based on audio frequency and video form, it is characterised in that including:
The audio-video document needing encryption and the key for encryption provided by user are provided;
According to the encryption level set, the AES being associated with described encryption level is used to come based on described in user's offer Described in double secret key, audio-video document is encrypted;
Export encrypted audio-video document.
2. the method for claim 1, it is characterised in that also include:
The encrypted audio-video document of output is stored in the memory module of cloud service computer, and instruction is completed encryption Returning to described user with the response storing described audio-video document, wherein said response contains encrypted audio-video document URL.
3. the method for claim 1, it is characterised in that wherein said encryption level is to be transmitted by an interface , or, described encryption level is the encryption level of acquiescence.
4. the method for claim 1, it is characterised in that when described audio-video document is MP4 video file, described in add Close algorithm comprises the steps:
The value of amendment Major brand is the value that described AES is specified, and whether described value indicates described video file The file of encryption;
The value of amendment Minor version is to represent the encryption level of this video file, and its intermediate value 0 represents encryption level 0, is worth 1 Represent encryption level 1;
The title that amendment Avc1 box, accC box, mp4a box, the entitled described AES of mp4v box are specified;
The key that the content of each box and client provide is encrypted computing, obtained encrypted content is replaced original in Hold;
If encryption level encryption level is 1, then continue executing with following step:
Wherein, if the value of Minor version is 0, the most described AES leaves it at that, and when Minor version's When value is 1, the most described AES also comprises the steps:
For the data of designated word joint number of each key frame of video, circulation performs AES encryption until described audio frequency and video literary composition successively Part afterbody.
5. method as claimed in claim 4, it is characterised in that for the audio frame in described audio-video document, then for often Individual audio frame performs described AES encryption until described audio-video document afterbody.
6. the method watching the Streaming Media that method according to claim 1 is encrypted, it is characterised in that including:
The request of the audio-video document of initiation encryption to be play, described request includes storing encrypted audio-video document The key that URL and user provide;
Send the request to the player with deciphering module, and it is described to obtain to be resolved described request by described player URL and key;
Described player initiates the download to encrypted audio-video document based on described URL to cloud service computer asks;
Described player from the data of encrypted audio-video document described in described cloud service downloaded and meanwhile based on The data of the encrypted audio-video document that described double secret key is downloaded are decrypted and play decrypted audio-video document.
7. method as claimed in claim 6, it is characterised in that also can install described deciphering mould at described cloud service computer Block, and when encrypted audio-video document be based on encryption level 1 or higher encryption level encrypted time, described cloud take Deciphering module at business computer replaces described player and performs described deciphering.
8. method as claimed in claim 6, it is characterised in that when described audio-video document is MP4 video file, described solution Close comprise the steps:
The value recovering Major brand is the original value before encrypting;
Recover AES to Avc1 box, accC box, mp4a box, the amendment of mp4v box title so that it returns to Original title;
According to the encrypted content in each box of secret key decryption that user provides to obtain original content;
Wherein, when the value of Minor version is 1, described deciphering also comprises the steps:
For the encrypted data of designated word joint number of each key frame of video, perform institute successively according to the key that user provides State deciphering until described audio-video document afterbody is to obtain initial data.
9. method as claimed in claim 8, it is characterised in that for the audio frame in described audio-video document, then for often Individual audio frame performs described deciphering until described audio-video document afterbody.
10. the encrypting module of an encryption Streaming Media based on audio frequency and video form, it is characterised in that including:
Input port, described input port for receive need encryption audio-video document and by user provided for encrypting Key;
Encryption level port, described encryption level port is adapted to assist in user and sets encryption level, in order to use and described encryption Audio-video document described in the described double secret key that the AES that rank is associated provides based on user is encrypted;
Output port, described output port is used for exporting encrypted audio-video document.
CN201610613721.9A 2016-07-29 2016-07-29 Streaming media encryption method and module based on audio and video formats Expired - Fee Related CN106209896B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610613721.9A CN106209896B (en) 2016-07-29 2016-07-29 Streaming media encryption method and module based on audio and video formats

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610613721.9A CN106209896B (en) 2016-07-29 2016-07-29 Streaming media encryption method and module based on audio and video formats

Publications (2)

Publication Number Publication Date
CN106209896A true CN106209896A (en) 2016-12-07
CN106209896B CN106209896B (en) 2020-02-18

Family

ID=57496829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610613721.9A Expired - Fee Related CN106209896B (en) 2016-07-29 2016-07-29 Streaming media encryption method and module based on audio and video formats

Country Status (1)

Country Link
CN (1) CN106209896B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650107A (en) * 2018-06-26 2020-01-03 杭州海康威视数字技术股份有限公司 Data processing method, device and system
CN111093097A (en) * 2019-12-20 2020-05-01 北京云享智胜科技有限公司 Stream media data encryption and decryption method and device, electronic equipment and storage medium
CN112966284A (en) * 2021-03-26 2021-06-15 知印信息技术(天津)有限公司 File encryption and decryption method and system and computer readable storage medium
CN115225869A (en) * 2022-09-20 2022-10-21 广州万协通信息技术有限公司 Directional processing method and device for monitoring data

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020141582A1 (en) * 2001-03-28 2002-10-03 Kocher Paul C. Content security layer providing long-term renewable security
CN1494803A (en) * 2001-02-26 2004-05-05 �ɸ���Ӱ��ɷ����޹�˾ Encryption of compressed video stream
CN1997159A (en) * 2006-09-29 2007-07-11 清华大学深圳研究生院 Encryption method of video stream based on H.264 coding standard with controllable quality
CN101350918A (en) * 2008-09-05 2009-01-21 清华大学 Method for protecting copyright of video content
CN101895396A (en) * 2010-07-14 2010-11-24 中兴通讯股份有限公司 Mobile terminal and encryption method thereof
CN102647420A (en) * 2012-03-31 2012-08-22 苏州阔地网络科技有限公司 Control method and system for preventing illegal connection
CN103248474A (en) * 2012-02-01 2013-08-14 华为技术有限公司 Encryption and decryption method and device for streaming media
CN103716637A (en) * 2014-01-15 2014-04-09 北京工业大学 H.264 compressed domain layered video encryption method based on content analysis
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1494803A (en) * 2001-02-26 2004-05-05 �ɸ���Ӱ��ɷ����޹�˾ Encryption of compressed video stream
US20020141582A1 (en) * 2001-03-28 2002-10-03 Kocher Paul C. Content security layer providing long-term renewable security
CN1997159A (en) * 2006-09-29 2007-07-11 清华大学深圳研究生院 Encryption method of video stream based on H.264 coding standard with controllable quality
CN101350918A (en) * 2008-09-05 2009-01-21 清华大学 Method for protecting copyright of video content
CN101895396A (en) * 2010-07-14 2010-11-24 中兴通讯股份有限公司 Mobile terminal and encryption method thereof
CN103248474A (en) * 2012-02-01 2013-08-14 华为技术有限公司 Encryption and decryption method and device for streaming media
CN102647420A (en) * 2012-03-31 2012-08-22 苏州阔地网络科技有限公司 Control method and system for preventing illegal connection
CN103716637A (en) * 2014-01-15 2014-04-09 北京工业大学 H.264 compressed domain layered video encryption method based on content analysis
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110650107A (en) * 2018-06-26 2020-01-03 杭州海康威视数字技术股份有限公司 Data processing method, device and system
CN111093097A (en) * 2019-12-20 2020-05-01 北京云享智胜科技有限公司 Stream media data encryption and decryption method and device, electronic equipment and storage medium
CN112966284A (en) * 2021-03-26 2021-06-15 知印信息技术(天津)有限公司 File encryption and decryption method and system and computer readable storage medium
CN115225869A (en) * 2022-09-20 2022-10-21 广州万协通信息技术有限公司 Directional processing method and device for monitoring data
CN115225869B (en) * 2022-09-20 2022-12-20 广州万协通信息技术有限公司 Directional processing method and device for monitoring data

Also Published As

Publication number Publication date
CN106209896B (en) 2020-02-18

Similar Documents

Publication Publication Date Title
US10110613B2 (en) Decrypting content samples including distinct encryption chains
US10320759B2 (en) Streaming system and method
US8385546B2 (en) System and method for storing and accessing digital media content using smart card technology
JP5756567B2 (en) Method and apparatus for dynamic and real-time advertisement insertion based on metadata within a hardware-based trust route
US6460137B1 (en) Encryption processing system
KR100843346B1 (en) Integrity protection of streamed content
US8224751B2 (en) Device-independent management of cryptographic information
US11025432B2 (en) Access control technology for peer-to-peer sharing
US9450748B2 (en) Decryption of content including partial-block discard
US8687809B2 (en) System and method for decryption of content including disconnected encryption chains
CN106209896A (en) Streaming media encryption method based on audio frequency and video form and module
CN109525893A (en) Video segment method based on slice file duration threshold value
US10127396B2 (en) System and method for local generation of streaming content with a hint track
KR101479290B1 (en) Agent for providing security cloud service, security token device for security cloud service
US8196214B2 (en) Method and apparatus for securing content using encryption with embedded key in content
CN112565656A (en) Video call method, device, system, electronic equipment and storage medium
KR100784300B1 (en) Unification digital content rights management system and method thereof
Hua et al. Content protection for IPTV-current state of the art and challenges
EP3692706A1 (en) A method for delivering digital content to at least one client device
KR100959380B1 (en) Flash contents supplying method
Li et al. RFID-based digital content copy protection system in movie and audio rental agency
Hunter Video encryption-the epic movie battle
US20100332853A1 (en) Network transmission method, network transmission system and network transmission device thereof
CA2516909A1 (en) Method and apparatus for distributing content to a client device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200218

CF01 Termination of patent right due to non-payment of annual fee