CN106209896A - Streaming media encryption method based on audio frequency and video form and module - Google Patents
Streaming media encryption method based on audio frequency and video form and module Download PDFInfo
- Publication number
- CN106209896A CN106209896A CN201610613721.9A CN201610613721A CN106209896A CN 106209896 A CN106209896 A CN 106209896A CN 201610613721 A CN201610613721 A CN 201610613721A CN 106209896 A CN106209896 A CN 106209896A
- Authority
- CN
- China
- Prior art keywords
- audio
- encryption
- video
- video document
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 230000004044 response Effects 0.000 claims description 5
- 101100378010 Bacillus subtilis (strain 168) accC1 gene Proteins 0.000 claims description 4
- 101100322122 Bacillus subtilis (strain 168) accC2 gene Proteins 0.000 claims description 4
- 101150070497 accC gene Proteins 0.000 claims description 4
- 230000004087 circulation Effects 0.000 claims description 3
- 239000000203 mixture Substances 0.000 claims description 3
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 230000008569 process Effects 0.000 description 15
- 238000005516 engineering process Methods 0.000 description 9
- 230000005540 biological transmission Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000006378 damage Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000000682 scanning probe acoustic microscopy Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 235000019640 taste Nutrition 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/70—Media network packetisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/75—Media network packet handling
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The application relates to method and the module of a kind of encryption Streaming Media based on audio frequency and video form.Its scheme includes: the audio-video document receiving needs encryption and the key for encryption provided by user;According to the encryption level set, audio-video document described in the described double secret key that the AES that is associated with described encryption level provides based on user is used to be encrypted;Export encrypted audio-video document.
Description
Technical field
The application relates to the summarization of encryption techniques field, particularly relates to streaming media encryption method based on audio frequency and video form
And module.
Background technology
Along with the development of Internet technology and continuing to increase of the network bandwidth, user has been become by internet viewing video
Daily habits for a kind of trend having and replacing tradition viewing TV.Increasing user selects the content from the Internet to carry
Various video file is watched at business.Although it is all free that content supplier is provided a lot of content, but in order to content carries
For the demand of self economic interests of business, multitude of video is still had to need could to be seen smoothly after collecting certain expense to user
See.This charging mechanism relates to the copyright protection to video content.And the most all lacked at Chinese internet arena
Kind video content copyright protection regime, therefore, it is very easy to carry out bootlegging propagation to charge video content.
Relaying to solve described bootlegging, especially for streaming medium content, existing the Internet also provides one
The copyright protection regime of encryption/decryption technique, such as MPEG, H26x, WMV is utilized to both provide corresponding video-encryption machine a bit
System.But, current media stream encryption scheme is the most more complicated, requires higher to calculating disposal ability.But along with communication technology
Development, increasing user begins with mobile terminal equipment, such as mobile phone, smart mobile phone, individual digital and helps
Reason, flat board etc. access the video content on the Internet.Compared with personal computer (such as desktop computer or notebook), these
Mobile device disposal ability is limited to the calculating disposal ability of video file, so the complexity of streaming media encryption and deciphering is not
Can be the highest.This also makes these Streaming Medias freely propagate after being easy to be cracked, and causes content supplier's benefit damage.
And, existing encrypt/decrypt scheme, after being encrypted audio-video document, destroys audio-video document itself
Structure, this just requires that follow-up network transmission link can structure after compatible this destruction.Especially to content delivery network
For network (CDN), owing to the audio-video document structure after encrypted is destroyed, also it is accomplished by CDN and can again resolve this
Form is to identify its true content, and this brings much inconvenience to CDN so that the content storage of CDN and the efficiency of distribution are big
Big reduction.Bring obstruction the most also to the popularization of whole encrypt/decrypt scheme.
Accordingly, it is desirable to provide the encrypt/decrypt scheme of a kind of novelty solves above-mentioned problems of the prior art.
Summary of the invention
The purpose of the application is the existing encryption/decryption side solving to use during the copyright protection of streaming medium content
Various not convenient in case.
The application is a kind of streaming media encryption method based on audio frequency and video form and system.
First aspect in the application, it is provided that a kind of method of encryption Streaming Media based on audio frequency and video form, including: connect
The audio-video document needing encryption and the key for encryption provided by user are provided;According to the encryption level set, use
Audio-video document described in the described double secret key that the AES being associated with described encryption level provides based on user adds
Close;Export encrypted audio-video document.
Second aspect in the application, it is provided that a kind of watch the stream matchmaker that method according to claim 1 is encrypted
The method of body, including: initiating the request of the audio-video document of encryption to be play, described request includes that storing encrypted sound regards
The key that the URL of frequency file and user provide;Send the request to the player with deciphering module, and by described broadcasting
Device resolves described request to obtain described URL and key;Described player is initiated warp to cloud service computer based on described URL
The download request of the audio-video document of encryption;Described player is while from encrypted sound described in described cloud service downloaded
The data of video file while the data of the encrypted audio-video document downloaded based on described double secret key are decrypted and with
Time the data of decrypted audio-video document are returned to user for broadcasting.
The third aspect in the application, it is provided that the encrypting module of a kind of encryption Streaming Media based on audio frequency and video form, its
It is characterised by, including: input port, described input port is for receiving the audio-video document needing encryption and being provided by user
For encryption key;Encryption level port, described encryption level port is adapted to assist in user and sets encryption level, in order to make
Audio-video document described in the described double secret key provided based on user with the AES being associated with described encryption level is carried out
Encryption;Output port, described output port is used for exporting encrypted audio-video document.
Accompanying drawing explanation
Fig. 1 is the schematic diagram of system running environment according to an embodiment of the invention.
Fig. 2 is the operating diagram of encrypting module according to an embodiment of the invention.
Fig. 3 is according to an embodiment of the invention for encrypting the flow chart of the method for audio-video document.
Fig. 4 is that the request of based on Client-initiated viewing encryption according to an embodiment of the invention audio-video document is
User provides the flow chart of the audio-video document asked.
Detailed description of the invention
The application mainly solves the Copyright Protection of video, specifically, only obtains decipherment algorithm and the use of key
The encrypted video of viewing could be deciphered in family.
Current media stream encryption scheme is the most more complicated, requires higher to the calculating disposal ability of equipment, thus takies
Higher cpu load.When particularly playing in mobile terminal, owing to device resource is limited, described solution secret meeting causes video playback
The problem such as have time delay, Ka Dun or sound picture asynchronous, this has had a strong impact on user's viewing experience.Even at PC end, working as PC
When performing the operation of multitask consuming relatively multiple resource, the deciphering scheme of described complexity also can affect the viewing experience of user.Separately
Outward, after audio-video document is encrypted by existing encipherment scheme, destroying the structure of audio-video document itself, this will give net
Network transmission link brings compatibility issue.Particularly, when described audio-video document is streaming medium content, described file structure
Destruction may make the sequencing of Stream Data Transmission originally that confusion occurs, and causes cannot normally watching described stream by network
Media content.
Two subject matters existed for current media stream encryption scheme, present applicant proposes a kind of based on audio frequency and video lattice
The streaming media encryption method of formula and system.The method and system provide following improvement relative to existing scheme:
(1) on the premise of ensureing identical audio-video document level of security, the complexity of encryption is minimized.
(2) on the premise of the experience not affecting user and watching audio-video document, the complexity of deciphering is minimized.
(3) file size before and after encryption keeps consistent, thus does not increase the flow uploaded, download.
(4) do not change original audio-video document structure after encryption, reduce the compatibility issue that network transmission link brings.
First, as it is shown in figure 1, disclose the schematic diagram of system running environment 100 according to an embodiment of the invention.Institute
State in system running environment 100, include the cloud service computer 110 and client source station 120 being connected by network 130.Described
Cloud service computer 110 provides the user required service by network with on-demand, easy extension way.Such as, at the present embodiment
In, cloud service computer 110 can provide cloud storage service and cloud cryptographic services.Cloud storage service can receive from client source
The audio-video document that the needs of 120 of standing are encrypted, and save it in the cloud storage module in cloud service computer 110, meanwhile,
The URL that will be stored in the audio-video document in cloud storage module returns to client source station 120.Cloud cryptographic services can take according to cloud
Cloud storage service is stored by the request from the encryption audio-video document of client source station 120 that business computer 110 receives
Corresponding audio-video document be encrypted after be then stored into cloud storage module, and would correspond to the warp being stored in cloud storage module
The URL of the audio-video document of encryption returns to client source station 120.Owing to make use of " cloud " technology, in an embodiment, audio frequency and video literary composition
Storage and the encryption of part can be completed by cloud service computer 110, and therefore, the calculating greatly reducing client source station processes
Capability Requirement so that, user even with having the mobile device of limited processing capacity, such as smart phone, it is also possible to real
The best viewing experience.
Then, in fig. 2, the operating diagram of encrypting module 200 according to an embodiment of the invention is disclosed.Encryption mould
The unit that block 200 can use CPU, microprocessor, coprocessor etc. to have calculation function realizes.Specifically, add described in
Close module includes: input port, and described input port is for receiving the audio-video document needing encryption and being provided by user
Key for encryption;Encryption level port, described encryption level port is adapted to assist in user and sets encryption level, in order to use
Audio-video document described in the described double secret key that the AES being associated with described encryption level provides based on user adds
Close;And output port, described output port is used for exporting encrypted audio-video document.It is provided solely for of the prior art
A kind of encipherment scheme of encryption mechanism except that, the encrypting module of the present invention, according to the different use scene of user, carries
Supply multiple encryption level.
For example, in one embodiment, need audio-video document is entered iff the purpose being in order at charge
Row encryption, then the encryption level that rank can be provided to be 0.In this encryption level, encrypting module is only in audio-video document
Some key message is encrypted, without destroying the integrity of audio/video frames data.So, when deciphering, the generation spent
Valency is minimum, and the process resource of the such as CPU etc consumed almost is negligible.In concrete practice, this encryption level
Can be used to limit encrypted audio-video document play by universal player.The most only there is the deciphering function of correspondence
Special player could play the encrypted audio-video document of this type of rank.But described special player only needs to spend less
Permitted just to play whole audio-video document smoothly after the key message in audio-video document is decrypted by resource and without from
Whole file is decrypted by head to tail.Owing to this encryption level 0 has consumption very small amount resource, therefore, it is non-
Often it is suitable for being dissolved in the Video Applications for the mobile device with limited processing resources.Many is opened specially for mobile device
Send out media player can use this encryption level with ensure audio-video document enough level of securitys on the premise of,
By reducing encryption/deciphering, the resource consumption of mobile device is provided the user good video tastes.It addition, this encryption
Rank will not change the structure of original audio-video document, thus reduces the compatibility issue that network transmission link brings.
Secondly, in another embodiment, when audio-video document contains the feelings of the important content can not known to other people
During condition, it is also possible to providing rank is the encryption level of 1.Under this rank, add adding the appointment data in audio/video frames
Close, to reach to destroy the purpose of the integrity of audio/video frames data file.Due to destroyed while file is encrypted
The integrity of this document, therefore, if user does not have the key of correspondence, just cannot full backup from encrypted data
Go out original audio-video document.It is additionally, since the integrity violations of audio-video document, therefore, even if this user just wants to
Certain section of video in audio-video document is also impossible, which greatly enhances the level of security of audio-video document, well
Protect important content contained in audio-video document.But, compared with the encipherment scheme of rank 0, the encipherment scheme of rank 1
Needing relatively complicated, need consumption more to process resource, therefore, it is relatively suitable for by having the cloud enough processing resource
Service computer realizes or is realized by the server that could be equally attached to cloud service computer on network.
The AES that the most just can realize described rank 0 and rank 1 is specifically described.In described explanation, with
Modal mp4 video file is discussed as example.It will be appreciated by those skilled in the art that described mp4 video file
It is merely for illustrative purposes and have to be limit the invention to this.It practice, any other video and audio format file
It is suitable for the solution of the present invention, such as RMVB, AVI, WMV, MKV, MPG etc. video format and MP3, WAV, WMA, APE etc.
Deng audio format.
1. AES (encryption of present examples mp4 video file), including:
The value of 1.1 amendment Major brand is the value that AES is specified, and whether this value indicates described video file
The file of encryption;
The value of 1.2 amendment Minor version is to represent the encryption level of this video file, and such as, 0 represents rank 0,1
Represent rank 1, by that analogy;
The title that 1.3 amendment Avc1 box, accC box, mp4a box, the entitled AES of mp4v box are specified,
Initialize owing to ordinary playing device to resolve this field, therefore the title destroying this field just can cause described ordinary playing
Device cannot find described field thus the most just cannot parse the content of these fields, to reach the effect tentatively encrypted;
The key that the content of each box specified for 1.4 couples 1.3 and client provide carries out Custom Encryption computing (such as position fortune
Calculate), obtained encrypted content is replaced original content, wherein at this in encryption before and after byte number keep constant, therefore
The purpose of structure and the size not changing video file can be realized;
The AES of encryption level 0 is belonged to, in other words, if user selects described video from 1.1 to 1.4 steps
It is the encryption of 0 that file performs encryption level, and the most described ciphering process leaves it at that.
And if user have selected the encryption of encryption level 1, in addition to comprising these encrypting steps above-mentioned, described in add
Close algorithm also includes:
1.5 for the data of the designated word joint number of key frame of video, perform operations described below:
Use client provide double secret key its carry out AES (Advanced Encryption Standard) encryption, AES adds
Close is block encryption, so the byte number specified must be the integral multiple of 16.Owing to the non-key frame of video is necessarily dependent upon key
Frame could decode, therefore only needs cryptography key frame;As a example by the audio-video document that key frame size is more than 10000 byte, it regards
Byte number specified by Pin is 128 bytes, and the designated word joint number of audio frequency is 64 bytes.In other embodiments, such as to sound
In the case of the data of the audio frame designated word joint number in video file carry out AES encryption, owing to the decoding of audio frame need not
Rely on adjacent audio frame, so every frame audio frame all need to be carried out AES encryption;Byte count sizes is not changed due to AES encryption,
Therefore it is also ensured that do not change structure and the size of video file;Although it is pointed out that and saying with AES encryption technology
Bright, but described example is merely for illustrative purposes, and other suitable encryption technologies can also be applied at above-mentioned encryption
In reason.
1.6 for each key frame in video, successively circulation perform to key frame of video (in the case of audio frame,
Then to each audio frame) AES encryption until end-of-file, the ciphering process to this rank 1 completes.
It is pointed out that above-mentioned AES is merely for illustrative purposes to be described, and have to be to this
Bright AES carries out any restriction.Other suitable AESs also apply be applicable in the present invention.
It should be understood that the explanation that the encryption level of above-mentioned rank 0 and rank 1 is merely exemplary, and have to be by this Shen
Scheme please is confined to the two rank.It practice, in other embodiments, according to the difference of the security requirement of scene, also
More encryption level can be provided to realize different secrecy purposes.Such as, in certain encryption level, when the key of user
Time not pair, can actively destroy audio-video document, even in some encryption level, when key is incorrect, can actively to
Corresponding content provider or the police send alarm (such as by modes such as notice, message, links) to be had audio frequency and video to remind
Unauthorized access of file etc..The encryption of other ranks can be compiled by those skilled in the art according to concrete demand
Journey is to realize the most above-mentioned additional security requirement.For the purpose saved space, no longer describe in detail one by one at this.
Superincumbent content describes the multi-level encryption technology that the encrypting module of the application is used, described multi-level
Encryption technology can be applicable to various device resource and user's request very well, thus provide and encrypt solution party more flexibly
Case.
After the encipherment scheme having understood the application, describe with reference now to Fig. 3 and use according to an embodiment of the invention
Flow chart in the method 300 of encryption audio-video document.First, 310, the encrypting module user from client source station receives needs
The corresponding key for encryption that the audio-video document of encryption and this user are provided.In step 320, come by an interface
Transmit encryption level to encrypting module, such as, select the encryption stage of needs for user by presenting a user interface to user
Not.It should be noted that this step is optional rather than necessary, because encrypting module can have the encryption stage of acquiescence
, do not specify without user.Only when user's other encryption levels of specific appointment, encrypting module just can use specified
Encryption level encrypts audio-video document.Subsequently, in step 330, the encryption level that encrypting module selects according to user, use with
The double secret key audio-video document that the AES that this encryption level is associated inputs based on user is encrypted.According to selected
The complexity of the AES that the encryption level selected is associated and the demand to process resource, described encryption can be by mobile device
The encrypting module at place performs, it is also possible to performed by the encryption server in cloud service computer.Then, in step 340,
After completing the encryption to audio-video document, encrypting module by encrypted audio-video document output with, such as, storage to cloud take
In the memory module of business computer.Alternatively, after exporting and stored encrypted audio-video document in step 340,
Step 350, instruction can be completed the response of encryption and preservation audio-video document and return to user to inform this use by encrypting module
The cryptographic tasks that family is asked is complete.Client source station, after receiving encryption successfully response, updates the file of client source station
List is to record completing of this cryptographic tasks.
In another embodiment, in addition to receive the audio-video document needing encryption from the user of client source station, institute
State encrypting module and can also receive a URL being associated with the audio-video document needing encryption from the user of client source station, and
Download at the network site specified by this URL and need the audio-video document of encryption, or, the user of client source station can shift to an earlier date
The audio-video document needing encryption is stored in the memory module at cloud service computer, in order at cloud service computer
Calling of encrypting module.
In yet another embodiment, when the encrypting module at cloud service computer performs described cryptographic tasks and stores
During encrypted audio-video document, in addition in step 350 place to the return success response of client source station, it is also possible to by encrypted
The URL of audio-video document together return to client source station.
Then, based on Client-initiated viewing encryption according to an embodiment of the invention audio frequency and video it are described with reference to Figure 4
The request of file provides the user the flow chart of asked audio-video document.First, in step 410, the use of client source station
The icon of the audio-video document on described client source station is clicked on to initiate in an application (such as browser, file manager) in family
Video playback is asked.In step 420, the request of described video playback is sent to the player with deciphering module by client source station,
Described request contains URL and the key of user's offer of encrypted audio-video document.In step 430, described in receiving
After video playback request, player resolves described request to obtain URL and the key of encrypted audio-video document therein.
In step 440, player URL based on described encrypted audio-video document initiates encrypted sound to cloud service computer
The GET of video file downloads request.In step 450, cloud service computer downloads request according to the GET received, and returns and institute
State encrypted audio-video document that URL is associated to player.In step 460, player starts to calculate from cloud service
Machine is downloaded the audio-video document data that audio-video document data are downloaded based on described double secret key on one side and is decrypted and general simultaneously
Decrypted audio-video document data return to user for broadcasting.Continue whole process, until whole audio-video document is play
Complete.In such scheme, described player is installed in client's source.And in another embodiment, cloud service computer
Can also have described deciphering module.Because, when encrypted audio-video document be based on rank 0 encrypted time, described deciphering
Process can't consume the resource of too much client's source, also would not have any impact the viewing experience of user, therefore,
The player of client's source is had the ability the viewing experience that decoding limit, limit provides smooth.But when described encrypted audio-video document is
Based on rank 1 or higher rank encrypted time, the most described deciphering module can utilize this cloud service at cloud service computer
The powerful process resource of computer completes the more complicated decrypting process of described encrypted audio-video document, subsequently will be through
The audio-video document of deciphering returns to the player of client's source, and now, the deciphering module of described player is big without expending again
The audio-video document received is decrypted by amount limited resources, but is directly play described decrypted audio frequency and video literary composition by player
Part, thus also ensure that the viewing experience of smoothness.In following content, illustrate the process of a kind of concrete decipherment algorithm.
As it has been described above, described decrypting process is still discussed using mp4 video file as example, and, other suitable videos
It is applied equally to the application with audio format file:
2. decipherment algorithm (deciphering of present examples mp4 video file), including:
2.1 values recovering Major brand are the original value before encryption;
2.2 resolve Minor version obtains the rank of encryption, value original before returning to encryption;
2.3 recover AES to Avc1 box, accC box, mp4a box, the amendment of mp4v box title so that its
Return to original title;
The encrypted content of the 2.4 above-mentioned box of secret key decryption provided according to user is to obtain original content, to this for adding
The decrypting process of level of confidentiality other 0 completes.
And if user is the encryption that have selected encryption level 1 carrys out encrypted video file, except comprise above-mentioned these
Outside decryption step, described decipherment algorithm also includes:
2.5 according to user provide key continue deciphering key frame of video (be then each audio frequency in the case of audio frame
Frame) encrypted data of designated word joint number to be to obtain initial data;
2.5 circulations perform the deciphering to key frame of video (being then each audio frame in the case of audio frame) until file
Tail, completes to this decrypting process.
As it has been described above, above-mentioned decrypting process can be embedded in player execution.
It is pointed out that above-mentioned decipherment algorithm is merely for illustrative purposes to be described, and have to be to this
Bright decipherment algorithm carries out any restriction.Other suitable decipherment algorithms also apply be applicable in the present invention.
By combining the various embodiments described by above-mentioned accompanying drawing, it will be understood to those skilled in the art that the present invention can
There is following benefit:
(1) according to the use scene that client is different, different encryption levels is set, to realize Information Security and playing body
The optimal compromise tested.
(2) key encrypted is provided by client, there is not conflict between different clients, and i.e. one client can not watch use
The audio-video document of another client, to ensure the safety of each client's audio-video document.
(3) file size before and after encryption is consistent, does not increase client and flow that user uploads, downloads, it is ensured that Ke Huji
The interests of user.
(4) do not change original audio-video document structure after encryption, reduce the compatibility issue that network transmission link brings.
(5) minimize the complexity of encryption, such user side deciphering Least-cost, the viewing experience of user can be promoted.
The theme of the application is described herein to meet legal requirements by details.But, this description itself is not intended to limit
The scope of this patent processed.On the contrary, inventor imagines and required for protection targeted may also be combined with other present or future technology
Embody otherwise, to include different steps or to be similar to the step combination of step described herein.This
Outward, although the different elements of method that term " step " and/or " frame " can be used for instruction herein, but unless and only
When clearly describing the order of each step, this term should not be construed as to imply that among each step disclosed herein or
Between any particular order.
Although the language special by architectural feature and/or method action describes this theme, it is to be understood that, appended right
Theme defined in claim is not necessarily limited to features described above or action or the order of above-mentioned action.More specifically, described
Feature and action are as realizing the exemplary forms of claims and disclosed.The application can be embodied as other concrete form
Without departing from its spirit or essential characteristics.Described embodiment the most all should be to be considered merely as illustrative and unrestricted
Property.Therefore, scope of the present application is by appended claims rather than instruction described above.Fall into claims waits efficacious prescriptions
Being changed in the implication of case and scope is all contained by the scope of claims.
Claims (10)
1. the method for an encryption Streaming Media based on audio frequency and video form, it is characterised in that including:
The audio-video document needing encryption and the key for encryption provided by user are provided;
According to the encryption level set, the AES being associated with described encryption level is used to come based on described in user's offer
Described in double secret key, audio-video document is encrypted;
Export encrypted audio-video document.
2. the method for claim 1, it is characterised in that also include:
The encrypted audio-video document of output is stored in the memory module of cloud service computer, and instruction is completed encryption
Returning to described user with the response storing described audio-video document, wherein said response contains encrypted audio-video document
URL.
3. the method for claim 1, it is characterised in that wherein said encryption level is to be transmitted by an interface
, or, described encryption level is the encryption level of acquiescence.
4. the method for claim 1, it is characterised in that when described audio-video document is MP4 video file, described in add
Close algorithm comprises the steps:
The value of amendment Major brand is the value that described AES is specified, and whether described value indicates described video file
The file of encryption;
The value of amendment Minor version is to represent the encryption level of this video file, and its intermediate value 0 represents encryption level 0, is worth 1
Represent encryption level 1;
The title that amendment Avc1 box, accC box, mp4a box, the entitled described AES of mp4v box are specified;
The key that the content of each box and client provide is encrypted computing, obtained encrypted content is replaced original in
Hold;
If encryption level encryption level is 1, then continue executing with following step:
Wherein, if the value of Minor version is 0, the most described AES leaves it at that, and when Minor version's
When value is 1, the most described AES also comprises the steps:
For the data of designated word joint number of each key frame of video, circulation performs AES encryption until described audio frequency and video literary composition successively
Part afterbody.
5. method as claimed in claim 4, it is characterised in that for the audio frame in described audio-video document, then for often
Individual audio frame performs described AES encryption until described audio-video document afterbody.
6. the method watching the Streaming Media that method according to claim 1 is encrypted, it is characterised in that including:
The request of the audio-video document of initiation encryption to be play, described request includes storing encrypted audio-video document
The key that URL and user provide;
Send the request to the player with deciphering module, and it is described to obtain to be resolved described request by described player
URL and key;
Described player initiates the download to encrypted audio-video document based on described URL to cloud service computer asks;
Described player from the data of encrypted audio-video document described in described cloud service downloaded and meanwhile based on
The data of the encrypted audio-video document that described double secret key is downloaded are decrypted and play decrypted audio-video document.
7. method as claimed in claim 6, it is characterised in that also can install described deciphering mould at described cloud service computer
Block, and when encrypted audio-video document be based on encryption level 1 or higher encryption level encrypted time, described cloud take
Deciphering module at business computer replaces described player and performs described deciphering.
8. method as claimed in claim 6, it is characterised in that when described audio-video document is MP4 video file, described solution
Close comprise the steps:
The value recovering Major brand is the original value before encrypting;
Recover AES to Avc1 box, accC box, mp4a box, the amendment of mp4v box title so that it returns to
Original title;
According to the encrypted content in each box of secret key decryption that user provides to obtain original content;
Wherein, when the value of Minor version is 1, described deciphering also comprises the steps:
For the encrypted data of designated word joint number of each key frame of video, perform institute successively according to the key that user provides
State deciphering until described audio-video document afterbody is to obtain initial data.
9. method as claimed in claim 8, it is characterised in that for the audio frame in described audio-video document, then for often
Individual audio frame performs described deciphering until described audio-video document afterbody.
10. the encrypting module of an encryption Streaming Media based on audio frequency and video form, it is characterised in that including:
Input port, described input port for receive need encryption audio-video document and by user provided for encrypting
Key;
Encryption level port, described encryption level port is adapted to assist in user and sets encryption level, in order to use and described encryption
Audio-video document described in the described double secret key that the AES that rank is associated provides based on user is encrypted;
Output port, described output port is used for exporting encrypted audio-video document.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610613721.9A CN106209896B (en) | 2016-07-29 | 2016-07-29 | Streaming media encryption method and module based on audio and video formats |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610613721.9A CN106209896B (en) | 2016-07-29 | 2016-07-29 | Streaming media encryption method and module based on audio and video formats |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106209896A true CN106209896A (en) | 2016-12-07 |
CN106209896B CN106209896B (en) | 2020-02-18 |
Family
ID=57496829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610613721.9A Expired - Fee Related CN106209896B (en) | 2016-07-29 | 2016-07-29 | Streaming media encryption method and module based on audio and video formats |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209896B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110650107A (en) * | 2018-06-26 | 2020-01-03 | 杭州海康威视数字技术股份有限公司 | Data processing method, device and system |
CN111093097A (en) * | 2019-12-20 | 2020-05-01 | 北京云享智胜科技有限公司 | Stream media data encryption and decryption method and device, electronic equipment and storage medium |
CN112966284A (en) * | 2021-03-26 | 2021-06-15 | 知印信息技术(天津)有限公司 | File encryption and decryption method and system and computer readable storage medium |
CN115225869A (en) * | 2022-09-20 | 2022-10-21 | 广州万协通信息技术有限公司 | Directional processing method and device for monitoring data |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020141582A1 (en) * | 2001-03-28 | 2002-10-03 | Kocher Paul C. | Content security layer providing long-term renewable security |
CN1494803A (en) * | 2001-02-26 | 2004-05-05 | �ɸ���Ӱ��ɷ�����˾ | Encryption of compressed video stream |
CN1997159A (en) * | 2006-09-29 | 2007-07-11 | 清华大学深圳研究生院 | Encryption method of video stream based on H.264 coding standard with controllable quality |
CN101350918A (en) * | 2008-09-05 | 2009-01-21 | 清华大学 | Method for protecting copyright of video content |
CN101895396A (en) * | 2010-07-14 | 2010-11-24 | 中兴通讯股份有限公司 | Mobile terminal and encryption method thereof |
CN102647420A (en) * | 2012-03-31 | 2012-08-22 | 苏州阔地网络科技有限公司 | Control method and system for preventing illegal connection |
CN103248474A (en) * | 2012-02-01 | 2013-08-14 | 华为技术有限公司 | Encryption and decryption method and device for streaming media |
CN103716637A (en) * | 2014-01-15 | 2014-04-09 | 北京工业大学 | H.264 compressed domain layered video encryption method based on content analysis |
CN105208404A (en) * | 2015-08-26 | 2015-12-30 | 北京新东方迅程网络科技有限公司 | Video encryption and decryption method and device |
-
2016
- 2016-07-29 CN CN201610613721.9A patent/CN106209896B/en not_active Expired - Fee Related
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1494803A (en) * | 2001-02-26 | 2004-05-05 | �ɸ���Ӱ��ɷ�����˾ | Encryption of compressed video stream |
US20020141582A1 (en) * | 2001-03-28 | 2002-10-03 | Kocher Paul C. | Content security layer providing long-term renewable security |
CN1997159A (en) * | 2006-09-29 | 2007-07-11 | 清华大学深圳研究生院 | Encryption method of video stream based on H.264 coding standard with controllable quality |
CN101350918A (en) * | 2008-09-05 | 2009-01-21 | 清华大学 | Method for protecting copyright of video content |
CN101895396A (en) * | 2010-07-14 | 2010-11-24 | 中兴通讯股份有限公司 | Mobile terminal and encryption method thereof |
CN103248474A (en) * | 2012-02-01 | 2013-08-14 | 华为技术有限公司 | Encryption and decryption method and device for streaming media |
CN102647420A (en) * | 2012-03-31 | 2012-08-22 | 苏州阔地网络科技有限公司 | Control method and system for preventing illegal connection |
CN103716637A (en) * | 2014-01-15 | 2014-04-09 | 北京工业大学 | H.264 compressed domain layered video encryption method based on content analysis |
CN105208404A (en) * | 2015-08-26 | 2015-12-30 | 北京新东方迅程网络科技有限公司 | Video encryption and decryption method and device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110650107A (en) * | 2018-06-26 | 2020-01-03 | 杭州海康威视数字技术股份有限公司 | Data processing method, device and system |
CN111093097A (en) * | 2019-12-20 | 2020-05-01 | 北京云享智胜科技有限公司 | Stream media data encryption and decryption method and device, electronic equipment and storage medium |
CN112966284A (en) * | 2021-03-26 | 2021-06-15 | 知印信息技术(天津)有限公司 | File encryption and decryption method and system and computer readable storage medium |
CN115225869A (en) * | 2022-09-20 | 2022-10-21 | 广州万协通信息技术有限公司 | Directional processing method and device for monitoring data |
CN115225869B (en) * | 2022-09-20 | 2022-12-20 | 广州万协通信息技术有限公司 | Directional processing method and device for monitoring data |
Also Published As
Publication number | Publication date |
---|---|
CN106209896B (en) | 2020-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10110613B2 (en) | Decrypting content samples including distinct encryption chains | |
US10320759B2 (en) | Streaming system and method | |
US8385546B2 (en) | System and method for storing and accessing digital media content using smart card technology | |
JP5756567B2 (en) | Method and apparatus for dynamic and real-time advertisement insertion based on metadata within a hardware-based trust route | |
US6460137B1 (en) | Encryption processing system | |
KR100843346B1 (en) | Integrity protection of streamed content | |
US8224751B2 (en) | Device-independent management of cryptographic information | |
US11025432B2 (en) | Access control technology for peer-to-peer sharing | |
US9450748B2 (en) | Decryption of content including partial-block discard | |
US8687809B2 (en) | System and method for decryption of content including disconnected encryption chains | |
CN106209896A (en) | Streaming media encryption method based on audio frequency and video form and module | |
CN109525893A (en) | Video segment method based on slice file duration threshold value | |
US10127396B2 (en) | System and method for local generation of streaming content with a hint track | |
KR101479290B1 (en) | Agent for providing security cloud service, security token device for security cloud service | |
US8196214B2 (en) | Method and apparatus for securing content using encryption with embedded key in content | |
CN112565656A (en) | Video call method, device, system, electronic equipment and storage medium | |
KR100784300B1 (en) | Unification digital content rights management system and method thereof | |
Hua et al. | Content protection for IPTV-current state of the art and challenges | |
EP3692706A1 (en) | A method for delivering digital content to at least one client device | |
KR100959380B1 (en) | Flash contents supplying method | |
Li et al. | RFID-based digital content copy protection system in movie and audio rental agency | |
Hunter | Video encryption-the epic movie battle | |
US20100332853A1 (en) | Network transmission method, network transmission system and network transmission device thereof | |
CA2516909A1 (en) | Method and apparatus for distributing content to a client device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200218 |
|
CF01 | Termination of patent right due to non-payment of annual fee |