CN113206841B - AES decryption agent method and system based on HLS protocol - Google Patents
AES decryption agent method and system based on HLS protocol Download PDFInfo
- Publication number
- CN113206841B CN113206841B CN202110457239.1A CN202110457239A CN113206841B CN 113206841 B CN113206841 B CN 113206841B CN 202110457239 A CN202110457239 A CN 202110457239A CN 113206841 B CN113206841 B CN 113206841B
- Authority
- CN
- China
- Prior art keywords
- module
- file
- address
- parameter
- decryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/65—Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Communication Control (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses an AES decryption agent method and system based on HLS protocol, wherein the system comprises an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module, and the presetting module is used for converting the access address of an actual m3u8 file into the address of the agent device; the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module; the analysis request module is used for analyzing the file type and extracting key parameters; the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file; and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
Description
Technical Field
The invention belongs to the technical field of video decryption, and particularly relates to an AES decryption agent system based on an HLS protocol.
Background
The HLS protocol (HTTP Live Streaming, adaptive bitrate Streaming based on HTTP) usually takes m3u8 as a packaging format, m3u8 is only a descriptive file, and a true file Stream is a TS (Transport Stream) file declared therein (TS is also a commonly used video packaging format, Encryption is performed on the file, and TS is only a packaging format and also has other formats, such as mp4), and AES (Advanced Encryption Standard ) is a common symmetric Encryption algorithm, and if the current m3u8 file is encrypted by AES, key information needs to be declared in m3u8 according to the protocol specification, so that the file can be played at a playing end.
Generally, a scene that a key is directly written into an m3u8 file cannot exist, the key belongs to private information and is easy to leak when being placed into the file, a common method is to declare an interface address for obtaining the key in the m3u8 file, the key can be obtained for playing after various authority authentications are carried out through a playing end, the authority authentications are generally placed at a client, namely the video is published outwards, the file cannot be directly played in an auditing operation process before the video is published by a server, even if the server can obtain the key information of the video from other channels, the current general method is to download the file to the local and carry out decryption playing according to a known key, the playing flow can be lengthened, the playing complexity is increased, and the method is not suitable for scenes of video auditing and real-time playing.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an AES decryption agent method and system based on an HLS protocol, which can decrypt and play an m3u8 file encrypted by AES in real time under the condition that an AES key is known, even if the key cannot be obtained through a key information interface stated in the m3u8 file or the key information is not stated.
In order to solve the technical problem, the invention adopts the following technical scheme:
one aspect of the embodiments of the present invention provides an AES decryption agent method based on an HLS protocol, which is applied to an agent system including an external device and an agent device, wherein the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the method includes the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the request according to the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
Preferably, the converting, by the preset value module, the access address of the actual m3u8 file into the address of the proxy device specifically includes:
if the m3u8 address is: http: // source file address/encrypted file name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
Preferably, the client module includes a program that requests the m3u8 file.
Preferably, the client module includes an application that requests the m3u8 file.
Preferably, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
Preferably, the analyzing request module analyzes the file type, and the extracting the key parameter specifically includes: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
Preferably, the analyzing request module analyzes the file type, and the extracting the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
Preferably, the converting module converts the content of the m3u8 file, and the changing the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
Preferably, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, including: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
Still another aspect of the embodiments of the present invention provides an AES decrypting agent system based on HLS protocol, including an external apparatus and an agent apparatus, where the external apparatus further includes a presetting module and a client module, the agent apparatus further includes a parsing request module, a conversion module and a decrypting module,
the preset value module is used for converting the access address of the actual m3u8 file into the address of the proxy device;
the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module;
the analysis request module is used for analyzing the file type and extracting key parameters;
the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file;
and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
The invention has the following beneficial effects:
(1) under the condition of a known key, the random encrypted HLS video stream and the random encrypted live stream can be played without a professional decryption client;
(2) under the scene of needing strict control of content quality and yellow discrimination and violence discrimination, the method can be used for carrying out real-time analysis on the encrypted video stream and the encrypted live stream.
Drawings
Fig. 1 is a schematic structural diagram of an AES decryption agent system based on an HLS protocol according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention discloses an AES decryption agent system based on an HLS protocol, including an external device and an agent device, where the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the preset module is used to convert an access address of an actual m3u8 file into an address of the agent device; the client module is used for requesting according to the address generated by the preset module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module; the analysis request module is used for analyzing the file type and extracting key parameters; the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file; and the decryption module is used for decrypting the TS file according to the key according to the AES general algorithm.
In a specific application example, the step of converting the access address of the actual m3u8 file into the address of the proxy device by the preset value module specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: // source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
The first parameter and the second parameter in the embodiment of the present invention are only exemplified by the parameter, and the name of the parameter is not limited.
The access address of the actual m3u8 file is converted into the address of the proxy device through the default value module, the client directs the request to the proxy service when playing, and the actual m3u8 file address and the key information are used as parameters to be transmitted.
In the specific application example, the client module refers to a program or application which requests m3u8 file, for example, if m3u8 is to be played, the client module refers to a player; if m3u8 is to be downloaded, the client module is usually a downloading program, and the embodiment of the present invention does not limit the type of the client module, and can be used as the client module as long as there is a need to request the m3u8 file.
In a specific application example, the processing, by the client module, according to the received response contents of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
The analysis request module analyzes the file type, and the extraction of the key parameters specifically comprises the following steps: if the file type of the first parameter is m3u8, the file is processed by the conversion module, and key information including the second parameter is carried.
The analysis request module analyzes the file type, and the extracting of the key parameters specifically comprises: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
In a specific application example, the converting module converts the content of the m3u8 file, and the changing of the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
Examples are illustrated below:
http: // Source File Address/encrypted File name. m3u8 is as follows:
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:10
#EXTINF:10.000,
1.ts
#EXTINF:10.000.
2.ts
#EXTINF:10.000.
3.ts
#EXT-X-ENDLIST
the converted content is then as follows:
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:10
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/1. ts & parameter 2. xxx
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/2. ts & parameter 2 ═ xxx
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/3. ts & parameter 2. xxx
#EXT-X-ENDLIST
In a specific application example, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, and includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time. Since AES decryption belongs to a general algorithm, it is not described herein.
Corresponding to the embodiment of the system of the present invention, the present invention provides an AES decryption agent method based on HLS protocol, which is applied to an agent system including an external device and an agent device as shown in fig. 1, wherein the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the method includes the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the presetting module, and simultaneously, the client module respectively processes the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
In a specific application example, the step of converting the access address of the actual m3u8 file into the address of the proxy device by the preset value module specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
In the specific application example, the client module refers to a program or application which requests m3u8 files, for example, if m3u8 is to be played, the client module refers to a player in general; if m3u8 is to be downloaded, the client module is usually a downloading program, and the embodiment of the present invention does not limit the type of the client module, and can be used as the client module as long as there is a need to request the m3u8 file.
In a specific application example, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
In a specific application example, the analyzing request module analyzes the file type, and the extracting of the key parameter specifically includes: if the file type of the first parameter is m3u8, the file is processed by the conversion module, and key information including the second parameter is carried.
In a specific application example, the analyzing request module analyzes the file type, and the extracting of the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
In a specific application example, the converting module converts the content of the m3u8 file, and the changing of the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
In a specific application example, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, and includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
For the technical contents of the remaining implementation details in the method embodiment, reference is made to the description of the system embodiment, and details are not repeated again.
It should be understood that the exemplary embodiments described herein are illustrative and not restrictive. Although one or more embodiments of the present invention have been described with reference to the accompanying drawings, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.
Claims (4)
1. An AES decryption agent method based on HLS protocol is characterized in that the AES decryption agent method is applied to an agent system comprising an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module, and the method comprises the following steps:
the preset module converts an access address of an actual m3u8 file into an address of an agent device, and specifically includes:
if the m3u8 address is: http:// source file address/encrypted file name.m 3u 8;
the translated address is: http:// proxy device address? A first parameter http:// source file address/encrypted file name m3u8& second parameter xxx;
wherein the first parameter is the m3u8 address and the second parameter is the known AES key;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the received response contents of the conversion module and the decryption module, and the method specifically comprises the following steps: after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address; after receiving the TS content responded by the decryption module, the client module directly plays the content, namely the decrypted video stream content;
the analysis request module analyzes the file type and extracts key parameters, and specifically comprises the following steps: if the file type of the first parameter is m3u8, processing the file by a conversion module, and simultaneously carrying key information comprising a second parameter; if the file type of the first parameter is TS, the file type is processed by a decryption module, and key information including a second parameter is carried;
the converting module converts the content of the m3u8 file, and changes the request address of the internal TS file, which specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, then responds to the client module, rewrites the TS address in the file information, changes the TS address into an agent address, and simultaneously appends key information including the second parameter, so that the client module also forwards the TS file request to the agent device;
the decryption module decrypts the TS file according to the key by the AES general algorithm, and specifically comprises the following steps: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file passes through the analysis request module and reaches the decryption module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of the AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
2. AES decryption agent method based on HLS protocol as claimed in claim 1, characterised in that the client module comprises a program requesting the m3u8 file.
3. AES decryption agent method based on HLS protocol as claimed in claim 1, characterised in that the client module comprises an application requesting the m3u8 file.
4. An AES decryption agent system based on HLS protocol is characterized in that the AES decryption agent system comprises an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module,
the preset module is configured to convert an access address of an actual m3u8 file into an address of an agent device, and specifically includes:
if the m3u8 address is: http:// source file address/encrypted file name.m 3u 8;
the translated address is: http:// proxy device address? A first parameter http:// source file address/encrypted file name m3u8& second parameter xxx;
wherein the first parameter is the m3u8 address and the second parameter is the known AES key;
the client module is used for making a request according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module, and the method specifically comprises the following steps: after receiving the content responded by the conversion module, the client module assembles the TS address and then requests TS information for proxy service according to the address; after receiving the TS content responded by the decryption module, the client module directly plays the content, namely the decrypted video stream content;
the analysis request module is used for analyzing file types and extracting key parameters, and specifically comprises the following steps: if the file type of the first parameter is m3u8, processing the file by a conversion module, and simultaneously carrying key information comprising a second parameter; if the file type of the first parameter is TS, the file type is processed by a decryption module, and key information including a second parameter is carried;
the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file, and specifically comprises the following steps: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into an agent address, and simultaneously appends key information including the second parameter, so that the client module also forwards the TS file to the agent device when requesting the TS file;
the decryption module is used for decrypting the TS file according to the key by the AES general algorithm, and specifically comprises the following steps: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110457239.1A CN113206841B (en) | 2021-04-26 | 2021-04-26 | AES decryption agent method and system based on HLS protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110457239.1A CN113206841B (en) | 2021-04-26 | 2021-04-26 | AES decryption agent method and system based on HLS protocol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113206841A CN113206841A (en) | 2021-08-03 |
CN113206841B true CN113206841B (en) | 2022-08-23 |
Family
ID=77028786
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110457239.1A Active CN113206841B (en) | 2021-04-26 | 2021-04-26 | AES decryption agent method and system based on HLS protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113206841B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105939491A (en) * | 2016-05-25 | 2016-09-14 | 乐视控股(北京)有限公司 | Video playing method and device |
CN106302465A (en) * | 2016-08-17 | 2017-01-04 | 无锡天脉聚源传媒科技有限公司 | A kind of method and device of playing audio-video data |
CN106657162A (en) * | 2017-03-01 | 2017-05-10 | 北京东大正保科技有限公司 | Online stream media playing method and stream media downloading and offline playing method |
CN107294927A (en) * | 2016-04-05 | 2017-10-24 | 北京优朋普乐科技有限公司 | Anti-stealing link method, device and system based on the network terminal |
CN108494792A (en) * | 2018-04-09 | 2018-09-04 | 四川百视通科技有限公司 | A kind of flash player plays the converting system and its working method of hls video flowings |
CN109995743A (en) * | 2018-01-02 | 2019-07-09 | 腾讯科技(深圳)有限公司 | A kind of processing method and terminal of multimedia file |
CN110139131A (en) * | 2018-02-09 | 2019-08-16 | 网宿科技股份有限公司 | A kind of method and terminal of playing video file |
CN111049832A (en) * | 2019-12-13 | 2020-04-21 | 北京浪潮数据技术有限公司 | Reverse proxy method and related device |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100571133C (en) * | 2004-02-17 | 2009-12-16 | 华为技术有限公司 | The implementation method of media flow security transmission |
US8243924B2 (en) * | 2007-06-29 | 2012-08-14 | Google Inc. | Progressive download or streaming of digital media securely through a localized container and communication protocol proxy |
US8301570B2 (en) * | 2007-10-29 | 2012-10-30 | Infosys Technologies Limited | Method and system for data security in an IMS network |
US8924718B2 (en) * | 2012-10-29 | 2014-12-30 | Tektronix, Inc. | Deciphering internet protocol (IP) security in an IP multimedia subsystem (IMS) using a monitoring system |
US9338149B2 (en) * | 2013-03-15 | 2016-05-10 | Arris Enterprises, Inc. | DLNA/DTCP stream conversion for secure media playback |
JP2015032039A (en) * | 2013-07-31 | 2015-02-16 | 株式会社東芝 | Display device and display method |
CN106550242B (en) * | 2016-12-08 | 2020-03-24 | 北京数码视讯科技股份有限公司 | Method and device for converting IP real-time media stream |
US10903985B2 (en) * | 2017-08-25 | 2021-01-26 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques |
-
2021
- 2021-04-26 CN CN202110457239.1A patent/CN113206841B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107294927A (en) * | 2016-04-05 | 2017-10-24 | 北京优朋普乐科技有限公司 | Anti-stealing link method, device and system based on the network terminal |
CN105939491A (en) * | 2016-05-25 | 2016-09-14 | 乐视控股(北京)有限公司 | Video playing method and device |
CN106302465A (en) * | 2016-08-17 | 2017-01-04 | 无锡天脉聚源传媒科技有限公司 | A kind of method and device of playing audio-video data |
CN106657162A (en) * | 2017-03-01 | 2017-05-10 | 北京东大正保科技有限公司 | Online stream media playing method and stream media downloading and offline playing method |
CN109995743A (en) * | 2018-01-02 | 2019-07-09 | 腾讯科技(深圳)有限公司 | A kind of processing method and terminal of multimedia file |
CN110139131A (en) * | 2018-02-09 | 2019-08-16 | 网宿科技股份有限公司 | A kind of method and terminal of playing video file |
CN108494792A (en) * | 2018-04-09 | 2018-09-04 | 四川百视通科技有限公司 | A kind of flash player plays the converting system and its working method of hls video flowings |
CN111049832A (en) * | 2019-12-13 | 2020-04-21 | 北京浪潮数据技术有限公司 | Reverse proxy method and related device |
Non-Patent Citations (1)
Title |
---|
基于代理技术的HLS客户端设计与实现;耿立宏等;《微电子学与计算机》;20161205(第12期);第13-17页 * |
Also Published As
Publication number | Publication date |
---|---|
CN113206841A (en) | 2021-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101428875B1 (en) | System and method for processing security based on http live streaming | |
US7447313B2 (en) | Pointers to encrypted data in RTP header | |
CN107707504B (en) | Streaming media playing method and system, server and client | |
KR101759039B1 (en) | Dtcp converter for hls | |
US20130144714A1 (en) | Method, Apparatus and System for Supporting Advertisement Contents in HTTP Streaming Play Mode | |
US20040199771A1 (en) | Method for tracing a security breach in highly distributed content | |
WO2021120831A1 (en) | Streaming media data encryption method and apparatus, streaming media data decryption method and apparatus, electronic device and storage medium | |
US20080063195A1 (en) | Method and system for encrypting or decrypting wmv streaming media | |
JP2005287039A (en) | Common scramble processing | |
CN108881205A (en) | A kind of safety broadcasting system and playback method of HLS Streaming Media | |
US20190246148A1 (en) | Method and system for scrambling broadcast with low latency | |
CN107124385B (en) | Mirror flow-based SSL/TLS protocol plaintext data acquisition method | |
CN106657162B (en) | Online streaming media playing method, streaming media downloading method and offline playing method | |
CN113259720A (en) | Video encryption method and system based on HLS protocol | |
CN113206841B (en) | AES decryption agent method and system based on HLS protocol | |
JP2002111652A (en) | Encryption processing for streaming media | |
WO2016141811A1 (en) | Streaming media pushing method and system | |
US20200364317A1 (en) | Method and system for identifying a user terminal in order to receive streaming protected multimedia content | |
US11647237B1 (en) | Method and apparatus for secure video manifest/playlist generation and playback | |
CN106790132A (en) | Based on RTMP without plug-in unit preview video method | |
CN114189706B (en) | Media playing method, system, device, computer equipment and storage medium | |
CN112350986A (en) | Method and system for shaping transmission fragmentation of audio and video network | |
CN112752122B (en) | Video encryption transmission method of intelligent camera and computer readable storage medium | |
CN108400987A (en) | A kind of audio play in address protection strategy | |
CN115643459A (en) | Video processing method, system, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |