CN113206841B - AES decryption agent method and system based on HLS protocol - Google Patents

AES decryption agent method and system based on HLS protocol Download PDF

Info

Publication number
CN113206841B
CN113206841B CN202110457239.1A CN202110457239A CN113206841B CN 113206841 B CN113206841 B CN 113206841B CN 202110457239 A CN202110457239 A CN 202110457239A CN 113206841 B CN113206841 B CN 113206841B
Authority
CN
China
Prior art keywords
module
file
address
parameter
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110457239.1A
Other languages
Chinese (zh)
Other versions
CN113206841A (en
Inventor
代存折
李妃军
翁成龙
宋录文
戴金晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Arcvideo Technology Co ltd
Original Assignee
Hangzhou Arcvideo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Arcvideo Technology Co ltd filed Critical Hangzhou Arcvideo Technology Co ltd
Priority to CN202110457239.1A priority Critical patent/CN113206841B/en
Publication of CN113206841A publication Critical patent/CN113206841A/en
Application granted granted Critical
Publication of CN113206841B publication Critical patent/CN113206841B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/65Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Communication Control (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses an AES decryption agent method and system based on HLS protocol, wherein the system comprises an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module, and the presetting module is used for converting the access address of an actual m3u8 file into the address of the agent device; the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module; the analysis request module is used for analyzing the file type and extracting key parameters; the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file; and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.

Description

AES decryption agent method and system based on HLS protocol
Technical Field
The invention belongs to the technical field of video decryption, and particularly relates to an AES decryption agent system based on an HLS protocol.
Background
The HLS protocol (HTTP Live Streaming, adaptive bitrate Streaming based on HTTP) usually takes m3u8 as a packaging format, m3u8 is only a descriptive file, and a true file Stream is a TS (Transport Stream) file declared therein (TS is also a commonly used video packaging format, Encryption is performed on the file, and TS is only a packaging format and also has other formats, such as mp4), and AES (Advanced Encryption Standard ) is a common symmetric Encryption algorithm, and if the current m3u8 file is encrypted by AES, key information needs to be declared in m3u8 according to the protocol specification, so that the file can be played at a playing end.
Generally, a scene that a key is directly written into an m3u8 file cannot exist, the key belongs to private information and is easy to leak when being placed into the file, a common method is to declare an interface address for obtaining the key in the m3u8 file, the key can be obtained for playing after various authority authentications are carried out through a playing end, the authority authentications are generally placed at a client, namely the video is published outwards, the file cannot be directly played in an auditing operation process before the video is published by a server, even if the server can obtain the key information of the video from other channels, the current general method is to download the file to the local and carry out decryption playing according to a known key, the playing flow can be lengthened, the playing complexity is increased, and the method is not suitable for scenes of video auditing and real-time playing.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an AES decryption agent method and system based on an HLS protocol, which can decrypt and play an m3u8 file encrypted by AES in real time under the condition that an AES key is known, even if the key cannot be obtained through a key information interface stated in the m3u8 file or the key information is not stated.
In order to solve the technical problem, the invention adopts the following technical scheme:
one aspect of the embodiments of the present invention provides an AES decryption agent method based on an HLS protocol, which is applied to an agent system including an external device and an agent device, wherein the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the method includes the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the request according to the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
Preferably, the converting, by the preset value module, the access address of the actual m3u8 file into the address of the proxy device specifically includes:
if the m3u8 address is: http: // source file address/encrypted file name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
Preferably, the client module includes a program that requests the m3u8 file.
Preferably, the client module includes an application that requests the m3u8 file.
Preferably, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
Preferably, the analyzing request module analyzes the file type, and the extracting the key parameter specifically includes: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
Preferably, the analyzing request module analyzes the file type, and the extracting the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
Preferably, the converting module converts the content of the m3u8 file, and the changing the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
Preferably, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, including: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
Still another aspect of the embodiments of the present invention provides an AES decrypting agent system based on HLS protocol, including an external apparatus and an agent apparatus, where the external apparatus further includes a presetting module and a client module, the agent apparatus further includes a parsing request module, a conversion module and a decrypting module,
the preset value module is used for converting the access address of the actual m3u8 file into the address of the proxy device;
the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module;
the analysis request module is used for analyzing the file type and extracting key parameters;
the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file;
and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
The invention has the following beneficial effects:
(1) under the condition of a known key, the random encrypted HLS video stream and the random encrypted live stream can be played without a professional decryption client;
(2) under the scene of needing strict control of content quality and yellow discrimination and violence discrimination, the method can be used for carrying out real-time analysis on the encrypted video stream and the encrypted live stream.
Drawings
Fig. 1 is a schematic structural diagram of an AES decryption agent system based on an HLS protocol according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention discloses an AES decryption agent system based on an HLS protocol, including an external device and an agent device, where the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the preset module is used to convert an access address of an actual m3u8 file into an address of the agent device; the client module is used for requesting according to the address generated by the preset module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module; the analysis request module is used for analyzing the file type and extracting key parameters; the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file; and the decryption module is used for decrypting the TS file according to the key according to the AES general algorithm.
In a specific application example, the step of converting the access address of the actual m3u8 file into the address of the proxy device by the preset value module specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: // source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
The first parameter and the second parameter in the embodiment of the present invention are only exemplified by the parameter, and the name of the parameter is not limited.
The access address of the actual m3u8 file is converted into the address of the proxy device through the default value module, the client directs the request to the proxy service when playing, and the actual m3u8 file address and the key information are used as parameters to be transmitted.
In the specific application example, the client module refers to a program or application which requests m3u8 file, for example, if m3u8 is to be played, the client module refers to a player; if m3u8 is to be downloaded, the client module is usually a downloading program, and the embodiment of the present invention does not limit the type of the client module, and can be used as the client module as long as there is a need to request the m3u8 file.
In a specific application example, the processing, by the client module, according to the received response contents of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
The analysis request module analyzes the file type, and the extraction of the key parameters specifically comprises the following steps: if the file type of the first parameter is m3u8, the file is processed by the conversion module, and key information including the second parameter is carried.
The analysis request module analyzes the file type, and the extracting of the key parameters specifically comprises: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
In a specific application example, the converting module converts the content of the m3u8 file, and the changing of the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
Examples are illustrated below:
http: // Source File Address/encrypted File name. m3u8 is as follows:
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:10
#EXTINF:10.000,
1.ts
#EXTINF:10.000.
2.ts
#EXTINF:10.000.
3.ts
#EXT-X-ENDLIST
the converted content is then as follows:
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:10
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/1. ts & parameter 2. xxx
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/2. ts & parameter 2 ═ xxx
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/3. ts & parameter 2. xxx
#EXT-X-ENDLIST
In a specific application example, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, and includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time. Since AES decryption belongs to a general algorithm, it is not described herein.
Corresponding to the embodiment of the system of the present invention, the present invention provides an AES decryption agent method based on HLS protocol, which is applied to an agent system including an external device and an agent device as shown in fig. 1, wherein the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the method includes the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the presetting module, and simultaneously, the client module respectively processes the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
In a specific application example, the step of converting the access address of the actual m3u8 file into the address of the proxy device by the preset value module specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
In the specific application example, the client module refers to a program or application which requests m3u8 files, for example, if m3u8 is to be played, the client module refers to a player in general; if m3u8 is to be downloaded, the client module is usually a downloading program, and the embodiment of the present invention does not limit the type of the client module, and can be used as the client module as long as there is a need to request the m3u8 file.
In a specific application example, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
In a specific application example, the analyzing request module analyzes the file type, and the extracting of the key parameter specifically includes: if the file type of the first parameter is m3u8, the file is processed by the conversion module, and key information including the second parameter is carried.
In a specific application example, the analyzing request module analyzes the file type, and the extracting of the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
In a specific application example, the converting module converts the content of the m3u8 file, and the changing of the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
In a specific application example, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, and includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
For the technical contents of the remaining implementation details in the method embodiment, reference is made to the description of the system embodiment, and details are not repeated again.
It should be understood that the exemplary embodiments described herein are illustrative and not restrictive. Although one or more embodiments of the present invention have been described with reference to the accompanying drawings, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.

Claims (4)

1. An AES decryption agent method based on HLS protocol is characterized in that the AES decryption agent method is applied to an agent system comprising an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module, and the method comprises the following steps:
the preset module converts an access address of an actual m3u8 file into an address of an agent device, and specifically includes:
if the m3u8 address is: http:// source file address/encrypted file name.m 3u 8;
the translated address is: http:// proxy device address? A first parameter http:// source file address/encrypted file name m3u8& second parameter xxx;
wherein the first parameter is the m3u8 address and the second parameter is the known AES key;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the received response contents of the conversion module and the decryption module, and the method specifically comprises the following steps: after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address; after receiving the TS content responded by the decryption module, the client module directly plays the content, namely the decrypted video stream content;
the analysis request module analyzes the file type and extracts key parameters, and specifically comprises the following steps: if the file type of the first parameter is m3u8, processing the file by a conversion module, and simultaneously carrying key information comprising a second parameter; if the file type of the first parameter is TS, the file type is processed by a decryption module, and key information including a second parameter is carried;
the converting module converts the content of the m3u8 file, and changes the request address of the internal TS file, which specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, then responds to the client module, rewrites the TS address in the file information, changes the TS address into an agent address, and simultaneously appends key information including the second parameter, so that the client module also forwards the TS file request to the agent device;
the decryption module decrypts the TS file according to the key by the AES general algorithm, and specifically comprises the following steps: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file passes through the analysis request module and reaches the decryption module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of the AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
2. AES decryption agent method based on HLS protocol as claimed in claim 1, characterised in that the client module comprises a program requesting the m3u8 file.
3. AES decryption agent method based on HLS protocol as claimed in claim 1, characterised in that the client module comprises an application requesting the m3u8 file.
4. An AES decryption agent system based on HLS protocol is characterized in that the AES decryption agent system comprises an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module,
the preset module is configured to convert an access address of an actual m3u8 file into an address of an agent device, and specifically includes:
if the m3u8 address is: http:// source file address/encrypted file name.m 3u 8;
the translated address is: http:// proxy device address? A first parameter http:// source file address/encrypted file name m3u8& second parameter xxx;
wherein the first parameter is the m3u8 address and the second parameter is the known AES key;
the client module is used for making a request according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module, and the method specifically comprises the following steps: after receiving the content responded by the conversion module, the client module assembles the TS address and then requests TS information for proxy service according to the address; after receiving the TS content responded by the decryption module, the client module directly plays the content, namely the decrypted video stream content;
the analysis request module is used for analyzing file types and extracting key parameters, and specifically comprises the following steps: if the file type of the first parameter is m3u8, processing the file by a conversion module, and simultaneously carrying key information comprising a second parameter; if the file type of the first parameter is TS, the file type is processed by a decryption module, and key information including a second parameter is carried;
the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file, and specifically comprises the following steps: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into an agent address, and simultaneously appends key information including the second parameter, so that the client module also forwards the TS file to the agent device when requesting the TS file;
the decryption module is used for decrypting the TS file according to the key by the AES general algorithm, and specifically comprises the following steps: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
CN202110457239.1A 2021-04-26 2021-04-26 AES decryption agent method and system based on HLS protocol Active CN113206841B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110457239.1A CN113206841B (en) 2021-04-26 2021-04-26 AES decryption agent method and system based on HLS protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110457239.1A CN113206841B (en) 2021-04-26 2021-04-26 AES decryption agent method and system based on HLS protocol

Publications (2)

Publication Number Publication Date
CN113206841A CN113206841A (en) 2021-08-03
CN113206841B true CN113206841B (en) 2022-08-23

Family

ID=77028786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110457239.1A Active CN113206841B (en) 2021-04-26 2021-04-26 AES decryption agent method and system based on HLS protocol

Country Status (1)

Country Link
CN (1) CN113206841B (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device
CN106302465A (en) * 2016-08-17 2017-01-04 无锡天脉聚源传媒科技有限公司 A kind of method and device of playing audio-video data
CN106657162A (en) * 2017-03-01 2017-05-10 北京东大正保科技有限公司 Online stream media playing method and stream media downloading and offline playing method
CN107294927A (en) * 2016-04-05 2017-10-24 北京优朋普乐科技有限公司 Anti-stealing link method, device and system based on the network terminal
CN108494792A (en) * 2018-04-09 2018-09-04 四川百视通科技有限公司 A kind of flash player plays the converting system and its working method of hls video flowings
CN109995743A (en) * 2018-01-02 2019-07-09 腾讯科技(深圳)有限公司 A kind of processing method and terminal of multimedia file
CN110139131A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of method and terminal of playing video file
CN111049832A (en) * 2019-12-13 2020-04-21 北京浪潮数据技术有限公司 Reverse proxy method and related device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100571133C (en) * 2004-02-17 2009-12-16 华为技术有限公司 The implementation method of media flow security transmission
US8243924B2 (en) * 2007-06-29 2012-08-14 Google Inc. Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
US8301570B2 (en) * 2007-10-29 2012-10-30 Infosys Technologies Limited Method and system for data security in an IMS network
US8924718B2 (en) * 2012-10-29 2014-12-30 Tektronix, Inc. Deciphering internet protocol (IP) security in an IP multimedia subsystem (IMS) using a monitoring system
US9338149B2 (en) * 2013-03-15 2016-05-10 Arris Enterprises, Inc. DLNA/DTCP stream conversion for secure media playback
JP2015032039A (en) * 2013-07-31 2015-02-16 株式会社東芝 Display device and display method
CN106550242B (en) * 2016-12-08 2020-03-24 北京数码视讯科技股份有限公司 Method and device for converting IP real-time media stream
US10903985B2 (en) * 2017-08-25 2021-01-26 Keysight Technologies Singapore (Sales) Pte. Ltd. Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107294927A (en) * 2016-04-05 2017-10-24 北京优朋普乐科技有限公司 Anti-stealing link method, device and system based on the network terminal
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device
CN106302465A (en) * 2016-08-17 2017-01-04 无锡天脉聚源传媒科技有限公司 A kind of method and device of playing audio-video data
CN106657162A (en) * 2017-03-01 2017-05-10 北京东大正保科技有限公司 Online stream media playing method and stream media downloading and offline playing method
CN109995743A (en) * 2018-01-02 2019-07-09 腾讯科技(深圳)有限公司 A kind of processing method and terminal of multimedia file
CN110139131A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of method and terminal of playing video file
CN108494792A (en) * 2018-04-09 2018-09-04 四川百视通科技有限公司 A kind of flash player plays the converting system and its working method of hls video flowings
CN111049832A (en) * 2019-12-13 2020-04-21 北京浪潮数据技术有限公司 Reverse proxy method and related device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于代理技术的HLS客户端设计与实现;耿立宏等;《微电子学与计算机》;20161205(第12期);第13-17页 *

Also Published As

Publication number Publication date
CN113206841A (en) 2021-08-03

Similar Documents

Publication Publication Date Title
KR101428875B1 (en) System and method for processing security based on http live streaming
US7447313B2 (en) Pointers to encrypted data in RTP header
CN107707504B (en) Streaming media playing method and system, server and client
KR101759039B1 (en) Dtcp converter for hls
US20130144714A1 (en) Method, Apparatus and System for Supporting Advertisement Contents in HTTP Streaming Play Mode
US20040199771A1 (en) Method for tracing a security breach in highly distributed content
WO2021120831A1 (en) Streaming media data encryption method and apparatus, streaming media data decryption method and apparatus, electronic device and storage medium
US20080063195A1 (en) Method and system for encrypting or decrypting wmv streaming media
JP2005287039A (en) Common scramble processing
CN108881205A (en) A kind of safety broadcasting system and playback method of HLS Streaming Media
US20190246148A1 (en) Method and system for scrambling broadcast with low latency
CN107124385B (en) Mirror flow-based SSL/TLS protocol plaintext data acquisition method
CN106657162B (en) Online streaming media playing method, streaming media downloading method and offline playing method
CN113259720A (en) Video encryption method and system based on HLS protocol
CN113206841B (en) AES decryption agent method and system based on HLS protocol
JP2002111652A (en) Encryption processing for streaming media
WO2016141811A1 (en) Streaming media pushing method and system
US20200364317A1 (en) Method and system for identifying a user terminal in order to receive streaming protected multimedia content
US11647237B1 (en) Method and apparatus for secure video manifest/playlist generation and playback
CN106790132A (en) Based on RTMP without plug-in unit preview video method
CN114189706B (en) Media playing method, system, device, computer equipment and storage medium
CN112350986A (en) Method and system for shaping transmission fragmentation of audio and video network
CN112752122B (en) Video encryption transmission method of intelligent camera and computer readable storage medium
CN108400987A (en) A kind of audio play in address protection strategy
CN115643459A (en) Video processing method, system, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant