CN114143576B - Video-audio encryption protection on-demand method and device and electronic equipment - Google Patents
Video-audio encryption protection on-demand method and device and electronic equipment Download PDFInfo
- Publication number
- CN114143576B CN114143576B CN202111420190.9A CN202111420190A CN114143576B CN 114143576 B CN114143576 B CN 114143576B CN 202111420190 A CN202111420190 A CN 202111420190A CN 114143576 B CN114143576 B CN 114143576B
- Authority
- CN
- China
- Prior art keywords
- video
- audio
- file
- demand
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 238000013475 authorization Methods 0.000 claims abstract description 9
- 238000012545 processing Methods 0.000 claims abstract description 7
- 238000012795 verification Methods 0.000 claims description 31
- 238000005266 casting Methods 0.000 claims description 4
- 238000004891 communication Methods 0.000 claims description 4
- 239000011159 matrix material Substances 0.000 claims description 4
- 230000000007 visual effect Effects 0.000 claims description 3
- 230000001066 destructive effect Effects 0.000 abstract description 3
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 238000005516 engineering process Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000013518 transcription Methods 0.000 description 1
- 230000035897 transcription Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/472—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
- H04N21/47202—End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting content on demand, e.g. video on demand
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Graphics (AREA)
- Human Computer Interaction (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses an audio and video encryption protection on-demand method, an audio and video encryption protection on-demand device and electronic equipment, which aim to solve the problems that content at a playing end is easy to leak, the volume of an encrypted file is increased, the encryption and decryption operation needs to re-encode and decode an audio and video file, the operation is time-consuming, and the hardware requirement is high in the prior art. The on-demand method comprises the following steps: s1: encrypting and decrypting the audio and video content; s2: and (3) authorization of the cloud authorization center, S3: the client requests the multicast. According to the video-on-demand method, the video-on-demand device and the electronic equipment, a cache file is not generated in the video-on-demand process, file copying reduces file reading and writing time, destructive processing is enough for each frame to ensure that the content of an audio-video file is not read normally, the problem of content leakage of a playing end is prevented, the requirement on file transmission bandwidth is low, the video-audio file is short in video-on-demand time to a player, playing and storing are all in authorized protection, so that content leakage is prevented, and a recorded watermark further traces back a recorded scene and time.
Description
Technical Field
The invention belongs to the technical field of computer software, and particularly relates to an audio/video encryption protection on-demand method, an audio/video encryption protection on-demand device and electronic equipment.
Background
The audio-video on-demand service provides audio-video on-demand services for users through a player, audio-video data of a server side are downloaded to a client side through a streaming media protocol, and the audio-video data are sent to a display card and an audio card to be played through the steps of protocol de-resolution, decapsulation, decoding, audio-video synchronization and the like.
The existing general audio and video encryption protection technology is DRM (Digital Rights Management) technology, the working principle of the DRM technology is that a digital program authorization center is firstly established, the compressed digital program content is encoded and protected by utilizing a Key (Key), the encrypted digital program head stores a Key ID and a URL of the program authorization center, when a user requests a program, according to the Key ID and URL information of the program head, the user can send out a related Key decryption (unlock) after the verification authorization of the digital program authorization center, the program can be played, the program to be protected is encrypted, even if the program to be downloaded and stored by the user is not obtained, the verification authorization of the digital program authorization center can not be played, so that the copyright of the program is strictly protected, the Key generally has two keys, one public Key (private Key) is used for encrypting the program content itself, the private Key can also prevent the program from being used for decrypting the program when the program head is changed or destroyed, the Key can be used for judging the program, and therefore the program is prevented from being illegally used, three keys are used, namely, the Key can be separated into two keys at the user's point of the current digital program playing end, the Key can be encrypted and the current digital program has the problem of being encrypted and the current digital program has the advantages, and the Key decoding operation has the problem that the two keys are required to be encrypted and the current digital program has the two-volume-encrypted and has the advantages at the current digital audio and has the Key decryption operation requirements.
Therefore, in order to solve the problems that the content of the playing end is easy to leak and the volume of the encrypted file is large, a solution is needed to improve the use scenario of the player.
Disclosure of Invention
(1) Technical problem to be solved
Aiming at the defects of the prior art, the invention aims to provide an audio and video encryption protection on-demand method, an audio and video encryption protection on-demand device and electronic equipment, and the on-demand method, the audio and video encryption protection on-demand device and the electronic equipment aim to solve the problems that content at a playing end is easy to leak, the volume of an encrypted file is increased, the encryption and decryption operation needs to re-encode an audio and video file, the operation is time-consuming, and the hardware requirement is high in the prior art.
(2) Technical proposal
In order to solve the technical problems, the invention provides an audio/video encryption protection on-demand method, which comprises the following steps:
s1: when encrypting and decrypting the audio and video content, in the video of the 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB. Each frame adopts destructive processing to ensure that the content of the audio and video file is not read normally, so that the content of a playing end cannot be leaked:
s11: randomly generating a 16-bit digital alpha-hybrid key, and bitwise setting each byte of a 16-byte encryption key array&0xff operation, grouping into groups of every 4 bits yields a 4 x 4 matrix Skey:two sets of 16 x16 binary digit matrices are predefined to implement a maximum 256-bit encryption codebook kbard;
s12: reading an audio and video source file, obtaining FCon by calculating 16 bytes according to bits &0xff each time, obtaining corresponding 16 system positions by corresponding rows and columns of Skey and KBard respectively, obtaining a result SBKey by mutually corresponding 16 system numbers according to index bits, converting the SBKey into 1X16 data, and finally obtaining 16-byte ciphertext Rcon with the same length according to the operation of each column of FCon, and writing the audio and video file back to a designated position;
s13: encrypting every 16KB, encrypting 16KB each time, and sequentially and circularly processing the whole file to realize encryption;
s14: the above steps are operated reversely, so that the decryption of the file can be realized;
s2: authorization of the cloud authorization center:
s21: scanning hardware of a storage system and hardware of a playing device, respectively generating unique UUIDs, connecting the cloud authorization center for registration through SSL TCP, verifying the cloud authorization center to be an effective storage device and the playing device through manual verification, and binding a player and a storage module service;
s22: the client reports 32-bit fingerprint data every 10 minutes, and the 32-bit fingerprint data is generated by hardware information, system information and position information. Intermittently carrying out identity verification through the generated fingerprint data to ensure that the playing equipment is effective, thereby being capable of carrying out video-on-demand;
s3: client end-casting:
s31, connecting a cloud authorization center after the player is started, verifying the effectiveness of the playing equipment, connecting the player with a local storage service, verifying whether UUIDs of the player are matched, if not, connecting the players cannot be carried out, and if so, acquiring an effective play list;
s32: and the player submits the video file and the fingerprint information to a cloud authorization center to obtain an encrypted file decoding key CKEY, submits a storage system to obtain a decoding cloud key LKey, decodes the CKEY by the LKey to obtain a correct file decoding key FKEY, decrypts the file stream according to the step S1, and starts playing the decoded video file.
Preferably, all communications are SSL TCP connections when the S3 performs client on-demand, and the watermark that generates a certain transparency but does not affect visual viewing when the video is played in the S32 is overlaid on the display screen. The site and time of the transcription can be further traced through the watermark, so that the audio and video files are prevented from being illegally used.
An audio/video encryption protection on-demand device, which comprises an audio/video encryption protection on-demand method as described above, the device comprises:
the encryption and decryption module is used for realizing the encryption and decryption operation on the audio and video files;
the storage module is used for scanning the hardware of the storage system and the hardware of the playing device and respectively generating unique UUIDs;
the verification module is used for verifying whether the UUID of the player is matched with the binding phase of the storage module;
the control module is used for controlling the encryption and decryption module, the storage module and the verification module to perform corresponding operations.
Preferably, the encryption and decryption module comprises a key generation module and a file reading module, wherein the key generation module is used for randomly generating a 16-bit digital letter mixed key, and the file reading module is used for reading an audio and video source file. The encryption and decryption operation of the audio and video files is realized through the cooperation of the encryption and decryption module and the file reading module.
Preferably, a UUID sample library J is provided in the storage module, and the storage system hardware and the playback device hardware are scanned, and unique UUIDs are respectively generated to be referred to as samples, using Y n (X n 、B n ) Representing samples stored in a storage module sample library (Y 1 、Y 2 、Y 3 …Y m ) And (3) inner part. By generating the unique UUID, each playing device is enabled to have the unique UUID, so that verification of the playing device is facilitated.
Preferably, the verification module is internally provided with a verification rule: comparing the UUID of the player with the sample library J, if the UUID of the player is E J, judging that the verification is passed, and if the UUID of the player is E J, judging that the verification is passedIt is determined that the verification is not passed. And by checking the playing equipment, an effective play list is obtained, so that the audio and video files can be played.
An audio/video encryption protection on-demand electronic device comprises an audio/video encryption protection on-demand device as described above, the electronic device comprises a memory, a processor and an on-demand program stored on the memory and capable of running on the processor, and the processor realizes an audio/video encryption protection on-demand method as described above when executing the on-demand program.
(3) Advantageous effects
Compared with the prior art, the invention has the beneficial effects that: according to the video-on-demand method, the device and the electronic equipment, a cache file is not generated in the video-on-demand process, file copying reduces file read-write time, encryption is carried out once every 16KB, calculated amount and time of encryption and decryption are reduced, in a video of a 5Mbps code stream, frame rate is 30 frames per second, and the size of each frame is 21.33KB, so that destructive processing of each frame is enough to ensure that the content of an audio-video file is not normally read, the problem of content leakage of a playing end is prevented, privacy is improved, hardware cost of system operation is reduced, file transmission bandwidth is required to be low, the time required for video-audio file on-demand to a player is short, playing and storage are in authorized protection, so that content leakage is prevented, and a recorded watermark is further traced back to a recording site and time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required for the description of the embodiments or the prior art will be briefly described, and it is apparent that the drawings in the following description are only one embodiment of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an embodiment of the on-demand method of the present invention;
FIG. 2 is a schematic view of an overall frame structure of an embodiment of the on-demand device of the present invention;
fig. 3 is a schematic diagram of an overall frame structure of an embodiment of the on-demand electronic device according to the present invention.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement of the purpose and the effect of the present invention easy to understand, the technical solutions in the embodiments of the present invention are clearly and completely described below to further illustrate the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, not all versions.
Example 1
The embodiment is an audio/video encryption protection on-demand method, an audio/video encryption protection on-demand device and electronic equipment, wherein a flow chart of the on-demand method is shown in fig. 1, and the on-demand method comprises the following steps:
s1: encrypting and decrypting the audio and video contents, wherein when encrypting and decrypting the audio and video contents, in the video of a 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB:
s11: randomly generating a 16-bit digital alpha-hybrid key, and bitwise setting each byte of a 16-byte encryption key array&0xff operation, grouping into groups of every 4 bits yields a 4 x 4 matrix Skey:two sets of 16 x16 binary digit matrices are predefined to implement a maximum 256-bit encryption codebook kbard;
s12: reading an audio and video source file, obtaining FCon by calculating 16 bytes according to bits &0xff each time, obtaining corresponding 16 system positions by corresponding rows and columns of Skey and KBard respectively, obtaining a result SBKey by mutually corresponding 16 system numbers according to index bits, converting the SBKey into 1X16 data, and finally obtaining 16-byte ciphertext Rcon with the same length according to the operation of each column of FCon, and writing the audio and video file back to a designated position;
s13: encrypting every 16KB, encrypting 16KB each time, and sequentially and circularly processing the whole file to realize encryption;
s14: the above steps are operated reversely, so that the decryption of the file can be realized;
s2: authorization of the cloud authorization center:
s21: scanning hardware of a storage system and hardware of a playing device, respectively generating unique UUIDs, connecting the cloud authorization center for registration through SSL TCP, verifying the cloud authorization center to be an effective storage device and the playing device through manual verification, and binding a player and a storage module service;
s22: the client reports 32-bit fingerprint data every 10 minutes, and the 32-bit fingerprint data is generated by hardware information, system information and position information;
s3: client end-casting:
s31, connecting a cloud authorization center after the player is started, verifying the effectiveness of the playing equipment, connecting the player with a local storage service, verifying whether UUIDs of the player are matched, if not, connecting the players cannot be carried out, and if so, acquiring an effective play list;
s32: and the player submits the video file and the fingerprint information to a cloud authorization center to obtain an encrypted file decoding key CKEY, submits a storage system to obtain a decoding cloud key LKey, decodes the CKEY by the LKey to obtain a correct file decoding key FKEY, decrypts the file stream according to the step S1, and starts playing the decoded video file.
In the step S1, when encrypting and decrypting the audio and video content, in the video of the 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB.
Meanwhile, 32-bit fingerprint data is generated from hardware information, system information, and location information in S22.
In addition, all communication is SSL TCP connection when S3 carries out client on-demand, and when video is played in S32, a watermark which has certain transparency but does not influence visual observation is generated on a display picture.
An audio/video encryption protection on-demand device, which comprises an audio/video encryption protection on-demand method as described above, the device comprises:
the encryption and decryption module is used for realizing the encryption and decryption operation on the audio and video files;
the storage module is used for scanning the hardware of the storage system and the hardware of the playing device and respectively generating unique UUIDs;
the verification module is used for verifying whether the UUID of the player is matched with the binding phase of the storage module;
the control module is used for controlling the encryption and decryption module, the storage module and the verification module to perform corresponding operations.
Meanwhile, the encryption and decryption module comprises a key generation module and a file reading module, wherein the key generation module is used for randomly generating a 16-bit digital letter mixed key, and the file reading module is used for reading the audio and video source file.
In addition, a UUID sample library J is arranged in the storage module, the hardware of the storage system and the hardware of the playing device are scanned, and unique UUIDs are respectively generated and are called samples, and Y is used n X n 、B n The representation is stored in a storage module sample library Y 1 、Y 2 、Y 3 …Y m And (3) inner part.
In addition, the verification module is internally provided with a verification rule: comparing the UUID of the player with the sample library J, if the UUID of the player is E J, judging that the verification is passed, and if the UUID of the player is E J, judging that the verification is passedIt is determined that the verification is not passed.
An audio/video encryption protection on-demand electronic device comprises an audio/video encryption protection on-demand device as described above, wherein the electronic device comprises a memory, a processor and an on-demand program stored on the memory and capable of running on the processor, and the processor realizes an audio/video encryption protection on-demand method as described above when executing the on-demand program. Electronic devices include, but are not limited to, smart phones, notebook computers, tablet computers, digital broadcast receivers, car terminals, portable multimedia players, desktop computers, digital TVs.
The overall frame structure of the on-demand device is shown in fig. 2, and the overall frame structure of the on-demand electronic device is shown in fig. 3.
When the video-on-demand method, the video-on-demand device and the electronic equipment of the technical scheme are used, a processor of the electronic equipment executes a video-on-demand program stored on a memory, and the video-on-demand program realizes video-on-demand protection by encryption, and comprises the following steps:
s1: encrypting and decrypting the audio and video content:
s11: the key generation module randomly generates a 16-bit digital alphabets mixed key, and each byte of the 16-byte encryption key array is bitwise&0xff operation, grouping into groups of every 4 bits yields a 4 x 4 matrix Skey:two sets of 16 x16 binary digit matrices are predefined to implement a maximum 256-bit encryption codebook kbard;
s12: the file reading module reads an audio and video source file, reads 16 bytes of file content each time, calculates according to bits &0xff to obtain FCon, skey and KBard respectively correspond to rows and columns, obtains corresponding 16-system positions, mutually corresponds to 16-system numbers according to index bits to obtain a result SBKey, converts the SBKey into 1X16 data, corresponds to each column of FCon one by one according to the operation, finally obtains 16-byte ciphertext Rcon with the same length, and writes the audio and video file back to a designated position;
s13: encrypting every 16KB, encrypting 16KB each time, sequentially and circularly processing the whole file to realize encryption, wherein in a video of a 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB;
s14: the above steps are operated reversely, so that the decryption of the file can be realized;
s2: authorization of the cloud authorization center:
s21: scanning hardware of a storage system and hardware of a playing device, respectively generating unique UUIDs, connecting cloud authorization centers for registration through SSL TCP, verifying that the cloud authorization centers are effective storage devices and playing devices through manual verification, and enabling the player to perform verificationBinding with the storage module service, arranging UUID sample library J in the storage module, scanning the hardware of the storage system and the hardware of the playing device, respectively generating unique UUIDs called samples, using Y n X n 、B n The representation is stored in a storage module sample library Y 1 、Y 2 、Y 3 …Y m An inner part;
s22: the client reports 32-bit fingerprint data generated by hardware information, system information and position information every 10 minutes;
s3: client end-casting:
s31, connecting a cloud authorization center after the player is started, verifying the effectiveness of the playing equipment, connecting the player with a local storage service, verifying whether the UUID of the player is matched, comparing the UUID of the player with a sample library J, and if the UUID of the player is E J, judging that the player passes the verification and acquiring an effective play list; if playerJudging that the verification is not passed and the connection is not possible;
s32: the player submits the video file and fingerprint information to a cloud authorization center to obtain an encrypted file decoding key Ckey, submits a storage system to obtain a decoding cloud key LKey, decodes the Ckey by the LKey to obtain a correct file decoding key Fkey, decrypts a file stream according to the step S1, starts playing the decoded video file, all communication is SSL TCP connection when a client plays the video file, and generates a watermark with certain transparency but without affecting naked eye viewing when the video is played.
Having described the main technical features and fundamental principles of the present invention and related advantages, it will be apparent to those skilled in the art that the present invention is not limited to the details of the above exemplary embodiments, but may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The above detailed description is, therefore, to be taken in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Furthermore, it should be understood that although the present disclosure describes embodiments in terms of various embodiments, not every embodiment is described in terms of a single embodiment, but rather that the descriptions of embodiments are merely provided for clarity, and that the descriptions of embodiments in terms of various embodiments are provided for persons skilled in the art on the basis of the description.
Claims (7)
1. An audio/video encryption protection on-demand method is characterized by comprising the following steps:
s1: encrypting and decrypting the audio and video contents, wherein when encrypting and decrypting the audio and video contents, in the video of a 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB:
s11: randomly generating a 16-bit digital alpha-hybrid key, and bitwise setting each byte of a 16-byte encryption key array&0xff operation, grouping into groups of every 4 bits yields a 4 x 4 matrix Skey:two sets of 16 x16 binary digit matrices are predefined to implement a maximum 256-bit encryption codebook kbard;
s12: reading an audio and video source file, obtaining FCon by calculating 16 bytes according to bits &0xff each time, obtaining corresponding 16 system positions by corresponding rows and columns of Skey and KBard respectively, obtaining a result SBKey by mutually corresponding 16 system numbers according to index bits, converting the SBKey into 1X16 data, and finally obtaining 16-byte ciphertext Rcon with the same length according to the operation of each column of FCon, and writing the audio and video file back to a designated position;
s13: encrypting every 16KB, encrypting 16KB each time, and sequentially and circularly processing the whole file to realize encryption;
s14: the above steps are operated reversely, so that the decryption of the file can be realized;
s2: authorization of the cloud authorization center:
s21: scanning hardware of a storage system and hardware of a playing device, respectively generating unique UUIDs, connecting the cloud authorization center for registration through SSL TCP, verifying the cloud authorization center to be an effective storage device and the playing device through manual verification, and binding a player and a storage module service;
s22: the client reports 32-bit fingerprint data every 10 minutes, and the 32-bit fingerprint data is generated by hardware information, system information and position information;
s3: client end-casting:
s31, connecting a cloud authorization center after the player is started, verifying the effectiveness of the playing equipment, connecting the player with a local storage service, verifying whether UUIDs of the player are matched, if not, connecting the players cannot be carried out, and if so, acquiring an effective play list;
s32: and the player submits the video file and the fingerprint information to a cloud authorization center to obtain an encrypted file decoding key CKEY, submits a storage system to obtain a decoding cloud key LKey, decodes the CKEY by the LKey to obtain a correct file decoding key FKEY, decrypts the file stream according to the step S1, and starts playing the decoded video file.
2. The audio/video encryption protection on-demand method according to claim 1, wherein all communications are SSL TCP connections when the client requests the video in S3, and the watermark that generates a certain transparency but does not affect visual viewing when the video is played in S32 is covered on the display screen.
3. An audio/video encryption protection on-demand device, characterized by comprising an audio/video encryption protection on-demand method according to claim 1, the device comprising:
the encryption and decryption module is used for realizing the encryption and decryption operation on the audio and video files;
the storage module is used for scanning the hardware of the storage system and the hardware of the playing device and respectively generating unique UUIDs;
the verification module is used for verifying whether the UUID of the player is matched with the binding phase of the storage module;
the control module is used for controlling the encryption and decryption module, the storage module and the verification module to perform corresponding operations.
4. The audio/video encryption protection on-demand device according to claim 3, wherein the encryption/decryption module comprises a key generation module and a file reading module, the key generation module is used for randomly generating a 16-bit digital alpha-numeric mixed key, and the file reading module is used for reading an audio/video source file.
5. An audio/video encryption protection on-demand device according to claim 3, wherein a UUID sample library J is provided in the storage module, and the storage system hardware and the playback device hardware are scanned, and unique UUIDs are respectively generated to be referred to as samples, using Y n (X n 、B n ) Representing samples stored in a storage module sample library (Y 1 、Y 2 、Y 3 …Y m ) And (3) inner part.
6. The audio/video encryption protection on-demand device according to claim 5, wherein the verification module is provided with a verification rule: comparing the UUID of the player with the sample library J, if the UUID of the player is E J, judging that the verification is passed, and if the UUID of the player is E J, judging that the verification is passedIt is determined that the verification is not passed.
7. An audio/video encryption protection on-demand electronic device, characterized by comprising an audio/video encryption protection on-demand device according to claim 3, the electronic device comprising a memory, a processor and an on-demand program stored on the memory and executable on the processor, said processor implementing an audio/video encryption protection on-demand method according to claim 1 or 2 when executing said on-demand program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111420190.9A CN114143576B (en) | 2021-11-26 | 2021-11-26 | Video-audio encryption protection on-demand method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111420190.9A CN114143576B (en) | 2021-11-26 | 2021-11-26 | Video-audio encryption protection on-demand method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114143576A CN114143576A (en) | 2022-03-04 |
CN114143576B true CN114143576B (en) | 2024-04-09 |
Family
ID=80388720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111420190.9A Active CN114143576B (en) | 2021-11-26 | 2021-11-26 | Video-audio encryption protection on-demand method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114143576B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115209220A (en) * | 2022-06-08 | 2022-10-18 | 阿里巴巴(中国)有限公司 | Video file processing method and device, storage medium and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105893791A (en) * | 2015-01-16 | 2016-08-24 | 何湘 | Encrypting protecting method of digital copyright |
CN105939484A (en) * | 2016-06-14 | 2016-09-14 | 深圳创维数字技术有限公司 | Audio/video encrypted playing method and system thereof |
CN106506142A (en) * | 2016-11-22 | 2017-03-15 | 北京航空航天大学 | A kind of AES integration encryption and decryption device implementation methods of low complex degree |
CN109033893A (en) * | 2018-06-11 | 2018-12-18 | 安徽工程大学 | AES encryption unit, AES encryption circuit and its encryption method based on composite matrix |
CN109245881A (en) * | 2018-09-14 | 2019-01-18 | 杭州嘀嗒科技有限公司 | A kind of photograph video cloud encryption storage method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10797858B2 (en) * | 2018-02-02 | 2020-10-06 | Intel Corporation | Unified hardware accelerator for symmetric-key ciphers |
-
2021
- 2021-11-26 CN CN202111420190.9A patent/CN114143576B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105893791A (en) * | 2015-01-16 | 2016-08-24 | 何湘 | Encrypting protecting method of digital copyright |
CN105939484A (en) * | 2016-06-14 | 2016-09-14 | 深圳创维数字技术有限公司 | Audio/video encrypted playing method and system thereof |
CN106506142A (en) * | 2016-11-22 | 2017-03-15 | 北京航空航天大学 | A kind of AES integration encryption and decryption device implementation methods of low complex degree |
CN109033893A (en) * | 2018-06-11 | 2018-12-18 | 安徽工程大学 | AES encryption unit, AES encryption circuit and its encryption method based on composite matrix |
CN109245881A (en) * | 2018-09-14 | 2019-01-18 | 杭州嘀嗒科技有限公司 | A kind of photograph video cloud encryption storage method |
Also Published As
Publication number | Publication date |
---|---|
CN114143576A (en) | 2022-03-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11366878B2 (en) | Method and apparatus for delivering encoded content | |
US7120250B2 (en) | Content distribution for multiple digital rights management | |
JP4740157B2 (en) | Protect digital data content | |
KR101127194B1 (en) | System and method for providing a secure content with revocable access | |
TWI406569B (en) | Unit for managing audio/video data and access control method for said data | |
US20140189358A1 (en) | Multimedia data protection | |
US9171569B2 (en) | Method and apparatus for assisting with content key changes | |
RU2530214C2 (en) | Method and apparatus for secure transmission of recorded copies of multicast audiovisual program using data scrambling and marking techniques | |
CN103237010B (en) | The server end of digital content is cryptographically provided | |
CN105611318A (en) | Method and system for video encryption playing | |
CN102025490A (en) | File segmental protection method, device and system | |
CN110012260A (en) | A kind of video conference content guard method, device, equipment and system | |
CN102685592A (en) | Streaming media player method supporting digital rights management | |
CN114143576B (en) | Video-audio encryption protection on-demand method and device and electronic equipment | |
US8645687B2 (en) | Electronic file access control system and method | |
CN112261444A (en) | Media stream encryption method based on high-performance virtual gateway | |
CN103237011B (en) | Digital content encryption transmission method and server end | |
US20200275142A1 (en) | A method for delivering digital content to at least one client device | |
KR100635128B1 (en) | Apparatus for generating encrypted motion-picture file with iso base media format and apparatus for reconstructing encrypted motion-picture, and method for reconstructing the same | |
JP2004135005A (en) | Data management system, data management method, client terminal, server apparatus, data decoding apparatus, data decoding method, and recording medium | |
CN115225977B (en) | Video sparse asymmetric encryption method | |
KR100587530B1 (en) | Apparatus for and Method of Protecting Streamed ASF Files | |
CN103533457A (en) | Multimedia digital watermark embedding and separation methods and multimedia digital watermark embedding and separation devices | |
JP2001175170A (en) | Method and device for reproducing stream | |
KR101492669B1 (en) | Method for recording and restoring a ciphered content by a processing unit |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |