CN114143576B - Video-audio encryption protection on-demand method and device and electronic equipment - Google Patents

Video-audio encryption protection on-demand method and device and electronic equipment Download PDF

Info

Publication number
CN114143576B
CN114143576B CN202111420190.9A CN202111420190A CN114143576B CN 114143576 B CN114143576 B CN 114143576B CN 202111420190 A CN202111420190 A CN 202111420190A CN 114143576 B CN114143576 B CN 114143576B
Authority
CN
China
Prior art keywords
video
audio
file
demand
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111420190.9A
Other languages
Chinese (zh)
Other versions
CN114143576A (en
Inventor
王瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Aishi Culture Development Co ltd
Original Assignee
Guangdong Aishi Culture Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Aishi Culture Development Co ltd filed Critical Guangdong Aishi Culture Development Co ltd
Priority to CN202111420190.9A priority Critical patent/CN114143576B/en
Publication of CN114143576A publication Critical patent/CN114143576A/en
Application granted granted Critical
Publication of CN114143576B publication Critical patent/CN114143576B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/472End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content
    • H04N21/47202End-user interface for requesting content, additional data or services; End-user interface for interacting with content, e.g. for content reservation or setting reminders, for requesting event notification, for manipulating displayed content for requesting content on demand, e.g. video on demand
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses an audio and video encryption protection on-demand method, an audio and video encryption protection on-demand device and electronic equipment, which aim to solve the problems that content at a playing end is easy to leak, the volume of an encrypted file is increased, the encryption and decryption operation needs to re-encode and decode an audio and video file, the operation is time-consuming, and the hardware requirement is high in the prior art. The on-demand method comprises the following steps: s1: encrypting and decrypting the audio and video content; s2: and (3) authorization of the cloud authorization center, S3: the client requests the multicast. According to the video-on-demand method, the video-on-demand device and the electronic equipment, a cache file is not generated in the video-on-demand process, file copying reduces file reading and writing time, destructive processing is enough for each frame to ensure that the content of an audio-video file is not read normally, the problem of content leakage of a playing end is prevented, the requirement on file transmission bandwidth is low, the video-audio file is short in video-on-demand time to a player, playing and storing are all in authorized protection, so that content leakage is prevented, and a recorded watermark further traces back a recorded scene and time.

Description

Video-audio encryption protection on-demand method and device and electronic equipment
Technical Field
The invention belongs to the technical field of computer software, and particularly relates to an audio/video encryption protection on-demand method, an audio/video encryption protection on-demand device and electronic equipment.
Background
The audio-video on-demand service provides audio-video on-demand services for users through a player, audio-video data of a server side are downloaded to a client side through a streaming media protocol, and the audio-video data are sent to a display card and an audio card to be played through the steps of protocol de-resolution, decapsulation, decoding, audio-video synchronization and the like.
The existing general audio and video encryption protection technology is DRM (Digital Rights Management) technology, the working principle of the DRM technology is that a digital program authorization center is firstly established, the compressed digital program content is encoded and protected by utilizing a Key (Key), the encrypted digital program head stores a Key ID and a URL of the program authorization center, when a user requests a program, according to the Key ID and URL information of the program head, the user can send out a related Key decryption (unlock) after the verification authorization of the digital program authorization center, the program can be played, the program to be protected is encrypted, even if the program to be downloaded and stored by the user is not obtained, the verification authorization of the digital program authorization center can not be played, so that the copyright of the program is strictly protected, the Key generally has two keys, one public Key (private Key) is used for encrypting the program content itself, the private Key can also prevent the program from being used for decrypting the program when the program head is changed or destroyed, the Key can be used for judging the program, and therefore the program is prevented from being illegally used, three keys are used, namely, the Key can be separated into two keys at the user's point of the current digital program playing end, the Key can be encrypted and the current digital program has the problem of being encrypted and the current digital program has the advantages, and the Key decoding operation has the problem that the two keys are required to be encrypted and the current digital program has the two-volume-encrypted and has the advantages at the current digital audio and has the Key decryption operation requirements.
Therefore, in order to solve the problems that the content of the playing end is easy to leak and the volume of the encrypted file is large, a solution is needed to improve the use scenario of the player.
Disclosure of Invention
(1) Technical problem to be solved
Aiming at the defects of the prior art, the invention aims to provide an audio and video encryption protection on-demand method, an audio and video encryption protection on-demand device and electronic equipment, and the on-demand method, the audio and video encryption protection on-demand device and the electronic equipment aim to solve the problems that content at a playing end is easy to leak, the volume of an encrypted file is increased, the encryption and decryption operation needs to re-encode an audio and video file, the operation is time-consuming, and the hardware requirement is high in the prior art.
(2) Technical proposal
In order to solve the technical problems, the invention provides an audio/video encryption protection on-demand method, which comprises the following steps:
s1: when encrypting and decrypting the audio and video content, in the video of the 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB. Each frame adopts destructive processing to ensure that the content of the audio and video file is not read normally, so that the content of a playing end cannot be leaked:
s11: randomly generating a 16-bit digital alpha-hybrid key, and bitwise setting each byte of a 16-byte encryption key array&0xff operation, grouping into groups of every 4 bits yields a 4 x 4 matrix Skey:two sets of 16 x16 binary digit matrices are predefined to implement a maximum 256-bit encryption codebook kbard;
s12: reading an audio and video source file, obtaining FCon by calculating 16 bytes according to bits &0xff each time, obtaining corresponding 16 system positions by corresponding rows and columns of Skey and KBard respectively, obtaining a result SBKey by mutually corresponding 16 system numbers according to index bits, converting the SBKey into 1X16 data, and finally obtaining 16-byte ciphertext Rcon with the same length according to the operation of each column of FCon, and writing the audio and video file back to a designated position;
s13: encrypting every 16KB, encrypting 16KB each time, and sequentially and circularly processing the whole file to realize encryption;
s14: the above steps are operated reversely, so that the decryption of the file can be realized;
s2: authorization of the cloud authorization center:
s21: scanning hardware of a storage system and hardware of a playing device, respectively generating unique UUIDs, connecting the cloud authorization center for registration through SSL TCP, verifying the cloud authorization center to be an effective storage device and the playing device through manual verification, and binding a player and a storage module service;
s22: the client reports 32-bit fingerprint data every 10 minutes, and the 32-bit fingerprint data is generated by hardware information, system information and position information. Intermittently carrying out identity verification through the generated fingerprint data to ensure that the playing equipment is effective, thereby being capable of carrying out video-on-demand;
s3: client end-casting:
s31, connecting a cloud authorization center after the player is started, verifying the effectiveness of the playing equipment, connecting the player with a local storage service, verifying whether UUIDs of the player are matched, if not, connecting the players cannot be carried out, and if so, acquiring an effective play list;
s32: and the player submits the video file and the fingerprint information to a cloud authorization center to obtain an encrypted file decoding key CKEY, submits a storage system to obtain a decoding cloud key LKey, decodes the CKEY by the LKey to obtain a correct file decoding key FKEY, decrypts the file stream according to the step S1, and starts playing the decoded video file.
Preferably, all communications are SSL TCP connections when the S3 performs client on-demand, and the watermark that generates a certain transparency but does not affect visual viewing when the video is played in the S32 is overlaid on the display screen. The site and time of the transcription can be further traced through the watermark, so that the audio and video files are prevented from being illegally used.
An audio/video encryption protection on-demand device, which comprises an audio/video encryption protection on-demand method as described above, the device comprises:
the encryption and decryption module is used for realizing the encryption and decryption operation on the audio and video files;
the storage module is used for scanning the hardware of the storage system and the hardware of the playing device and respectively generating unique UUIDs;
the verification module is used for verifying whether the UUID of the player is matched with the binding phase of the storage module;
the control module is used for controlling the encryption and decryption module, the storage module and the verification module to perform corresponding operations.
Preferably, the encryption and decryption module comprises a key generation module and a file reading module, wherein the key generation module is used for randomly generating a 16-bit digital letter mixed key, and the file reading module is used for reading an audio and video source file. The encryption and decryption operation of the audio and video files is realized through the cooperation of the encryption and decryption module and the file reading module.
Preferably, a UUID sample library J is provided in the storage module, and the storage system hardware and the playback device hardware are scanned, and unique UUIDs are respectively generated to be referred to as samples, using Y n (X n 、B n ) Representing samples stored in a storage module sample library (Y 1 、Y 2 、Y 3 …Y m ) And (3) inner part. By generating the unique UUID, each playing device is enabled to have the unique UUID, so that verification of the playing device is facilitated.
Preferably, the verification module is internally provided with a verification rule: comparing the UUID of the player with the sample library J, if the UUID of the player is E J, judging that the verification is passed, and if the UUID of the player is E J, judging that the verification is passedIt is determined that the verification is not passed. And by checking the playing equipment, an effective play list is obtained, so that the audio and video files can be played.
An audio/video encryption protection on-demand electronic device comprises an audio/video encryption protection on-demand device as described above, the electronic device comprises a memory, a processor and an on-demand program stored on the memory and capable of running on the processor, and the processor realizes an audio/video encryption protection on-demand method as described above when executing the on-demand program.
(3) Advantageous effects
Compared with the prior art, the invention has the beneficial effects that: according to the video-on-demand method, the device and the electronic equipment, a cache file is not generated in the video-on-demand process, file copying reduces file read-write time, encryption is carried out once every 16KB, calculated amount and time of encryption and decryption are reduced, in a video of a 5Mbps code stream, frame rate is 30 frames per second, and the size of each frame is 21.33KB, so that destructive processing of each frame is enough to ensure that the content of an audio-video file is not normally read, the problem of content leakage of a playing end is prevented, privacy is improved, hardware cost of system operation is reduced, file transmission bandwidth is required to be low, the time required for video-audio file on-demand to a player is short, playing and storage are in authorized protection, so that content leakage is prevented, and a recorded watermark is further traced back to a recording site and time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings required for the description of the embodiments or the prior art will be briefly described, and it is apparent that the drawings in the following description are only one embodiment of the present invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an embodiment of the on-demand method of the present invention;
FIG. 2 is a schematic view of an overall frame structure of an embodiment of the on-demand device of the present invention;
fig. 3 is a schematic diagram of an overall frame structure of an embodiment of the on-demand electronic device according to the present invention.
Detailed Description
In order to make the technical means, the creation characteristics, the achievement of the purpose and the effect of the present invention easy to understand, the technical solutions in the embodiments of the present invention are clearly and completely described below to further illustrate the present invention, and it is obvious that the described embodiments are only some embodiments of the present invention, not all versions.
Example 1
The embodiment is an audio/video encryption protection on-demand method, an audio/video encryption protection on-demand device and electronic equipment, wherein a flow chart of the on-demand method is shown in fig. 1, and the on-demand method comprises the following steps:
s1: encrypting and decrypting the audio and video contents, wherein when encrypting and decrypting the audio and video contents, in the video of a 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB:
s11: randomly generating a 16-bit digital alpha-hybrid key, and bitwise setting each byte of a 16-byte encryption key array&0xff operation, grouping into groups of every 4 bits yields a 4 x 4 matrix Skey:two sets of 16 x16 binary digit matrices are predefined to implement a maximum 256-bit encryption codebook kbard;
s12: reading an audio and video source file, obtaining FCon by calculating 16 bytes according to bits &0xff each time, obtaining corresponding 16 system positions by corresponding rows and columns of Skey and KBard respectively, obtaining a result SBKey by mutually corresponding 16 system numbers according to index bits, converting the SBKey into 1X16 data, and finally obtaining 16-byte ciphertext Rcon with the same length according to the operation of each column of FCon, and writing the audio and video file back to a designated position;
s13: encrypting every 16KB, encrypting 16KB each time, and sequentially and circularly processing the whole file to realize encryption;
s14: the above steps are operated reversely, so that the decryption of the file can be realized;
s2: authorization of the cloud authorization center:
s21: scanning hardware of a storage system and hardware of a playing device, respectively generating unique UUIDs, connecting the cloud authorization center for registration through SSL TCP, verifying the cloud authorization center to be an effective storage device and the playing device through manual verification, and binding a player and a storage module service;
s22: the client reports 32-bit fingerprint data every 10 minutes, and the 32-bit fingerprint data is generated by hardware information, system information and position information;
s3: client end-casting:
s31, connecting a cloud authorization center after the player is started, verifying the effectiveness of the playing equipment, connecting the player with a local storage service, verifying whether UUIDs of the player are matched, if not, connecting the players cannot be carried out, and if so, acquiring an effective play list;
s32: and the player submits the video file and the fingerprint information to a cloud authorization center to obtain an encrypted file decoding key CKEY, submits a storage system to obtain a decoding cloud key LKey, decodes the CKEY by the LKey to obtain a correct file decoding key FKEY, decrypts the file stream according to the step S1, and starts playing the decoded video file.
In the step S1, when encrypting and decrypting the audio and video content, in the video of the 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB.
Meanwhile, 32-bit fingerprint data is generated from hardware information, system information, and location information in S22.
In addition, all communication is SSL TCP connection when S3 carries out client on-demand, and when video is played in S32, a watermark which has certain transparency but does not influence visual observation is generated on a display picture.
An audio/video encryption protection on-demand device, which comprises an audio/video encryption protection on-demand method as described above, the device comprises:
the encryption and decryption module is used for realizing the encryption and decryption operation on the audio and video files;
the storage module is used for scanning the hardware of the storage system and the hardware of the playing device and respectively generating unique UUIDs;
the verification module is used for verifying whether the UUID of the player is matched with the binding phase of the storage module;
the control module is used for controlling the encryption and decryption module, the storage module and the verification module to perform corresponding operations.
Meanwhile, the encryption and decryption module comprises a key generation module and a file reading module, wherein the key generation module is used for randomly generating a 16-bit digital letter mixed key, and the file reading module is used for reading the audio and video source file.
In addition, a UUID sample library J is arranged in the storage module, the hardware of the storage system and the hardware of the playing device are scanned, and unique UUIDs are respectively generated and are called samples, and Y is used n X n 、B n The representation is stored in a storage module sample library Y 1 、Y 2 、Y 3 …Y m And (3) inner part.
In addition, the verification module is internally provided with a verification rule: comparing the UUID of the player with the sample library J, if the UUID of the player is E J, judging that the verification is passed, and if the UUID of the player is E J, judging that the verification is passedIt is determined that the verification is not passed.
An audio/video encryption protection on-demand electronic device comprises an audio/video encryption protection on-demand device as described above, wherein the electronic device comprises a memory, a processor and an on-demand program stored on the memory and capable of running on the processor, and the processor realizes an audio/video encryption protection on-demand method as described above when executing the on-demand program. Electronic devices include, but are not limited to, smart phones, notebook computers, tablet computers, digital broadcast receivers, car terminals, portable multimedia players, desktop computers, digital TVs.
The overall frame structure of the on-demand device is shown in fig. 2, and the overall frame structure of the on-demand electronic device is shown in fig. 3.
When the video-on-demand method, the video-on-demand device and the electronic equipment of the technical scheme are used, a processor of the electronic equipment executes a video-on-demand program stored on a memory, and the video-on-demand program realizes video-on-demand protection by encryption, and comprises the following steps:
s1: encrypting and decrypting the audio and video content:
s11: the key generation module randomly generates a 16-bit digital alphabets mixed key, and each byte of the 16-byte encryption key array is bitwise&0xff operation, grouping into groups of every 4 bits yields a 4 x 4 matrix Skey:two sets of 16 x16 binary digit matrices are predefined to implement a maximum 256-bit encryption codebook kbard;
s12: the file reading module reads an audio and video source file, reads 16 bytes of file content each time, calculates according to bits &0xff to obtain FCon, skey and KBard respectively correspond to rows and columns, obtains corresponding 16-system positions, mutually corresponds to 16-system numbers according to index bits to obtain a result SBKey, converts the SBKey into 1X16 data, corresponds to each column of FCon one by one according to the operation, finally obtains 16-byte ciphertext Rcon with the same length, and writes the audio and video file back to a designated position;
s13: encrypting every 16KB, encrypting 16KB each time, sequentially and circularly processing the whole file to realize encryption, wherein in a video of a 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB;
s14: the above steps are operated reversely, so that the decryption of the file can be realized;
s2: authorization of the cloud authorization center:
s21: scanning hardware of a storage system and hardware of a playing device, respectively generating unique UUIDs, connecting cloud authorization centers for registration through SSL TCP, verifying that the cloud authorization centers are effective storage devices and playing devices through manual verification, and enabling the player to perform verificationBinding with the storage module service, arranging UUID sample library J in the storage module, scanning the hardware of the storage system and the hardware of the playing device, respectively generating unique UUIDs called samples, using Y n X n 、B n The representation is stored in a storage module sample library Y 1 、Y 2 、Y 3 …Y m An inner part;
s22: the client reports 32-bit fingerprint data generated by hardware information, system information and position information every 10 minutes;
s3: client end-casting:
s31, connecting a cloud authorization center after the player is started, verifying the effectiveness of the playing equipment, connecting the player with a local storage service, verifying whether the UUID of the player is matched, comparing the UUID of the player with a sample library J, and if the UUID of the player is E J, judging that the player passes the verification and acquiring an effective play list; if playerJudging that the verification is not passed and the connection is not possible;
s32: the player submits the video file and fingerprint information to a cloud authorization center to obtain an encrypted file decoding key Ckey, submits a storage system to obtain a decoding cloud key LKey, decodes the Ckey by the LKey to obtain a correct file decoding key Fkey, decrypts a file stream according to the step S1, starts playing the decoded video file, all communication is SSL TCP connection when a client plays the video file, and generates a watermark with certain transparency but without affecting naked eye viewing when the video is played.
Having described the main technical features and fundamental principles of the present invention and related advantages, it will be apparent to those skilled in the art that the present invention is not limited to the details of the above exemplary embodiments, but may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The above detailed description is, therefore, to be taken in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Furthermore, it should be understood that although the present disclosure describes embodiments in terms of various embodiments, not every embodiment is described in terms of a single embodiment, but rather that the descriptions of embodiments are merely provided for clarity, and that the descriptions of embodiments in terms of various embodiments are provided for persons skilled in the art on the basis of the description.

Claims (7)

1. An audio/video encryption protection on-demand method is characterized by comprising the following steps:
s1: encrypting and decrypting the audio and video contents, wherein when encrypting and decrypting the audio and video contents, in the video of a 5Mbps code stream, the frame rate is 30 frames per second, and the size of each frame is 21.33KB:
s11: randomly generating a 16-bit digital alpha-hybrid key, and bitwise setting each byte of a 16-byte encryption key array&0xff operation, grouping into groups of every 4 bits yields a 4 x 4 matrix Skey:two sets of 16 x16 binary digit matrices are predefined to implement a maximum 256-bit encryption codebook kbard;
s12: reading an audio and video source file, obtaining FCon by calculating 16 bytes according to bits &0xff each time, obtaining corresponding 16 system positions by corresponding rows and columns of Skey and KBard respectively, obtaining a result SBKey by mutually corresponding 16 system numbers according to index bits, converting the SBKey into 1X16 data, and finally obtaining 16-byte ciphertext Rcon with the same length according to the operation of each column of FCon, and writing the audio and video file back to a designated position;
s13: encrypting every 16KB, encrypting 16KB each time, and sequentially and circularly processing the whole file to realize encryption;
s14: the above steps are operated reversely, so that the decryption of the file can be realized;
s2: authorization of the cloud authorization center:
s21: scanning hardware of a storage system and hardware of a playing device, respectively generating unique UUIDs, connecting the cloud authorization center for registration through SSL TCP, verifying the cloud authorization center to be an effective storage device and the playing device through manual verification, and binding a player and a storage module service;
s22: the client reports 32-bit fingerprint data every 10 minutes, and the 32-bit fingerprint data is generated by hardware information, system information and position information;
s3: client end-casting:
s31, connecting a cloud authorization center after the player is started, verifying the effectiveness of the playing equipment, connecting the player with a local storage service, verifying whether UUIDs of the player are matched, if not, connecting the players cannot be carried out, and if so, acquiring an effective play list;
s32: and the player submits the video file and the fingerprint information to a cloud authorization center to obtain an encrypted file decoding key CKEY, submits a storage system to obtain a decoding cloud key LKey, decodes the CKEY by the LKey to obtain a correct file decoding key FKEY, decrypts the file stream according to the step S1, and starts playing the decoded video file.
2. The audio/video encryption protection on-demand method according to claim 1, wherein all communications are SSL TCP connections when the client requests the video in S3, and the watermark that generates a certain transparency but does not affect visual viewing when the video is played in S32 is covered on the display screen.
3. An audio/video encryption protection on-demand device, characterized by comprising an audio/video encryption protection on-demand method according to claim 1, the device comprising:
the encryption and decryption module is used for realizing the encryption and decryption operation on the audio and video files;
the storage module is used for scanning the hardware of the storage system and the hardware of the playing device and respectively generating unique UUIDs;
the verification module is used for verifying whether the UUID of the player is matched with the binding phase of the storage module;
the control module is used for controlling the encryption and decryption module, the storage module and the verification module to perform corresponding operations.
4. The audio/video encryption protection on-demand device according to claim 3, wherein the encryption/decryption module comprises a key generation module and a file reading module, the key generation module is used for randomly generating a 16-bit digital alpha-numeric mixed key, and the file reading module is used for reading an audio/video source file.
5. An audio/video encryption protection on-demand device according to claim 3, wherein a UUID sample library J is provided in the storage module, and the storage system hardware and the playback device hardware are scanned, and unique UUIDs are respectively generated to be referred to as samples, using Y n (X n 、B n ) Representing samples stored in a storage module sample library (Y 1 、Y 2 、Y 3 …Y m ) And (3) inner part.
6. The audio/video encryption protection on-demand device according to claim 5, wherein the verification module is provided with a verification rule: comparing the UUID of the player with the sample library J, if the UUID of the player is E J, judging that the verification is passed, and if the UUID of the player is E J, judging that the verification is passedIt is determined that the verification is not passed.
7. An audio/video encryption protection on-demand electronic device, characterized by comprising an audio/video encryption protection on-demand device according to claim 3, the electronic device comprising a memory, a processor and an on-demand program stored on the memory and executable on the processor, said processor implementing an audio/video encryption protection on-demand method according to claim 1 or 2 when executing said on-demand program.
CN202111420190.9A 2021-11-26 2021-11-26 Video-audio encryption protection on-demand method and device and electronic equipment Active CN114143576B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111420190.9A CN114143576B (en) 2021-11-26 2021-11-26 Video-audio encryption protection on-demand method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111420190.9A CN114143576B (en) 2021-11-26 2021-11-26 Video-audio encryption protection on-demand method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN114143576A CN114143576A (en) 2022-03-04
CN114143576B true CN114143576B (en) 2024-04-09

Family

ID=80388720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111420190.9A Active CN114143576B (en) 2021-11-26 2021-11-26 Video-audio encryption protection on-demand method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN114143576B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115209220A (en) * 2022-06-08 2022-10-18 阿里巴巴(中国)有限公司 Video file processing method and device, storage medium and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893791A (en) * 2015-01-16 2016-08-24 何湘 Encrypting protecting method of digital copyright
CN105939484A (en) * 2016-06-14 2016-09-14 深圳创维数字技术有限公司 Audio/video encrypted playing method and system thereof
CN106506142A (en) * 2016-11-22 2017-03-15 北京航空航天大学 A kind of AES integration encryption and decryption device implementation methods of low complex degree
CN109033893A (en) * 2018-06-11 2018-12-18 安徽工程大学 AES encryption unit, AES encryption circuit and its encryption method based on composite matrix
CN109245881A (en) * 2018-09-14 2019-01-18 杭州嘀嗒科技有限公司 A kind of photograph video cloud encryption storage method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10797858B2 (en) * 2018-02-02 2020-10-06 Intel Corporation Unified hardware accelerator for symmetric-key ciphers

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105893791A (en) * 2015-01-16 2016-08-24 何湘 Encrypting protecting method of digital copyright
CN105939484A (en) * 2016-06-14 2016-09-14 深圳创维数字技术有限公司 Audio/video encrypted playing method and system thereof
CN106506142A (en) * 2016-11-22 2017-03-15 北京航空航天大学 A kind of AES integration encryption and decryption device implementation methods of low complex degree
CN109033893A (en) * 2018-06-11 2018-12-18 安徽工程大学 AES encryption unit, AES encryption circuit and its encryption method based on composite matrix
CN109245881A (en) * 2018-09-14 2019-01-18 杭州嘀嗒科技有限公司 A kind of photograph video cloud encryption storage method

Also Published As

Publication number Publication date
CN114143576A (en) 2022-03-04

Similar Documents

Publication Publication Date Title
US11366878B2 (en) Method and apparatus for delivering encoded content
US7120250B2 (en) Content distribution for multiple digital rights management
JP4740157B2 (en) Protect digital data content
KR101127194B1 (en) System and method for providing a secure content with revocable access
TWI406569B (en) Unit for managing audio/video data and access control method for said data
US20140189358A1 (en) Multimedia data protection
US9171569B2 (en) Method and apparatus for assisting with content key changes
RU2530214C2 (en) Method and apparatus for secure transmission of recorded copies of multicast audiovisual program using data scrambling and marking techniques
CN103237010B (en) The server end of digital content is cryptographically provided
CN105611318A (en) Method and system for video encryption playing
CN102025490A (en) File segmental protection method, device and system
CN110012260A (en) A kind of video conference content guard method, device, equipment and system
CN102685592A (en) Streaming media player method supporting digital rights management
CN114143576B (en) Video-audio encryption protection on-demand method and device and electronic equipment
US8645687B2 (en) Electronic file access control system and method
CN112261444A (en) Media stream encryption method based on high-performance virtual gateway
CN103237011B (en) Digital content encryption transmission method and server end
US20200275142A1 (en) A method for delivering digital content to at least one client device
KR100635128B1 (en) Apparatus for generating encrypted motion-picture file with iso base media format and apparatus for reconstructing encrypted motion-picture, and method for reconstructing the same
JP2004135005A (en) Data management system, data management method, client terminal, server apparatus, data decoding apparatus, data decoding method, and recording medium
CN115225977B (en) Video sparse asymmetric encryption method
KR100587530B1 (en) Apparatus for and Method of Protecting Streamed ASF Files
CN103533457A (en) Multimedia digital watermark embedding and separation methods and multimedia digital watermark embedding and separation devices
JP2001175170A (en) Method and device for reproducing stream
KR101492669B1 (en) Method for recording and restoring a ciphered content by a processing unit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant