CN106686407B - A kind of automatic identification encrypting and decrypting method and system for video data transmission - Google Patents

A kind of automatic identification encrypting and decrypting method and system for video data transmission Download PDF

Info

Publication number
CN106686407B
CN106686407B CN201611149596.7A CN201611149596A CN106686407B CN 106686407 B CN106686407 B CN 106686407B CN 201611149596 A CN201611149596 A CN 201611149596A CN 106686407 B CN106686407 B CN 106686407B
Authority
CN
China
Prior art keywords
encryption
decryption
video file
transmitted
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611149596.7A
Other languages
Chinese (zh)
Other versions
CN106686407A (en
Inventor
潘海东
梅春
孙方鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Interactive Encyclopedia Network Technology Co.,Ltd.
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing Interactive Encyclopedia Network Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Interactive Encyclopedia Network Technology Ltd By Share Ltd filed Critical Beijing Interactive Encyclopedia Network Technology Ltd By Share Ltd
Priority to CN201611149596.7A priority Critical patent/CN106686407B/en
Publication of CN106686407A publication Critical patent/CN106686407A/en
Application granted granted Critical
Publication of CN106686407B publication Critical patent/CN106686407B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a kind of automatic identification encrypting and decrypting methods for video data transmission, the step of this method includes: the Transfer Parameters for obtaining video file to be transmitted, confirm the current state S1 in video file path to be transmitted and video file to be transmitted, according to user encryption or decryption instructions, encryption or decryption process S2 is carried out to current video file to be transmitted, judges whether encryption or decryption process operation succeeds, and final mode of operation is returned into user, complete automatic identification cryptographic operation S3.Technical solution occupancy data space of the present invention is small, only 30KB or so, can be realized server or other associated video playout softwares call;By using file part cipher mode, encryption or decryption can be fast implemented, and encryption or decrypted state can be set to video file, while can judge video file state.

Description

A kind of automatic identification encrypting and decrypting method and system for video data transmission
Technical field
The present invention relates to technical field of information encryption, add more particularly to a kind of automatic identification for video data transmission Close decryption method and system.
Background technique
As science and technology develops rapidly, the propagation of electronic data is dissolved into daily life extensively, for example, view Frequently, the electronic data such as data such as audio.
People can use communication apparatus to store electronic data, some are related to the data of individual privacy (for example, part is shone Piece, video, Mobile banking data) be not intended to be accessed easily by other people, can be to being not intended to the data accessed by other people It is encrypted.In the related technology, cipher mode is usually password encryption, and the password of encryption can be character, number or pattern etc.; Need to input correct password when the data of access encryption.
Now, common video-encryption decoding tool is usually the software tool of user oriented manual operation, main Types It is as follows:
1) user need to open selection after software manually and need the video file for encrypting or decrypting, select later respective encrypted or Decryption oprerations;
2) user need to artificially judge whether the video has been encrypted, and playing video file such as be attempted, if can not normal play Then the video file may be encrypted.
The operation of encryption or the decryption of conventional encryption and decryption software piece tool needs artificial execution, is not easy to the use of user, The process of encryption and decryption is slow.All Partial encryptions of file are although highly-safe, but greatly committed memory space, It is unfavorable for storing and transmitting for file.And encryption or decryption oprerations can not be carried out to designated position, it is inflexible for use.
Summary of the invention
In order to solve the above technical problems, the present invention adopts the following technical solutions
A kind of the step of automatic identification encrypting and decrypting method for video data transmission, this method includes:
S1, the Transfer Parameters for obtaining video file to be transmitted confirm video file path to be transmitted and video to be transmitted text The current state of part;
S2, according to user encryption or decryption instructions, encryption or decryption process is carried out to current video file to be transmitted;
S3, judge whether encryption or decryption process operation succeeds, and final mode of operation is returned into user, complete certainly Dynamic identification cryptographic operation.
Preferably, the current state of the video file to be transmitted includes: to have encrypted, decrypted and untreated three kinds of shapes State.
Preferably, the step S2 includes:
S21, encryption or decryption oprerations number maxCount, current crypto or decryption oprerations number count are attempted to maximum Initializing set is carried out with the original state of video-encryption or decrypted result;
S22, pass through Rule of judgment: encrypting or whether decrypted state is operation failure state and current crypto or decryption number Count is less than maximum trial encryption or decryption oprerations number maxCount, decides whether to attempt as video file to be transmitted Encryption;If meeting Rule of judgment, S23 is thened follow the steps, if being unsatisfactory for Rule of judgment, thens follow the steps S3;
S23, for video file be arranged encryption or decryption oprerations operation mark, and judge operation mark setting whether at Function, if success, thens follow the steps S24, if failure, it tries encryption or decryption oprerations number count add 1, and repeat step S22 And S23, until the Rule of judgment for identifying successfully or being unsatisfactory for step S22;
S24, according to user demand, the content for treating transmitting video files designated position carries out encryption or decryption oprerations;
S25, judge whether encryption or decryption oprerations succeed, if success, completes the encryption or solution of video file to be transmitted Close operation, if failure, thens follow the steps S22 to S25, until the Rule of judgment for operating successfully or being unsatisfactory for step S22.
Preferably, the S24 includes:
S241, using 1024 byte of head of video file to be transmitted as encryption or decryption object;
S242, initial position is set as site=0;
S243, judge whether 1024 byte of head of current video file to be transmitted encrypts completion, if not completing, from The data of 16 bytes are taken out in 1024 bytes, and this 16 byte datas are encrypted, if encryption is completed, from The data of 16 bytes are taken out in 1024 bytes, and this 16 byte datas are decrypted;
S244, the data after encryption or decryption are written at site, are exited if writing failure;
S245,16 bytes, as site=site+16 are taken in 1024 byte again, and repeats step S243 To step S245, until 1024 byte data all complete by encryption or decryption.
Preferably, it if reading data failure or encryption/decryption failure in the step S243, directly exits.
Preferably, the step S3 includes:
If S31, encryption or decryption oprerations success, return to operation success status;
If S32, encryption or decryption oprerations failure, it tries roll back to video file and carry out the shape before encryption or decryption oprerations State;
If the success of S33, rolling back action, returns operation failure state, if rolling back action fails, return can not restore shape State.
A kind of automatic identification encrypting and decrypting system for video data transmission, the system include:
File identification unit obtains video file transfer request, confirms video file path to be transmitted and video to be transmitted The current state of file;
Encryption unit carries out at encryption or decryption current video file to be transmitted according to user encryption or decryption instructions Reason;
State feedback unit, judges whether encryption or decryption process operation succeeds, and final mode of operation is returned to User completes automatic identification cryptographic operation.
Preferably, the current state of the video file to be transmitted includes: to have encrypted, decrypted and untreated three kinds of shapes State.
Preferably, include: in the encryption unit
Initialization module attempts encryption or decryption oprerations number maxCount, current crypto or decryption oprerations time to maximum The original state of number count and video-encryption or decrypted result carries out initializing set;
First judgment module passes through Rule of judgment: encrypting or whether decrypted state is operation failure state and current crypto Or decryption number count is less than maximum trial encryption or decryption oprerations number maxCount, decides whether to attempt to be to be passed Defeated video file encryption;If meeting Rule of judgment, the operation mark of encryption or decryption oprerations is set for video file, if discontented Sufficient Rule of judgment then returns to the mode of operation that state feedback unit determines to user;
Operation mark setting module, the operation mark of encryption or decryption oprerations is arranged for video file, and judges operation mark Know whether setting succeeds, if success, carries out user-specific content encryption or decryption oprerations, if failure, it tries encryption or solution Close number of operations count adds 1, and repeats the operation of step first judgment module and operation mark setting module, until mark at Until function or the Rule of judgment for being unsatisfactory for first judgment module;
Specified content processing module, according to user demand, the content for treating transmitting video files designated position is encrypted Or decryption oprerations;
Second judgment module, judges whether encryption or decryption oprerations succeed, if success, completes video file to be transmitted Encryption or decryption oprerations, if failure, execute first judgment module, operation mark setting module, specified content processing module and The operation of second judgment module, until operating successfully or until being unsatisfactory for the Rule of judgment of first judgment module.
Preferably, the state feedback unit includes:
Encrypted result judgment module, if encryption or decryption oprerations success, return to operation success status, if encryption or decryption Operation failure, it tries roll back to video file and carry out the state before encryption or decryption oprerations;
Rollback result judgment module, if rolling back action success, returns operation failure state, if rolling back action fails, Return can not reset condition.
Beneficial effects of the present invention are as follows:
Technical solution of the present invention is run by method of calling, rather than interfacial type is manually operated, and facilitates system or program It calls and executes.Increase encryption or decrypted state mark, system or program is facilitated to judge file encryption or decrypted state.Utilize we Case generates library file, greatly reduces the memory space of the tool insert, greatly improves the speed of encryption and decryption.
Detailed description of the invention
Specific embodiments of the present invention will be described in further detail with reference to the accompanying drawing;
Fig. 1 shows the schematic diagram of automatic identification encrypting and decrypting method described in this programme;
Fig. 2 shows the encryption of local circulation described in this programme or the schematic diagrames of decryption method.
Specific embodiment
In order to illustrate more clearly of the present invention, the present invention is done further below with reference to preferred embodiments and drawings It is bright.Similar component is indicated in attached drawing with identical appended drawing reference.It will be appreciated by those skilled in the art that institute is specific below The content of description is illustrative and be not restrictive, and should not be limited the scope of the invention with this.
As shown in Figure 1, the invention discloses a kind of automatic identification encrypting and decrypting method for video data transmission, the party The step of method includes:
Step S1, the Transfer Parameters for obtaining video file to be transmitted, confirm video file path to be transmitted and view to be transmitted The current state of frequency file;Wherein, the current state of the video file to be transmitted includes: to have encrypted, decrypted and untreated Three kinds of states.Wherein, it needs to call two parameters in the step, the first parameter is video file path to be encrypted, and the second parameter is Operating parameter, and indicated by following code:
Number 0 represents decryption, transmits this parameter, method video can be decrypted operation;
Number 1 represents encryption, transmits this parameter, and method can carry out cryptographic operation to video;
Number 2, which represents, obtains video file state, transmits this parameter, method only checks file current state, can return to three Kind state, i.e. number 0 represent file and do not carry out any processing;Number 1 represents file and has encrypted;Number 2 represents file and has decrypted.
Step S2, according to user encryption or decryption instructions, encryption or decryption process is carried out to current video file to be transmitted. Step S2 includes:
S21, encryption or decryption oprerations number maxCount, current crypto or decryption oprerations number count are attempted to maximum Initializing set is carried out with the original state of video-encryption or decrypted result;
S22, pass through Rule of judgment: encrypting or whether decrypted state is operation failure state and current crypto or decryption number Count is less than maximum trial encryption or decryption oprerations number maxCount, decides whether to attempt as video file to be transmitted Encryption;If meeting Rule of judgment, S23 is thened follow the steps, if being unsatisfactory for Rule of judgment, thens follow the steps S3;
S23, for video file be arranged encryption or decryption oprerations operation mark, and judge operation mark setting whether at Function, if success, thens follow the steps S24, if failure, it tries encryption or decryption oprerations number count add 1, and repeat step S22 And S23, until the Rule of judgment for identifying successfully or being unsatisfactory for step S22;
S24, according to user demand, the content for treating transmitting video files designated position carries out encryption or decryption oprerations;Its In, as shown in Fig. 2, step S24 includes:
S241, using 1024 byte of head of video file to be transmitted as encryption or decryption object;
S242, initial position is set as site=0;
S243, judge whether 1024 byte of head of current video file to be transmitted encrypts completion, if not completing, from The data of 16 bytes are taken out in 1024 bytes, and this 16 byte datas are encrypted, if encryption is completed, from The data of 16 bytes are taken out in 1024 bytes, and this 16 byte datas are decrypted;If reading data in the step Failure or encryption/decryption failure, then directly exit
S244, the data after encryption or decryption are written at site, are exited if writing failure;
S245,16 bytes, as site=site+16 are taken in 1024 byte again, and repeats step S243 To step S245, until 1024 byte data all complete by encryption or decryption;
S25, judge whether encryption or decryption oprerations succeed, if success, completes the encryption or solution of video file to be transmitted Close operation, if failure, thens follow the steps S22 to S25, until the Rule of judgment for operating successfully or being unsatisfactory for step S22.
S3, judge whether encryption or decryption process operation succeeds, and final mode of operation is returned into user, complete certainly Dynamic identification cryptographic operation.The step S3 includes:
If S31, encryption or decryption oprerations success, return to operation success status;
If S32, encryption or decryption oprerations failure, it tries roll back to video file and carry out the shape before encryption or decryption oprerations State;
If the success of S33, rolling back action, returns operation failure state, if rolling back action fails, return can not restore shape State.
This programme further discloses a kind of automatic identification encrypting and decrypting system for video data transmission, the system packet It includes:
File identification unit obtains video file transfer request, confirms video file path to be transmitted and video to be transmitted The current state of file has been encrypted, has been decrypted or untreated three kinds of states;
Encryption unit carries out at encryption or decryption current video file to be transmitted according to user encryption or decryption instructions Reason;Include: in the encryption unit
Initialization module attempts encryption or decryption oprerations number maxCount, current crypto or decryption oprerations time to maximum The original state of number count and video-encryption or decrypted result carries out initializing set;
First judgment module passes through Rule of judgment: encrypting or whether decrypted state is operation failure state and current crypto Or decryption number count is less than maximum trial encryption or decryption oprerations number maxCount, decides whether to attempt to be to be passed Defeated video file encryption;If meeting Rule of judgment, the operation mark of encryption or decryption oprerations is set for video file, if discontented Sufficient Rule of judgment then returns to the mode of operation that state feedback unit determines to user;
Operation mark setting module, the operation mark of encryption or decryption oprerations is arranged for video file, and judges operation mark Know whether setting succeeds, if success, carries out user-specific content encryption or decryption oprerations, if failure, it tries encryption or solution Close number of operations count adds 1, and repeats the operation of step first judgment module and operation mark setting module, until mark at Until function or the Rule of judgment for being unsatisfactory for first judgment module;
Specified content processing module, according to user demand, the content for treating transmitting video files designated position is encrypted Or decryption oprerations;
Second judgment module, judges whether encryption or decryption oprerations succeed, if success, completes video file to be transmitted Encryption or decryption oprerations, if failure, execute first judgment module, operation mark setting module, specified content processing module and The operation of second judgment module, until operating successfully or until being unsatisfactory for the Rule of judgment of first judgment module.
State feedback unit, judges whether encryption or decryption process operation succeeds, and final mode of operation is returned to User completes automatic identification cryptographic operation.The state feedback unit includes:
Encrypted result judgment module, if encryption or decryption oprerations success, return to operation success status, if encryption or decryption Operation failure, it tries roll back to video file and carry out the state before encryption or decryption oprerations;
Rollback result judgment module, if rolling back action success, returns operation failure state, if rolling back action fails, Return can not reset condition.
This programme can be write using C/C++ language, the dynamic base that can be called under system environments be generated, for video software It calls.For example, the dynamic base so file that can be called under Android environment is generated, for the video software tune of Android environment With.This programme such as uses conventional code to occupy storage size as 104k, if compiling generates library file and occupies memory space 30k Left and right, is more suitable the quick calling of server or other associated video playout softwares.
Below by one group of embodiment, the present invention will be further described:
As shown in Figure 1, the present invention provides a kind of automatic identification encrypting and decrypting methods for video data transmission.The party Specific step is as follows for method:
In step sl, the parameter for obtaining and handling transmitting, including need to encrypt or decrypt video file path, specific behaviour It instructs;Wherein, concrete operations instruction is to check encryption and decryption state, cryptographic operation and the decryption oprerations of video file.If behaviour Making instruction is to check the encryption and decryption state of video file, thens follow the steps S2.
State judgement can be carried out in S2 step to video file, return state, which have, have been encrypted, has decrypted and three kinds untreated State.Encrypted state indicates that target video is encrypted state now, and need to be decrypted could normal browsing;Decrypted state table Show that target video is decrypted state now, can be browsed;Untreated state indicates that the video was never carried out encrypting or be solved Close operation.
If operational order is to encrypt or decrypt video video file, S3 is thened follow the steps.
S2 step can according to instruction to video file carry out encryption or decryption oprerations, operation after the completion of execute S3 return plus As a result the implementing result of close/decryption oprerations is divided into encryption or successful decryption energy;Encryption or decryption failure, if encryption or decryption Failure program can attempt state before rollback video file operation;Video file can not restore, after encryption or decryption failure, rollback When operation similarly fails, the status indicator can be returned.When operational order is to encrypt or decrypt video file, step is executed S3。
It is the local circulation encryption or decryption constructed by this programme for specifically encrypting or decrypting process in step S2 The specific execution step of method, this method includes:
S21, encryption or decryption oprerations number maxCount, current crypto or decryption oprerations number count are attempted to maximum Initializing set is carried out with the original state of video-encryption or decrypted result;
S22, pass through Rule of judgment: encrypting or whether decrypted state is operation failure state and current crypto or decryption number Count is less than maximum trial encryption or decryption oprerations number maxCount, decides whether to attempt as video file to be transmitted Encryption;If meeting Rule of judgment, S23 is thened follow the steps, if being unsatisfactory for Rule of judgment, thens follow the steps S3;
S23, for video file be arranged encryption or decryption oprerations operation mark, and judge operation mark setting whether at Function, if success, thens follow the steps S24, if failure, it tries encryption or decryption oprerations number count add 1, and repeat step S22 And S23, until the Rule of judgment for identifying successfully or being unsatisfactory for step S22;
S24, according to user demand, the content for treating transmitting video files designated position carries out encryption or decryption oprerations;
S25, judge whether encryption or decryption oprerations succeed, if success, completes the encryption or solution of video file to be transmitted Close operation, if failure, thens follow the steps S22 to S25, until the Rule of judgment for operating successfully or being unsatisfactory for step S22.
The S24 includes:
S241, using 1024 byte of head of video file to be transmitted as encryption or decryption object;
S242, initial position is set as site=0;
S243, judge whether 1024 byte of head of current video file to be transmitted encrypts completion, if not completing, from The data of 16 bytes are taken out in 1024 bytes, and this 16 byte datas are encrypted, if encryption is completed, from The data of 16 bytes are taken out in 1024 bytes, and this 16 byte datas are decrypted;If reading data failure or adding Close/decryption oprerations failure, then directly exit;
S244, the data after encryption or decryption are written at site, are exited if writing failure;
S245,16 bytes, as site=site+16 are taken in 1024 byte again, and repeats step S243 To step S245, until 1024 byte data all complete by encryption or decryption.
Be operation success status in state, or encrypted or decryption oprerations number be more than or equal to it is maximum attempt encryption or S3 can be entered step after decryption oprerations number.
It can be done as follows in step S3 according to final result, when encryption or decryption oprerations success, return is operated successfully State;After encryption or decryption oprerations failure, trial rolls back to state before video file operation, if success rollback, returns to behaviour Make status of fail;If rolling back action also fails, return can not reset condition.
Whole video-encryption or decryption video file operation are completed.
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair The restriction of embodiments of the present invention may be used also on the basis of the above description for those of ordinary skill in the art To make other variations or changes in different ways, all embodiments can not be exhaustive here, it is all to belong to this hair The obvious changes or variations that bright technical solution is extended out are still in the scope of protection of the present invention.

Claims (8)

1. a kind of automatic identification encrypting and decrypting method for video data transmission, which is characterized in that the step of this method includes:
S1, the Transfer Parameters for obtaining video file to be transmitted confirm video file path to be transmitted and video file to be transmitted Current state;
S2, according to user encryption or decryption instructions, encryption or decryption process is carried out to current video file to be transmitted;
S3, judge whether encryption or decryption process operation succeeds, and final mode of operation is returned into user, complete automatic knowledge Other cryptographic operation;
Step S2 includes:
S21, encryption or decryption oprerations number maxCount, current crypto or decryption oprerations number count and view are attempted to maximum The original state of frequency encryption or decrypted result carries out initializing set;
S22, pass through Rule of judgment: encrypting or whether decrypted state is operation failure state and current crypto or decryption number Count is less than maximum trial encryption or decryption oprerations number maxCount, decides whether to attempt as video file to be transmitted Encryption;If meeting Rule of judgment, S23 is thened follow the steps, if being unsatisfactory for Rule of judgment, thens follow the steps S3;
S23, the operation mark that encryption or decryption oprerations are set for video file, and judge whether operation mark setting succeeds, if Success, thens follow the steps S24, if failure, it tries encryption or decryption oprerations number count add 1, and repeat step S22 and S23, until the Rule of judgment for identifying successfully or being unsatisfactory for step S22;
S24, according to user demand, the content for treating transmitting video files designated position carries out encryption or decryption oprerations;
S25, judge whether encryption or decryption oprerations succeed, if success, complete encryption or the decryption behaviour of video file to be transmitted Make, if failure, thens follow the steps S22 to S25, until the Rule of judgment for operating successfully or being unsatisfactory for step S22.
2. the method according to claim 1, wherein the current state of the video file to be transmitted includes: Encryption has been decrypted and untreated three kinds of states.
3. the method according to claim 1, wherein step S24 includes:
S241, using 1024 byte of head of video file to be transmitted as encryption or decryption object;
S242, initial position is set as site=0;
S243, judge whether 1024 byte of head of current video file to be transmitted encrypts completion, if not completing, from 1024 words The data of 16 bytes are taken out in section, and this 16 byte datas are encrypted, if encryption is completed, from 1024 bytes The middle data for taking out 16 bytes, and this 16 byte datas are decrypted;
S244, the data after encryption or decryption are written at site, are exited if writing failure;
S245,16 bytes, as site=site+16 are taken in 1024 byte again, and repeats step S243 to step Rapid S245, until 1024 byte data all complete by encryption or decryption.
4. if according to the method described in claim 3, it is characterized in that, read data failure or encryption/decryption in step S243 Operation failure then directly exits.
5. the method according to claim 1, wherein step S3 includes:
If S31, encryption or decryption oprerations success, return to operation success status;
If S32, encryption or decryption oprerations failure, it tries roll back to video file and carry out the state before encryption or decryption oprerations;
If the success of S33, rolling back action, returns operation failure state, if rolling back action fails, return can not reset condition.
6. a kind of automatic identification encrypting and decrypting system for video data transmission, which is characterized in that the system includes:
File identification unit obtains video file transfer request, confirms video file path to be transmitted and video file to be transmitted Current state;
Encryption unit carries out encryption or decryption process to current video file to be transmitted according to user encryption or decryption instructions;
State feedback unit, judges whether encryption or decryption process operation succeeds, and final mode of operation is returned to user, Complete automatic identification cryptographic operation;
The encryption unit includes:
Initialization module attempts encryption or decryption oprerations number maxCount, current crypto or decryption oprerations number to maximum The original state of count and video-encryption or decrypted result carries out initializing set;
First judgment module passes through Rule of judgment: encrypting or whether decrypted state is operation failure state and current crypto or solution Close number count is less than maximum trial encryption or decryption oprerations number maxCount, decides whether to attempt as view to be transmitted Frequency file encryption;If meeting Rule of judgment, the operation mark of encryption or decryption oprerations is set for video file, if being unsatisfactory for sentencing Broken strip part then returns to the mode of operation that state feedback unit determines to user;
Operation mark setting module, the operation mark of encryption or decryption oprerations is arranged for video file, and judges that operation mark is set It sets and whether succeeds, if success, carries out user-specific content encryption or decryption oprerations, if failure, it tries encryption or decryption behaviour Make number count and add 1, and repeat the operation of step first judgment module and operation mark setting module, until identify successfully or Until the Rule of judgment for being unsatisfactory for first judgment module;
Specified content processing module, according to user demand, the content for treating transmitting video files designated position is encrypted or is solved Close operation;
Second judgment module, judges whether encryption or decryption oprerations succeed, if success, completes the encryption of video file to be transmitted Or decryption oprerations execute first judgment module, operation mark setting module, specified content processing module and second if failure The operation of judgment module, until operating successfully or until being unsatisfactory for the Rule of judgment of first judgment module.
7. system according to claim 6, which is characterized in that the current state of the video file to be transmitted includes: Encryption has been decrypted and untreated three kinds of states.
8. system according to claim 6, which is characterized in that the state feedback unit includes:
Encrypted result judgment module, if encryption or decryption oprerations success, return to operation success status, if encryption or decryption oprerations Failure, it tries roll back to video file and carry out the state before encryption or decryption oprerations;
Rollback result judgment module, if rolling back action fails, returns if rolling back action success, returns operation failure state It can not reset condition.
CN201611149596.7A 2016-12-13 2016-12-13 A kind of automatic identification encrypting and decrypting method and system for video data transmission Active CN106686407B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611149596.7A CN106686407B (en) 2016-12-13 2016-12-13 A kind of automatic identification encrypting and decrypting method and system for video data transmission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611149596.7A CN106686407B (en) 2016-12-13 2016-12-13 A kind of automatic identification encrypting and decrypting method and system for video data transmission

Publications (2)

Publication Number Publication Date
CN106686407A CN106686407A (en) 2017-05-17
CN106686407B true CN106686407B (en) 2019-07-23

Family

ID=58868302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611149596.7A Active CN106686407B (en) 2016-12-13 2016-12-13 A kind of automatic identification encrypting and decrypting method and system for video data transmission

Country Status (1)

Country Link
CN (1) CN106686407B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112100631B (en) * 2020-08-11 2022-09-06 福建天泉教育科技有限公司 Processing method and terminal for judging encryption of PPTX (Power Point X) document

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1689268A (en) * 2003-05-22 2005-10-26 富士通株式会社 Encrypted data reception device and decryption key updating method
CN102236607A (en) * 2010-04-23 2011-11-09 国民技术股份有限公司 Data security protection method and data security protection device
CN103731654A (en) * 2013-12-23 2014-04-16 华中科技大学 Information embedding system and information extracting system using 2D/3D videos
CN104320420A (en) * 2014-11-17 2015-01-28 国电南京自动化股份有限公司 SCADA file encryption method based on AES algorithm
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101258845B1 (en) * 2011-10-10 2013-05-06 고려대학교 산학협력단 Information save method and system using TCP communication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1689268A (en) * 2003-05-22 2005-10-26 富士通株式会社 Encrypted data reception device and decryption key updating method
CN102236607A (en) * 2010-04-23 2011-11-09 国民技术股份有限公司 Data security protection method and data security protection device
CN103731654A (en) * 2013-12-23 2014-04-16 华中科技大学 Information embedding system and information extracting system using 2D/3D videos
CN104320420A (en) * 2014-11-17 2015-01-28 国电南京自动化股份有限公司 SCADA file encryption method based on AES algorithm
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device

Also Published As

Publication number Publication date
CN106686407A (en) 2017-05-17

Similar Documents

Publication Publication Date Title
CN110245506B (en) Intelligent contract management method and device based on block chain and electronic equipment
CN109040090B (en) A kind of data ciphering method and device
CN105450620B (en) A kind of information processing method and device
CN110110548B (en) Method for storing files in trusted execution environment in encrypted manner based on encryption chip
CN102138300B (en) Message authentication code pre-computation with applications to secure memory
CN100388245C (en) Multitask execution system
CN110266467B (en) Method and device for realizing dynamic encryption based on block height
CN103299315A (en) System and method for in-place encryption
CN105653986B (en) A kind of data guard method and device based on microSD card
JP2007027896A (en) Communication card, secret information processing system, secret information transmission method, and program
JP4763447B2 (en) Authentication system and authentication target device
CN109462477B (en) White box encryption method based on Internet of things embedded equipment
CN108763917A (en) A kind of data encryption/decryption method and device
CN109104724A (en) A kind of data ciphering method and device for device upgrade
CN109446757B (en) Method for protecting general MCU program
CN110224834A (en) Identity identifying method, decryption and ciphering terminal based on dynamic token
CN104850764B (en) A kind of method for protecting software and system based on smart card
CN114662135A (en) Data access method, computer device and readable storage medium
CN106686407B (en) A kind of automatic identification encrypting and decrypting method and system for video data transmission
CN105095780B (en) The access method and device of test port in a kind of chip
KR102466866B1 (en) Data verification method
CN115941336A (en) Data processing method, device and equipment
CN209103293U (en) Electronic equipment
CN110909318B (en) Operating system anti-theft method and device for user equipment and terminal
CN100440140C (en) System and method for regulating execution of computer software

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100085, Beijing, Haidian District information road, No. 28, information building, block A, seven

Patentee after: Beijing Interactive Encyclopedia Network Technology Co.,Ltd.

Address before: 100085, Beijing, Haidian District information road, No. 28, information building, block A, seven

Patentee before: BEIJING HUDONG BAIKE NETWORK TECHNOLOGY CO.,LTD.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20190924

Address after: 100041, room 2, building 3, building 30, Xing Xing street, Shijingshan District, Beijing,

Patentee after: BEIJING BYTEDANCE NETWORK TECHNOLOGY Co.,Ltd.

Address before: 100085, Beijing, Haidian District information road, No. 28, information building, block A, seven

Patentee before: Beijing Interactive Encyclopedia Network Technology Co.,Ltd.