CN109547818A - A kind of video content decentralization secure distribution method - Google Patents

A kind of video content decentralization secure distribution method Download PDF

Info

Publication number
CN109547818A
CN109547818A CN201811511132.5A CN201811511132A CN109547818A CN 109547818 A CN109547818 A CN 109547818A CN 201811511132 A CN201811511132 A CN 201811511132A CN 109547818 A CN109547818 A CN 109547818A
Authority
CN
China
Prior art keywords
video content
video
decentralization
key
server software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811511132.5A
Other languages
Chinese (zh)
Inventor
谭肖平
魏万晓
李久明
王翔
王群华
潘芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yoostar Technology Co Ltd
Original Assignee
Yoostar Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yoostar Technology Co Ltd filed Critical Yoostar Technology Co Ltd
Priority to CN201811511132.5A priority Critical patent/CN109547818A/en
Publication of CN109547818A publication Critical patent/CN109547818A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption

Abstract

The present invention is suitable for multimedia technology improvement areas, a kind of video content decentralization secure distribution method is provided, the video content decentralization secure distribution method is the following steps are included: video is generated two different double-strands using the technology decentralization of block chain by S1, video content provider;The video for generating different double-strands is carried out video content distribution by S2, video content provider in a peer-to-peer network.This method mitigates the pressure of server or cloud, improving performance;Without worrying resource distribution and assignment problem;Without configuring bigger bandwidth, the expenses such as bandwidth are saved;Content in order to prevent is divulged a secret, the method that the present invention uses secure distribution, guarantees that the user of only authorization could correctly decompress, to promote safety.

Description

A kind of video content decentralization secure distribution method
Technical field
The invention belongs to multimedia technology improvement areas more particularly to a kind of video content decentralization secure distribution sides Method.
Background technique
The content of conventional video stores on the server or on cloud, and user needs when obtaining content from server or Yun Jinhang Downloading.There is some drawbacks for this scheme.1) when there are many number of users, the burden of server or cloud is very heavy, responds very slow; 2) server needs very high bandwidth, and no person is not able to satisfy the demand of a large number of users, this causes the cost of operator to get higher;3) institute Bandwidth and various resource requirements is needed to be not easy to determine.If configuration one abundant resource, can be satisfied a large number of users it is online when Needs.It, then can waste of resource but if online user is few.If it is less to configure resource, it is possible to when user becomes more, under performance Drop is obvious;4) content is stored in server or cloud, once server account or cloud account are broken, then content will be revealed, and is used Family information will also be revealed, this is very big security risk.
Summary of the invention
The purpose of the present invention is to provide a kind of video content decentralization secure distribution methods, it is intended to solve above-mentioned skill Art problem.
The invention is realized in this way a kind of video content decentralization secure distribution method, during the video content is gone Heart secure distribution method the following steps are included:
Video is generated two different double-strands using the technology decentralization of block chain by S1, video content provider;
The video for generating different double-strands is carried out video content distribution by S2, video content provider in a peer-to-peer network.
A further technical solution of the present invention is: the video content decentralization secure distribution method of stating includes following step It is rapid:
S3, commercial value transfer will be completed in video content generation, storage and process of consumption in a network;
S4, verified unsymmetrical key method and block chain technology are carried out to video content add after completing business and shifting It is close.
A further technical solution of the present invention is: Video Quality Metric is divided at password using block chain technology in the step S1 Send out chain and the two different chains of content distribution chain.
A further technical solution of the present invention is: video content provider uses P2P pairs in a network in the step S2 Video content is distributed under equal networks and C/S double mode.
A further technical solution of the present invention is: the two class node of network settings, respectively video content provider save Point and user node, in video content provider's node side runtime server software program, at user node end, operation video is broadcast Application program is put, the server software program is only that authorized user provides service, and the video playing application program is as taking Device software program of being engaged in could be as server software PROGRAMMED REQUESTS to data after proving legal identity.
A further technical solution of the present invention is: the legal body of the server software program verification video playing application program Part after issue decryption current video content key, institute's delivering key the following steps are included:
A1, video playing application program are issued to server software program subscribes to request, and the sending of video playing application program is transferred accounts;
A2, it is the recipient that transfers accounts by the public key setting of server software program, is worth quantity needed for reception payment services;
A3, subscription request is shown to be using ReqSubscribe in PswChainScript again, and signed using own private key Name;
A4, confirmation, which are transferred accounts, is written to the subscription valence that rear server software program on PswChain receives video playing application program Value;
The subscription of the pairs of video playing application program of A5, server software is marked;
A6, Psw_random is generated every T_key_cycle time server software program;
A7, it is distributed on key chain after being encrypted using the public key of video playing application journey to Psw_random;
A8, video content encrypt and issue video content using Psw_random.
A further technical solution of the present invention is: the server software program issues video content using ContChain, The generation and distribution of user node in network synchronous ContChain, the ContChain the following steps are included:
B1, server software program receive key distribution chain;
B2, server software program read key distribution chain content and generate subscription data;
The new distributing passwords Psw_random of B3, server software Program Generating and more new key distribution chain;
The video data block that B4, server software program need to be distributed using Psw_random password encryption;
B5, server software program use the encrypted video data block of P2P net distribution;
B6, video playing application program synchronized update key distribution chain and ContChain are simultaneously consumed;
B7, server software program judge whether also in current period T_key_cycle, if so, continuing encrypted data chunk simultaneously Distribution, and go to step B4;If otherwise going to step B1.
A further technical solution of the present invention is: the server software program is by video content, temporally tissue segmentation is File block, each block are marked with timestamp.
A further technical solution of the present invention is: the video playing application program is not required to save whole ContChain's Content need to only carry out saving or being saved according to specified file data cFileDataID after time cTime.
A further technical solution of the present invention is: the user node, which is acquisition value, to be block recorder by competition Big transferring accounts for the precious record acquisition person of transferring accounts is carried out to block and takes VValue and reward VValue.
The beneficial effects of the present invention are: this method mitigates the pressure of server or cloud, improving performance;Without worrying that resource is matched It sets and assignment problem;Without configuring bigger bandwidth, the expenses such as bandwidth are saved;Content in order to prevent is divulged a secret, and the present invention uses The method of secure distribution guarantees that the user of only authorization could correctly decompress, to promote safety.
Detailed description of the invention
Fig. 1 is the ways of distribution schematic diagram of video content provided in an embodiment of the present invention;
Fig. 2 is the composite structural diagram of PswChain provided in an embodiment of the present invention.
Fig. 3 is key distribution procedure schematic diagram provided in an embodiment of the present invention.
Fig. 4 is the composite structural diagram of ContChain provided in an embodiment of the present invention.
Fig. 5 is generation and the distribution flow figure of ContChain provided in an embodiment of the present invention.
Fig. 6 is the flow chart of video content decentralization secure distribution method provided in an embodiment of the present invention.
Specific embodiment
Explanation of nouns
VideoContent: video content is embodied in binary file.
ContentProvider: video content provider.
ContentReceiver: the node in network, it is the storage person of video content, turns originator or consumer.
The server software program of the end ServerApp:ContentProvider operation.
The software program of the end ReceiverApp:ContentReceiver operation, for decrypted video content, is broadcast It puts.
PswChain: key distribution chain.It is block one by one by key data tissue, these blocks are connected on one It rises, forms key distribution chain.The working principle of key distribution chain is similar with bit coin block chain principle.But mentality of designing and make With method difference.
VValue: certain value is represented.When ContentReceiver consumer video content, need to pay certain expense With the expense is indicated with VValue.ContentReceiver directly can buy VValue from video content provider, VValue can be taken by handling new block for PswChain to obtain transferring accounts for the person of transferring accounts.
PswChainScript:PswChain is used to realize scripting language defined in business.
ContChain: video content chain, for distributing the video content of ContentProvider offer.Video content quilt It is divided into the file block temporally organized.File block uploads to content distribution P2P network after being encrypted.In network ContentReceiver synchronizes ContChain.If necessary to consume the video content in ContChain, ContentReceiver needs to request decruption key to ContentProvider, and pays certain VValue.
ChainRecorder: block recorder, the node on network can be that competition is known as block recorder.Record Member is responsible for generating new block according to current network conditions.If node has been successfully generated block, the reward of the block and Transfer charge in block transaction will be attributed to the node, increase its VValue.Block recorder can expend computing resource come into Row record, motivates node to be recorded by the measure, guarantees that whole network operates normally.
As shown in Figure 1, video content decentralization secure distribution method provided by the invention, details are as follows:
Video is generated two different double-strands using the technology decentralization of block chain by step S1, video content provider.
The video for generating different double-strands is carried out video content point by step S2, video content provider in a peer-to-peer network Hair.
Video content is generated in a network, completes commercial value transfer in storage and process of consumption by step S3.
Step S4 carries out verified unsymmetrical key method and block chain skill to video content after completing business and shifting Art is encrypted.
By 1) using duplex structure.Password distribution and content distribution use different chains respectively;When two kinds of chain distributions all Using P2P peer-to-peer network, division center is removed;2) content distribution is carried out using P2P, C/S double mode.Two class section of network settings Point, one kind are video content provider's node, and one kind is user node.The communication mode of two class nodes is identical, but role is different; User node can obtain video content by P2P network, can also be by C/S mode directly from video content provider's node Request content;3) network provides a kind of value Transfer method, can generate in video content, store, completes quotient in process of consumption Industry value Transfer;4) video content encryption uses verified unsymmetrical key method and block chain technology.
Video content provider (ContentProvider) is usually the company for runing video traffic, is video content Creator, owner.Node (ContentReceiver) is the storage person of video content, turns originator or consumer. ContentReceiver directly can request video counts from ContentProvider by server/customer end (C/S) mode According to (VideoContent), can also be requested by point-to-point (P2P) mode from other ContentReceiver VideoContent.That is, ContentProvider carries out the distribution of video content by C/S and P2P two ways, This is different from conventional solution, is a characteristic of the invention.
The end ContentProvider runtime server software program (ServerApp).The operation of the end ContentReceiver Video playing application program (ReceiverApp).ServerApp only provides service for authorized user.ReceiverApp must be first The legal identity of oneself is proved to ServerApp, then could correctly be requested from ServerApp to data.ServerApp verifying The key of decryption current video content can be distributed after the legal identity of ReceiverApp to ReceiverApp.
ServerApp can at regular intervals be distributed to video password the ReceiverApp of authorization.The interval time is The distribution period of password, length T_key_cycle.Within a T_key_cycle period, ServerApp keeps encryption close Code is constant.Therefore, a password only need to be only distributed in a cycle T_key_cycle.It is arrived in next T_key_cycle When, then distribute next time.Dispensed amount can be reduced in this way, reduces communication load, mitigate ServerApp's and ReceiverApp Handle load.
ServerApp has been used key distribution chain (PswChain) in distribution, and key distribution chain PswChain is block Method of Data Organization.
The meaning of PswChain each section is as follows:
KHash is the cryptographic Hash of current block.
KVersion is the version number of currently used agreement.
KTime is the timestamp of current data block.
KPreHash is the cryptographic Hash of previous block.
KPswSize is that the block includes the number that ServerApp is sent to ReceiverApp password.
The PubKey of kPsw is the public key of ReceiverApp recipient, and the ReceiverApp for only possessing the public key just may be used To decrypt password.
The EncryptedKey of kPsw is the encrypted password of ServerApp, and only recipient could decrypt.
The ServerAppSignHash of kPsw is the signature of ServerApp, is guaranteed correctly and effective.
KTranSize is the quantity that current VValue transfers accounts.
The SendPubKey of kTran is the sending people to transfer accounts.
The RcvPubKey of kTran is the recipient that transfers accounts.
The TranAmount of kTran is VValue quantity of transferring accounts.
The TranFee of kTran is transfer charge, will be obtained by packing person.
The kPswChainScript of kTran wants execution script for the people that transfers accounts.
The SendSignHash of kTran is the signature transferred accounts and issue people.
KPackPubKey is the packer of block, and the expense of transferring accounts of the block will be by its acquisition.
KPackTotalFee is to be packaged resulting total VValue quantity.
Use rivest, shamir, adelman.ContentProvider and ContentReceiver all have oneself public key and Private key.Public key is disclosed to all nodes, and public key also represents account account.Private key oneself is grasped, and can not be revealed, if leakage Itself account is with regard to out of hand.
The video content that the ContentReceiver of video wants consumer video content provider to provide needs to pay certain Value (VValue).ContentReceiver directly can buy VValue from video content provider, can also be by competing Strive referred to as block recorder (ChainRecorder) to block carry out be packaged record obtain transferring accounts for the person of transferring accounts take VValue and prize Encourage VValue.Node on network can be that competition is known as block recorder.Recorder is responsible for raw according to current network conditions The block of Cheng Xin.If node has been successfully generated block, the transfer charge in the reward of the block and block transaction will It is attributed to the node, increases its VValue.Block recorder can expend computing resource to record, and section is motivated by the measure Point is recorded, and guarantees that whole network operates normally.
For consumer video content, ReceiverApp, which needs to issue to ServerApp, subscribes to request.In request, ReceiverApp can be issued and be transferred accounts.It 1) is the recipient that transfers accounts by the public key setting of ServerApp, needed for payment services VValue quantity;2) it is shown to be subscription request using ReqSubscribe in PswChainScript again, and uses the private of oneself Key is signed;3) when transfer accounts be written on key distribution chain PswChain after, transfer accounts and be identified, ServerApp will receive The subscription VValue of ReceiverApp.ServerApp can and then be handled request is subscribed to, and mark ordering for ReceiverApp It reads.
After the T_key_cycle time, ServerApp generates random cipher Psw_random.For each subscription ReceiverApp, Psw_random is encrypted using the public key of the ReceiverApp, is then distributed on key chain Face.Then video content is encrypted using Psw_random, and content distribution is gone out.
Key distribution procedure is as shown in Figure 3.ReceiverApp is received and synchronous PswChain, reception by P2P at any time The cipher key content of ServerApp distribution.The password EncryptedKey being encrypted of oneself is obtained by PswChain, then It is decoded with the private key of oneself, recovers password Psw_random.Later, Psw_random can be used in ReceiverApp The video content received is decoded, and carries out video consumer.
ServerApp distributes video content using another chain (content chain ContChain).Video content is divided into The file block temporally organized.File block uploads to content distribution P2P network after being encrypted.In network ContentReceiver synchronizes ContChain.If necessary to consume the video content in ContChain, ContentReceiver needs to request decruption key to ContentProvider, and pays certain VValue.
The content-encrypt chain ContChain structure of ServerApp is as shown in Figure 4.The structure of ContChain is simpler. ReceiverApp does not have to the content for all saving ContChain.It need to only be saved after the time cTime of needs or root It is saved later according to specified file data cFileDataID.
The content that ContChain specifically includes is as follows:
CHash is the cryptographic Hash of current video content block.
CPreHash is the cryptographic Hash of previous area's content block.
CVersion is the version number that Current Content block uses agreement.
CTime is the timestamp of Current Content block.
CFileDataID is the ID number of video content, and required content can be found according to this number.
CEncryptedData is specific encrypted video content.Corresponding password must be used to be decrypted and could restore Video original data.
The generation of ContChain does not need to dig mine, and all blocks are entirely to be generated by ServerApp.ReceiverApp It can receive video content block, but block cannot be created.Therefore, PswChain needs Miner to generate block, and ContChain is not needed.ContChain is a kind of block chain of center distribution.
The generation and distribution flow of ContChain, as shown in figure 5, being described in detail below:
1) ServerApp receives PswChain;
2) ServerApp reads PswChain content, generates and subscribes to data;
3) ServerApp generates new distributing passwords Psw_random, updates PswChain chain;
4) ServerApp needs the video data block distributed using Psw_random password encryption;
5) ServerApp uses the encrypted data block of P2P net distribution;
6) the synchronous PswChain and ContChain of ReceiverApp, and consumed;
7) ServerApp judges whether also in current period T_key_cycle, if then continuing encrypted data chunk and distributing, turns To 4);Otherwise it goes to 1).
The company of an offer net cast content service is provided, is named as ABXY company, it is video content provider (ContentProvider).
Node (ContentReceiver) is the video user of the said firm, these users are the storage persons of video content, turn Originator or consumer.ContentReceiver directly requests decruption key from ContentProvider with C/S model.With point pair Point (P2P) mode requests VideoContent from other ContentReceiver.That is, ContentProvider passes through C/S and P2P two ways carries out the distribution of video content, this is different from conventional solution, is a characteristic of the invention.This The distribution method Integral Thought of invention is shown in Fig. 1.
ABXY company end runtime server software program (ServerApp).The end node ContentReceiver runs video Play-back application (ReceiverApp).ServerApp only provides decruption key for authorized user.ReceiverApp must be first The legal identity of oneself is proved to ServerApp, then could correctly be requested from ServerApp to data.ServerApp verifying Decruption key can be distributed to ReceiverApp after the legal identity of ReceiverApp.
ServerApp can at regular intervals be distributed to video password the ReceiverApp of authorization.The interval time is The distribution period of password, length are set as T_key_cycle=5 second.In 5 seconds, ServerApp keeps Crypted password constant.5 seconds The Modify password of ServerApp meeting later, and use new password encryption video content.The ReceiverApp of node has to weight Video content after this could be decrypted by newly obtaining new password.
ContentProvider and ContentReceiver has the public key and private key of oneself.Public key is disclosed to all Node, public key also represent account account.Private key oneself is grasped, and can not be revealed, out of hand once itself account if leakage.
ServerApp every 5 seconds by new cipher key distribution to key distribution chain (PswChain), key distribution chain PswChain is the Method of Data Organization of block, and the meaning of each section is as follows:
KHash is the cryptographic Hash of current block.
KVersion is the version number of currently used agreement.The first edition is then set as 1.0.
KTime is the timestamp of current data block.Such as 1524190210, indicate on April 20th, 2018,10:10:10.
KPreHash is the cryptographic Hash of previous block.
KPswSize is that the block includes the number that ServerApp is sent to ReceiverApp password.ServerApp dimension The list of one booking reader of shield, after each issuing time arrives, can send new password on PswChain.Corresponding section Point ReceiverApp can synchronize PswChain, be taken out one's own key.
The PubKey of kPsw is the public key of ReceiverApp recipient, and the ReceiverApp for only possessing the public key just may be used To decrypt password.
The EncryptedKey of kPsw is the encrypted password of ServerApp, and only recipient could decrypt.Recipient makes Key can be unlocked with the private key of oneself.
The ServerAppSignHash of kPsw is the signature of ServerApp, is guaranteed correctly and effective.
KTranSize is the quantity that current VValue transfers accounts.PswChain supports value Transfer, between node, node and Transfer operation can be carried out between company.When node subscribes to the cipher key service of ServerApp, need to pay certain VValue Quantity, such as 1.02.
The SendPubKey of kTran is the sending people to transfer accounts.
The RcvPubKey of kTran is the recipient that transfers accounts.
The TranAmount of kTran is transfer accounts VValue quantity, such as 3.9.
The TranFee of kTran is transfer charge, will be obtained by ChainRecorder.
The kPswChainScript of kTran wants execution script for the people that transfers accounts.
The SendSignHash of kTran is the signature transferred accounts and issue people.
KPackPubKey is the public key of ChainRecorder, it will obtain corresponding reward and expense.
KPackTotalFee is the resulting total VValue quantity of ChainRecorder.
The video content that the ContentReceiver of video wants consumer video content provider to provide needs to pay certain Value (VValue).ContentReceiver directly can buy VValue from video content provider. ContentReceiver can sell VValue or the forms such as supplement with money by a card and be sold in the official website of oneself.
In order to obtain VValue, ContentReceiver can also be known as block recorder by competition (ChainRecorder) transferring accounts for the packing record acquisition person of transferring accounts is carried out to block and takes VValue and reward VValue.On network Node can be competition be known as block recorder.Recorder is responsible for generating new block according to current network conditions.If Node has been successfully generated block, then the reward of the block and block transaction in transfer charge will be attributed to the node, increase Its VValue.Block recorder can expend computing resource to record, and motivate node to be recorded by the measure, guarantee Whole network operates normally.
In order to obtain the password of consumer video content, ReceiverApp, which needs to issue to ServerApp, subscribes to request. ReceiverApp can only be sent to encrypted password the user of successful subscription.In request, ReceiverApp needs Sending is transferred accounts a certain number of VValue.It 1) is the recipient that transfers accounts by the public key setting of ServerApp, needed for payment services VValue quantity, such as 1.02;2) it is shown to be subscription request using ReqSubscribe in PswChainScript again, and used The private key of oneself is signed;3) when transfer accounts be written on key distribution chain PswChain after, transfer accounts and be identified, ServerApp will receive the subscription VValue of ReceiverApp.ServerApp can and then be handled request is subscribed to, and be marked The subscription of ReceiverApp.
After 5 second time, ServerApp generates new random cipher Psw_random, such as "ju9dk3kcij389ck".For the ReceiverApp that each is subscribed to, using the public key of the ReceiverApp to Psw_ Random is encrypted, and is then distributed to above key chain.Then video content is encrypted using Psw_random, and handle Content distribution is gone out.
ReceiverApp is received and synchronous PswChain, the cipher key content of reception ServerApp distribution by P2P at any time. The password EncryptedKey being encrypted that oneself is obtained by PswChain, is then decoded with the private key of oneself, extensive Appear again password Psw_random, such as " ju9dk3kcij389ck ".Later, ReceiverApp can be used Psw_random pairs The video content received is decoded, and carries out video consumer.
ServerApp distributes video content using content chain ContChain.Video content, which is divided into, temporally to be organized File block, every spacer block all uses timestamp label, such as: 1526190210.File block uploads to content point after being encrypted Send out P2P network.The synchronous ContChain of ContentReceiver in network.If necessary to consume the video in ContChain Content, ContentReceiver needs to request decruption key to ContentProvider, and pays certain VValue.
ReceiverApp does not have to the content for all saving ContChain.It need to only be carried out after the time cTime of needs It saves, or is saved later according to specified file data cFileDataID.
The content that ContChain specifically includes is as follows:
CHash is the cryptographic Hash of current video content block.
CPreHash is the cryptographic Hash of previous area's content block.
CVersion is the version number that Current Content block uses agreement, and initial version number is 1.0.
CTime is the timestamp of Current Content block, such as 1526190210.
CFileDataID is the ID number of video content, and required content can be found according to this number.
CEncryptedData is specific encrypted video content.Corresponding password must be used to be decrypted and could restore Video original data.
The generation of ContChain does not need ChainRecorder, and all blocks are entirely to be generated by ServerApp. ReceiverApp can receive video content block, but cannot create block.ContChain is a kind of the privately owned of center distribution Block chain.
The generation of ContChain and distribution flow are as follows:
1) ServerApp receives PswChain;
2) ServerApp reads PswChain content, generates and subscribes to data;
3) ServerApp generates new distributing passwords Psw_random, updates PswChain chain;
4) ServerApp needs the video data block distributed using Psw_random password encryption;
5) ServerApp uses the encrypted data block of P2P net distribution;
6) the synchronous PswChain and ContChain of ReceiverApp, and consumed;
7) ServerApp judges whether also in current period T_key_cycle, if then continuing encrypted data chunk and distributing, turns To 4);Otherwise it goes to 1).
Mitigate the pressure of server or cloud, improving performance;Without worrying resource distribution and assignment problem;It is bigger without configuring Bandwidth, save the expenses such as bandwidth;Content in order to prevent is divulged a secret, and the method that the present invention uses secure distribution, guarantee is only awarded The user of power could correctly decompress, to promote safety.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of video content decentralization secure distribution method, which is characterized in that the video content decentralization secrecy point Forwarding method the following steps are included:
Video is generated two different double-strands using the technology decentralization of block chain by S1, video content provider;
The video for generating different double-strands is carried out video content distribution by S2, video content provider in a peer-to-peer network.
2. video content decentralization secure distribution method according to claim 1, which is characterized in that described to state in video Hold decentralization secure distribution method the following steps are included:
S3, commercial value transfer will be completed in video content generation, storage and process of consumption in a network;
S4, verified unsymmetrical key method and block chain technology are carried out to video content add after completing business and shifting It is close.
3. video content decentralization secure distribution method according to claim 2, which is characterized in that in the step S1 Using block chain technology by Video Quality Metric at password distribution chain and the two different chains of content distribution chain.
4. video content decentralization secure distribution method according to claim 3, which is characterized in that in the step S2 Video content provider uses in a network is distributed video content under P2P peer-to-peer network and C/S double mode.
5. video content decentralization secure distribution method according to claim 4, which is characterized in that the network settings Two class nodes, respectively video content provider's node and user node, in video content provider's node side runtime server Software program runs video playing application program at user node end, and the server software program is only authorized user's offer Service, the video playing application program could be as server software programs after as server software program certification legal identity Request data.
6. video content decentralization secure distribution method according to claim 5, which is characterized in that the server is soft The key of decryption current video content is issued after part program verification video playing application program legal identity, institute's delivering key includes Following steps:
A1, video playing application program are issued to server software program subscribes to request, and the sending of video playing application program is transferred accounts;
A2, it is the recipient that transfers accounts by the public key setting of server software program, is worth quantity needed for reception payment services;
A3, subscription request is shown to be using ReqSubscribe in PswChainScript again, and signed using own private key Name;
A4, confirmation, which are transferred accounts, is written to the subscription valence that rear server software program on PswChain receives video playing application program Value;
The subscription of the pairs of video playing application program of A5, server software is marked;
A6, Psw_random is generated every T_key_cycle time server software program;
A7, it is distributed on key chain after being encrypted using the public key of video playing application journey to Psw_random;
A8, video content encrypt and issue video content using Psw_random.
7. video content decentralization secure distribution method according to claim 6, which is characterized in that the server is soft Part program issues video content using ContChain, the synchronous ContChain of the user node in network, the ContChain's Generate and distribution the following steps are included:
B1, server software program receive key distribution chain;
B2, server software program read key distribution chain content and generate subscription data;
The new distributing passwords Psw_random of B3, server software Program Generating and more new key distribution chain;
The video data block that B4, server software program need to be distributed using Psw_random password encryption;
B5, server software program use the encrypted video data block of P2P net distribution;
B6, video playing application program synchronized update key distribution chain and ContChain are simultaneously consumed;
B7, server software program judge whether also in current period T_key_cycle, if so, continuing encrypted data chunk simultaneously Distribution, and go to step B4;If otherwise going to step B1.
8. video content decentralization secure distribution method according to claim 7, which is characterized in that the server is soft By video content, temporally tissue segmentation is file block to part program, and each block is marked with timestamp.
9. video content decentralization secure distribution method according to claim 7, which is characterized in that the video playing The content that application program is not required to save whole ContChain need to only carry out saving or according to specified file after time cTime Data cFileDataID is saved.
10. video content decentralization secure distribution method according to claim 7, which is characterized in that user's section Point is that acquisition value can be that block recorder takes VValue to big treasured record the transferring accounts for the person of transferring accounts of acquisition of block progress by competing With reward VValue.
CN201811511132.5A 2018-12-11 2018-12-11 A kind of video content decentralization secure distribution method Pending CN109547818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811511132.5A CN109547818A (en) 2018-12-11 2018-12-11 A kind of video content decentralization secure distribution method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811511132.5A CN109547818A (en) 2018-12-11 2018-12-11 A kind of video content decentralization secure distribution method

Publications (1)

Publication Number Publication Date
CN109547818A true CN109547818A (en) 2019-03-29

Family

ID=65854583

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811511132.5A Pending CN109547818A (en) 2018-12-11 2018-12-11 A kind of video content decentralization secure distribution method

Country Status (1)

Country Link
CN (1) CN109547818A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111538780A (en) * 2020-04-01 2020-08-14 深圳创客区块链技术有限公司 Method, device and storage medium for converting block chain single strand into primary and secondary double strands
US10771243B1 (en) 2020-04-29 2020-09-08 Ecosteer Srl Multicast encryption scheme for data-ownership platform
CN112235543A (en) * 2020-10-14 2021-01-15 重庆紫光华山智安科技有限公司 Video encryption method and system based on block chain
WO2022121673A1 (en) * 2020-12-09 2022-06-16 International Business Machines Corporation Decentralized broadcast encryption and key generation facility

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101800731A (en) * 2009-02-06 2010-08-11 株式会社日立制作所 Network transmission management server, network transmission management method and network transmission system
KR101727525B1 (en) * 2016-09-05 2017-04-17 주식회사 스케일체인 Block chain based distributed storage method and device thereof
CN107018432A (en) * 2017-03-28 2017-08-04 华为技术有限公司 The Licensing Methods and equipment of media content
CN108769751A (en) * 2018-05-02 2018-11-06 中广热点云科技有限公司 A kind of network video based on intelligent contract listens Management Support System
CN108833944A (en) * 2018-07-09 2018-11-16 中国联合网络通信集团有限公司 Method of video distribution
CN108964911A (en) * 2018-09-18 2018-12-07 苏州米特希赛尔人工智能有限公司 A kind of stream media service system based on block chain and quantum flow data block technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101800731A (en) * 2009-02-06 2010-08-11 株式会社日立制作所 Network transmission management server, network transmission management method and network transmission system
KR101727525B1 (en) * 2016-09-05 2017-04-17 주식회사 스케일체인 Block chain based distributed storage method and device thereof
CN107018432A (en) * 2017-03-28 2017-08-04 华为技术有限公司 The Licensing Methods and equipment of media content
CN108769751A (en) * 2018-05-02 2018-11-06 中广热点云科技有限公司 A kind of network video based on intelligent contract listens Management Support System
CN108833944A (en) * 2018-07-09 2018-11-16 中国联合网络通信集团有限公司 Method of video distribution
CN108964911A (en) * 2018-09-18 2018-12-07 苏州米特希赛尔人工智能有限公司 A kind of stream media service system based on block chain and quantum flow data block technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
南湘浩: "《CPK密码体制与网际安全》", 31 December 2008 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111538780A (en) * 2020-04-01 2020-08-14 深圳创客区块链技术有限公司 Method, device and storage medium for converting block chain single strand into primary and secondary double strands
CN111538780B (en) * 2020-04-01 2023-01-13 深圳创客区块链技术有限公司 Method and device for converting block chain single chain into primary and secondary double chains and storage medium
US10771243B1 (en) 2020-04-29 2020-09-08 Ecosteer Srl Multicast encryption scheme for data-ownership platform
CN112235543A (en) * 2020-10-14 2021-01-15 重庆紫光华山智安科技有限公司 Video encryption method and system based on block chain
CN112235543B (en) * 2020-10-14 2023-02-17 重庆紫光华山智安科技有限公司 Video encryption method and system based on block chain
WO2022121673A1 (en) * 2020-12-09 2022-06-16 International Business Machines Corporation Decentralized broadcast encryption and key generation facility
GB2616804A (en) * 2020-12-09 2023-09-20 Ibm Decentralized broadcast encryption and key generation facility
US11876903B2 (en) 2020-12-09 2024-01-16 International Business Machines Corporation Decentralized broadcast encryption and key generation facility

Similar Documents

Publication Publication Date Title
CN109547818A (en) A kind of video content decentralization secure distribution method
JP7281514B2 (en) Blockchain-enforced methods for control and distribution of digital content
JP7436580B2 (en) Computer-implemented systems and methods for time-release encryption on blockchain networks
CN111737724B (en) Data processing method and device, intelligent equipment and storage medium
CN110309634B (en) Credible advertisement data management system based on block chain
EP2774313B1 (en) Electronic content distribution based on secret sharing
CN100512095C (en) Content distribution system and content distribution method
CN109409122A (en) File memory method and its electronic equipment, storage medium
CN110400136A (en) Account management method, device, server and storage medium based on block chain
JP2023539814A (en) Transferring Cryptocurrency from Remote Access Restricted Wallets
CN112434343A (en) Virtual power plant safety scheduling and transaction method based on dual block chain technology
CN110601830B (en) Key management method, device, equipment and storage medium based on block chain
CN108959523B (en) Music playing method and player based on block chain technology
WO1998047091A1 (en) Virtual property system
WO2015014245A1 (en) Method and system for safely transmitting transaction sensitive data based on cloud pos
CN112953930A (en) Cloud storage data processing method and device and computer system
CN111967860A (en) Transaction system, method and node in transaction system
CN113824551B (en) Quantum key distribution method applied to secure storage system
CN111383016A (en) Electronic invoice data processing method, device and system based on private chain
Daraghmi et al. A blockchain-based editorial management system
CN114022285A (en) Cross-enterprise cloud computing resource metering method and system based on alliance block chain
He et al. Blockchain-based p2p content delivery with monetary incentivization and fairness guarantee
CN109985390B (en) Virtual asset management method and system
CN112995167A (en) Kafka mechanism-based power utilization information acquisition method, block chain network and user side
JP2002140534A (en) System and method for contents distribution with log management constitution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190329

RJ01 Rejection of invention patent application after publication