CN109547818A - A kind of video content decentralization secure distribution method - Google Patents
A kind of video content decentralization secure distribution method Download PDFInfo
- Publication number
- CN109547818A CN109547818A CN201811511132.5A CN201811511132A CN109547818A CN 109547818 A CN109547818 A CN 109547818A CN 201811511132 A CN201811511132 A CN 201811511132A CN 109547818 A CN109547818 A CN 109547818A
- Authority
- CN
- China
- Prior art keywords
- video content
- video
- decentralization
- key
- server software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
- H04N21/4405—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
Abstract
The present invention is suitable for multimedia technology improvement areas, a kind of video content decentralization secure distribution method is provided, the video content decentralization secure distribution method is the following steps are included: video is generated two different double-strands using the technology decentralization of block chain by S1, video content provider;The video for generating different double-strands is carried out video content distribution by S2, video content provider in a peer-to-peer network.This method mitigates the pressure of server or cloud, improving performance;Without worrying resource distribution and assignment problem;Without configuring bigger bandwidth, the expenses such as bandwidth are saved;Content in order to prevent is divulged a secret, the method that the present invention uses secure distribution, guarantees that the user of only authorization could correctly decompress, to promote safety.
Description
Technical field
The invention belongs to multimedia technology improvement areas more particularly to a kind of video content decentralization secure distribution sides
Method.
Background technique
The content of conventional video stores on the server or on cloud, and user needs when obtaining content from server or Yun Jinhang
Downloading.There is some drawbacks for this scheme.1) when there are many number of users, the burden of server or cloud is very heavy, responds very slow;
2) server needs very high bandwidth, and no person is not able to satisfy the demand of a large number of users, this causes the cost of operator to get higher;3) institute
Bandwidth and various resource requirements is needed to be not easy to determine.If configuration one abundant resource, can be satisfied a large number of users it is online when
Needs.It, then can waste of resource but if online user is few.If it is less to configure resource, it is possible to when user becomes more, under performance
Drop is obvious;4) content is stored in server or cloud, once server account or cloud account are broken, then content will be revealed, and is used
Family information will also be revealed, this is very big security risk.
Summary of the invention
The purpose of the present invention is to provide a kind of video content decentralization secure distribution methods, it is intended to solve above-mentioned skill
Art problem.
The invention is realized in this way a kind of video content decentralization secure distribution method, during the video content is gone
Heart secure distribution method the following steps are included:
Video is generated two different double-strands using the technology decentralization of block chain by S1, video content provider;
The video for generating different double-strands is carried out video content distribution by S2, video content provider in a peer-to-peer network.
A further technical solution of the present invention is: the video content decentralization secure distribution method of stating includes following step
It is rapid:
S3, commercial value transfer will be completed in video content generation, storage and process of consumption in a network;
S4, verified unsymmetrical key method and block chain technology are carried out to video content add after completing business and shifting
It is close.
A further technical solution of the present invention is: Video Quality Metric is divided at password using block chain technology in the step S1
Send out chain and the two different chains of content distribution chain.
A further technical solution of the present invention is: video content provider uses P2P pairs in a network in the step S2
Video content is distributed under equal networks and C/S double mode.
A further technical solution of the present invention is: the two class node of network settings, respectively video content provider save
Point and user node, in video content provider's node side runtime server software program, at user node end, operation video is broadcast
Application program is put, the server software program is only that authorized user provides service, and the video playing application program is as taking
Device software program of being engaged in could be as server software PROGRAMMED REQUESTS to data after proving legal identity.
A further technical solution of the present invention is: the legal body of the server software program verification video playing application program
Part after issue decryption current video content key, institute's delivering key the following steps are included:
A1, video playing application program are issued to server software program subscribes to request, and the sending of video playing application program is transferred accounts;
A2, it is the recipient that transfers accounts by the public key setting of server software program, is worth quantity needed for reception payment services;
A3, subscription request is shown to be using ReqSubscribe in PswChainScript again, and signed using own private key
Name;
A4, confirmation, which are transferred accounts, is written to the subscription valence that rear server software program on PswChain receives video playing application program
Value;
The subscription of the pairs of video playing application program of A5, server software is marked;
A6, Psw_random is generated every T_key_cycle time server software program;
A7, it is distributed on key chain after being encrypted using the public key of video playing application journey to Psw_random;
A8, video content encrypt and issue video content using Psw_random.
A further technical solution of the present invention is: the server software program issues video content using ContChain,
The generation and distribution of user node in network synchronous ContChain, the ContChain the following steps are included:
B1, server software program receive key distribution chain;
B2, server software program read key distribution chain content and generate subscription data;
The new distributing passwords Psw_random of B3, server software Program Generating and more new key distribution chain;
The video data block that B4, server software program need to be distributed using Psw_random password encryption;
B5, server software program use the encrypted video data block of P2P net distribution;
B6, video playing application program synchronized update key distribution chain and ContChain are simultaneously consumed;
B7, server software program judge whether also in current period T_key_cycle, if so, continuing encrypted data chunk simultaneously
Distribution, and go to step B4;If otherwise going to step B1.
A further technical solution of the present invention is: the server software program is by video content, temporally tissue segmentation is
File block, each block are marked with timestamp.
A further technical solution of the present invention is: the video playing application program is not required to save whole ContChain's
Content need to only carry out saving or being saved according to specified file data cFileDataID after time cTime.
A further technical solution of the present invention is: the user node, which is acquisition value, to be block recorder by competition
Big transferring accounts for the precious record acquisition person of transferring accounts is carried out to block and takes VValue and reward VValue.
The beneficial effects of the present invention are: this method mitigates the pressure of server or cloud, improving performance;Without worrying that resource is matched
It sets and assignment problem;Without configuring bigger bandwidth, the expenses such as bandwidth are saved;Content in order to prevent is divulged a secret, and the present invention uses
The method of secure distribution guarantees that the user of only authorization could correctly decompress, to promote safety.
Detailed description of the invention
Fig. 1 is the ways of distribution schematic diagram of video content provided in an embodiment of the present invention;
Fig. 2 is the composite structural diagram of PswChain provided in an embodiment of the present invention.
Fig. 3 is key distribution procedure schematic diagram provided in an embodiment of the present invention.
Fig. 4 is the composite structural diagram of ContChain provided in an embodiment of the present invention.
Fig. 5 is generation and the distribution flow figure of ContChain provided in an embodiment of the present invention.
Fig. 6 is the flow chart of video content decentralization secure distribution method provided in an embodiment of the present invention.
Specific embodiment
Explanation of nouns
VideoContent: video content is embodied in binary file.
ContentProvider: video content provider.
ContentReceiver: the node in network, it is the storage person of video content, turns originator or consumer.
The server software program of the end ServerApp:ContentProvider operation.
The software program of the end ReceiverApp:ContentReceiver operation, for decrypted video content, is broadcast
It puts.
PswChain: key distribution chain.It is block one by one by key data tissue, these blocks are connected on one
It rises, forms key distribution chain.The working principle of key distribution chain is similar with bit coin block chain principle.But mentality of designing and make
With method difference.
VValue: certain value is represented.When ContentReceiver consumer video content, need to pay certain expense
With the expense is indicated with VValue.ContentReceiver directly can buy VValue from video content provider,
VValue can be taken by handling new block for PswChain to obtain transferring accounts for the person of transferring accounts.
PswChainScript:PswChain is used to realize scripting language defined in business.
ContChain: video content chain, for distributing the video content of ContentProvider offer.Video content quilt
It is divided into the file block temporally organized.File block uploads to content distribution P2P network after being encrypted.In network
ContentReceiver synchronizes ContChain.If necessary to consume the video content in ContChain,
ContentReceiver needs to request decruption key to ContentProvider, and pays certain VValue.
ChainRecorder: block recorder, the node on network can be that competition is known as block recorder.Record
Member is responsible for generating new block according to current network conditions.If node has been successfully generated block, the reward of the block and
Transfer charge in block transaction will be attributed to the node, increase its VValue.Block recorder can expend computing resource come into
Row record, motivates node to be recorded by the measure, guarantees that whole network operates normally.
As shown in Figure 1, video content decentralization secure distribution method provided by the invention, details are as follows:
Video is generated two different double-strands using the technology decentralization of block chain by step S1, video content provider.
The video for generating different double-strands is carried out video content point by step S2, video content provider in a peer-to-peer network
Hair.
Video content is generated in a network, completes commercial value transfer in storage and process of consumption by step S3.
Step S4 carries out verified unsymmetrical key method and block chain skill to video content after completing business and shifting
Art is encrypted.
By 1) using duplex structure.Password distribution and content distribution use different chains respectively;When two kinds of chain distributions all
Using P2P peer-to-peer network, division center is removed;2) content distribution is carried out using P2P, C/S double mode.Two class section of network settings
Point, one kind are video content provider's node, and one kind is user node.The communication mode of two class nodes is identical, but role is different;
User node can obtain video content by P2P network, can also be by C/S mode directly from video content provider's node
Request content;3) network provides a kind of value Transfer method, can generate in video content, store, completes quotient in process of consumption
Industry value Transfer;4) video content encryption uses verified unsymmetrical key method and block chain technology.
Video content provider (ContentProvider) is usually the company for runing video traffic, is video content
Creator, owner.Node (ContentReceiver) is the storage person of video content, turns originator or consumer.
ContentReceiver directly can request video counts from ContentProvider by server/customer end (C/S) mode
According to (VideoContent), can also be requested by point-to-point (P2P) mode from other ContentReceiver
VideoContent.That is, ContentProvider carries out the distribution of video content by C/S and P2P two ways,
This is different from conventional solution, is a characteristic of the invention.
The end ContentProvider runtime server software program (ServerApp).The operation of the end ContentReceiver
Video playing application program (ReceiverApp).ServerApp only provides service for authorized user.ReceiverApp must be first
The legal identity of oneself is proved to ServerApp, then could correctly be requested from ServerApp to data.ServerApp verifying
The key of decryption current video content can be distributed after the legal identity of ReceiverApp to ReceiverApp.
ServerApp can at regular intervals be distributed to video password the ReceiverApp of authorization.The interval time is
The distribution period of password, length T_key_cycle.Within a T_key_cycle period, ServerApp keeps encryption close
Code is constant.Therefore, a password only need to be only distributed in a cycle T_key_cycle.It is arrived in next T_key_cycle
When, then distribute next time.Dispensed amount can be reduced in this way, reduces communication load, mitigate ServerApp's and ReceiverApp
Handle load.
ServerApp has been used key distribution chain (PswChain) in distribution, and key distribution chain PswChain is block
Method of Data Organization.
The meaning of PswChain each section is as follows:
KHash is the cryptographic Hash of current block.
KVersion is the version number of currently used agreement.
KTime is the timestamp of current data block.
KPreHash is the cryptographic Hash of previous block.
KPswSize is that the block includes the number that ServerApp is sent to ReceiverApp password.
The PubKey of kPsw is the public key of ReceiverApp recipient, and the ReceiverApp for only possessing the public key just may be used
To decrypt password.
The EncryptedKey of kPsw is the encrypted password of ServerApp, and only recipient could decrypt.
The ServerAppSignHash of kPsw is the signature of ServerApp, is guaranteed correctly and effective.
KTranSize is the quantity that current VValue transfers accounts.
The SendPubKey of kTran is the sending people to transfer accounts.
The RcvPubKey of kTran is the recipient that transfers accounts.
The TranAmount of kTran is VValue quantity of transferring accounts.
The TranFee of kTran is transfer charge, will be obtained by packing person.
The kPswChainScript of kTran wants execution script for the people that transfers accounts.
The SendSignHash of kTran is the signature transferred accounts and issue people.
KPackPubKey is the packer of block, and the expense of transferring accounts of the block will be by its acquisition.
KPackTotalFee is to be packaged resulting total VValue quantity.
Use rivest, shamir, adelman.ContentProvider and ContentReceiver all have oneself public key and
Private key.Public key is disclosed to all nodes, and public key also represents account account.Private key oneself is grasped, and can not be revealed, if leakage
Itself account is with regard to out of hand.
The video content that the ContentReceiver of video wants consumer video content provider to provide needs to pay certain
Value (VValue).ContentReceiver directly can buy VValue from video content provider, can also be by competing
Strive referred to as block recorder (ChainRecorder) to block carry out be packaged record obtain transferring accounts for the person of transferring accounts take VValue and prize
Encourage VValue.Node on network can be that competition is known as block recorder.Recorder is responsible for raw according to current network conditions
The block of Cheng Xin.If node has been successfully generated block, the transfer charge in the reward of the block and block transaction will
It is attributed to the node, increases its VValue.Block recorder can expend computing resource to record, and section is motivated by the measure
Point is recorded, and guarantees that whole network operates normally.
For consumer video content, ReceiverApp, which needs to issue to ServerApp, subscribes to request.In request,
ReceiverApp can be issued and be transferred accounts.It 1) is the recipient that transfers accounts by the public key setting of ServerApp, needed for payment services
VValue quantity;2) it is shown to be subscription request using ReqSubscribe in PswChainScript again, and uses the private of oneself
Key is signed;3) when transfer accounts be written on key distribution chain PswChain after, transfer accounts and be identified, ServerApp will receive
The subscription VValue of ReceiverApp.ServerApp can and then be handled request is subscribed to, and mark ordering for ReceiverApp
It reads.
After the T_key_cycle time, ServerApp generates random cipher Psw_random.For each subscription
ReceiverApp, Psw_random is encrypted using the public key of the ReceiverApp, is then distributed on key chain
Face.Then video content is encrypted using Psw_random, and content distribution is gone out.
Key distribution procedure is as shown in Figure 3.ReceiverApp is received and synchronous PswChain, reception by P2P at any time
The cipher key content of ServerApp distribution.The password EncryptedKey being encrypted of oneself is obtained by PswChain, then
It is decoded with the private key of oneself, recovers password Psw_random.Later, Psw_random can be used in ReceiverApp
The video content received is decoded, and carries out video consumer.
ServerApp distributes video content using another chain (content chain ContChain).Video content is divided into
The file block temporally organized.File block uploads to content distribution P2P network after being encrypted.In network
ContentReceiver synchronizes ContChain.If necessary to consume the video content in ContChain,
ContentReceiver needs to request decruption key to ContentProvider, and pays certain VValue.
The content-encrypt chain ContChain structure of ServerApp is as shown in Figure 4.The structure of ContChain is simpler.
ReceiverApp does not have to the content for all saving ContChain.It need to only be saved after the time cTime of needs or root
It is saved later according to specified file data cFileDataID.
The content that ContChain specifically includes is as follows:
CHash is the cryptographic Hash of current video content block.
CPreHash is the cryptographic Hash of previous area's content block.
CVersion is the version number that Current Content block uses agreement.
CTime is the timestamp of Current Content block.
CFileDataID is the ID number of video content, and required content can be found according to this number.
CEncryptedData is specific encrypted video content.Corresponding password must be used to be decrypted and could restore
Video original data.
The generation of ContChain does not need to dig mine, and all blocks are entirely to be generated by ServerApp.ReceiverApp
It can receive video content block, but block cannot be created.Therefore, PswChain needs Miner to generate block, and
ContChain is not needed.ContChain is a kind of block chain of center distribution.
The generation and distribution flow of ContChain, as shown in figure 5, being described in detail below:
1) ServerApp receives PswChain;
2) ServerApp reads PswChain content, generates and subscribes to data;
3) ServerApp generates new distributing passwords Psw_random, updates PswChain chain;
4) ServerApp needs the video data block distributed using Psw_random password encryption;
5) ServerApp uses the encrypted data block of P2P net distribution;
6) the synchronous PswChain and ContChain of ReceiverApp, and consumed;
7) ServerApp judges whether also in current period T_key_cycle, if then continuing encrypted data chunk and distributing, turns
To 4);Otherwise it goes to 1).
The company of an offer net cast content service is provided, is named as ABXY company, it is video content provider
(ContentProvider).
Node (ContentReceiver) is the video user of the said firm, these users are the storage persons of video content, turn
Originator or consumer.ContentReceiver directly requests decruption key from ContentProvider with C/S model.With point pair
Point (P2P) mode requests VideoContent from other ContentReceiver.That is, ContentProvider passes through
C/S and P2P two ways carries out the distribution of video content, this is different from conventional solution, is a characteristic of the invention.This
The distribution method Integral Thought of invention is shown in Fig. 1.
ABXY company end runtime server software program (ServerApp).The end node ContentReceiver runs video
Play-back application (ReceiverApp).ServerApp only provides decruption key for authorized user.ReceiverApp must be first
The legal identity of oneself is proved to ServerApp, then could correctly be requested from ServerApp to data.ServerApp verifying
Decruption key can be distributed to ReceiverApp after the legal identity of ReceiverApp.
ServerApp can at regular intervals be distributed to video password the ReceiverApp of authorization.The interval time is
The distribution period of password, length are set as T_key_cycle=5 second.In 5 seconds, ServerApp keeps Crypted password constant.5 seconds
The Modify password of ServerApp meeting later, and use new password encryption video content.The ReceiverApp of node has to weight
Video content after this could be decrypted by newly obtaining new password.
ContentProvider and ContentReceiver has the public key and private key of oneself.Public key is disclosed to all
Node, public key also represent account account.Private key oneself is grasped, and can not be revealed, out of hand once itself account if leakage.
ServerApp every 5 seconds by new cipher key distribution to key distribution chain (PswChain), key distribution chain
PswChain is the Method of Data Organization of block, and the meaning of each section is as follows:
KHash is the cryptographic Hash of current block.
KVersion is the version number of currently used agreement.The first edition is then set as 1.0.
KTime is the timestamp of current data block.Such as 1524190210, indicate on April 20th, 2018,10:10:10.
KPreHash is the cryptographic Hash of previous block.
KPswSize is that the block includes the number that ServerApp is sent to ReceiverApp password.ServerApp dimension
The list of one booking reader of shield, after each issuing time arrives, can send new password on PswChain.Corresponding section
Point ReceiverApp can synchronize PswChain, be taken out one's own key.
The PubKey of kPsw is the public key of ReceiverApp recipient, and the ReceiverApp for only possessing the public key just may be used
To decrypt password.
The EncryptedKey of kPsw is the encrypted password of ServerApp, and only recipient could decrypt.Recipient makes
Key can be unlocked with the private key of oneself.
The ServerAppSignHash of kPsw is the signature of ServerApp, is guaranteed correctly and effective.
KTranSize is the quantity that current VValue transfers accounts.PswChain supports value Transfer, between node, node and
Transfer operation can be carried out between company.When node subscribes to the cipher key service of ServerApp, need to pay certain VValue
Quantity, such as 1.02.
The SendPubKey of kTran is the sending people to transfer accounts.
The RcvPubKey of kTran is the recipient that transfers accounts.
The TranAmount of kTran is transfer accounts VValue quantity, such as 3.9.
The TranFee of kTran is transfer charge, will be obtained by ChainRecorder.
The kPswChainScript of kTran wants execution script for the people that transfers accounts.
The SendSignHash of kTran is the signature transferred accounts and issue people.
KPackPubKey is the public key of ChainRecorder, it will obtain corresponding reward and expense.
KPackTotalFee is the resulting total VValue quantity of ChainRecorder.
The video content that the ContentReceiver of video wants consumer video content provider to provide needs to pay certain
Value (VValue).ContentReceiver directly can buy VValue from video content provider.
ContentReceiver can sell VValue or the forms such as supplement with money by a card and be sold in the official website of oneself.
In order to obtain VValue, ContentReceiver can also be known as block recorder by competition
(ChainRecorder) transferring accounts for the packing record acquisition person of transferring accounts is carried out to block and takes VValue and reward VValue.On network
Node can be competition be known as block recorder.Recorder is responsible for generating new block according to current network conditions.If
Node has been successfully generated block, then the reward of the block and block transaction in transfer charge will be attributed to the node, increase
Its VValue.Block recorder can expend computing resource to record, and motivate node to be recorded by the measure, guarantee
Whole network operates normally.
In order to obtain the password of consumer video content, ReceiverApp, which needs to issue to ServerApp, subscribes to request.
ReceiverApp can only be sent to encrypted password the user of successful subscription.In request, ReceiverApp needs
Sending is transferred accounts a certain number of VValue.It 1) is the recipient that transfers accounts by the public key setting of ServerApp, needed for payment services
VValue quantity, such as 1.02;2) it is shown to be subscription request using ReqSubscribe in PswChainScript again, and used
The private key of oneself is signed;3) when transfer accounts be written on key distribution chain PswChain after, transfer accounts and be identified,
ServerApp will receive the subscription VValue of ReceiverApp.ServerApp can and then be handled request is subscribed to, and be marked
The subscription of ReceiverApp.
After 5 second time, ServerApp generates new random cipher Psw_random, such as
"ju9dk3kcij389ck".For the ReceiverApp that each is subscribed to, using the public key of the ReceiverApp to Psw_
Random is encrypted, and is then distributed to above key chain.Then video content is encrypted using Psw_random, and handle
Content distribution is gone out.
ReceiverApp is received and synchronous PswChain, the cipher key content of reception ServerApp distribution by P2P at any time.
The password EncryptedKey being encrypted that oneself is obtained by PswChain, is then decoded with the private key of oneself, extensive
Appear again password Psw_random, such as " ju9dk3kcij389ck ".Later, ReceiverApp can be used Psw_random pairs
The video content received is decoded, and carries out video consumer.
ServerApp distributes video content using content chain ContChain.Video content, which is divided into, temporally to be organized
File block, every spacer block all uses timestamp label, such as: 1526190210.File block uploads to content point after being encrypted
Send out P2P network.The synchronous ContChain of ContentReceiver in network.If necessary to consume the video in ContChain
Content, ContentReceiver needs to request decruption key to ContentProvider, and pays certain VValue.
ReceiverApp does not have to the content for all saving ContChain.It need to only be carried out after the time cTime of needs
It saves, or is saved later according to specified file data cFileDataID.
The content that ContChain specifically includes is as follows:
CHash is the cryptographic Hash of current video content block.
CPreHash is the cryptographic Hash of previous area's content block.
CVersion is the version number that Current Content block uses agreement, and initial version number is 1.0.
CTime is the timestamp of Current Content block, such as 1526190210.
CFileDataID is the ID number of video content, and required content can be found according to this number.
CEncryptedData is specific encrypted video content.Corresponding password must be used to be decrypted and could restore
Video original data.
The generation of ContChain does not need ChainRecorder, and all blocks are entirely to be generated by ServerApp.
ReceiverApp can receive video content block, but cannot create block.ContChain is a kind of the privately owned of center distribution
Block chain.
The generation of ContChain and distribution flow are as follows:
1) ServerApp receives PswChain;
2) ServerApp reads PswChain content, generates and subscribes to data;
3) ServerApp generates new distributing passwords Psw_random, updates PswChain chain;
4) ServerApp needs the video data block distributed using Psw_random password encryption;
5) ServerApp uses the encrypted data block of P2P net distribution;
6) the synchronous PswChain and ContChain of ReceiverApp, and consumed;
7) ServerApp judges whether also in current period T_key_cycle, if then continuing encrypted data chunk and distributing, turns
To 4);Otherwise it goes to 1).
Mitigate the pressure of server or cloud, improving performance;Without worrying resource distribution and assignment problem;It is bigger without configuring
Bandwidth, save the expenses such as bandwidth;Content in order to prevent is divulged a secret, and the method that the present invention uses secure distribution, guarantee is only awarded
The user of power could correctly decompress, to promote safety.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of video content decentralization secure distribution method, which is characterized in that the video content decentralization secrecy point
Forwarding method the following steps are included:
Video is generated two different double-strands using the technology decentralization of block chain by S1, video content provider;
The video for generating different double-strands is carried out video content distribution by S2, video content provider in a peer-to-peer network.
2. video content decentralization secure distribution method according to claim 1, which is characterized in that described to state in video
Hold decentralization secure distribution method the following steps are included:
S3, commercial value transfer will be completed in video content generation, storage and process of consumption in a network;
S4, verified unsymmetrical key method and block chain technology are carried out to video content add after completing business and shifting
It is close.
3. video content decentralization secure distribution method according to claim 2, which is characterized in that in the step S1
Using block chain technology by Video Quality Metric at password distribution chain and the two different chains of content distribution chain.
4. video content decentralization secure distribution method according to claim 3, which is characterized in that in the step S2
Video content provider uses in a network is distributed video content under P2P peer-to-peer network and C/S double mode.
5. video content decentralization secure distribution method according to claim 4, which is characterized in that the network settings
Two class nodes, respectively video content provider's node and user node, in video content provider's node side runtime server
Software program runs video playing application program at user node end, and the server software program is only authorized user's offer
Service, the video playing application program could be as server software programs after as server software program certification legal identity
Request data.
6. video content decentralization secure distribution method according to claim 5, which is characterized in that the server is soft
The key of decryption current video content is issued after part program verification video playing application program legal identity, institute's delivering key includes
Following steps:
A1, video playing application program are issued to server software program subscribes to request, and the sending of video playing application program is transferred accounts;
A2, it is the recipient that transfers accounts by the public key setting of server software program, is worth quantity needed for reception payment services;
A3, subscription request is shown to be using ReqSubscribe in PswChainScript again, and signed using own private key
Name;
A4, confirmation, which are transferred accounts, is written to the subscription valence that rear server software program on PswChain receives video playing application program
Value;
The subscription of the pairs of video playing application program of A5, server software is marked;
A6, Psw_random is generated every T_key_cycle time server software program;
A7, it is distributed on key chain after being encrypted using the public key of video playing application journey to Psw_random;
A8, video content encrypt and issue video content using Psw_random.
7. video content decentralization secure distribution method according to claim 6, which is characterized in that the server is soft
Part program issues video content using ContChain, the synchronous ContChain of the user node in network, the ContChain's
Generate and distribution the following steps are included:
B1, server software program receive key distribution chain;
B2, server software program read key distribution chain content and generate subscription data;
The new distributing passwords Psw_random of B3, server software Program Generating and more new key distribution chain;
The video data block that B4, server software program need to be distributed using Psw_random password encryption;
B5, server software program use the encrypted video data block of P2P net distribution;
B6, video playing application program synchronized update key distribution chain and ContChain are simultaneously consumed;
B7, server software program judge whether also in current period T_key_cycle, if so, continuing encrypted data chunk simultaneously
Distribution, and go to step B4;If otherwise going to step B1.
8. video content decentralization secure distribution method according to claim 7, which is characterized in that the server is soft
By video content, temporally tissue segmentation is file block to part program, and each block is marked with timestamp.
9. video content decentralization secure distribution method according to claim 7, which is characterized in that the video playing
The content that application program is not required to save whole ContChain need to only carry out saving or according to specified file after time cTime
Data cFileDataID is saved.
10. video content decentralization secure distribution method according to claim 7, which is characterized in that user's section
Point is that acquisition value can be that block recorder takes VValue to big treasured record the transferring accounts for the person of transferring accounts of acquisition of block progress by competing
With reward VValue.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811511132.5A CN109547818A (en) | 2018-12-11 | 2018-12-11 | A kind of video content decentralization secure distribution method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811511132.5A CN109547818A (en) | 2018-12-11 | 2018-12-11 | A kind of video content decentralization secure distribution method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109547818A true CN109547818A (en) | 2019-03-29 |
Family
ID=65854583
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811511132.5A Pending CN109547818A (en) | 2018-12-11 | 2018-12-11 | A kind of video content decentralization secure distribution method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109547818A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111538780A (en) * | 2020-04-01 | 2020-08-14 | 深圳创客区块链技术有限公司 | Method, device and storage medium for converting block chain single strand into primary and secondary double strands |
US10771243B1 (en) | 2020-04-29 | 2020-09-08 | Ecosteer Srl | Multicast encryption scheme for data-ownership platform |
CN112235543A (en) * | 2020-10-14 | 2021-01-15 | 重庆紫光华山智安科技有限公司 | Video encryption method and system based on block chain |
WO2022121673A1 (en) * | 2020-12-09 | 2022-06-16 | International Business Machines Corporation | Decentralized broadcast encryption and key generation facility |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101800731A (en) * | 2009-02-06 | 2010-08-11 | 株式会社日立制作所 | Network transmission management server, network transmission management method and network transmission system |
KR101727525B1 (en) * | 2016-09-05 | 2017-04-17 | 주식회사 스케일체인 | Block chain based distributed storage method and device thereof |
CN107018432A (en) * | 2017-03-28 | 2017-08-04 | 华为技术有限公司 | The Licensing Methods and equipment of media content |
CN108769751A (en) * | 2018-05-02 | 2018-11-06 | 中广热点云科技有限公司 | A kind of network video based on intelligent contract listens Management Support System |
CN108833944A (en) * | 2018-07-09 | 2018-11-16 | 中国联合网络通信集团有限公司 | Method of video distribution |
CN108964911A (en) * | 2018-09-18 | 2018-12-07 | 苏州米特希赛尔人工智能有限公司 | A kind of stream media service system based on block chain and quantum flow data block technology |
-
2018
- 2018-12-11 CN CN201811511132.5A patent/CN109547818A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101800731A (en) * | 2009-02-06 | 2010-08-11 | 株式会社日立制作所 | Network transmission management server, network transmission management method and network transmission system |
KR101727525B1 (en) * | 2016-09-05 | 2017-04-17 | 주식회사 스케일체인 | Block chain based distributed storage method and device thereof |
CN107018432A (en) * | 2017-03-28 | 2017-08-04 | 华为技术有限公司 | The Licensing Methods and equipment of media content |
CN108769751A (en) * | 2018-05-02 | 2018-11-06 | 中广热点云科技有限公司 | A kind of network video based on intelligent contract listens Management Support System |
CN108833944A (en) * | 2018-07-09 | 2018-11-16 | 中国联合网络通信集团有限公司 | Method of video distribution |
CN108964911A (en) * | 2018-09-18 | 2018-12-07 | 苏州米特希赛尔人工智能有限公司 | A kind of stream media service system based on block chain and quantum flow data block technology |
Non-Patent Citations (1)
Title |
---|
南湘浩: "《CPK密码体制与网际安全》", 31 December 2008 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111538780A (en) * | 2020-04-01 | 2020-08-14 | 深圳创客区块链技术有限公司 | Method, device and storage medium for converting block chain single strand into primary and secondary double strands |
CN111538780B (en) * | 2020-04-01 | 2023-01-13 | 深圳创客区块链技术有限公司 | Method and device for converting block chain single chain into primary and secondary double chains and storage medium |
US10771243B1 (en) | 2020-04-29 | 2020-09-08 | Ecosteer Srl | Multicast encryption scheme for data-ownership platform |
CN112235543A (en) * | 2020-10-14 | 2021-01-15 | 重庆紫光华山智安科技有限公司 | Video encryption method and system based on block chain |
CN112235543B (en) * | 2020-10-14 | 2023-02-17 | 重庆紫光华山智安科技有限公司 | Video encryption method and system based on block chain |
WO2022121673A1 (en) * | 2020-12-09 | 2022-06-16 | International Business Machines Corporation | Decentralized broadcast encryption and key generation facility |
GB2616804A (en) * | 2020-12-09 | 2023-09-20 | Ibm | Decentralized broadcast encryption and key generation facility |
US11876903B2 (en) | 2020-12-09 | 2024-01-16 | International Business Machines Corporation | Decentralized broadcast encryption and key generation facility |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109547818A (en) | A kind of video content decentralization secure distribution method | |
JP7281514B2 (en) | Blockchain-enforced methods for control and distribution of digital content | |
JP7436580B2 (en) | Computer-implemented systems and methods for time-release encryption on blockchain networks | |
CN111737724B (en) | Data processing method and device, intelligent equipment and storage medium | |
CN110309634B (en) | Credible advertisement data management system based on block chain | |
EP2774313B1 (en) | Electronic content distribution based on secret sharing | |
CN100512095C (en) | Content distribution system and content distribution method | |
CN109409122A (en) | File memory method and its electronic equipment, storage medium | |
CN110400136A (en) | Account management method, device, server and storage medium based on block chain | |
JP2023539814A (en) | Transferring Cryptocurrency from Remote Access Restricted Wallets | |
CN112434343A (en) | Virtual power plant safety scheduling and transaction method based on dual block chain technology | |
CN110601830B (en) | Key management method, device, equipment and storage medium based on block chain | |
CN108959523B (en) | Music playing method and player based on block chain technology | |
WO1998047091A1 (en) | Virtual property system | |
WO2015014245A1 (en) | Method and system for safely transmitting transaction sensitive data based on cloud pos | |
CN112953930A (en) | Cloud storage data processing method and device and computer system | |
CN111967860A (en) | Transaction system, method and node in transaction system | |
CN113824551B (en) | Quantum key distribution method applied to secure storage system | |
CN111383016A (en) | Electronic invoice data processing method, device and system based on private chain | |
Daraghmi et al. | A blockchain-based editorial management system | |
CN114022285A (en) | Cross-enterprise cloud computing resource metering method and system based on alliance block chain | |
He et al. | Blockchain-based p2p content delivery with monetary incentivization and fairness guarantee | |
CN109985390B (en) | Virtual asset management method and system | |
CN112995167A (en) | Kafka mechanism-based power utilization information acquisition method, block chain network and user side | |
JP2002140534A (en) | System and method for contents distribution with log management constitution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190329 |
|
RJ01 | Rejection of invention patent application after publication |