CN113206841A - AES decryption agent method and system based on HLS protocol - Google Patents
AES decryption agent method and system based on HLS protocol Download PDFInfo
- Publication number
- CN113206841A CN113206841A CN202110457239.1A CN202110457239A CN113206841A CN 113206841 A CN113206841 A CN 113206841A CN 202110457239 A CN202110457239 A CN 202110457239A CN 113206841 A CN113206841 A CN 113206841A
- Authority
- CN
- China
- Prior art keywords
- module
- file
- address
- decryption
- parameter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/25—Mapping addresses of the same type
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/65—Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Computer And Data Communications (AREA)
- Communication Control (AREA)
Abstract
The invention discloses an AES decryption agent method and system based on HLS protocol, wherein the system comprises an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module, and the presetting module is used for converting the access address of an actual m3u8 file into the address of the agent device; the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module; the analysis request module is used for analyzing the file type and extracting key parameters; the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file; and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
Description
Technical Field
The invention belongs to the technical field of video decryption, and particularly relates to an AES decryption agent system based on an HLS protocol.
Background
The HLS protocol (HTTP Live Streaming, adaptive bitrate Streaming based on HTTP) usually takes m3u8 as an encapsulation format, m3u8 is only a descriptive file, the true file Stream is a TS (Transport Stream ) file declared inside the file (TS is also a commonly used video encapsulation format, Encryption is performed on the file, TS is only an encapsulation format, and other formats such as mp4), AES (Advanced Encryption Standard ) is a more common symmetric Encryption algorithm, and if the current m3u8 file is encrypted by AES, key information needs to be declared in m3u8 according to the protocol specification, and the file can be played at the playing end.
Generally, a scene that a key is directly written into an m3u8 file cannot exist, the key belongs to private information and is easy to leak when being placed into the file, a common method is to declare an interface address for obtaining the key in the m3u8 file, the key can be obtained for playing after various authority authentications are carried out through a playing end, the authority authentications are generally placed at a client, namely the video is published outwards, the file cannot be directly played in an auditing operation process before the video is published by a server, even if the server can obtain the key information of the video from other channels, the current general method is to download the file to the local and carry out decryption playing according to a known key, the playing flow can be lengthened, the playing complexity is increased, and the method is not suitable for scenes of video auditing and real-time playing.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an AES decryption agent method and system based on an HLS protocol, which can decrypt and play an m3u8 file encrypted by AES in real time under the condition that an AES key is known, even if the key cannot be obtained through a key information interface stated in the m3u8 file or the key information is not stated.
In order to solve the technical problems, the invention adopts the following technical scheme:
one aspect of the embodiments of the present invention provides an AES decryption agent method based on an HLS protocol, which is applied to an agent system including an external device and an agent device, wherein the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the method includes the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the request according to the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
Preferably, the converting, by the preset value module, the access address of the actual m3u8 file into the address of the proxy device specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
Preferably, the client module includes a program that requests the m3u8 file.
Preferably, the client module includes an application that requests the m3u8 file.
Preferably, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
Preferably, the analyzing request module analyzes the file type, and the extracting the key parameter specifically includes: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
Preferably, the analyzing request module analyzes the file type, and the extracting the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
Preferably, the converting module converts the content of the m3u8 file, and the changing the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
Preferably, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, including: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
Yet another aspect of the embodiments of the present invention provides an AES decrypting agent system based on HLS protocol, including an external device and an agent device, where the external device further includes a presetting module and a client module, the agent device further includes a parsing request module, a conversion module and a decrypting module,
the preset value module is used for converting the access address of the actual m3u8 file into the address of the proxy device;
the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module;
the analysis request module is used for analyzing the file type and extracting key parameters;
the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file;
and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
The invention has the following beneficial effects:
(1) under the condition of a known key, the random encrypted HLS video stream and the random encrypted live stream can be played without a professional decryption client;
(2) under the scene of needing strict control of content quality and yellow discrimination and violence discrimination, the method can be used for carrying out real-time analysis on the encrypted video stream and the encrypted live stream.
Drawings
Fig. 1 is a schematic structural diagram of an AES decryption agent system based on an HLS protocol according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention discloses an AES decryption agent system based on an HLS protocol, including an external device and an agent device, where the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the preset module is used to convert an access address of an actual m3u8 file into an address of the agent device; the client module is used for requesting according to the address generated by the preset module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module; the analysis request module is used for analyzing the file type and extracting key parameters; the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file; and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
In a specific application example, the step of converting the access address of the actual m3u8 file into the address of the proxy device by the preset value module specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
In the embodiment of the present invention, the first parameter and the second parameter are only illustrated by the example, and the names of the parameters are not limited.
The access address of the actual m3u8 file is converted into the address of the proxy device through the default value module, the client directs the request to the proxy service when playing, and the actual m3u8 file address and the key information are used as parameters to be transmitted.
In the specific application example, the client module refers to a program or application which requests m3u8 file, for example, if m3u8 is to be played, the client module refers to a player; if m3u8 is to be downloaded, the client module is usually a downloading program, and the embodiment of the present invention does not limit the type of the client module, and can be used as the client module as long as there is a need to request the m3u8 file.
In a specific application example, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
The analysis request module analyzes the file type, and the extracting of the key parameters specifically comprises: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
The analysis request module analyzes the file type, and the extracting of the key parameters specifically comprises: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
In a specific application example, the converting module converts the content of the m3u8 file, and the changing of the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
Examples are illustrated below:
http: // Source File Address/encrypted File name. m3u8 is as follows:
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:10
#EXTINF:10.000,
1.ts
#EXTINF:10.000.
2.ts
#EXTINF:10.000.
3.ts
#EXT-X-ENDLIST
the converted content is then as follows:
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:10
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/1. ts & parameter 2. xxx
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/2. ts & parameter 2 ═ xxx
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/3. ts & parameter 2. xxx
#EXT-X-ENDLIST
In a specific application example, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, and includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time. Since AES decryption belongs to a general algorithm, it is not described herein.
Corresponding to the embodiment of the system of the present invention, the present invention provides an AES decryption agent method based on HLS protocol, which is applied to an agent system including an external device and an agent device as shown in fig. 1, wherein the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the method includes the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the request according to the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
In a specific application example, the step of converting the access address of the actual m3u8 file into the address of the proxy device by the preset value module specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
In the specific application example, the client module refers to a program or application which requests m3u8 file, for example, if m3u8 is to be played, the client module refers to a player; if m3u8 is to be downloaded, the client module is usually a downloading program, and the embodiment of the present invention does not limit the type of the client module, and can be used as the client module as long as there is a need to request the m3u8 file.
In a specific application example, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
In a specific application example, the analyzing request module analyzes the file type, and the extracting of the key parameter specifically includes: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
In a specific application example, the analyzing request module analyzes the file type, and the extracting of the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
In a specific application example, the converting module converts the content of the m3u8 file, and the changing of the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
In a specific application example, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, and includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
For the technical content of the remaining implementation details in the method embodiment, reference is made to the description of the system embodiment, and details are not repeated again.
It is to be understood that the exemplary embodiments described herein are illustrative and not restrictive. Although one or more embodiments of the present invention have been described with reference to the accompanying drawings, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.
Claims (10)
1. An AES decryption agent method based on HLS protocol is characterized in that the AES decryption agent method is applied to an agent system comprising an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module, and the method comprises the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the request according to the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
2. The AES decryption agent method based on HLS protocol as claimed in claim 1, wherein the step of converting the access address of the actual m3u8 file to the address of the agent device by the preset value module specifically includes:
if the m3u8 address is: http:// source file address/encrypted file name.m 3u 8;
the translated address is: http:// proxy device address? First parameter http:// source file address/encrypted file name m3u8& second parameter xxx
Where the first parameter is the m3u8 address and the second parameter is the known AES key.
3. AES decryption agent method based on HLS protocol as claimed in claim 1, characterised in that the client module comprises a program requesting the m3u8 file.
4. AES decryption agent method based on HLS protocol as claimed in claim 1, characterised in that the client module comprises an application requesting the m3u8 file.
5. The AES decryption agent method based on the HLS protocol as claimed in claim 1, wherein the processing performed by the client module according to the received response contents of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
6. The AES decryption agent method based on HLS protocol as claimed in claim 2, wherein the parsing request module analyzes the file type, and extracting the key parameter specifically includes: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
7. The AES decryption agent method based on HLS protocol as claimed in claim 2, wherein the parsing request module analyzes the file type, and extracting the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
8. The AES decryption agent method based on HLS protocol as claimed in claim 1, wherein the conversion module converts the m3u8 file content, and changing the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
9. The AES decryption agent method based on HLS protocol as claimed in claim 1, wherein the decryption module decrypting the TS file according to the AES general algorithm based on the key specifically includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
10. An AES decryption agent system based on HLS protocol is characterized in that the AES decryption agent system comprises an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module,
the preset value module is used for converting the access address of the actual m3u8 file into the address of the proxy device;
the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module;
the analysis request module is used for analyzing the file type and extracting key parameters;
the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file;
and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110457239.1A CN113206841B (en) | 2021-04-26 | 2021-04-26 | AES decryption agent method and system based on HLS protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110457239.1A CN113206841B (en) | 2021-04-26 | 2021-04-26 | AES decryption agent method and system based on HLS protocol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113206841A true CN113206841A (en) | 2021-08-03 |
CN113206841B CN113206841B (en) | 2022-08-23 |
Family
ID=77028786
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110457239.1A Active CN113206841B (en) | 2021-04-26 | 2021-04-26 | AES decryption agent method and system based on HLS protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113206841B (en) |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1658552A (en) * | 2004-02-17 | 2005-08-24 | 华为技术有限公司 | Method for safety transfering medium flow |
US20090003600A1 (en) * | 2007-06-29 | 2009-01-01 | Widevine Technologies, Inc. | Progressive download or streaming of digital media securely through a localized container and communication protocol proxy |
US20090133103A1 (en) * | 2007-10-29 | 2009-05-21 | Infosys Technologies Ltd. | Method and system for data security in an IMS network |
US20140122874A1 (en) * | 2012-10-29 | 2014-05-01 | Tektronix, Inc. | Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System |
US20140281481A1 (en) * | 2013-03-15 | 2014-09-18 | General Instrument Corporation | Dlna/dtcp stream conversion for secure media playback |
JP2015032039A (en) * | 2013-07-31 | 2015-02-16 | 株式会社東芝 | Display device and display method |
CN105939491A (en) * | 2016-05-25 | 2016-09-14 | 乐视控股(北京)有限公司 | Video playing method and device |
CN106302465A (en) * | 2016-08-17 | 2017-01-04 | 无锡天脉聚源传媒科技有限公司 | A kind of method and device of playing audio-video data |
CN106550242A (en) * | 2016-12-08 | 2017-03-29 | 北京数码视讯科技股份有限公司 | The conversion method and device of IP real-time media streams |
CN106657162A (en) * | 2017-03-01 | 2017-05-10 | 北京东大正保科技有限公司 | Online stream media playing method and stream media downloading and offline playing method |
CN107294927A (en) * | 2016-04-05 | 2017-10-24 | 北京优朋普乐科技有限公司 | Anti-stealing link method, device and system based on the network terminal |
CN108494792A (en) * | 2018-04-09 | 2018-09-04 | 四川百视通科技有限公司 | A kind of flash player plays the converting system and its working method of hls video flowings |
CN109995743A (en) * | 2018-01-02 | 2019-07-09 | 腾讯科技(深圳)有限公司 | A kind of processing method and terminal of multimedia file |
CN110139131A (en) * | 2018-02-09 | 2019-08-16 | 网宿科技股份有限公司 | A kind of method and terminal of playing video file |
US20200067700A1 (en) * | 2017-08-25 | 2020-02-27 | Keysight Technologies Singapore (Holdings) Pte. Ltd. | Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques |
CN111049832A (en) * | 2019-12-13 | 2020-04-21 | 北京浪潮数据技术有限公司 | Reverse proxy method and related device |
-
2021
- 2021-04-26 CN CN202110457239.1A patent/CN113206841B/en active Active
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1658552A (en) * | 2004-02-17 | 2005-08-24 | 华为技术有限公司 | Method for safety transfering medium flow |
US20090003600A1 (en) * | 2007-06-29 | 2009-01-01 | Widevine Technologies, Inc. | Progressive download or streaming of digital media securely through a localized container and communication protocol proxy |
US20090133103A1 (en) * | 2007-10-29 | 2009-05-21 | Infosys Technologies Ltd. | Method and system for data security in an IMS network |
US20140122874A1 (en) * | 2012-10-29 | 2014-05-01 | Tektronix, Inc. | Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System |
US20140281481A1 (en) * | 2013-03-15 | 2014-09-18 | General Instrument Corporation | Dlna/dtcp stream conversion for secure media playback |
JP2015032039A (en) * | 2013-07-31 | 2015-02-16 | 株式会社東芝 | Display device and display method |
CN107294927A (en) * | 2016-04-05 | 2017-10-24 | 北京优朋普乐科技有限公司 | Anti-stealing link method, device and system based on the network terminal |
CN105939491A (en) * | 2016-05-25 | 2016-09-14 | 乐视控股(北京)有限公司 | Video playing method and device |
CN106302465A (en) * | 2016-08-17 | 2017-01-04 | 无锡天脉聚源传媒科技有限公司 | A kind of method and device of playing audio-video data |
CN106550242A (en) * | 2016-12-08 | 2017-03-29 | 北京数码视讯科技股份有限公司 | The conversion method and device of IP real-time media streams |
CN106657162A (en) * | 2017-03-01 | 2017-05-10 | 北京东大正保科技有限公司 | Online stream media playing method and stream media downloading and offline playing method |
US20200067700A1 (en) * | 2017-08-25 | 2020-02-27 | Keysight Technologies Singapore (Holdings) Pte. Ltd. | Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques |
CN109995743A (en) * | 2018-01-02 | 2019-07-09 | 腾讯科技(深圳)有限公司 | A kind of processing method and terminal of multimedia file |
CN110139131A (en) * | 2018-02-09 | 2019-08-16 | 网宿科技股份有限公司 | A kind of method and terminal of playing video file |
CN108494792A (en) * | 2018-04-09 | 2018-09-04 | 四川百视通科技有限公司 | A kind of flash player plays the converting system and its working method of hls video flowings |
CN111049832A (en) * | 2019-12-13 | 2020-04-21 | 北京浪潮数据技术有限公司 | Reverse proxy method and related device |
Non-Patent Citations (1)
Title |
---|
耿立宏等: "基于代理技术的HLS客户端设计与实现", 《微电子学与计算机》 * |
Also Published As
Publication number | Publication date |
---|---|
CN113206841B (en) | 2022-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101428875B1 (en) | System and method for processing security based on http live streaming | |
EP2700238B1 (en) | Ethernet decoder device and method to access protected content | |
CN107707504B (en) | Streaming media playing method and system, server and client | |
KR101759039B1 (en) | Dtcp converter for hls | |
US7447313B2 (en) | Pointers to encrypted data in RTP header | |
US20040199771A1 (en) | Method for tracing a security breach in highly distributed content | |
US20130144714A1 (en) | Method, Apparatus and System for Supporting Advertisement Contents in HTTP Streaming Play Mode | |
WO2021120831A1 (en) | Streaming media data encryption method and apparatus, streaming media data decryption method and apparatus, electronic device and storage medium | |
US20080063195A1 (en) | Method and system for encrypting or decrypting wmv streaming media | |
CN108881205A (en) | A kind of safety broadcasting system and playback method of HLS Streaming Media | |
US20190246148A1 (en) | Method and system for scrambling broadcast with low latency | |
CN107124385B (en) | Mirror flow-based SSL/TLS protocol plaintext data acquisition method | |
JP2015154238A5 (en) | ||
CN113206841B (en) | AES decryption agent method and system based on HLS protocol | |
CN110719247A (en) | Terminal network access method and device | |
CN106790132A (en) | Based on RTMP without plug-in unit preview video method | |
CN112752122B (en) | Video encryption transmission method of intelligent camera and computer readable storage medium | |
US11039181B1 (en) | Method and apparatus for secure video manifest/playlist generation and playback | |
CN114189706B (en) | Media playing method, system, device, computer equipment and storage medium | |
CN115567503B (en) | HTTPS protocol analysis method based on flow analysis | |
CN114302158A (en) | Video live broadcast method and device, computer equipment and storage medium | |
CN117750083A (en) | Safe and controllable video encryption and decryption device and method | |
CN115643459A (en) | Video processing method, system, storage medium and electronic equipment | |
Wang et al. | IPTV Video Hardware Encryption Transmission System Analysis | |
CN116567278A (en) | H5 reduced delay live broadcast method requiring verification permission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |