CN113206841A - AES decryption agent method and system based on HLS protocol - Google Patents

AES decryption agent method and system based on HLS protocol Download PDF

Info

Publication number
CN113206841A
CN113206841A CN202110457239.1A CN202110457239A CN113206841A CN 113206841 A CN113206841 A CN 113206841A CN 202110457239 A CN202110457239 A CN 202110457239A CN 113206841 A CN113206841 A CN 113206841A
Authority
CN
China
Prior art keywords
module
file
address
decryption
parameter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110457239.1A
Other languages
Chinese (zh)
Other versions
CN113206841B (en
Inventor
代存折
李妃军
翁成龙
宋录文
戴金晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Arcvideo Technology Co ltd
Original Assignee
Hangzhou Arcvideo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Arcvideo Technology Co ltd filed Critical Hangzhou Arcvideo Technology Co ltd
Priority to CN202110457239.1A priority Critical patent/CN113206841B/en
Publication of CN113206841A publication Critical patent/CN113206841A/en
Application granted granted Critical
Publication of CN113206841B publication Critical patent/CN113206841B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/65Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Computer And Data Communications (AREA)
  • Communication Control (AREA)

Abstract

The invention discloses an AES decryption agent method and system based on HLS protocol, wherein the system comprises an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module, and the presetting module is used for converting the access address of an actual m3u8 file into the address of the agent device; the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module; the analysis request module is used for analyzing the file type and extracting key parameters; the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file; and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.

Description

AES decryption agent method and system based on HLS protocol
Technical Field
The invention belongs to the technical field of video decryption, and particularly relates to an AES decryption agent system based on an HLS protocol.
Background
The HLS protocol (HTTP Live Streaming, adaptive bitrate Streaming based on HTTP) usually takes m3u8 as an encapsulation format, m3u8 is only a descriptive file, the true file Stream is a TS (Transport Stream ) file declared inside the file (TS is also a commonly used video encapsulation format, Encryption is performed on the file, TS is only an encapsulation format, and other formats such as mp4), AES (Advanced Encryption Standard ) is a more common symmetric Encryption algorithm, and if the current m3u8 file is encrypted by AES, key information needs to be declared in m3u8 according to the protocol specification, and the file can be played at the playing end.
Generally, a scene that a key is directly written into an m3u8 file cannot exist, the key belongs to private information and is easy to leak when being placed into the file, a common method is to declare an interface address for obtaining the key in the m3u8 file, the key can be obtained for playing after various authority authentications are carried out through a playing end, the authority authentications are generally placed at a client, namely the video is published outwards, the file cannot be directly played in an auditing operation process before the video is published by a server, even if the server can obtain the key information of the video from other channels, the current general method is to download the file to the local and carry out decryption playing according to a known key, the playing flow can be lengthened, the playing complexity is increased, and the method is not suitable for scenes of video auditing and real-time playing.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an AES decryption agent method and system based on an HLS protocol, which can decrypt and play an m3u8 file encrypted by AES in real time under the condition that an AES key is known, even if the key cannot be obtained through a key information interface stated in the m3u8 file or the key information is not stated.
In order to solve the technical problems, the invention adopts the following technical scheme:
one aspect of the embodiments of the present invention provides an AES decryption agent method based on an HLS protocol, which is applied to an agent system including an external device and an agent device, wherein the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the method includes the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the request according to the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
Preferably, the converting, by the preset value module, the access address of the actual m3u8 file into the address of the proxy device specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
Preferably, the client module includes a program that requests the m3u8 file.
Preferably, the client module includes an application that requests the m3u8 file.
Preferably, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
Preferably, the analyzing request module analyzes the file type, and the extracting the key parameter specifically includes: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
Preferably, the analyzing request module analyzes the file type, and the extracting the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
Preferably, the converting module converts the content of the m3u8 file, and the changing the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
Preferably, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, including: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
Yet another aspect of the embodiments of the present invention provides an AES decrypting agent system based on HLS protocol, including an external device and an agent device, where the external device further includes a presetting module and a client module, the agent device further includes a parsing request module, a conversion module and a decrypting module,
the preset value module is used for converting the access address of the actual m3u8 file into the address of the proxy device;
the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module;
the analysis request module is used for analyzing the file type and extracting key parameters;
the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file;
and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
The invention has the following beneficial effects:
(1) under the condition of a known key, the random encrypted HLS video stream and the random encrypted live stream can be played without a professional decryption client;
(2) under the scene of needing strict control of content quality and yellow discrimination and violence discrimination, the method can be used for carrying out real-time analysis on the encrypted video stream and the encrypted live stream.
Drawings
Fig. 1 is a schematic structural diagram of an AES decryption agent system based on an HLS protocol according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention discloses an AES decryption agent system based on an HLS protocol, including an external device and an agent device, where the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the preset module is used to convert an access address of an actual m3u8 file into an address of the agent device; the client module is used for requesting according to the address generated by the preset module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module; the analysis request module is used for analyzing the file type and extracting key parameters; the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file; and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
In a specific application example, the step of converting the access address of the actual m3u8 file into the address of the proxy device by the preset value module specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
In the embodiment of the present invention, the first parameter and the second parameter are only illustrated by the example, and the names of the parameters are not limited.
The access address of the actual m3u8 file is converted into the address of the proxy device through the default value module, the client directs the request to the proxy service when playing, and the actual m3u8 file address and the key information are used as parameters to be transmitted.
In the specific application example, the client module refers to a program or application which requests m3u8 file, for example, if m3u8 is to be played, the client module refers to a player; if m3u8 is to be downloaded, the client module is usually a downloading program, and the embodiment of the present invention does not limit the type of the client module, and can be used as the client module as long as there is a need to request the m3u8 file.
In a specific application example, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
The analysis request module analyzes the file type, and the extracting of the key parameters specifically comprises: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
The analysis request module analyzes the file type, and the extracting of the key parameters specifically comprises: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
In a specific application example, the converting module converts the content of the m3u8 file, and the changing of the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
Examples are illustrated below:
http: // Source File Address/encrypted File name. m3u8 is as follows:
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:10
#EXTINF:10.000,
1.ts
#EXTINF:10.000.
2.ts
#EXTINF:10.000.
3.ts
#EXT-X-ENDLIST
the converted content is then as follows:
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:10
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/1. ts & parameter 2. xxx
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/2. ts & parameter 2 ═ xxx
#EXTINF:10.000,
http: // proxy device address? Parameter 1 — http: // source file address/3. ts & parameter 2. xxx
#EXT-X-ENDLIST
In a specific application example, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, and includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time. Since AES decryption belongs to a general algorithm, it is not described herein.
Corresponding to the embodiment of the system of the present invention, the present invention provides an AES decryption agent method based on HLS protocol, which is applied to an agent system including an external device and an agent device as shown in fig. 1, wherein the external device further includes a preset module and a client module, the agent device further includes an analysis request module, a conversion module and a decryption module, and the method includes the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the request according to the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
In a specific application example, the step of converting the access address of the actual m3u8 file into the address of the proxy device by the preset value module specifically includes:
if the m3u8 address is: http: v/Source File Address/encrypted File name m3u 8;
the translated address is: http: // proxy device address? First parameter http: v/source file address/encrypted file name m3u8& second parameter xxx;
where the first parameter is the m3u8 address and the second parameter is the known AES key.
In the specific application example, the client module refers to a program or application which requests m3u8 file, for example, if m3u8 is to be played, the client module refers to a player; if m3u8 is to be downloaded, the client module is usually a downloading program, and the embodiment of the present invention does not limit the type of the client module, and can be used as the client module as long as there is a need to request the m3u8 file.
In a specific application example, the processing, by the client module, according to the received response content of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
In a specific application example, the analyzing request module analyzes the file type, and the extracting of the key parameter specifically includes: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
In a specific application example, the analyzing request module analyzes the file type, and the extracting of the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
In a specific application example, the converting module converts the content of the m3u8 file, and the changing of the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
In a specific application example, the decrypting module specifically decrypts the TS file according to the key by using the AES general algorithm, and includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
For the technical content of the remaining implementation details in the method embodiment, reference is made to the description of the system embodiment, and details are not repeated again.
It is to be understood that the exemplary embodiments described herein are illustrative and not restrictive. Although one or more embodiments of the present invention have been described with reference to the accompanying drawings, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.

Claims (10)

1. An AES decryption agent method based on HLS protocol is characterized in that the AES decryption agent method is applied to an agent system comprising an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module, and the method comprises the following steps:
the preset value module converts the access address of the actual m3u8 file into the address of the proxy device;
the client module makes a request according to the address generated by the preset module, and simultaneously, the client module respectively processes the request according to the received response contents of the conversion module and the decryption module;
the analysis request module analyzes the file type and extracts key parameters;
the conversion module converts the content of the m3u8 file and changes the request address of the internal TS file;
and the decryption module decrypts the TS file according to the key according to the AES general algorithm.
2. The AES decryption agent method based on HLS protocol as claimed in claim 1, wherein the step of converting the access address of the actual m3u8 file to the address of the agent device by the preset value module specifically includes:
if the m3u8 address is: http:// source file address/encrypted file name.m 3u 8;
the translated address is: http:// proxy device address? First parameter http:// source file address/encrypted file name m3u8& second parameter xxx
Where the first parameter is the m3u8 address and the second parameter is the known AES key.
3. AES decryption agent method based on HLS protocol as claimed in claim 1, characterised in that the client module comprises a program requesting the m3u8 file.
4. AES decryption agent method based on HLS protocol as claimed in claim 1, characterised in that the client module comprises an application requesting the m3u8 file.
5. The AES decryption agent method based on the HLS protocol as claimed in claim 1, wherein the processing performed by the client module according to the received response contents of the conversion module and the decryption module respectively specifically includes:
after receiving the content responded by the conversion module, the client module assembles the TS address and then deputys the TS information of the service request according to the address;
after receiving the TS content responded by the decryption module, the client module can directly play the content, namely the decrypted video stream content.
6. The AES decryption agent method based on HLS protocol as claimed in claim 2, wherein the parsing request module analyzes the file type, and extracting the key parameter specifically includes: if the file type of the first parameter is m3u8, the file type is processed by the conversion module, and key information including the second parameter is carried.
7. The AES decryption agent method based on HLS protocol as claimed in claim 2, wherein the parsing request module analyzes the file type, and extracting the key parameter specifically includes: if the file type of the first parameter is TS, the TS is processed by a decryption module, and key information including a second parameter is carried.
8. The AES decryption agent method based on HLS protocol as claimed in claim 1, wherein the conversion module converts the m3u8 file content, and changing the request address of the internal TS file specifically includes: after receiving the m3u8 file address including the first parameter forwarded by the analysis request module, the conversion module rewrites the file information, responds to the client module, rewrites the TS address in the file information, changes the TS address into the proxy address, and adds the key information including the second parameter, so that the client module also forwards the TS file to the proxy device when requesting the TS file.
9. The AES decryption agent method based on HLS protocol as claimed in claim 1, wherein the decryption module decrypting the TS file according to the AES general algorithm based on the key specifically includes: after the original TS file address is converted into the address of the proxy device by the conversion module, the client module makes a request according to the address of the proxy device, the request of the TS file reaches the decryption module through the analysis request module, the first parameter received by the decryption module is the file address of the original TS, the second parameter is the key information of AES, the TS file stream is firstly downloaded into the memory, then the decryption is carried out according to the AES general algorithm and the key information of the second parameter, and finally the decrypted file stream is responded to the client module in real time.
10. An AES decryption agent system based on HLS protocol is characterized in that the AES decryption agent system comprises an external device and an agent device, wherein the external device further comprises a presetting module and a client module, the agent device further comprises an analysis request module, a conversion module and a decryption module,
the preset value module is used for converting the access address of the actual m3u8 file into the address of the proxy device;
the client module is used for requesting according to the address generated by the presetting module, and simultaneously, the client module respectively processes according to the received response contents of the conversion module and the decryption module;
the analysis request module is used for analyzing the file type and extracting key parameters;
the conversion module is used for converting the content of the m3u8 file and changing the request address of the internal TS file;
and the decryption module is used for decrypting the TS file according to the key by the AES general algorithm.
CN202110457239.1A 2021-04-26 2021-04-26 AES decryption agent method and system based on HLS protocol Active CN113206841B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110457239.1A CN113206841B (en) 2021-04-26 2021-04-26 AES decryption agent method and system based on HLS protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110457239.1A CN113206841B (en) 2021-04-26 2021-04-26 AES decryption agent method and system based on HLS protocol

Publications (2)

Publication Number Publication Date
CN113206841A true CN113206841A (en) 2021-08-03
CN113206841B CN113206841B (en) 2022-08-23

Family

ID=77028786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110457239.1A Active CN113206841B (en) 2021-04-26 2021-04-26 AES decryption agent method and system based on HLS protocol

Country Status (1)

Country Link
CN (1) CN113206841B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1658552A (en) * 2004-02-17 2005-08-24 华为技术有限公司 Method for safety transfering medium flow
US20090003600A1 (en) * 2007-06-29 2009-01-01 Widevine Technologies, Inc. Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
US20090133103A1 (en) * 2007-10-29 2009-05-21 Infosys Technologies Ltd. Method and system for data security in an IMS network
US20140122874A1 (en) * 2012-10-29 2014-05-01 Tektronix, Inc. Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System
US20140281481A1 (en) * 2013-03-15 2014-09-18 General Instrument Corporation Dlna/dtcp stream conversion for secure media playback
JP2015032039A (en) * 2013-07-31 2015-02-16 株式会社東芝 Display device and display method
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device
CN106302465A (en) * 2016-08-17 2017-01-04 无锡天脉聚源传媒科技有限公司 A kind of method and device of playing audio-video data
CN106550242A (en) * 2016-12-08 2017-03-29 北京数码视讯科技股份有限公司 The conversion method and device of IP real-time media streams
CN106657162A (en) * 2017-03-01 2017-05-10 北京东大正保科技有限公司 Online stream media playing method and stream media downloading and offline playing method
CN107294927A (en) * 2016-04-05 2017-10-24 北京优朋普乐科技有限公司 Anti-stealing link method, device and system based on the network terminal
CN108494792A (en) * 2018-04-09 2018-09-04 四川百视通科技有限公司 A kind of flash player plays the converting system and its working method of hls video flowings
CN109995743A (en) * 2018-01-02 2019-07-09 腾讯科技(深圳)有限公司 A kind of processing method and terminal of multimedia file
CN110139131A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of method and terminal of playing video file
US20200067700A1 (en) * 2017-08-25 2020-02-27 Keysight Technologies Singapore (Holdings) Pte. Ltd. Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques
CN111049832A (en) * 2019-12-13 2020-04-21 北京浪潮数据技术有限公司 Reverse proxy method and related device

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1658552A (en) * 2004-02-17 2005-08-24 华为技术有限公司 Method for safety transfering medium flow
US20090003600A1 (en) * 2007-06-29 2009-01-01 Widevine Technologies, Inc. Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
US20090133103A1 (en) * 2007-10-29 2009-05-21 Infosys Technologies Ltd. Method and system for data security in an IMS network
US20140122874A1 (en) * 2012-10-29 2014-05-01 Tektronix, Inc. Deciphering Internet Protocol (IP) Security in an IP Multimedia Subsystem (IMS) using a Monitoring System
US20140281481A1 (en) * 2013-03-15 2014-09-18 General Instrument Corporation Dlna/dtcp stream conversion for secure media playback
JP2015032039A (en) * 2013-07-31 2015-02-16 株式会社東芝 Display device and display method
CN107294927A (en) * 2016-04-05 2017-10-24 北京优朋普乐科技有限公司 Anti-stealing link method, device and system based on the network terminal
CN105939491A (en) * 2016-05-25 2016-09-14 乐视控股(北京)有限公司 Video playing method and device
CN106302465A (en) * 2016-08-17 2017-01-04 无锡天脉聚源传媒科技有限公司 A kind of method and device of playing audio-video data
CN106550242A (en) * 2016-12-08 2017-03-29 北京数码视讯科技股份有限公司 The conversion method and device of IP real-time media streams
CN106657162A (en) * 2017-03-01 2017-05-10 北京东大正保科技有限公司 Online stream media playing method and stream media downloading and offline playing method
US20200067700A1 (en) * 2017-08-25 2020-02-27 Keysight Technologies Singapore (Holdings) Pte. Ltd. Monitoring encrypted network traffic flows in a virtual environment using dynamic session key acquisition techniques
CN109995743A (en) * 2018-01-02 2019-07-09 腾讯科技(深圳)有限公司 A kind of processing method and terminal of multimedia file
CN110139131A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of method and terminal of playing video file
CN108494792A (en) * 2018-04-09 2018-09-04 四川百视通科技有限公司 A kind of flash player plays the converting system and its working method of hls video flowings
CN111049832A (en) * 2019-12-13 2020-04-21 北京浪潮数据技术有限公司 Reverse proxy method and related device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
耿立宏等: "基于代理技术的HLS客户端设计与实现", 《微电子学与计算机》 *

Also Published As

Publication number Publication date
CN113206841B (en) 2022-08-23

Similar Documents

Publication Publication Date Title
KR101428875B1 (en) System and method for processing security based on http live streaming
EP2700238B1 (en) Ethernet decoder device and method to access protected content
CN107707504B (en) Streaming media playing method and system, server and client
KR101759039B1 (en) Dtcp converter for hls
US7447313B2 (en) Pointers to encrypted data in RTP header
US20040199771A1 (en) Method for tracing a security breach in highly distributed content
US20130144714A1 (en) Method, Apparatus and System for Supporting Advertisement Contents in HTTP Streaming Play Mode
WO2021120831A1 (en) Streaming media data encryption method and apparatus, streaming media data decryption method and apparatus, electronic device and storage medium
US20080063195A1 (en) Method and system for encrypting or decrypting wmv streaming media
CN108881205A (en) A kind of safety broadcasting system and playback method of HLS Streaming Media
US20190246148A1 (en) Method and system for scrambling broadcast with low latency
CN107124385B (en) Mirror flow-based SSL/TLS protocol plaintext data acquisition method
JP2015154238A5 (en)
CN113206841B (en) AES decryption agent method and system based on HLS protocol
CN110719247A (en) Terminal network access method and device
CN106790132A (en) Based on RTMP without plug-in unit preview video method
CN112752122B (en) Video encryption transmission method of intelligent camera and computer readable storage medium
US11039181B1 (en) Method and apparatus for secure video manifest/playlist generation and playback
CN114189706B (en) Media playing method, system, device, computer equipment and storage medium
CN115567503B (en) HTTPS protocol analysis method based on flow analysis
CN114302158A (en) Video live broadcast method and device, computer equipment and storage medium
CN117750083A (en) Safe and controllable video encryption and decryption device and method
CN115643459A (en) Video processing method, system, storage medium and electronic equipment
Wang et al. IPTV Video Hardware Encryption Transmission System Analysis
CN116567278A (en) H5 reduced delay live broadcast method requiring verification permission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant