CN115767138A - Video data processing method and device, electronic equipment and storage medium - Google Patents

Video data processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115767138A
CN115767138A CN202310014849.3A CN202310014849A CN115767138A CN 115767138 A CN115767138 A CN 115767138A CN 202310014849 A CN202310014849 A CN 202310014849A CN 115767138 A CN115767138 A CN 115767138A
Authority
CN
China
Prior art keywords
information
video data
key
watermark
played
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310014849.3A
Other languages
Chinese (zh)
Inventor
王滨
夏鹏泽
宋令阳
傅彩利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202310014849.3A priority Critical patent/CN115767138A/en
Publication of CN115767138A publication Critical patent/CN115767138A/en
Pending legal-status Critical Current

Links

Images

Abstract

The embodiment of the application provides a video data processing method and device, an electronic device and a storage medium, wherein an encryption key is encrypted based on a public key in a user key pair, video data to be played is encrypted based on the encryption key, and watermark information comprises identification information of a terminal device, so that tracing of an encrypted video file can be realized. When the encrypted video file is transmitted to the playing device to be played, the private key in the user key pair needs to be obtained for decryption, the user information can be obtained while the private key is obtained, the user information is utilized to generate a watermark image which is overlaid on the video playing window to be displayed, and the video data can be traced in the playing device.

Description

Video data processing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a video data processing method and apparatus, an electronic device, and a storage medium.
Background
With the development of video technology, video shooting is widely used in the industries of public safety, finance, telecommunication and the like, however, the frequent use of video resources also causes the occurrence of a large number of video file leakage events, so that the problem of video leakage tracing is urgently needed to be solved.
Disclosure of Invention
An object of the embodiments of the present application is to provide a video data processing method, an apparatus, an electronic device, and a storage medium, which are used to implement tracing of video files. The specific technical scheme is as follows:
the embodiment of the application provides a video data processing method, which is applied to downloading equipment and comprises the following steps:
acquiring video data to be played and an encryption key, and encrypting the video data to be played by using the encryption key to obtain a video data ciphertext;
acquiring watermark generation parameters and identification information of the downloading equipment, and generating watermark information according to the watermark generation parameters and the identification information of the downloading equipment, wherein the identification information of the downloading equipment comprises equipment identification and/or user identification of the downloading equipment;
acquiring a public key in a user key pair, and encrypting the encryption key by using the public key to obtain encryption information;
and splicing the encrypted information, the watermark information and the video data ciphertext to obtain an encrypted video file.
In a possible embodiment, the method further comprises:
acquiring the encryption algorithm type of the video data to be played;
encrypting the encryption algorithm type by using the public key to obtain an algorithm type ciphertext;
adding the algorithm type ciphertext to the encrypted information.
In a possible embodiment, before the step of splicing the encryption information, the watermark information, and the video data ciphertext to obtain an encrypted video file, the method further includes:
generating an integrity check key of the encryption information, the watermark information and the video data ciphertext;
encrypting the integrity check key by using the public key to obtain a check key ciphertext;
and adding the check key ciphertext to the encrypted information.
In a possible embodiment, the watermark generation parameters include: the display mode, font style and self-defined content of the watermark.
In a possible embodiment, the method further comprises:
acquiring play authority control information, wherein the play authority control information comprises at least one of the following contents: the validity period of the video data to be played is the user identification allowing the video data to be played;
and adding the playing authority control information into the encrypted video file.
An embodiment of the present application further provides a video data processing method, which is applied to a playing device, and the method includes:
acquiring an encrypted video file, user information of the playing device and a private key bound with the user information, wherein the encrypted video file comprises encrypted information, watermark information and a video data ciphertext, the encrypted information comprises an encrypted key ciphertext, the encrypted key ciphertext is obtained by encrypting a public key, and the public key and the private key belong to the same user key pair;
decrypting an encryption key ciphertext in the encrypted information by using the private key to obtain an encryption key;
decrypting the video data ciphertext by using the encryption key to obtain video data to be played;
generating a watermark picture according to the watermark information and the user information;
and creating a watermark window on the video playing window of the video data to be played, and displaying the watermark picture in the watermark window.
In a possible embodiment, the obtaining the user information of the playback device and the private key bound to the user information includes:
acquiring user information of the playing device, and authenticating the user information;
and under the condition that the user information passes the authentication, acquiring a private key bound by the user information.
In a possible embodiment, the encryption information further includes an algorithm type ciphertext, and the method further includes:
decrypting the algorithm type ciphertext in the encrypted information by using the private key to obtain an encryption algorithm type;
the decrypting the video data cipher text by using the encryption key to obtain the video data to be played comprises the following steps:
and decrypting the video data ciphertext through the decryption algorithm corresponding to the encryption algorithm type by using the encryption key to obtain the video data to be played.
In a possible embodiment, the encrypted information further includes a check key ciphertext, and the method further includes:
decrypting a check key ciphertext in the encrypted information by using the private key to obtain an integrity check key;
and verifying the integrity of the encryption information, the watermark information and the video data ciphertext by using the integrity verification key to obtain an integrity verification result.
In a possible embodiment, the encrypted video file further comprises playback right control information, and the playback right control information comprises at least one of the following: the validity period of the video data to be played is the user identification allowing the video data to be played;
the method further comprises the following steps:
under the condition that the playing authority control information comprises the valid period of the video data to be played, judging whether the video data to be played is within the valid period, and if not, generating first prompt information indicating that the video data to be played is out of date;
and/or
And under the condition that the playing permission control information comprises a user identifier allowing the video data to be played, judging whether the user indicated by the user information is allowed to play the video data to be played, and if not, generating second prompt information indicating that the current user does not allow the video data to be played.
In a possible embodiment, the watermark information includes watermark generation parameters and identification information of a downloading device;
generating a watermark picture according to the watermark information and the user information, comprising:
and generating a watermark picture comprising the identification information of the downloading equipment and the user information according to the watermark generation parameters.
In a possible embodiment, the watermark picture further includes a device identifier of the playback device.
An embodiment of the present application further provides a video data processing apparatus, which is applied to a downloading device, and the apparatus includes:
the first encryption module is used for acquiring video data to be played and an encryption key, and encrypting the video data to be played by using the encryption key to obtain a video data ciphertext;
the watermark generation module is used for acquiring watermark generation parameters and identification information of the downloading equipment and generating watermark information according to the watermark generation parameters and the identification information of the downloading equipment, wherein the identification information of the downloading equipment comprises equipment identification and/or user identification of the downloading equipment;
the second encryption module is used for acquiring a public key in a user key pair, and encrypting the encryption key by using the public key to obtain encryption information;
and the splicing module is used for splicing the encrypted information, the watermark information and the video data ciphertext to obtain an encrypted video file.
In a possible embodiment, the apparatus further comprises:
the acquisition module is used for acquiring the encryption algorithm type of the video data to be played;
the third encryption module is used for encrypting the encryption algorithm type by using the public key to obtain an algorithm type ciphertext;
and the first adding module is used for adding the algorithm type ciphertext into the encryption information.
In a possible embodiment, the apparatus further comprises:
a verification key generation module, configured to generate an integrity verification key for the encrypted information, the watermark information, and the video data ciphertext;
the fourth encryption module is used for encrypting the integrity check key by using the public key to obtain a check key ciphertext;
and the second adding module is used for adding the check key ciphertext into the encrypted information.
In a possible embodiment, the watermark generation parameters include: the display mode, font style and watermark self-defined content of the watermark.
In a possible embodiment, the apparatus further comprises:
a playing permission control information obtaining module, configured to obtain playing permission control information, where the playing permission control information includes at least one of the following contents: the video data to be played has a valid period and a user identifier allowing the video data to be played;
and the third adding module is used for adding the playing authority control information into the encrypted video file.
An embodiment of the present application further provides a video data processing apparatus, which is applied to a playing device, and the apparatus includes:
the acquisition module is used for acquiring an encrypted video file, user information of the playing device and a private key bound with the user information, wherein the encrypted video file comprises encrypted information, watermark information and a video data ciphertext, the encrypted information comprises an encrypted key ciphertext, the encrypted key ciphertext is obtained by encrypting a public key, and the public key and the private key belong to the same user key pair;
the first decryption module is used for decrypting an encryption key ciphertext in the encrypted information by using the private key to obtain an encryption key;
the second decryption module is used for decrypting the video data ciphertext by using the encryption key to obtain video data to be played;
the generating module is used for generating a watermark picture according to the watermark information and the user information;
and the creating module is used for creating a watermark window on the video playing window of the video data to be played and displaying the watermark picture in the watermark window.
In a possible embodiment, the obtaining module is specifically configured to:
acquiring user information of the playing device, and authenticating the user information;
and under the condition that the user information passes the authentication, acquiring a private key bound by the user information.
In a possible embodiment, the encryption information further includes an algorithm type ciphertext, and the apparatus further includes:
the third decryption module is used for decrypting the algorithm type ciphertext in the encrypted information by using the private key to obtain an encryption algorithm type;
the second decryption module is specifically configured to:
and decrypting the video data ciphertext through a decryption algorithm corresponding to the encryption algorithm type by using the encryption key to obtain the video data to be played.
In a possible embodiment, the encrypted information further includes a check key ciphertext, and the apparatus further includes:
the fourth decryption module is used for decrypting a verification key ciphertext in the encrypted information by using the private key to obtain an integrity verification key;
and the verification module is used for verifying the integrity of the encrypted information, the watermark information and the video data ciphertext by using the integrity verification key to obtain an integrity verification result.
In a possible embodiment, the encrypted video file further comprises playback right control information, and the playback right control information comprises at least one of the following: the validity period of the video data to be played is the user identification allowing the video data to be played;
the device further comprises:
the first judging module is used for judging whether the video data to be played is within the valid period of the video data to be played under the condition that the playing authority control information comprises the valid period of the video data to be played, and if not, generating first prompt information indicating that the video data to be played is out of date;
and/or
And the second judging module is used for judging whether the user indicated by the user information is allowed to play the video data to be played or not under the condition that the playing permission control information comprises the user identifier which allows the video data to be played, and if not, generating second prompt information which indicates that the current user does not allow the video data to be played.
In a possible embodiment, the watermark information includes watermark generation parameters and identification information of a downloading device;
the generation module is specifically configured to:
and generating a watermark picture comprising the identification information of the downloading equipment and the user information according to the watermark generation parameters.
In a possible embodiment, the watermark picture further includes a device identifier of the playback device.
An embodiment of the present application further provides an electronic device, including: a processor, a memory;
a memory for storing a computer program;
and a processor for implementing any of the above video data processing methods when executing the program stored in the memory.
An embodiment of the present application further provides a computer-readable storage medium, in which a computer program is stored, and when the computer program is executed by a processor, the computer program implements any of the video data processing methods described above.
Embodiments of the present application further provide a computer program product containing instructions, which when run on a computer, cause the computer to perform any of the video data processing methods described above.
The embodiment of the application has the following beneficial effects:
according to the embodiment of the application, the acquired video data to be played is encrypted by using the acquired encryption key to obtain the video data ciphertext, the watermark information is generated according to the acquired watermark generation parameter and the identification information of the downloading equipment, the encryption key is encrypted by using the public key in the acquired user key pair to obtain the encryption information, and finally the encryption information, the watermark information and the video data ciphertext are spliced to obtain the encrypted video file. When the encrypted video file is transmitted to the playing device to be played, a public key in a user key pair needs to be obtained for decryption, user information can be obtained while the public key in the user key pair is obtained, a watermark image is generated by utilizing the user information and is superposed on a video playing window to be displayed, and video data can be traced in the playing device.
Of course, not all advantages described above need to be achieved at the same time in the practice of any one product or method of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and it is also obvious for a person skilled in the art to obtain other embodiments according to the drawings.
Fig. 1 is a first flowchart illustrating a video data processing method applied to a downloading device according to an embodiment of the present disclosure;
fig. 2a is a schematic diagram of an encrypted video file provided in an embodiment of the present application;
fig. 2b is a schematic flowchart of a second video data processing method applied to a downloading device according to an embodiment of the present application;
fig. 3 is a first flowchart illustrating a video data processing method applied to a playing device according to an embodiment of the present application;
fig. 4 is an interaction diagram of a video data processing method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a video data processing apparatus applied to a downloading device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of video data processing applied to a playing device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application are within the scope of protection of the present application.
In order to implement traceability of a video file, embodiments of the present application provide a video data processing method, an apparatus, an electronic device, a computer-readable storage medium, and a computer program product containing instructions.
Next, a video data processing method provided in the embodiment of the present application is first described. The method is applied to any electronic equipment which can provide video data processing service, such as a network hard disk video recorder, a personal computer, a server and the like. The video data processing method provided by the embodiment of the application can be realized by at least one of software, hardware circuit and logic circuit arranged in the electronic equipment.
As shown in fig. 1, fig. 1 is a first flowchart illustrating a video data processing method applied to a downloading device according to an embodiment of the present application, where the method includes:
s110, acquiring video data to be played and an encryption key, and encrypting the video data to be played by using the encryption key to obtain a video data ciphertext;
s120, acquiring a watermark generation parameter and the identification information of the downloading equipment, and generating watermark information according to the watermark generation parameter and the identification information of the downloading equipment; wherein the identification information of the download device comprises a device identification and/or a user identification of the download device
S130, acquiring a public key in a user key pair, and encrypting the encryption key by using the public key to obtain encryption information;
and S140, splicing the encrypted information, the watermark information and the video data ciphertext to obtain an encrypted video file.
The encryption key may be preset, for example, a corresponding relationship between the video data to be played and the encryption key is preset, and after the video data to be played is obtained, the encryption key may be obtained based on the corresponding relationship between the video data to be played and the encryption key. The encryption key may also be generated in real time according to a related key algorithm, which may be set according to actual situations and will not be described herein. The video data to be played can be downloaded from a video source by a downloading device.
After the video data to be played and the encryption key are obtained, the video data to be played are encrypted by using the encryption key, and a video data ciphertext is obtained. Therefore, if the video data to be played are required to be obtained, the video data ciphertext needs to be decrypted based on the encryption key, and therefore the safety of the video data is improved.
The watermark generation parameters include various types of parameters required to generate a watermark. In one example, the watermark generation parameters may include: for clarity of the scheme and layout, the following detailed description is made with reference to another embodiment.
The identification information of the downloading equipment can be any information which uniquely represents the downloading equipment, and the identification information of the downloading equipment comprises equipment identification and/or user identification of the downloading equipment; for example, the device identification of the downloading device may be a globally unique identifier of the downloading device, etc., and the user identification of the downloading device may be a user ID for logging in the downloading device, etc. After acquiring the watermark generation parameter and the identification information of the downloading equipment, generating watermark information comprising the watermark generation parameter and the identification information of the downloading equipment. The tracing to the video file can be realized by downloading the identification information of the equipment in the watermark information.
The downloading device may first obtain a public key in the user key pair, and then encrypt the encryption key using the public key to obtain the encrypted information. The user key pair comprises a public key and a private key, the downloading equipment encrypts the encryption key through the public key, the playing equipment can decrypt only by using the private key in the user key pair, the private key is bound with the user, and the user can obtain the private key only after identity authentication.
In the embodiment of the present application, the order of S110, S120, and S130 is not specified, and the video data to be played and the encryption key may be obtained first, and the video data to be played is encrypted by using the encryption key to obtain a video data cipher text; acquiring watermark generation parameters and identification information of downloading equipment, and generating watermark information according to the watermark generation parameters and the identification information of the downloading equipment; finally, a public key in the user key pair is obtained, the encryption key is encrypted by the public key, or a watermark generation parameter and the identification information of the downloading equipment are obtained first, and watermark information is generated according to the watermark generation parameter and the identification information of the downloading equipment; then video data to be played and an encryption key are obtained, and the video data to be played are encrypted by using the encryption key to obtain a video data ciphertext; and finally, acquiring a public key in the user key pair, and encrypting the encryption key by using the public key to obtain encryption information. Or the steps of generating the encryption information, the watermark information, and the video data ciphertext are performed simultaneously, which may be set according to the actual situation, and is not limited herein.
After the encryption information, the watermark information and the video data ciphertext are generated, the encryption information, the watermark information and the video data ciphertext can be spliced to obtain an encrypted video file. As shown in particular in fig. 2 a.
Because the encryption key is encrypted based on the public key in the user key pair, and the video data to be played is encrypted based on the encryption key, when the video data is transmitted to the playing device for playing, the private key in the user key pair needs to be obtained for decryption, and the private key in the user key pair belongs to the user, only the corresponding user can decrypt the private key, so that the security of the video data is improved, and the watermark information is generated based on the watermark generation parameter and the identification information of the downloading device, so that the tracing of the video file can be realized.
In a possible embodiment, the method further includes:
acquiring the encryption algorithm type of the video data to be played;
encrypting the encryption algorithm type by using the public key to obtain an algorithm type ciphertext;
and adding the algorithm type ciphertext into the encrypted information.
The encryption algorithm type of the video data to be played may include a symmetric encryption algorithm, an asymmetric encryption algorithm and a hash algorithm, and specifically, reference may be made to the encryption algorithm type in the related art.
After the encryption algorithm type of the video data to be played is obtained, the encryption algorithm type is encrypted by using the public key to obtain an algorithm type ciphertext, and then the algorithm type ciphertext is added into the encryption information. On the basis of encrypting the encryption key, the encryption algorithm type is also encrypted, and the data security can be improved by multiple encryption of the video data to be played.
In a possible embodiment, before the step of splicing the encrypted information, the watermark information, and the video data ciphertext to obtain an encrypted video file, the method further includes:
generating an integrity check key of the encryption information, the watermark information and the video data ciphertext;
encrypting the integrity check key by using the public key to obtain a check key ciphertext;
and adding the check key ciphertext into the encrypted information.
The integrity check key can be the summary or hash value of the encryption information, the watermark information and the video data ciphertext, the downloading equipment also generates the integrity check key of the encryption information, the watermark information and the video data ciphertext, then encrypts the integrity check key by using the public key to obtain a check key ciphertext, and adds the check key ciphertext to the encryption information. Therefore, after the user acquires the encrypted video file, the user needs to obtain the integrity check key based on the correct public key, and then the integrity of the encrypted information, the watermark information and the video data ciphertext is checked through the integrity check key. Therefore, integrity protection of the encrypted information, the watermark information and the video data ciphertext is realized, and the safety of the video data is improved.
In a possible embodiment, the watermark generation parameters include: the display mode, font style and self-defined content of the watermark.
The display mode of the watermark is used for representing the display mode of the watermark, for example, the watermark is explicitly displayed, implicitly displayed, and the transparency corresponding to the watermark when explicitly displayed.
The character style represents what character style is selected for the characters in the watermark.
The watermark self-defining content can comprise a specific watermark position, a watermark pattern, a watermark layout and the like.
The watermark is generated based on the display mode, font style and watermark self-defined content of the watermark, so that the watermark content can be enriched, and the user experience degree is increased.
As shown in fig. 2b, fig. 2b is a second flowchart illustrating a video data processing method applied to a downloading device according to an embodiment of the present application, and in a possible embodiment, the method further includes:
s150, acquiring playing right control information, wherein the playing right control information includes at least one of the following contents: the validity period of the video data to be played is the user identification allowing the video data to be played;
s160, adding the playing right control information to the encrypted video file.
The playback permission control information may be an expiration date of the video data to be played, for example, wherein the expiration date of the video data to be played may be determined based on a time stamp of generation of the encrypted video file, for example, the expiration date of the video data to be played is specified to be 3 days from generation of the encrypted video file. The validity period of the video data to be played may also be determined based on the time when the encrypted video file is received by the playing device, for example, the validity period of the video data to be played is defined as 1 day since the encrypted video file is received. The specific setting may be performed according to actual conditions, and is not limited herein.
The user identification allowing the video data to be played specifies which users or which permission level users can play the video data to be played, so that even if other users receive the encrypted video file and successfully decrypt the encrypted video file, if the user identifications are not matched, the user can not play the video to be played, and only the corresponding user can decrypt the video file, so that the integrity protection of the video data to be played is realized, the safety of the video data is improved, and the watermark information is generated based on the watermark generation parameter and the identification information of the downloading equipment, so that the source tracing of the video file can be realized.
By providing authority control for information such as playing users and playing time of the video files, the leakage of the playing of the video data can be effectively prevented.
As shown in fig. 3, fig. 3 is a first flowchart illustrating a video data processing method applied to a playing device according to an embodiment of the present application, where the method includes:
s310, acquiring an encrypted video file, user information of the playing device and a private key bound with the user information;
s320, decrypting the encrypted key ciphertext in the encrypted information by using the private key to obtain an encrypted key;
s330, decrypting the video data ciphertext by using the encryption key to obtain video data to be played;
s340, generating a watermark picture according to the watermark information and the user information;
and S350, creating a watermark window on the video playing window of the video data to be played, and displaying the watermark picture in the watermark window.
The encrypted video file comprises encryption information, watermark information and a video data ciphertext. The watermark information includes watermark generation parameters, and the encryption information includes an encryption key ciphertext.
The watermark generation parameters comprise various parameters required for generating the watermark. In one example, the watermark generation parameters include: display mode of watermark, font style, self-defined content of watermark, etc. The display mode of the watermark is used for representing the display mode of the watermark, for example, the watermark is explicitly displayed, implicitly displayed, and the transparency corresponding to the watermark when explicitly displayed. The character style represents the selected character style of the characters in the watermark. The watermark self-defining content comprises a specific watermark position, a watermark pattern, a watermark layout and the like.
The encrypted key ciphertext is obtained by encrypting a public key, and the public key and the private key belong to the same user key pair. The user key is bound with the user information, and the user key is obtained on the basis of the user information, that is, after the user information is obtained, the user key bound with the user information can be obtained, and then the corresponding private key can be obtained. The playing device decrypts the encrypted key ciphertext in the encrypted information by using the private key bound by the user information to obtain an encrypted key, decrypts the video data ciphertext by using the encrypted key to obtain the video data to be played, generates a watermark picture according to the watermark generation parameter and the user information in the watermark information, finally creates a watermark window on the video playing window of the video data to be played, and displays the watermark picture in the watermark window.
The method comprises the steps of encrypting an encryption key based on a public key in a user key pair, encrypting video data to be played based on the encryption key, decrypting files to be played by playing equipment based on a private key of the playing equipment, enabling the private key in the user key to belong to a user, and only enabling the corresponding user to decrypt the files to be played, so that the safety of the video data is improved.
In a possible embodiment, the obtaining the user information of the playback device and the private key bound to the user information includes:
acquiring user information of the playing device and authenticating the user information;
and under the condition that the user information passes the authentication, acquiring a private key bound by the user information.
The playing device acquires the user information of the playing device, authenticates the user information, and acquires the private key bound by the user information under the condition that the user information passes the authentication.
For example, after the user information of the playback device is obtained, the user information of the playback device may be verified online, specifically, the user information of the playback device may be sent to a verification server, the verification server verifies the user information of the playback device, after the verification is passed, the verification server returns a private key bound to the user information to the playback device, and the playback device obtains the private key.
In one example, a user obtains a private key through a Ukey (small storage device), for example, the user inserts the Ukey into an interface of a playback device, where the Ukey stores the private key bound by user information; and authenticating the user information through the Ukey, and after the authentication is passed, the playing equipment can acquire the private key stored in the Ukey.
In a possible embodiment, the encryption information further includes an algorithm type ciphertext, and the method further includes:
decrypting the algorithm type ciphertext in the encrypted information by using the private key to obtain an encryption algorithm type;
the decrypting the video data ciphertext by using the encryption key to obtain the video data to be played includes:
and decrypting the video data ciphertext by using the encryption key through a decryption algorithm corresponding to the encryption algorithm type to obtain video data to be played.
The encryption algorithm types may include a symmetric encryption algorithm, an asymmetric encryption algorithm, and a hash algorithm, and particularly, reference may be made to the encryption algorithm types in the related art.
The playing device decrypts the algorithm type ciphertext in the encrypted information by using the private key to obtain an encrypted algorithm type, and decrypts the video data ciphertext by using the encrypted key through a decryption algorithm corresponding to the encrypted algorithm type to obtain the video data to be played. On the basis of encrypting the encryption key, the encryption algorithm type is also encrypted, and the data security can be improved by multiple encryption of the video data to be played.
In a possible embodiment, the encrypted information further includes a check key ciphertext, and the method further includes:
decrypting a check key ciphertext in the encrypted information by using the private key to obtain an integrity check key;
and verifying the integrity of the encrypted information, the watermark information and the video data ciphertext by using the integrity verification key to obtain an integrity verification result.
The integrity check key can be summary or hash value of encryption information, watermark information, video data ciphertext and the like, the encryption information also comprises a check key ciphertext, the playing device decrypts the check key ciphertext in the encryption information by using a user key pair to obtain the integrity check key, and then verifies the integrity of the encryption information, the watermark information and the video data ciphertext by using the integrity check key to obtain an integrity check result. In one example, the playing device may calculate, according to a preset algorithm, a current integrity check key of the watermark information, the video data ciphertext and the encrypted information except the check key ciphertext, compare the current integrity check key with an integrity check key obtained by decryption, determine that the data encrypted video file is complete (has not been tampered) if the current integrity check key and the integrity check key are the same, and determine that the data encrypted video file is incomplete (has been tampered) otherwise. The preset algorithm in the embodiment of the present application is the same as the algorithm used by the downloading device side to generate the integrity check key.
In a possible embodiment, the encrypted video file further includes playing right control information, where the playing right control information includes at least one of the following: the validity period of the video data to be played is the user identification allowing the video data to be played;
the method further comprises the following steps:
under the condition that the playing authority control information comprises the valid period of the video data to be played, judging whether the video data to be played is in the valid period of the video data to be played, and if not, generating first prompt information indicating that the video data to be played is out of date;
and/or
And under the condition that the playing permission control information comprises a user identifier allowing the video data to be played, judging whether the user indicated by the user information is allowed to play the video data to be played, and if not, generating second prompt information indicating that the current user does not allow the video data to be played.
The playing permission control information may be an expiration date of the video data to be played, for example, wherein the expiration date of the video data to be played may be determined based on a timestamp of generation of the encrypted video file, for example, the expiration date of the video data to be played is specified to be 3 days since the encrypted video file was generated. The validity period of the video data to be played may also be determined based on the time when the encrypted video file is received by the playing device, for example, the validity period of the video data to be played is defined as 1 day since the encrypted video file is received. The specific setting may be performed according to actual conditions, and is not limited herein.
Under the condition that the playing permission control information includes the validity period of the video data to be played, judging whether the video data to be played is within the validity period of the video data to be played, if so, playing the video data to be played, otherwise, generating first prompt information indicating that the video data to be played is overdue, wherein the first prompt information may be a preset prompt tone, or preset prompt characters, and the prompt characters may be: the failure can be specifically set according to the actual situation.
The user identifier for allowing the video data to be played specifies which users or users with which authority level can play the video data to be played, so that even if other users receive the encrypted video file and the decryption is successful, if the user identifiers are not matched, the user can not play the video to be played, and thus only the corresponding user can decrypt the video.
And under the condition that the playing permission control information comprises a user identifier allowing the video data to be played, judging whether the user indicated by the user information is allowed to play the video data to be played, if so, playing the video data to be played, and if not, generating second prompt information indicating that the current user is not allowed to play the video data to be played. The second prompt information may be a preset prompt sound, or a preset prompt text, and the prompt text may be: an unauthorized user.
By providing authority control for information such as playing users and playing time of the video files, the leakage of the playing of the video data can be effectively prevented.
In a possible embodiment, the watermark information includes a watermark generation parameter and identification information of a downloading device;
the generating a watermark picture according to the watermark information and the user information includes:
and generating a watermark picture comprising the identification information of the downloading equipment and the user information according to the watermark generation parameters.
The watermark information comprises watermark generation parameters and identification information of the downloading equipment, so that a watermark picture comprising the identification information of the downloading equipment and the user information can be generated according to the watermark generation parameters.
Besides the user information of the playing device, the watermark picture can also comprise identification information of the downloading device, and the identification information of the downloading device comprises a device identification and/or a user identification of the downloading device, so that the source tracing of the playing process and the downloading process can be realized.
In a possible embodiment, the watermark picture further includes a device identifier of the playback device.
The watermark picture also comprises a device identifier of the playing device, so that the playing device which plays the video can be known through the device identifier of the playing device in the watermark picture, and the playing of the video data can be effectively prevented from being divulged.
As shown in fig. 4, fig. 4 is an interactive schematic diagram of a video data processing method according to an embodiment of the present application, where the method includes:
the downloading device 1 needs to download an original video file and encrypt the original video file, specifically, the downloading device 1 obtains the original video file (video data to be played) and an encryption key, encrypts the video data to be played by using the encryption key to obtain a video data ciphertext, obtains a watermark generation parameter and identification information of the downloading device, and generates watermark information according to the watermark generation parameter and the identification information of the downloading device; setting play authority control information; and acquiring a public key in the user key pair, encrypting the encryption key by using the public key to obtain encryption information, and splicing the encryption information, the watermark information, the video data ciphertext and the playing authority control information to obtain an encrypted video file.
Then the downloading device 1 transmits the encrypted video file to a playing device A and a playing device B, the playing device A and the playing device B respectively acquire the encrypted video file, a user key pair of the playing device A and the user information of the playing device B, wherein the encrypted video file comprises encrypted information, watermark information and a video data ciphertext, the watermark information comprises watermark generation parameters, the encrypted information comprises an encrypted key ciphertext, a private key in the user key pair is used for decrypting the encrypted key ciphertext in the encrypted information to obtain an encrypted key, the encrypted key is used for decrypting the video data ciphertext to obtain video data to be played, a watermark picture is generated according to the watermark generation parameters and the user information in the watermark information, a watermark window is created on the video playing window of the video data to be played, and the watermark picture is displayed in the watermark window.
And encrypting the encryption key based on a public key in the user key pair, encrypting the video data to be played based on the encryption key, wherein the watermark information comprises identification information of the downloading equipment, so that the tracing of the encrypted video file can be realized. When the encrypted video file is transmitted to the playing device to be played, the private key in the user key pair needs to be obtained for decryption, the private key in the user key pair is obtained, the user information is obtained at the same time, the user information is utilized to generate a watermark image to be overlaid on the video playing window for displaying, and the video data can be traced in the playing device.
Based on the foregoing method embodiment, an embodiment of the present application provides a video data processing apparatus, which is applied to a downloading device, as shown in fig. 5, where fig. 5 is a schematic structural diagram of the video data processing apparatus applied to the downloading device provided in the embodiment of the present application, and the apparatus includes:
a first encryption module 510, configured to obtain video data to be played and an encryption key, and encrypt the video data to be played by using the encryption key to obtain a video data ciphertext;
a watermark generating module 520, configured to obtain a watermark generating parameter and identification information of the downloading device, and generate watermark information according to the watermark generating parameter and the identification information of the downloading device, where the identification information of the downloading device includes a device identifier and/or a user identifier of the downloading device;
a second encryption module 530, configured to obtain a public key in a user key pair, and encrypt the encryption key by using the public key to obtain encrypted information;
and a splicing module 540, configured to splice the encrypted information, the watermark information, and the video data ciphertext to obtain an encrypted video file.
In a possible embodiment, the apparatus further includes:
the acquisition module is used for acquiring the encryption algorithm type of the video data to be played;
the third encryption module is used for encrypting the encryption algorithm type by using the public key to obtain an algorithm type ciphertext;
and the first adding module is used for adding the algorithm type ciphertext into the encryption information.
In a possible embodiment, the apparatus further includes:
a verification key generation module, configured to generate an integrity verification key of the encrypted information, the watermark information, and the video data ciphertext;
the fourth encryption module is used for encrypting the integrity check key by using the public key to obtain a check key ciphertext;
and the second adding module is used for adding the check key ciphertext into the encrypted information.
In a possible embodiment, the watermark generation parameters include: the display mode, font style and self-defined content of the watermark.
In a possible embodiment, the apparatus further comprises:
a playing authority control information obtaining module, configured to obtain playing authority control information, where the playing authority control information includes at least one of the following contents: the validity period of the video data to be played is the user identification allowing the video data to be played;
and the third adding module is used for adding the playing authority control information into the encrypted video file.
Based on the foregoing method embodiment, an embodiment of the present application provides a video data processing apparatus, which is applied to a playing device, as shown in fig. 6, where fig. 6 is a schematic structural diagram of the video data processing apparatus applied to the playing device provided in the embodiment of the present application, and the apparatus includes:
an obtaining module 610, configured to obtain an encrypted video file, user information of the playback device, and a private key bound to the user information, where the encrypted video file includes encryption information, watermark information, and a video data ciphertext, the encryption information includes an encryption key ciphertext, the encryption key ciphertext is obtained by encrypting a public key, and the public key and the private key belong to a same user key pair;
a first decryption module 620, configured to decrypt, by using the private key, an encryption key ciphertext in the encrypted information to obtain an encryption key;
a second decryption module 630, configured to decrypt the video data ciphertext using the encryption key to obtain video data to be played;
a generating module 640, configured to generate a watermark picture according to the watermark information and the user information;
a creating module 650, configured to create a watermark window on the video playing window of the video data to be played, and display the watermark picture in the watermark window.
In a possible embodiment, the obtaining module is specifically configured to:
acquiring user information of the playing device and authenticating the user information;
and under the condition that the user information passes the authentication, acquiring a private key bound by the user information.
In a possible embodiment, the encryption information further includes an algorithm type ciphertext, and the apparatus further includes:
the third decryption module is used for decrypting the algorithm type ciphertext in the encrypted information by using the private key to obtain an encryption algorithm type;
the second decryption module is specifically configured to:
and decrypting the video data ciphertext by using the encryption key through a decryption algorithm corresponding to the encryption algorithm type to obtain the video data to be played.
In a possible embodiment, the encrypted information further includes a check key ciphertext, and the apparatus further includes:
the fourth decryption module is used for decrypting the check key ciphertext in the encrypted information by using the private key to obtain an integrity check key;
and the verification module is used for verifying the integrity of the encrypted information, the watermark information and the video data ciphertext by using the integrity verification key to obtain an integrity verification result.
In a possible embodiment, the encrypted video file further includes playing right control information, where the playing right control information includes at least one of the following: the video data to be played has a valid period and a user identifier allowing the video data to be played;
the above-mentioned device still includes:
a first judging module, configured to judge whether the playback permission control information includes the expiration date of the video data to be played, and if not, generate a first prompt message indicating that the video data to be played is out of date;
and/or
A second judging module, configured to judge whether to allow the user indicated by the user information to play the video data to be played under the condition that the play permission control information includes a user identifier allowing the video data to be played, and if not, generate second prompt information indicating that the current user does not allow the video data to be played.
In a possible embodiment, the watermark information includes a watermark generation parameter and identification information of the downloading device;
the generation module is specifically configured to:
and generating a watermark picture comprising the identification information of the downloading equipment and the user information according to the watermark generation parameters.
In a possible embodiment, the watermark picture further includes a device identifier of the playback device.
With regard to the apparatus in the above embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be described in detail here.
An embodiment of the present application further provides an electronic device, as shown in fig. 7, including:
a memory 701 for storing a computer program;
the processor 702 is configured to implement the following steps when executing the program stored in the memory 701:
acquiring video data to be played and an encryption key, and encrypting the video data to be played by using the encryption key to obtain a video data ciphertext;
acquiring watermark generation parameters and identification information of the downloading equipment, and generating watermark information according to the watermark generation parameters and the identification information of the downloading equipment, wherein the identification information of the downloading equipment comprises equipment identification and/or user identification of the downloading equipment;
acquiring a public key in a user key pair, and encrypting the encryption key by using the public key to obtain encryption information;
and splicing the encrypted information, the watermark information and the video data ciphertext to obtain an encrypted video file.
The electronic device may further include a communication bus and/or a communication interface, and the processor 702, the communication interface, and the memory 701 complete communication with each other through the communication bus.
An embodiment of the present application further provides an electronic device, including:
a memory for storing a computer program;
the processor is used for realizing the following steps when executing the program stored in the memory:
acquiring an encrypted video file, user information of the playing device and a private key bound with the user information, wherein the encrypted video file comprises encrypted information, watermark information and a video data ciphertext, the encrypted information comprises an encrypted key ciphertext, the encrypted key ciphertext is obtained by encrypting a public key, and the public key and the private key belong to the same user key pair;
decrypting an encryption key ciphertext in the encrypted information by using the private key to obtain an encryption key;
decrypting the video data ciphertext by using the encryption key to obtain video data to be played;
generating a watermark picture according to the watermark information and the user information;
and creating a watermark window on the video playing window of the video data to be played, and displaying the watermark picture in the watermark window. The electronic device may further include a communication bus and/or a communication interface, and the processor, the communication interface, and the memory complete communication with each other through the communication bus.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Alternatively, the memory may be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In yet another embodiment provided by the present application, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of any of the above video data processing methods.
In yet another embodiment provided by the present application, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the video data processing methods of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on differences from other embodiments. In particular, for the apparatus, the electronic device, the computer-readable storage medium, and the computer program product embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiments.
The above description is only for the preferred embodiment of the present application and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application are included in the protection scope of the present application.

Claims (18)

1. A video data processing method applied to a downloading device, the method comprising:
acquiring video data to be played and an encryption key, and encrypting the video data to be played by using the encryption key to obtain a video data ciphertext;
acquiring watermark generation parameters and identification information of the downloading equipment, and generating watermark information according to the watermark generation parameters and the identification information of the downloading equipment, wherein the identification information of the downloading equipment comprises equipment identification and/or user identification of the downloading equipment;
acquiring a public key in a user key pair, and encrypting the encryption key by using the public key to obtain encryption information;
and splicing the encrypted information, the watermark information and the video data ciphertext to obtain an encrypted video file.
2. The method of claim 1, further comprising:
acquiring the encryption algorithm type of the video data to be played;
encrypting the encryption algorithm type by using the public key to obtain an algorithm type ciphertext;
adding the algorithm type ciphertext to the encrypted information.
3. The method according to claim 1, wherein before the step of concatenating the encryption information, the watermark information, and the video data ciphertext to obtain the encrypted video file, the method further comprises:
generating an integrity check key of the encryption information, the watermark information and the video data ciphertext;
encrypting the integrity check key by using the public key to obtain a check key ciphertext;
and adding the check key ciphertext to the encrypted information.
4. The method of claim 1, wherein the watermark generation parameters comprise: the display mode, font style and self-defined content of the watermark.
5. The method of claim 1, further comprising:
acquiring play authority control information, wherein the play authority control information comprises at least one of the following contents: the video data to be played has a valid period and a user identifier allowing the video data to be played;
and adding the playing authority control information into the encrypted video file.
6. A video data processing method applied to a playback device, the method comprising:
acquiring an encrypted video file, user information of the playing device and a private key bound with the user information, wherein the encrypted video file comprises encrypted information, watermark information and a video data ciphertext, the encrypted information comprises an encrypted key ciphertext, the encrypted key ciphertext is obtained by encrypting a public key, and the public key and the private key belong to the same user key pair;
decrypting an encryption key ciphertext in the encryption information by using the private key to obtain an encryption key;
decrypting the video data ciphertext by using the encryption key to obtain video data to be played;
generating a watermark picture according to the watermark information and the user information;
and creating a watermark window on the video playing window of the video data to be played, and displaying the watermark picture in the watermark window.
7. The method of claim 6, wherein the obtaining the user information of the playback device and the private key bound to the user information comprises:
acquiring user information of the playing device, and authenticating the user information;
and under the condition that the user information passes the authentication, acquiring a private key bound by the user information.
8. The method of claim 6, wherein the encryption information further includes an algorithm type ciphertext, the method further comprising:
decrypting the algorithm type ciphertext in the encrypted information by using the private key to obtain an encryption algorithm type;
the decrypting the video data cipher text by using the encryption key to obtain the video data to be played comprises the following steps:
and decrypting the video data ciphertext through the decryption algorithm corresponding to the encryption algorithm type by using the encryption key to obtain the video data to be played.
9. The method of claim 6, wherein the encrypted information further includes a check key ciphertext, and wherein the method further comprises:
decrypting a check key ciphertext in the encrypted information by using the private key to obtain an integrity check key;
and verifying the integrity of the encrypted information, the watermark information and the video data ciphertext by using the integrity verification key to obtain an integrity verification result.
10. The method of claim 6, wherein the encrypted video file further comprises playback rights control information, wherein the playback rights control information comprises at least one of: the validity period of the video data to be played is the user identification allowing the video data to be played;
the method further comprises the following steps:
under the condition that the playing authority control information comprises the valid period of the video data to be played, judging whether the video data to be played is in the valid period of the video data to be played, and if not, generating first prompt information indicating that the video data to be played is out of date;
and/or
And under the condition that the playing permission control information comprises a user identifier allowing the video data to be played, judging whether the user indicated by the user information is allowed to play the video data to be played, and if not, generating second prompt information indicating that the current user does not allow the video data to be played.
11. The method of claim 6, wherein the watermark information comprises watermark generation parameters and identification information of a downloading device;
generating a watermark picture according to the watermark information and the user information, comprising:
and generating a watermark picture comprising the identification information of the downloading equipment and the user information according to the watermark generation parameters.
12. The method according to claim 11, wherein the watermark picture further includes a device identifier of the playback device.
13. A video data processing apparatus, for use in a downloading device, the apparatus comprising:
the first encryption module is used for acquiring video data to be played and an encryption key, and encrypting the video data to be played by using the encryption key to obtain a video data ciphertext;
the watermark generation module is used for acquiring watermark generation parameters and identification information of the downloading equipment and generating watermark information according to the watermark generation parameters and the identification information of the downloading equipment, wherein the identification information of the downloading equipment comprises equipment identification and/or user identification of the downloading equipment;
the second encryption module is used for acquiring a public key in a user key pair, and encrypting the encryption key by using the public key to obtain encryption information;
and the splicing module is used for splicing the encrypted information, the watermark information and the video data ciphertext to obtain an encrypted video file.
14. The apparatus of claim 13, further comprising:
the acquisition module is used for acquiring the encryption algorithm type of the video data to be played;
the third encryption module is used for encrypting the encryption algorithm type by using the public key to obtain an algorithm type ciphertext;
the first adding module is used for adding the algorithm type ciphertext into the encryption information;
the device further comprises:
a verification key generation module, configured to generate an integrity verification key for the encrypted information, the watermark information, and the video data ciphertext;
the fourth encryption module is used for encrypting the integrity check key by using the public key to obtain a check key ciphertext;
the second adding module is used for adding the check key ciphertext into the encrypted information;
the watermark generation parameters include: displaying mode, font style and watermark self-defining content of the watermark;
the device further comprises:
a playing permission control information obtaining module, configured to obtain playing permission control information, where the playing permission control information includes at least one of the following contents: the validity period of the video data to be played is the user identification allowing the video data to be played;
and the third adding module is used for adding the playing authority control information into the encrypted video file.
15. A video data processing apparatus, applied to a playback device, the apparatus comprising:
the acquisition module is used for acquiring an encrypted video file, user information of the playing device and a private key bound with the user information, wherein the encrypted video file comprises encrypted information, watermark information and a video data ciphertext, the encrypted information comprises an encrypted key ciphertext, the encrypted key ciphertext is obtained by encrypting a public key, and the public key and the private key belong to the same user key pair;
the first decryption module is used for decrypting an encryption key ciphertext in the encrypted information by using the private key to obtain an encryption key;
the second decryption module is used for decrypting the video data ciphertext by using the encryption key to obtain video data to be played;
the generating module is used for generating a watermark picture according to the watermark information and the user information;
and the creating module is used for creating a watermark window on the video playing window of the video data to be played and displaying the watermark picture in the watermark window.
16. The apparatus of claim 15, wherein the obtaining module is specifically configured to:
acquiring user information of the playing device, and authenticating the user information;
under the condition that the user information passes the authentication, acquiring a private key bound by the user information;
the encryption information further comprises an algorithm type ciphertext, and the device further comprises:
the third decryption module is used for decrypting the algorithm type ciphertext in the encrypted information by using the private key to obtain an encryption algorithm type;
the second decryption module is specifically configured to:
decrypting the video data ciphertext through a decryption algorithm corresponding to the encryption algorithm type by using the encryption key to obtain video data to be played
The encrypted information further includes a check key ciphertext, and the apparatus further includes:
the fourth decryption module is used for decrypting a verification key ciphertext in the encrypted information by using the private key to obtain an integrity verification key;
the verification module is used for verifying the integrity of the encrypted information, the watermark information and the video data ciphertext by using the integrity verification key to obtain an integrity verification result;
the encrypted video file further comprises play right control information, wherein the play right control information comprises at least one of the following contents: the video data to be played has a valid period and a user identifier allowing the video data to be played;
the device further comprises:
the first judging module is used for judging whether the video data to be played is within the valid period of the video data to be played under the condition that the playing authority control information comprises the valid period of the video data to be played, and if not, generating first prompt information indicating that the video data to be played is out of date;
and/or
A second judging module, configured to judge whether to allow the user indicated by the user information to play the video data to be played under the condition that the playing permission control information includes a user identifier that allows the video data to be played, and if not, generate second prompt information indicating that the current user does not allow the video data to be played;
the watermark information comprises watermark generation parameters and identification information of downloading equipment;
the generation module is specifically configured to:
generating a watermark picture comprising the identification information of the downloading equipment and the user information according to the watermark generation parameters;
the watermark picture also comprises a device identifier of the playing device.
17. An electronic device, comprising:
a memory for storing a computer program;
a processor for implementing the method of any one of claims 1 to 5 or 6 to 12 when executing a program stored in a memory.
18. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method of any one of claims 1 to 5 or 6 to 12.
CN202310014849.3A 2023-01-06 2023-01-06 Video data processing method and device, electronic equipment and storage medium Pending CN115767138A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310014849.3A CN115767138A (en) 2023-01-06 2023-01-06 Video data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310014849.3A CN115767138A (en) 2023-01-06 2023-01-06 Video data processing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115767138A true CN115767138A (en) 2023-03-07

Family

ID=85348244

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310014849.3A Pending CN115767138A (en) 2023-01-06 2023-01-06 Video data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115767138A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1615481A (en) * 2002-01-22 2005-05-11 皇家飞利浦电子股份有限公司 Method and system for distributing multimedia object
CN102761790A (en) * 2011-04-27 2012-10-31 航天信息股份有限公司 Digital-watermark-based digital copyright management method and device for IPTV terminals
CN102891754A (en) * 2012-10-10 2013-01-23 雷欧尼斯(北京)信息技术有限公司 Method and device for protecting network digital multimedia copyright
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN104298896A (en) * 2014-09-30 2015-01-21 广州星汇文化发展有限公司 Method and system for managing and distributing digital rights
CN105939487A (en) * 2016-06-06 2016-09-14 乐视控股(北京)有限公司 Video processing method and device
CN106845161A (en) * 2017-01-10 2017-06-13 合网络技术(北京)有限公司 The method and apparatus that broadcasting to multimedia file is encrypted
CN106998475A (en) * 2017-03-24 2017-08-01 浙江宇视科技有限公司 Video transmission path tracking and device
CN108040188A (en) * 2017-10-31 2018-05-15 安徽四创电子股份有限公司 A kind of video source tracing method based on dominant watermark
CN111314781A (en) * 2018-12-11 2020-06-19 青岛海尔多媒体有限公司 Local file encryption method, device, equipment and storage medium
CN114244606A (en) * 2021-12-17 2022-03-25 苏州浪潮智能科技有限公司 Data processing method, system, equipment and computer readable storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1615481A (en) * 2002-01-22 2005-05-11 皇家飞利浦电子股份有限公司 Method and system for distributing multimedia object
CN102761790A (en) * 2011-04-27 2012-10-31 航天信息股份有限公司 Digital-watermark-based digital copyright management method and device for IPTV terminals
CN103379098A (en) * 2012-04-19 2013-10-30 华为技术有限公司 Content sharing method, device and network system thereof
CN102891754A (en) * 2012-10-10 2013-01-23 雷欧尼斯(北京)信息技术有限公司 Method and device for protecting network digital multimedia copyright
CN104298896A (en) * 2014-09-30 2015-01-21 广州星汇文化发展有限公司 Method and system for managing and distributing digital rights
CN105939487A (en) * 2016-06-06 2016-09-14 乐视控股(北京)有限公司 Video processing method and device
CN106845161A (en) * 2017-01-10 2017-06-13 合网络技术(北京)有限公司 The method and apparatus that broadcasting to multimedia file is encrypted
CN106998475A (en) * 2017-03-24 2017-08-01 浙江宇视科技有限公司 Video transmission path tracking and device
CN108040188A (en) * 2017-10-31 2018-05-15 安徽四创电子股份有限公司 A kind of video source tracing method based on dominant watermark
CN111314781A (en) * 2018-12-11 2020-06-19 青岛海尔多媒体有限公司 Local file encryption method, device, equipment and storage medium
CN114244606A (en) * 2021-12-17 2022-03-25 苏州浪潮智能科技有限公司 Data processing method, system, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN106571951B (en) Audit log obtaining method, system and device
US6622247B1 (en) Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority
RU2504005C2 (en) Digital rights management apparatus and method
US20090179071A1 (en) Systems and methods for secure voting
CN103051451A (en) Encryption authentication of security service execution environment
KR20010041400A (en) Transmitting reviews with digital signatures
JPH08166879A (en) Method and apparatus for reinforcement of safety of softwarefor distribution
CN105075176B (en) Challenge-response method and associated client device
US7995766B2 (en) Group subordinate terminal, group managing terminal, server, key updating system, and key updating method therefor
TW202205183A (en) File storage device based on block chain, file access authorization system and method thereof making the file become a token that can be traded on the Internet, and use the blockchain token to control the access to the device file
CN105721903A (en) Method and system for playing online videos
CN102281300A (en) digital rights management license distribution method and system, server and terminal
JP2004030326A (en) Contents use managing system, information processor or information processing method for using or providing contents and computer program
JP2007028015A (en) Program, system and method for time stamp verification, and time stamp generation request method
CN113312664B (en) User data authorization method and user data authorization system
CN112800392A (en) Authorization method and device based on soft certificate and storage medium
WO2021073224A1 (en) Data display method, display terminal, server, display system and storage medium
CN109829329B (en) Method and device for decrypting electronic signature document, storage medium and electronic equipment
CN108900472B (en) Information transmission method and device
CN111476014A (en) Verification method and related device
CN115242471B (en) Information transmission method, information transmission device, electronic equipment and computer readable storage medium
CN114726647B (en) Safe distribution method and system of 4K film content and safe projection system
CN111382451A (en) Security level identification method and device, electronic equipment and storage medium
CN100464341C (en) Generation and management method for digital content use trace based on reliable computing technology
CN115767138A (en) Video data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination