CN101783925B - Method for security protection of video data of set top box for peer-to-peer computing - Google Patents

Method for security protection of video data of set top box for peer-to-peer computing Download PDF

Info

Publication number
CN101783925B
CN101783925B CN2010101360913A CN201010136091A CN101783925B CN 101783925 B CN101783925 B CN 101783925B CN 2010101360913 A CN2010101360913 A CN 2010101360913A CN 201010136091 A CN201010136091 A CN 201010136091A CN 101783925 B CN101783925 B CN 101783925B
Authority
CN
China
Prior art keywords
key
video
top box
peer
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010101360913A
Other languages
Chinese (zh)
Other versions
CN101783925A (en
Inventor
王汝传
陈粒
韩志杰
李致远
吴敏
支萌萌
徐鹤
邵星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN2010101360913A priority Critical patent/CN101783925B/en
Publication of CN101783925A publication Critical patent/CN101783925A/en
Application granted granted Critical
Publication of CN101783925B publication Critical patent/CN101783925B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a method for security protection of video data of a set top box for peer-to-peer computing, which is a technical method for security protection of video data of a P2P IPTV system. On the basis of the P2P IPTV system, a digital image scrambling encryption technology is introduced, and a single key server is designed, thereby achieving the purpose of security protection of video data in the P2P IPTV system. The invention solves the security problem caused by that the P2P IPTV system uses a P2P network for transmitting video data. The method expands the P2P IPTV system on the basis that the original framework of the P2P IPTV system is not changed, designs an encryption algorithm and generation, management, transmission and use of keys, has the advantages of innovation, security, expandability and practicability, and has good application prospects and market value.

Description

A kind of method for security protection of video data that is used for the peer computer top box
Technical field
The present invention proposes the technical method of the security protection of video data of a kind of P2P of being used for IPTV system (based on the interactive Web TV system of Computing Technology); Solved the safety issue of user side STB, belonged to equity and calculate and network security interleaving techniques field through P2P networking transmitting video data.
Background technology
Peer-to-peer network, promptly P2P (Peer-to-Peer) network makes between thousands of the computers through directly exchanging shared computer resource and service.In the P2P network, all computers all are in the status of equity, and promptly in the network, each computer can be asked the network service, can provide services on the Internet for other computers again.This specific character makes the P2P network have very good extensibility, the polymerization that can accomplish resource at lower cost with share, allow that also computer in the network has bigger autonomy and controls in the management of data each other and resource-sharing.Traditional C/S (Client/Server) structure and B/S (Brower/Server) structure depend on server; Not only disposal ability and the bandwidth to server has high requirements; And have the single point failure problem, if i.e. server failing, whole network just can't continue to obtain service.The P2P network does not rely on private server in general, and it is very low to the performance requirement of each node computer, and whole network robustness is high, can effectively solve the single point failure problem.
P2P IPTV is promptly based on the IPTV of Computing Technology; It is a kind of broadband cabled television network that utilizes; Integrate multiple technologies such as the Internet, multimedia, equity calculating, the brand-new technology of the multiple interactive services that comprises DTV is provided to the domestic consumer.Traditional I PTV system is based on the C/S structure; This makes resource in the whole networking to server aggregates; Adapt to the nowadays multi-medium data and the user group who is on the increase of magnanimity; Only improve constantly the number of the bandwidth of server end, the performance of strengthening server, increase server, thereby make operator must constantly increase man power and material's input.P2P IPTV system advantage is; The relation of server and user side STB is reciprocity; Utilize the good characteristic of P2P network; Can improve greatly whole network flow distribution, alleviate load of server, overcome the problem of server single point failure, thereby reduce number of servers and maintenance cost, for operator has saved great amount of manpower and material resources.
Encryption technology is to utilize special means to change important initial data into the mess code data, spies upon initial data to prevent others, when needs use initial data, the mess code data is reduced into initial data with identical or different means.Algorithm and key are the core elements of encryption technology, thereby encryption technology is divided into algorithm for encryption technology and Key Encryption Technology.The former is the complexity and the disguised fail safe that guarantees encryption technology that relies on AES, and the latter's AES is disclosed, and the disguise of encryption key is depended in its fail safe.The digital Image Scrambling encryption technology is meant the technology of transmit leg by mathematics or other field, a significant digital picture is made it to become a rambling image do conversion be used further to transmission.In the image transmission course, illegal interceptor can't obtain original image information from rambling image, thereby reaches the purpose of image encryption.The recipient can recover original image through going random deciphering.In order to ensure the confidentiality of image, the general key of introducing in the scramble process.
P2P IPTV system utilizes the P2P network to come transmitting multimedia data, so safety problem occurred: 1, the disabled user steals the P2P seed file, thereby adds the P2P network, downloads multi-medium data; 2, after validated user was downloaded multi-medium data, illegal copies were given other users or are stolen by other users.Traditional set-top-box system is to utilize condition receiving system to realize the protection to video data; The control word of the continuous conversion of condition receiving system utilization comes video data is carried out real-time scrambling; Carry out real-time descrambling, broadcast at the subscriber computer top box, do not preserve video data.P2P IPTV system then downloads and plays the whole video file, does not delete video file after finishing playing, but supplies other validated users downloads in the P2P network.Therefore, constantly change the real-time scrambling of control word, can't adapt to P2P IPTV system.To sum up can get, P2P IPTV system does not have at present temporarily the security protection of video data scheme that is suitable for, and seems very important so propose a cover based on the security protection of video data scheme of P2P IPTV.
Summary of the invention
Technical problem: the objective of the invention is to propose a kind of method for security protection of video data that is used for the peer computer top box, solved the safety problem that P2P IPTV system utilizes P2P Network Transmission video data to be faced.This method is on the basis of the original framework that does not change P2P IPTV system; P2P IPTV system is expanded; Generation, management, transmission and use to AES and key design; Have novelty, fail safe, extensibility and practicality, have good application prospects and market value.
Technical scheme: method of the present invention has been introduced the digital Image Scrambling encryption technology, has been designed independent key server on the basis of P2P IPTV system, its objective is the video data in the P2P IPTV system is carried out safeguard protection.
The definition of image scrambling conversion: define 2 given image A=[a (i, j)] n * m, establish conversion T and be (x, y): 1≤x≤n; 1≤y≤m, and x, y is integer } to self 1-1 mapping; That is: (x, the element of y) locating transform to position (x ', y ') and locate with position in the image A; Obtain image B, claim that then conversion T is the scramble conversion of image A, still is designated as B=TA.Can find out that from definition { (x, y): 1≤x≤n, 1≤y≤m, and x, y is integer } 1-1 mapping to self is constructed in structure scramble conversion exactly.
If C=TB=T (TA)=T 2(A), claim that then C is the image of twice of A iteration scramble.By that analogy, can carry out repeatedly iteration scramble.
The scramble conversion should be satisfied following two conditions:
(1) conversion be the discrete point territory (x, y): 0≤x, y≤N-1} is to self mapping one by one;
(2) conversion be the discrete point territory (x, y): 0≤x, y≤N-1} is to self full mapping, i.e. conversion is reversible.These two conditions are necessary conditions that the scramble conversion can be accomplished effective scramble, that is to say and have only one to one, but all pixels of transformation results traversing graph picture, and the scramble conversion that inverse transformation exists is only in the reality effectively available.
This method is applied to video-encryption with the digital Image Scrambling encryption technology.Digital image inverse transformation encryption is a kind of special encryption technology to image, and it is different from traditional encryption technology, and the time of its encryption is little to the scale-dependent property of be-encrypted data.Digital image inverse transformation encryption is carried out subregion to image when handling large-size images, be that unit carries out scramble then with the zone, makes this encryption technology to stablize and encrypts large-size images at high speed.Because the fast and stable of digital image inverse transformation encryption is highly suitable for the not high subscriber computer top box of performance.The video-encryption of this method not to the PES behind the coding or multiplexing after TS encrypt, encrypt but each two field picture in the raw video image sequence is carried out digital Image Scrambling, further improved fail safe.
This method also be provided with key server specially, be used for granting, the management of key, and user's request verified.Key is not stored in the subscriber computer top box, but when playing to the key server application, thereby improved the disguise of key, eliminate key owing to being kept at the potential safety hazard that the subscriber computer top box brings.Its quick-reading flow sheets is following:
Step 1 key generator generates random key, supplies AES to use;
The key that step 2 generates according to step 1 pursues the image scrambling of frame and encrypts the sequence of video images that obtains encrypting to the raw video image sequence;
Step 3 encoder utilizes video compression algorithm that the encrypted video image sequence of step 2 is encoded, and forms the video PES Packet Elementary Stream, and is multiplexed into transfer stream file through multiplexer and audio frequency PES Packet Elementary Stream;
Step 4 is published to the media server in the peer-to-peer network with the transfer stream file of step 3, and transfer stream file information and counterpart keys are sent to key server;
Step 5 subscriber computer top box adds peer-to-peer network, the transfer stream file of download step 3;
During transfer stream file that step 6 subscriber computer top box step for playing 5 is downloaded, earlier the media information in user profile and the transfer stream file is sent to key server;
The information that step 7 key server sends step 6 verifies that when checking was passed through, the subscriber computer top box was given in the checking success message loopback that just will comprise counterpart keys, otherwise, return authentication failed message;
Step 8 subscriber computer top box is received the checking message that step 7 is returned, and judges whether to verify successfully: if fail then release; If success is then extracted key and is deposited internal memory in from the checking message of step 7;
Step 9 subscriber computer top box carries out demultiplexing to the transfer stream file of step 5 and obtains the video PES Packet Elementary Stream; The sequence of video images of again the video PES Packet Elementary Stream being decoded and obtaining encrypting, and the key that utilizes step 8 carries out the scramble deciphering to it and obtains the raw video image sequence;
When step 10 finished playing or drops by the wayside when transfer stream file, the key of step 8 disappeared immediately in the internal memory, during following this transfer stream file of less important broadcast, obtain key from key server again.
This method does not change original reciprocity networking set-top-box system framework, is applicable to general reciprocity networking set-top-box system.
Beneficial effect: the present invention is through analyzing the safety problem in the P2P IPTV system; Consider the factor such as characteristics, subscriber computer top box performance of system architecture, the video data of P2P IPTV; Propose the method for security protection of video data of a kind of P2P of being used for IPTV system, and in the subscriber computer top box adopts the P2P IPTV system of DM6446 chip, realized prototype system.The key point of technology is based on the video-encryption of digital Image Scrambling encryption technology; Adopted special key server managing keys; Key is not kept at the subscriber computer top box, but when playing at every turn to key server application key.Of the present invention safe, performance good, high and have good autgmentability to the adaptability of P2P IPTV system, provide below and specify:
Safe: adopt the digital Image Scrambling encryption technology, this encryption technology fail safe is good, efficient is high, and the image approximate after the encryption is difficult to crack in white noise.Utilize this technology that each two field picture of video is encrypted, and then the synthetic video file, can protect the safety of video file greatly.Adopt independently key server managing keys, key is not stored in client server, but when playing to the key server application, thereby improved the disguise of key, and further improved fail safe.
Good performance: because the function of subscriber computer top box designs and cost consideration in the P2P IPTV system; Existing subscriber computer top box performance is limited; If adopting traditional encryption technology encrypts the big video of data volume; The deciphering time of subscriber computer top box will be that the user can't accept so, and can't realize playing while deciphering at all.And the method for scrambling in the employing condition receiving system, fail safe is low, and constantly conversion scrambling control word is not suitable for the P2P network.This method has adopted the digital Image Scrambling encryption technology of stable high speed, and the speed of this encryption technology is very fast, is very suitable for the limited subscriber computer top box of performance.Because the digital Image Scrambling encryption technology carries out the branch block operations to image, big or small insensitive to image is not only applicable to present video, is applicable to later HD video yet.
High-adaptability to P2P IPTV system: this method does not change original framework of P2P IPTV system; But original framework is carried out suitable expansion; Key generator and scrambling encryption device have been added at publisher server; Add the scramble decipher at the subscriber computer top box, and added a key server, can be applicable to general P2PIPTV system.And this method is to the not change of whole flow process of the coding of original video data, multiplexing, demultiplexing, decoding, and only on the aspect of video image, encrypts, and applicability is high.
Good autgmentability: because this method adopts modularized design method, the system module functional hierarchy is clearly demarcated, therefore can add new function easily, and the prior function of also can upgrading easily is so this method has good extensibility.
Description of drawings
Fig. 1 is a system architecture diagram;
Fig. 2 is encryption flow figure;
Fig. 3 is the checking flow chart;
Fig. 4 is the deciphering flow chart.
Embodiment
One, architecture
This programme mainly is divided into publisher server, media server, key server and subscriber computer top box four parts, concrete architecture such as Fig. 1.
Publisher server has comprised scrambling encryption device, key generator, video encoder, audio coder and multiplexer.Original video can be regarded the image sequence of per second 25 frames as, promptly one second kind 25 width of cloth images.The scrambling encryption device is a kind of image encryption device, utilizes its one second kind that 25 width of cloth images are encrypted.Key generator generates the key that is used for scrambling encryption and deciphering.Because very big of the video image after encrypting; Can't carry out the networking transmission; So use video encoder, it utilizes between the video image related and redundant greatly, and video image is compressed; The compression back forms basic stream (PES, the Program Elementary Stream) file after the packing.Original audio data is also very big, is not suitable in transmission over networks, must be compressed by audio coder, forms the PES file.Multiplexer carries out video PES file and audio frequency PES file multiplexing, and generates and be suitable for Network Transmission, MPTS (TS, Transport Stream) file that anti-packet loss ability is strong.
Be used to deposit the TS file of publisher server issue during media server, supply other subscriber computer top boxs downloads in the P2P network.Here be noted that the media server in the P2P network has a lot of platforms, publisher server will be uploaded the TS file to every media server, and this process also can realize through the P2P network.
Key server has mainly comprised key database, customer data base and validator.Key database is used to store TS fileinfo and the counterpart keys that publisher server transmits.Customer data base is used for storing subscriber information, comprises identifier, authority, identity information of user etc.The effect of validator is user profile and the media information that the monitoring users STB sends; And search customer data base with to user identity with whether this media file is enjoyed access rights; When checking was passed through, validator can take out corresponding key and send to the subscriber computer top box from key database.
The subscriber computer top box is made up of demodulation multiplexer, audio decoder, Video Decoder and scramble decipher four module.The effect of demodulation multiplexer is that the Voice & Video in the TS file is separated.The audio frequency PES decoding that audio decoder is separated demodulation multiplexer is reduced into original audio frequency.Video Decoder is reduced into the encrypted video image with the audio frequency PES decoding of separating.The scramble decipher with decoded encrypted video picture decoding, is reduced into original video according to the key that key server transmits.
It should be noted that the communication between publisher server, key server and subscriber computer top box three parts, all high by algorithm complex, the RSA cryptographic algorithms that fail safe is good is encrypted, to guarantee the fail safe of whole system.
Two, procedure
Publisher server enciphered video data, issue TS file, to key server transmission TS fileinfo and key; Key server is preserved key, and checking user request transmits key; The subscriber computer top box is to key server request key, through P2P network download TS file, demultiplexing, decoding, deciphering and broadcast.Whole proposal can be divided into three processes substantially: ciphering process, proof procedure, decrypting process.
Ciphering process is mainly accomplished by publisher server, in original publisher server, has added key generator and scrambling encryption device, whole ciphering process such as Fig. 2.
Key generator generation key at random, original sequence of video images can also can be obtained by the video file decoding from camera.Original sequence of video images just is equivalent to many continuous images, and the scrambling encryption device utilizes key that each image has been carried out scrambling encryption.The implementation method of scrambling encryption device is a lot, like the pseudo random sequence scrambling encryption, and chaos matrix scrambling encryption etc., the complexity that these concrete scrambling encryption implementation methods can free algorithm for design is to be applicable to the subscriber computer top box.Behind the scrambling encryption, original video image will become the random picture that can't understand, with the protection video image.Because the video image of each frame has obtained encryption, entire video data has obtained protection from content, in any case the transmission copying video data, as long as encrypt the not deciphering of rear video image sequence, entire video data is exactly safe.Sequence of video images after the encryption is encoded by video encoder; The implementation method of encoder also is optional; Like MPEG-2, MPEG-4, video compression algorithm etc. H.264, different compression algorithm compression ratio and efficient are variant, have selected the MPEG-2 video coding here for use.In publisher server, video encoder generally is to be accomplished by the Digital Image Processing card of special use, and the video card of part is also supported the vision hardware coding now.Sequence of video images after the encryption forms the relatively little PES Packet Elementary Stream PES of data scale after video encoder encodes.
Audio coder is encoded to the voice data of input, and the implementation of audio coder can be selected MP2, ACC or MP3 etc. for use here, has selected MP2 here.Voice data forms audio frequency PES Packet Elementary Stream PES after encoding.Audio coder is generally accomplished by sound card.
A PES Packet Elementary Stream PES can't comprise video and audio frequency simultaneously, and the PES anti-packet loss ability is poor, is inappropriate for Network Transmission, so multiplexer just is in the same place audio frequency PES generator stream PS or transport stream TS with video PES is multiplexing.Program flow PS is used for VCD or DVD more, and transport stream TS generally is used for complex environment, like Network Transmission.MPTS is actually the bag that is replaced by a plurality of audio frequency and video to be formed, and each wraps 188 bytes, even lost partial data, still can recover original video.After forming transport stream TS, can release by the Streaming Media mode, also can all audio frequency and video bags be preserved into single file, promptly the transport stream TS file will form the TS file here.
After forming the TS file; Publisher server can be according to TS documenting P2P seed file; And, comprise to EPG server issue seed and TS fileinfo, to the Tracker server of media server transmission TS file, renewal P2P network to P2P network issue TS file.Publisher server can send to key server with TS fileinfo and counterpart keys then.
Proof procedure is meant the reciprocal process between subscriber computer top box and the key server, like Fig. 3.The subscriber computer top box extracted the media information in the TS file earlier before playing the TS file, like the numbering of TS file, programm name etc., and with media information encryption sends to key server to obtain key with user profile.
Key server has comprised key database, customer data base and validator.After key server received the message that the subscriber computer top box sends, validator can therefrom extract user profile, and in customer data base, searches.If can not find corresponding information, show it is illegal user, send authentication failed message.If find corresponding informance, show it is validated user, so validator can continue to extract media information, and according to the information in the customer data base judge this validated user whether have the visit these medium right.If no, send authentication failed message, if authority is arranged, validator just takes out corresponding key from key database, send to the user.Authentication failed message be 32 zero, the checking success message is 288, comprise high 32 one with low 256 key.The user can revise the data structure of checking message as required voluntarily.
After the subscriber computer top box receives the checking message that server returns, judge whether success of checking according to high 32 earlier.If failure is directly withdrawed from, if success just extracts key and gets into decrypting process.The interacting message of subscriber computer top box and key server is encrypted by RSA cryptographic algorithms in the whole verification process, and is safe and reliable.
Decrypting process is mainly described the subscriber computer top box after getting access to key, handles and play the process of TS file, its flow process such as Fig. 4.Decrypting process is mainly accomplished by the subscriber computer top box, on the basis of original subscriber computer set top box module, adds the scramble decipher.Because scrambling encryption is that original sequence is encrypted, and does not influence coding, the multiplex process of video, all need not to change original subscriber computer set top box module, only need behind decoder decode PES, the sequence of video images that generates are deciphered get final product.The subscriber computer top box is through EPG server program downloading information and seed file, and then adding P2P network, downloads the TS file.Before playing the TS file, the subscriber computer top box obtains the media information of TS file earlier, and to key server application key.
Behind the key that subscriber computer top box reception key server transmits, earlier key is kept in the internal memory, begin to read each bag of TS file then, it is carried out demultiplexing, obtain two PES.Packet header to PES is analyzed, and is audio frequency PES so that which to be confirmed, which is video PES.Audio frequency PES directly sends into audio decoder, through deciphering, obtains original audio data and writes the buffer memory of audio frequency apparatus.
Video Decoder can be analyzed video PES, with the decoder of what kind it is decoded confirming, like MPEG-2, MPEG-4, H.264 wait.After definite decoder kind, the subscriber computer top box is sent video PES into DSP then and is decoded earlier with corresponding initialization function initialization DSP, obtains the sequence of video images behind the scrambling encryption.At this moment, the scramble decipher is deciphered each two field picture according to key, is reduced into original image, obtains original sequence of video images.At last these image processing are become the image of yuv format, write the buffer memory of display device.

Claims (1)

1. method for security protection of video data that is used for the peer computer top box, the entire method process that it is characterized in that the video data in the peer computer set-top box system is carried out safeguard protection is following:
Step 1. key generator generates random key, supplies AES to use;
The key that step 2. generates according to step 1 pursues the image scrambling of frame and encrypts the sequence of video images that obtains encrypting to the raw video image sequence;
Step 3. encoder utilizes video compression algorithm that the encrypted video image sequence of step 2 is encoded, and forms the video PES Packet Elementary Stream, and is multiplexed into transfer stream file through multiplexer and audio frequency PES Packet Elementary Stream;
Step 4. is published to the media server in the peer-to-peer network with the transfer stream file of step 3, and transfer stream file information and counterpart keys are sent to key server;
Step 5. subscriber computer top box adds peer-to-peer network, the transfer stream file of download step 3;
During transfer stream file that step 6. subscriber computer top box step for playing 5 is downloaded, earlier the media information in user profile and the transfer stream file is sent to key server;
The information that step 7. key server sends step 6 verifies that when checking was passed through, the subscriber computer top box was given in the checking success message loopback that just will comprise counterpart keys, otherwise, return authentication failed message;
Step 8. subscriber computer top box is received the checking message that step 7 is returned, and judges whether to verify successfully: if the failure would withdraw from; If success is then extracted key and is deposited internal memory in from the checking message of step 7;
Step 9. subscriber computer top box carries out demultiplexing to the transfer stream file of step 5 and obtains the video PES Packet Elementary Stream; The sequence of video images of again the video PES Packet Elementary Stream being decoded and obtaining encrypting, and the key that utilizes step 8 carries out the scramble deciphering to it and obtains the raw video image sequence;
When step 10. finished playing or drops by the wayside when transfer stream file, the key of step 8 disappeared immediately in the internal memory, during following this transfer stream file of less important broadcast, obtain key from key server again.
CN2010101360913A 2010-03-30 2010-03-30 Method for security protection of video data of set top box for peer-to-peer computing Expired - Fee Related CN101783925B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101360913A CN101783925B (en) 2010-03-30 2010-03-30 Method for security protection of video data of set top box for peer-to-peer computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101360913A CN101783925B (en) 2010-03-30 2010-03-30 Method for security protection of video data of set top box for peer-to-peer computing

Publications (2)

Publication Number Publication Date
CN101783925A CN101783925A (en) 2010-07-21
CN101783925B true CN101783925B (en) 2012-07-04

Family

ID=42523715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101360913A Expired - Fee Related CN101783925B (en) 2010-03-30 2010-03-30 Method for security protection of video data of set top box for peer-to-peer computing

Country Status (1)

Country Link
CN (1) CN101783925B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924905A (en) * 2010-09-01 2010-12-22 新邮通信设备有限公司 Method and system for encrypting and decrypting in video telephone communication
CN108768606B (en) * 2018-05-10 2021-09-17 深圳市汇星数字技术有限公司 Streaming media real-time encryption method and system based on video transmission
CN113554543B (en) * 2020-12-07 2024-03-12 浙江宇视科技有限公司 Identification method and device based on scrambled image, electronic equipment and medium
CN112507366B (en) * 2020-12-18 2024-03-26 北京国电通网络技术有限公司 Method and system for efficiently aggregating multidimensional data in smart power grid
CN115278312B (en) * 2022-07-21 2023-11-14 中山亿联智能科技有限公司 Encryption method for safe transmission of set top box information
CN117521119A (en) * 2024-01-08 2024-02-06 福建鸿翔建设工程有限公司 VR (virtual reality) -technology-based safety experience method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1254475A (en) * 1997-03-21 2000-05-24 卡纳尔股份有限公司 Method of downloading of data to MPEG receiver/decoder and MPEG transmission system for implementing the same
US20050100167A1 (en) * 2003-11-11 2005-05-12 Jukka Alve System and method for using DRM to control conditional access to broadband digital content
CN1716850A (en) * 2003-09-29 2006-01-04 美国博通公司 Method and system for secure verification of a set-top-box chip
US7039802B1 (en) * 1997-06-06 2006-05-02 Thomson Licensing Conditional access system for set-top boxes

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1254475A (en) * 1997-03-21 2000-05-24 卡纳尔股份有限公司 Method of downloading of data to MPEG receiver/decoder and MPEG transmission system for implementing the same
US7039802B1 (en) * 1997-06-06 2006-05-02 Thomson Licensing Conditional access system for set-top boxes
CN1716850A (en) * 2003-09-29 2006-01-04 美国博通公司 Method and system for secure verification of a set-top-box chip
US20050100167A1 (en) * 2003-11-11 2005-05-12 Jukka Alve System and method for using DRM to control conditional access to broadband digital content

Also Published As

Publication number Publication date
CN101783925A (en) 2010-07-21

Similar Documents

Publication Publication Date Title
CN101719910B (en) Terminal equipment for realizing content protection and transmission method thereof
US9038147B2 (en) Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
CN103355000B (en) Data security is expanded in player application
CN110401818B (en) Safe communication system for power video transmission
CN101783925B (en) Method for security protection of video data of set top box for peer-to-peer computing
CN101534433B (en) Streaming media encryption method
US20150356281A1 (en) Secure Watermarking of Content
EP2929695A1 (en) Digital rights management for segmented content
KR20040088365A (en) Scalable, error resilient drm for scalable media
CN101277181A (en) Dynamic multilayer encryption method for managing flow medium digital authority
CN103686333A (en) Audio video protecting method and audio video terminal
JP5437073B2 (en) Method and apparatus for managing keys and method and apparatus for acquiring keys
US10691778B2 (en) Method and system for providing secure codecs
JP2005039835A (en) Individual video encryption system and method
CN103039088A (en) Method and system for secure broadcasting of a digital data stream
US8842823B2 (en) Technique for determining usage of encrypted media content
KR20220036916A (en) How to watermark a video fragment with 2 or more variants
Zhu et al. A DRM system supporting what you see is what you pay
US20240137624A1 (en) Watermarking multimedia fragments into two or more variants
CN102326399A (en) Method and apparatus for secure distribution of audiovisual data encapsulated according to a plurality of transport protocols
Jayashree et al. An improved multilevel resource handling strategy for cloud based video streaming
Lee et al. A Novel Frequency Billing Service in Digital Television System.
Tanwar et al. Video Encryption for Secure Video Transmission in IPTV
Yang et al. The Simplified and Secure Conditional Access for Interactive TV service in Converged Network
Tanwar et al. Optimized Dual Channel Video Encryption Technique for IPTV

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20100721

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000219

Denomination of invention: Method for security protection of video data of set top box for peer-to-peer computing

Granted publication date: 20120704

License type: Common License

Record date: 20161121

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: Nanjing Post & Telecommunication Univ.

Contract record no.: 2016320000219

Date of cancellation: 20180116

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120704

Termination date: 20180330