CN103078861B - A kind of network terminal control method for playing back verified based on AES and material - Google Patents

A kind of network terminal control method for playing back verified based on AES and material Download PDF

Info

Publication number
CN103078861B
CN103078861B CN201310003809.5A CN201310003809A CN103078861B CN 103078861 B CN103078861 B CN 103078861B CN 201310003809 A CN201310003809 A CN 201310003809A CN 103078861 B CN103078861 B CN 103078861B
Authority
CN
China
Prior art keywords
file
bytes
value
byte
network terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310003809.5A
Other languages
Chinese (zh)
Other versions
CN103078861A (en
Inventor
吴长太
曹礼玉
胡光杰
廖燕梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengonda Technology Co., Ltd.
Original Assignee
FUJIAN SANYUANDA SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FUJIAN SANYUANDA SOFTWARE Co Ltd filed Critical FUJIAN SANYUANDA SOFTWARE Co Ltd
Priority to CN201310003809.5A priority Critical patent/CN103078861B/en
Publication of CN103078861A publication Critical patent/CN103078861A/en
Application granted granted Critical
Publication of CN103078861B publication Critical patent/CN103078861B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of network terminal control method for playing back verified based on AES and material, in order to ensure integrality and the uniqueness of playlist and material file, whether the network terminal all needs decryption verification playlist and playing material to be issued by platform end before each use playlist, and the network terminal only plays the material file issued by platform end.For little material, as html(htm) file, playlist xml file, txt text, can carry out the computing of full text School Affairs; And for large material, as picture file and video file, if carry out full text computing with School Affairs, will largely on take the network terminal processing time, reduce the overall broadcast performance of the network terminal.Therefore, process large material, adopt the method extracting certain position of material use CRC32 algorithm calculation check value to carry out, the present invention can shorten the time of network terminal process encryption and decryption, can ensure integrality and the uniqueness of material file.

Description

A kind of network terminal control method for playing back verified based on AES and material
Technical field
The present invention relates to technical field of communication equipment, particularly relate to a kind of network terminal control method for playing back verified based on AES and material.
Background technology
Current media termination divides by place and mainly comprises: vehicle-mounted media terminal and building media termination, and they have a common feature: be exactly broadcasting and the transmission of carrying out media in the public place of flowing.Therefore business is dropped into for terminal equipment, for guaranteeing that the fail safe of device plays, uniqueness and independence all have larger requirement.Show according to current related data and the analysis of trade information, different vendor is not quite similar to media content data cipher mode, and what have does not encrypt completely, and media data occurs with form expressly completely in terminal; And the means encryption that some uses are too complicated, increase development cost, increase overhead.Present patent application file is considered based on total system, especially for the embedded system that hardware resources is relatively nervous, proposes a kind of novel encryption and verification algorithm.The data of media bearer are divided into two kinds of mode process by this algorithm, and one will carry out AES encryption in full, and another kind extracts certain position in data to make AES encryption.The effective combination of the two, in the fail safe of data content and the operational efficiency of system, finds a metastable balance point, is also well positioned to meet the Information Security of current device business proposition and the requirement of uniqueness.
Have now in technology and disclose one " mobile terminal apparatus electronic file storage organization and management method ", see that publication number is: CN101183374, publication date is: the Chinese patent of 2008.05.21, this invention relates to the field of the wireless mode management document of mobile terminal device, current computer documents management is not suitable for mobile terminal device with storage mode, also incompatible, this invention have employed a series of software and hardware technology for overcoming these problems, changed by material format, fill memory block, padding data position, generate catalogue and label, fill copyright data, compressed text data, encrypted electronic content, final generation comprises initial data, bibliographic structure, the compression of copyright information the file destination of encipherment protection and UMD file, copy to mobile terminal, at user terminal, edition interface is set, this invention structure is simple, can operating procedure few, improve compatibility, flexibility, fail safe and extensibility.Just the carrying out of e-file is managed in this invention, e-file is carried out to the operation of material format conversion; Do not relate to the problem in fail safe and terminal equipment operational efficiency.
Summary of the invention
The technical problem to be solved in the present invention, be to provide a kind of network terminal control method for playing back verified based on AES and material, it shortens the processing time of the network terminal to a great extent, also can ensure integrality and the uniqueness of material file.
The present invention is achieved in that a kind of network terminal control method for playing back verified based on AES and material, comprises the steps:
Step 1, ad content the html file, txt text and the playlist xml file that use play by the network terminal carry out aes algorithm encryption by platform end, the material that the ad content of network terminal broadcasting is quoted is uploaded by platform end, and adds cryptographic check code at each material end;
Step 2, platform end are by issuing download command to the network terminal, and the path at ftp server place needed for informing network terminal downloads,
Step 3, the network terminal obtain after described path resolves, and start FTP thread download html file, txt text and the playlist xml file after aes algorithm encryption and carry out end add the process of cryptographic check code after each material; The network terminal, when broadcasting advertisement content, is decrypted html file, txt text and playlist xml file after encryption, and verifies each material quoted in ad content;
Step 4, when deciphering html file, txt text and playlist xml file, any file decryption is wrong or checking material is wrong, then the network terminal plays this wrong file or wrong material by forbidding; And reporting platform end, corresponding wrong file or material are downloaded in request again.
Tool of the present invention has the following advantages: the present invention adopts AES encryption and the material checking of html file, txt text and playlist xml file, neither affects the normal play of ad content, also can meet operational demand.The more important thing is the cipher mode existed compared to existing market, more standardization, easy to operate, and be more applicable for integrality and the uniqueness of network mode releasing advertisements content, while guaranteed performance improves, reduce in product the cost using encryption largely, improve product competitiveness in the market, and shorten the processing time of the network terminal to a great extent, also can ensure integrality and the uniqueness of material file.
Accompanying drawing explanation
The schematic flow sheet of Fig. 1 platform end encryption html file, txt text and playlist xml file.
The each material end of Fig. 2 platform end to picture file, video file adds the schematic flow sheet of cryptographic check code.
The schematic flow sheet of Fig. 3 network terminal decryption verification html file, txt text and playlist xml file.
The schematic flow sheet of Fig. 4 network terminal decryption verification picture file, video file.
Embodiment
Refer to shown in Fig. 1 to Fig. 4, a kind of network terminal control method for playing back verified based on AES and material of the present invention, comprises the steps:
Step 1, ad content the html file (or htm file), txt text and the playlist xml file that use play by the network terminal carry out aes algorithm encryption by platform end, the material that the ad content of network terminal broadcasting is quoted is uploaded by platform end, and adds cryptographic check code at each material end;
Wherein, described ad content the html file, txt text and the playlist xml file that use play by the network terminal carries out aes algorithm encryption by platform end, specifically comprises the steps:
Step 10, the html file, txt text and the playlist xml file that use at platform end acquisition ad content; These three files are operated to step 18 by step 11 one by one:
The length of step 11, calculation document, obtains the file length value of the HEX form of 4 bytes, and inadequate 4 bytes of length of file length value, mend 0 above; More than 4 bytes, remove the high byte exceeded, retain the value of low 4 bytes;
The School Affairs of step 12, calculation document, obtains the checksum value of the HEX form of 4 bytes, and checksum value is obtained by accumulation calculating all bytes of whole file, and inadequate 4 bytes of checksum value length, mend 0 above; More than 4 bytes, remove the high byte exceeded, retain the value of low 4 bytes;
The alignment check value of step 13, acquisition file, obtain the alignment check value of the HEX form of 2 bytes, alignment check value is by the first byte of checksum value and low 42 bytes formed of the second byte in high 4 and the step 12 of the first byte of step 11 file length value and the second byte;
Step 14, the threshold value A (this threshold value A is 4 byte values that platform end and the network terminal are arranged) of 4 bytes file length value in step 11 and platform end preset carry out XOR (XOR) computing, again operation result is changed into ASCII value B, this B is the character string of 8 bytes;
Step 15, this threshold value C of threshold value C(of 4 bytes checksum value in step 12 and platform end preset are 4 byte values that platform end and the network terminal are arranged) carry out XOR (XOR) computing, again operation result is changed into ASCII value D, this D is the character string of 8 bytes;
Step 16, the alignment check value in step 13 is changed into ASCII value E, this E is the character string of 4 bytes;
Step 17, the character string B obtaining in step 14, step 15, step 16, D, E, form the character string F of 20 bytes with BED order;
Step 18, the character string F in step 17 is appended to the end of this file, and encrypts this file with aes algorithm.
The material that the ad content of network terminal broadcasting is quoted is uploaded by platform end, and adds cryptographic check code at each material end, specifically comprise the steps:
Step 21, the story types uploaded according to platform end, find out and need material, i.e. picture file and video file; This picture file and video file are all operated to step 29 by step 22:
The length of step 22, calculation document; Obtain the file length value of the HEX form of 4 bytes, inadequate 4 bytes of length of file length value, mend 0 above; More than 4 bytes, remove the high byte exceeded, retain the value of low 4 bytes;
The CRC32 verification of step 23, calculation document; Obtain the check value of the HEX form of 2 bytes, this test value gets 1K byte and last 1K byte before this file to do CRC32 verification;
Step 24, acquisition alignment check value, obtain the alignment check value of the HEX form of 2 bytes; This alignment check value is by the first byte of CRC32 check value and low 42 bytes formed of the second byte in high 4 and the step 23 of the first byte of step 22 file length value and the second byte;
Step 25, the threshold value A of the file length value in step 22 and described 4 bytes is carried out XOR, then operation result is changed into ASCII value H, this H is the character string of 8 bytes;
Step 26, the threshold value C of the check value in step 23 and described 4 bytes is carried out XOR, then operation result is changed into ASCII value I, this I is the character string of 8 bytes;
Step 27, the alignment check value in step 24 is changed into ASCII value J, this J is the character string of 4 bytes;
Step 28, the character string H obtaining in step 25, step 26, step 27, I, J, form the character string K of 20 bytes with HJI order;
Step 29, the character string K in step 28 done aes algorithm encryption, be then appended to the end of this file.
Step 2, platform end are by issuing download command to the network terminal, and the path at ftp server place needed for informing network terminal downloads,
Step 3, the network terminal obtain after described path resolves, and start FTP thread download html file, txt text and the playlist xml file after aes algorithm encryption and carry out end add the process of cryptographic check code after each material, (this playlist xml file is the strategy file that the network terminal controls media play, this file have recorded the material path and other property values of the time span of material broadcasting and the strategy of task switch etc. of quoting in network terminal playing process, the network terminal is in download material process with when calling playlist xml file broadcasting media task, all needing first to decipher playlist xml file and verification identifying code) network terminal is when broadcasting advertisement content, to the html file after encryption, txt text and playlist xml file are decrypted, and each material quoted in ad content is verified,
Step 4, when deciphering html file, txt text and playlist xml file, any file decryption is wrong or checking material is wrong, then the network terminal plays this wrong file or wrong material by forbidding; And reporting platform end, corresponding wrong file or material are downloaded in request again.
Wherein, the described network terminal, when broadcasting advertisement content, is decrypted html file, txt text and playlist xml file after encryption, specifically comprises the steps:
Step 31, the network terminal obtain each file downloaded, and judge whether each file type downloaded is html file, txt text or playlist xml file; Then each file downloaded is operated to step 38 according to step 32 one by one, no, then do not operate;
Step 32, the file downloaded with aes algorithm deciphering;
Step 33, extract this end of file 20 byte, and resolve into three parts, Part I is 8 bytes above in 20 bytes, and this character string is changed into the value L of the HEX form of 4 bytes; Part II is middle 4 bytes in 20 bytes, and the character string of middle 4 bytes is changed into the value M of the HEX form of 2 bytes; Part III is last 8 bytes in 20 bytes, and the character string of these last 8 bytes is changed into the value N of the HEX form of 4 bytes;
Step 34, the L obtained in step 33 and the threshold value A of described 4 bytes are carried out XOR, obtain result O; The threshold value C of the N obtained in step 33 and described 4 bytes is carried out XOR, obtains result P;
First byte and the second byte high 4 and extract the low 4 of the first byte and the second byte in P, the Q value of composition 2 bytes in O in step 35, extraction step 34;
Step 36, compare M value and whether Q value is equal, if equal, then continue step 37; If unequal, then forbid broadcasting advertisement content, and report the alignment of platform end file verification to make mistakes, request re-issues this file;
Step 37, remove end of file 20 bytes after, calculate length R and the School Affairs S of this file;
In step 38, determining step 37, whether R equals O, and whether S equals P; The two is all equal, then continue material checking, if one of them does not wait or the two is all unequal, then forbid broadcasting advertisement content, and report the bad checksum of platform end file, request re-issues this file.
The network terminal generally hardware resource is all relatively nervous, especially processes relatively large material file, as video file and picture file.Therefore, calculate the check value of picture and video, just do not adopt the cumulative sum algorithm of byte in full, but directly obtain this file header 1K byte and last 1K byte, then make CRC32 algorithm calculation check value.So just can shorten the CPU processing time to a great extent, improve running efficiency of system.The file relative path in the present invention, verify each material quoted in ad content, specifically comprise the steps: step 41, providing according to play list file obtains material in this locality, i.e. picture file or video file;
The character string of step 42,20 bytes in extraction document end, and being first decrypted with aes algorithm, then resolves into three parts, and Part I is 8 bytes above in 20 bytes, and this character string is changed into the value T of the HEX form of 4 bytes; Part II is middle 4 bytes in 20 bytes, and the character string of middle 4 bytes is changed into the value U of the HEX form of 2 bytes; Part III is last 8 bytes in 20 bytes, and the character string of last 8 bytes is changed into the value V of the HEX form of 4 bytes;
Step 43, the T obtained in step 42 and the threshold value A of described 4 bytes are carried out XOR, obtain result W; The threshold value C of the V obtained in step 42 and described 4 bytes is carried out XOR, obtains result X;
First byte and the second byte high 4 and extract the low 4 of the first byte and the second byte in X, the Y value of composition 2 bytes in W in step 44, extraction step 43;
Step 45, compare U value and whether Y value is equal, if equal, then continue step 46; If unequal, then forbid broadcasting advertisement content, and report the alignment of platform end picture file or video file verification to make mistakes, request re-issues this file;
Step 46, remove end of file 20 bytes after, calculate length Z and the CRC32 check value AB of this file, this check value AB does CRC32 computing obtain for getting file header 1K byte and end 1K byte;
In step 47, determining step 46, whether Z equals W, and whether AB equals X; The two is all equal, then, and and broadcasting advertisement content; If one of them does not wait or the two is all unequal, then forbid broadcasting advertisement content, and report platform end picture file or video file bad checksum, request re-issues this file.
Here it is worth mentioning that:
1, platform end encrypted authentication html(or htm) file, txt text, playlist xml file,
Platform end is according to the file uploaded, determine whether html(or htm) file, txt text, playlist xml file, when being these files, the file structure that final operation obtains is respectively as table 1:html(or htm) file structure, table 2:txt text structure, table 3 playlist xml file structure:
Table 1
Html file 8 byte file length 4 byte-aligned test values 8 byte file School Affairs
Table 2
Txt text 8 byte file length 4 byte-aligned test values 8 byte file School Affairs
Table 3
Playlist xml file 8 byte file length 4 byte-aligned test values 8 byte file School Affairs
Wherein: namely 8 byte file length are the ascii strings of 8 bytes, are character string B;
4 byte-aligned test values are also ascii strings, are character string E;
8 byte file School Affairs are also ascii strings, are character string D.
2, platform end encrypted authentication picture file, video file
Platform end, according to the file uploaded, determines whether picture file, video file, when being these files, finally operates the file structure that obtains respectively as table 4: picture file structure, table 5: video file structure.
Table 4
Picture file 8 byte file length 4 byte-aligned test values 8 byte CRC32 check values
Table 5
Video file 8 byte file length 4 byte-aligned test values 8 byte CRC32 check values
Wherein: namely 8 byte file length are the ascii strings of 8 bytes, are character string H;
The alignment test value of 4 bytes is also ascii string, is character string J;
8 byte CRC32 check values are also ascii strings, are character string I.
In a word, consider based on total system, especially for the embedded system that hardware resources is relatively nervous, propose a kind of novel encryption and verification algorithm.The data of media bearer are divided into two kinds of mode process by this algorithm, and one will carry out AES encryption in full, and another kind extracts certain position in data to make AES encryption.The effective combination of the two, in the fail safe of data content and the operational efficiency of system, finds a metastable balance point, is also well positioned to meet the Information Security of current device business proposition and the requirement of uniqueness.And it reduces in product the cost using encryption largely, improve product competitiveness in the market, and shorten the processing time of the network terminal to a great extent, also can ensure integrality and the uniqueness of material file.
The foregoing is only preferred embodiment of the present invention, all equalizations done according to the present patent application the scope of the claims change and modify, and all should belong to covering scope of the present invention.

Claims (3)

1., based on the network terminal control method for playing back that AES and material verify, it is characterized in that, comprise the steps:
Step 1, ad content the html file, txt text and the playlist xml file that use play by the network terminal carry out aes algorithm encryption by platform end, the material that the ad content of network terminal broadcasting is quoted is uploaded by platform end, and adds cryptographic check code at each material end; Described ad content the html file, txt text and the playlist xml file that use play by the network terminal carries out aes algorithm encryption by platform end, specifically comprises the steps:
Step 10, the html file, txt text and the playlist xml file that use at platform end acquisition ad content; These three files are operated to step 18 by step 11 one by one:
The length of step 11, calculation document, obtains the file length value of the HEX form of 4 bytes, and inadequate 4 bytes of length of file length value, mend 0 above; More than 4 bytes, remove the high byte exceeded, retain the value of low 4 bytes;
The School Affairs of step 12, calculation document, obtains the checksum value of the HEX form of 4 bytes, and checksum value is obtained by accumulation calculating all bytes of whole file, and inadequate 4 bytes of checksum value length, mend 0 above; More than 4 bytes, remove the high byte exceeded, retain the value of low 4 bytes;
The alignment check value of step 13, acquisition file, obtain the alignment check value of the HEX form of 2 bytes, alignment check value is by the first byte of checksum value and low 42 bytes formed of the second byte in high 4 and the step 12 of the first byte of step 11 file length value and the second byte;
Step 14, the threshold value A of 4 bytes file length value in step 11 and platform end preset are carried out XOR, then operation result are changed into ASCII value B, and this B is the character string of 8 bytes;
Step 15, the threshold value C of 4 bytes checksum value in step 12 and platform end preset carry out XOR, then operation result are changed into ASCII value D, and this D is the character string of 8 bytes;
Step 16, the alignment check value in step 13 is changed into ASCII value E, this E is the character string of 4 bytes;
Step 17, the character string B obtaining in step 14, step 15, step 16, D, E, form the character string F of 20 bytes with BED order;
Step 18, the character string F in step 17 is appended to the end of this file, and encrypts this file with aes algorithm;
Wherein, the material that the ad content of network terminal broadcasting is quoted is uploaded by platform end, and adds cryptographic check code at each material end, specifically comprise the steps:
Step 21, the story types uploaded according to platform end, find out and need material, i.e. picture file and video file; This picture file and video file are all operated to step 29 by step 22:
The length of step 22, calculation document; Obtain the file length value of the HEX form of 4 bytes, inadequate 4 bytes of length of file length value, mend 0 above; More than 4 bytes, remove the high byte exceeded, retain the value of low 4 bytes;
The CRC32 verification of step 23, calculation document; Obtain the check value of the HEX form of 2 bytes, this test value gets 1K byte and last 1K byte before this file to do CRC32 verification;
Step 24, acquisition alignment check value, obtain the alignment check value of the HEX form of 2 bytes; This alignment check value is by the first byte of CRC32 check value and low 42 bytes formed of the second byte in high 4 and the step 23 of the first byte of step 22 file length value and the second byte;
Step 25, the threshold value A of the file length value in step 22 and described 4 bytes is carried out XOR, then operation result is changed into ASCII value H, this H is the character string of 8 bytes;
Step 26, the threshold value C of the check value in step 23 and described 4 bytes is carried out XOR, then operation result is changed into ASCII value I, this I is the character string of 8 bytes;
Step 27, the alignment check value in step 24 is changed into ASCII value J, this J is the character string of 4 bytes;
Step 28, the character string H obtaining in step 25, step 26, step 27, I, J, form the character string K of 20 bytes with HJI order;
Step 29, the character string K in step 28 done aes algorithm encryption, be then appended to the end of this file;
Step 2, platform end are by issuing download command to the network terminal, and the path at ftp server place needed for informing network terminal downloads,
Step 3, the network terminal obtain after described path resolves, and start FTP thread download html file, txt text and the playlist xml file after aes algorithm encryption and carry out end add the process of cryptographic check code after each material; The network terminal, when broadcasting advertisement content, is decrypted html file, txt text and playlist xml file after encryption, and verifies each material quoted in ad content;
Step 4, when deciphering html file, txt text and playlist xml file, any file decryption is wrong or checking material is wrong, then the network terminal plays this wrong file or wrong material by forbidding; And reporting platform end, corresponding wrong file or material are downloaded in request again.
2. a kind of network terminal control method for playing back verified based on AES and material according to claim 1, it is characterized in that: the described network terminal is when broadcasting advertisement content, html file, txt text and playlist xml file after encryption are decrypted, specifically comprise the steps:
Step 31, the network terminal obtain each file downloaded, and judge whether each file type downloaded is html file, txt text or playlist xml file; Then each file downloaded is operated to step 38 according to step 32 one by one, no, then do not operate;
Step 32, the file downloaded with aes algorithm deciphering;
Step 33, extract this end of file 20 byte, and resolve into three parts, Part I is 8 bytes above in 20 bytes, and the character string of 8 bytes is above changed into the value L of the HEX form of 4 bytes; Part II is middle 4 bytes in 20 bytes, and the character string of middle 4 bytes is changed into the value M of the HEX form of 2 bytes; Part III is last 8 bytes in 20 bytes, and the character string of these last 8 bytes is changed into the value N of the HEX form of 4 bytes;
Step 34, the L obtained in step 33 and the threshold value A of described 4 bytes are carried out XOR, obtain result O; The threshold value C of the N obtained in step 33 and described 4 bytes is carried out XOR, obtains result P;
First byte and the second byte high 4 and extract the low 4 of the first byte and the second byte in P, the Q value of composition 2 bytes in O in step 35, extraction step 34;
Step 36, compare M value and whether Q value is equal, if equal, then continue step 37; If unequal, then forbid broadcasting advertisement content, and report the alignment of platform end file verification to make mistakes, request re-issues this file;
Step 37, remove end of file 20 bytes after, calculate length R and the School Affairs S of this file;
In step 38, determining step 37, whether R equals O, and whether S equals P; The two is all equal, then continue material checking, if one of them does not wait or the two is all unequal, then forbid broadcasting advertisement content, and report the bad checksum of platform end file, request re-issues this file.
3. a kind of network terminal control method for playing back verified based on AES and material according to claim 1, it is characterized in that: each material quoted in ad content is verified, the file relative path specifically comprise the steps: step 41, providing according to play list file obtains material in this locality, i.e. picture file or video file;
The character string of step 42,20 bytes in extraction document end, and being first decrypted with aes algorithm, then resolves into three parts, and Part I is 8 bytes above in 20 bytes, and the character string of 8 bytes is above changed into the value T of the HEX form of 4 bytes; Part II is middle 4 bytes in 20 bytes, and the character string of middle 4 bytes is changed into the value U of the HEX form of 2 bytes; Part III is last 8 bytes in 20 bytes, and the character string of last 8 bytes is changed into the value V of the HEX form of 4 bytes;
Step 43, the T obtained in step 42 and the threshold value A of described 4 bytes are carried out XOR, obtain result W; The threshold value C of the V obtained in step 42 and described 4 bytes is carried out XOR, obtains result X;
First byte and the second byte high 4 and extract the low 4 of the first byte and the second byte in X, the Y value of composition 2 bytes in W in step 44, extraction step 43;
Step 45, compare U value and whether Y value is equal, if equal, then continue step 46; If unequal, then forbid broadcasting advertisement content, and report the alignment of platform end picture file or video file verification to make mistakes, request re-issues this file;
Step 46, remove end of file 20 bytes after, calculate length Z and the CRC32 check value AB of this file, this check value AB does CRC32 computing obtain for getting file header 1K byte and end 1K byte;
In step 47, determining step 46, whether Z equals W, and whether AB equals X; The two is all equal, then, and and broadcasting advertisement content; If one of them does not wait or the two is all unequal, then forbid broadcasting advertisement content, and report platform end picture file or video file bad checksum, request re-issues this file.
CN201310003809.5A 2013-01-06 2013-01-06 A kind of network terminal control method for playing back verified based on AES and material Active CN103078861B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310003809.5A CN103078861B (en) 2013-01-06 2013-01-06 A kind of network terminal control method for playing back verified based on AES and material

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310003809.5A CN103078861B (en) 2013-01-06 2013-01-06 A kind of network terminal control method for playing back verified based on AES and material

Publications (2)

Publication Number Publication Date
CN103078861A CN103078861A (en) 2013-05-01
CN103078861B true CN103078861B (en) 2015-11-25

Family

ID=48155265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310003809.5A Active CN103078861B (en) 2013-01-06 2013-01-06 A kind of network terminal control method for playing back verified based on AES and material

Country Status (1)

Country Link
CN (1) CN103078861B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474563A (en) * 2017-09-08 2019-03-15 阿里巴巴集团控股有限公司 Processing, providing method, client and the server of file stream
CN108280356B (en) * 2018-01-17 2020-07-14 吉浦斯信息咨询(深圳)有限公司 File decryption method and device, processing terminal and computer readable storage medium
CN110730188A (en) * 2019-10-23 2020-01-24 深圳市中仁信息科技有限公司 Method for encrypting, storing and transmitting static pictures

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222624A (en) * 2007-12-07 2008-07-16 四川长虹电器股份有限公司 Multimedia data encryption method based on AVI format
CN101547184A (en) * 2008-03-24 2009-09-30 突触计算机系统(上海)有限公司 Method and device for authenticating data block transmitted in network
CN101615411A (en) * 2009-07-22 2009-12-30 福州星网视易信息系统有限公司 The playlist of networked information delivery system and the encryption method of media task
CN102469345A (en) * 2010-11-19 2012-05-23 康佳集团股份有限公司 Method for encrypting and decrypting multimedia-media data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7636724B2 (en) * 2001-08-31 2009-12-22 Peerify Technologies LLC Data storage system and method by shredding and deshredding

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222624A (en) * 2007-12-07 2008-07-16 四川长虹电器股份有限公司 Multimedia data encryption method based on AVI format
CN101547184A (en) * 2008-03-24 2009-09-30 突触计算机系统(上海)有限公司 Method and device for authenticating data block transmitted in network
CN101615411A (en) * 2009-07-22 2009-12-30 福州星网视易信息系统有限公司 The playlist of networked information delivery system and the encryption method of media task
CN102469345A (en) * 2010-11-19 2012-05-23 康佳集团股份有限公司 Method for encrypting and decrypting multimedia-media data

Also Published As

Publication number Publication date
CN103078861A (en) 2013-05-01

Similar Documents

Publication Publication Date Title
US11366878B2 (en) Method and apparatus for delivering encoded content
CN101436141B (en) Firmware upgrading and encapsulating method and device based on digital signing
US20040255123A1 (en) Data embedding method and viewing confirmation method
CN101350718B (en) Method for protecting play content authority range base on user identification module
JP2016515235A5 (en)
CN104836656B (en) A kind of storage of video file and transmission method
CN103400064B (en) For file encryption and the method and apparatus of deciphering
CN105706099A (en) Software update device, and software update program
CN110210270B (en) Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system
KR20120053398A (en) Validation system and verification method including signature device and verification device to verify contents
CN106789075B (en) POS digital signature anti-cutting system
CN109391936A (en) A kind of method of OTA upgrade package encryption downloading
CN112332975A (en) Internet of things equipment secure communication method and system
CN106557707A (en) A kind of method and system for processing document data
CN103078861B (en) A kind of network terminal control method for playing back verified based on AES and material
CN113449338B (en) Information encryption storage method and system based on block chain
CN107948213A (en) A kind of encryption and authentication method, system, device and computer-readable recording medium
US9641337B2 (en) Interface compatible approach for gluing white-box implementation to surrounding program
CN102316164A (en) Cloud storage user side equipment and data processing method thereof
CN101739522B (en) DRM file integrity protection method and device
CN102546655A (en) Secure transmission method for health information
CN104008344A (en) Method and system for ePub document data safety protection
CN105760202B (en) Server calculates equipment, Software Compression packet processing unit and method
CN111476014A (en) Verification method and related device
CN105808979A (en) Improved Android software installation package signature and signature verification method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: FUJIAN SANYUANDA SOFTWARE CO., LTD.

Free format text: FORMER OWNER: FUJIAN SUNNADA COMMUNICATION CO., LTD.

Effective date: 20150226

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20150226

Address after: Wufeng Street software Avenue Gulou District of Fuzhou city in Fujian province 350000 No. 89 Fuzhou software industrial park two 7 floor third floor

Applicant after: Fujian Sanyuanda Software Co., Ltd.

Address before: No. 7 building two Wufeng Street software Avenue Gulou District of Fuzhou city in Fujian province 350000 No. 89 Fuzhou Software Industrial Park

Applicant before: Fujian Sunnada Communication Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 350000, No. 16, building G, zone four, Fuzhou Software Park, 89 software Avenue, Gulou District, Fujian, Fuzhou

Patentee after: Hengonda Technology Co., Ltd.

Address before: Wufeng Street software Avenue Gulou District of Fuzhou city in Fujian province 350000 No. 89 Fuzhou software industrial park two 7 floor third floor

Patentee before: Fujian Sanyuanda Software Co., Ltd.