CN105407366B - A kind of internet video and data file hardware encryption transmission system - Google Patents
A kind of internet video and data file hardware encryption transmission system Download PDFInfo
- Publication number
- CN105407366B CN105407366B CN201510979569.1A CN201510979569A CN105407366B CN 105407366 B CN105407366 B CN 105407366B CN 201510979569 A CN201510979569 A CN 201510979569A CN 105407366 B CN105407366 B CN 105407366B
- Authority
- CN
- China
- Prior art keywords
- key
- decryption
- disk
- data
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
Abstract
Present invention design realizes a set of internet video and data file hardware encryption transmission and broadcast control system.Devise the overall structure, agreement and data structure of system, then it devises the data encryption packaged service device (102) of encryption packing, the USB vision hardware that video flowing is decrypted decryption disk (107), user authorization management software and packaged service software is carried out to video flowing using hardware, the use in the present system of 3DES and 224 ECC Encryption Algorithm of detailed design, the management transmission mode of key and realization of system etc..
Description
Technical field
The present invention relates to the fields such as internet digital video and network security transmission, copyright protection.
Background technique
The rapid prosperity of internet video is got up in recent years.But internet video is there is very strong robber's chain at present, no
It easily charges, be easy to be trapped the problems such as seeing.Some service providers oneself do not provide the content of service, pass through technological means
Around other gainful end-user interfaces (such as advertisement), other services are provided to end user directly on the website of oneself
The service content of provider gains the browsing and clicking rate of end user by cheating.What it is due to content transmission is clear stream, and video content holds very much
It is easily trapped and sees, the safety of transmission of video greatly reduces.The video data volume of transmission over networks is very big, in real time
Property, continuity require it is high.Therefore common file encryption mode is not suitable for when transmitting video.Generic-document is encrypted due to data
Amount is relatively seldom, and requirement of real-time is not very high, substantially very low by software or processing operational capability ancillary hardware example
As the equipment of similar U shield for bank is completed.The internet video flow data amount that multiple programs broadcast simultaneously is very huge, real-time
It is required that high, it is impossible to be handled by the processing method and processing capacity that handle file.This project uses hardware by video flowing
Or file data (being particularly suitable for very big, the high file data of requirement of real-time) carries out encrypted transmission, fundamentally thoroughly solves
It has determined problem above.
Summary of the invention
For on internet video and king-sized, the high data file of requirement of real-time (abbreviation large-data documents)
Real-time encrypted transmission on the internet, the present invention are the real-time encrypted Transmission system of hardware, and video flowing and large-data documents exist
It is encrypted in real time in entire transmission process by dedicated hardware device and decryption processing, by one piece of insertion server internal
, it has used the hardware of pci bus to encrypt packing board (103) and has added to complete hardware to video flowing and large-data documents
The data encryption packaged service device (102) of close operation come complete encryption be packaged, insertion set-top box (106) USB port USB video
Hardware decryption disk (107) is decrypted, is managed and assists to be packaged by user authorization management software and packaged service software, by
The encrypted transmission and broadcast control system of a whole set of video and large-data documents that they are collectively formed.
The overall structure, agreement and data structure for devising system first, are then devised and are flowed into using hardware to video
It is soft that the data encryption packaged service device (102) of row encryption and the USB vision hardware of decryption decrypt disk (107), user authorization management
Part and packaged service software.Whole system authorizes pipe by data encryption packaged service device (abbreviation packaged service device) (102), user
Manage server (abbreviation management server) (104), program storage video server (101), (letter of general clear stream Internet set-box
Claim set-top box) (106), USB vision hardware decryption disk composition (referred to as decryption disk) (107), such as Fig. 1.Each decryption disk has only
One identifier, this helps to improve the safety of system.
The logical relation of cipher key delivery: as shown in Figure 2.Data encryption packaged service device (102) export encrypted packet and
Key identifier decrypts disk (107) to USB vision hardware, and decryption disk (107) takes according to key identifier to user authorization management
Corresponding key is requested in business device (104), and management server (104) provides corresponding key to approved qualified decryption disk (107).
The structure of data packet is as follows: the video program of various standards such as MPEG1, MPEG2, H264, H265 etc. are big
The file of data volume is accordingly to be regarded as the data file of big data quantity within the system.Packaged service device (102) is first by data file
Being divided into length is the isometric data patch of 8 bytes, is then encrypted data patch using 3DES.Then by fixed quantity
(such as 1024) encrypted data patch connects into a data chunk, does SHA265 operation to the data chunk, will
To cryptographic Hash link together with current and next 3DES key identifier, subscriber management server (104) address,
Then constitutive characteristic information does 224 ECC operations to this feature information, obtained encrypted feature information is synchronous with packet header again
Word, packet are long, packet identifier links together, and are placed on before data chunk, are packaged into encrypted packet jointly.
The transmission time sequence of 3DES key arranges as follows: for encrypted packet by the Internet transmission to receiving end, 3DES's is close
Key will be transformed into next key after continuing the regular hour, transformation period interval passes through the man-machine boundary of packaged service device (102)
Face setting.It is to shift to an earlier date standard to 3DES deciphering module in the purpose that encrypted packet transmits the identifier of next key in front
Standby next key provides information, thus under guaranteeing that decrypting disk has time enough to obtain from empowerment management server (104)
One key, and then guarantee the continuity of video playing when key switching.Application program on set-top box (106) adds what is received
Ciphertext data packet is transferred to decryption disk (107), and the interior software of decryption disk (107) decouples data packet after receiving encrypted packet, worked as
Preceding and next 3DES key identifier.
The generation of key request instruction: the software in decryption disk (107) obtains decryption disk identifier itself, and current
It forms request key plain together with next 3DES key identifier, then acts and pre-exist in the use in decryption disk
Decryption disk identifier is added in the exclusive private key encryption of the user of 224 ECC algorithms again, and the user for then reusing ECC algorithm is total
There is public key encryption, forms the 3DES key request instruction by 224 ECC encryptions twice, be sent to user authorization management service
Device (104) removes request key.
Two key pairs that ECC algorithm uses: the encrypted transmission of customer management information has used two key pairs, and user is only
There are key pair and user to share key pair.The exclusive key pair of user refers to the number that ECC public key is stored in management server (104)
According in library, private key is stored in the decryption disk being different from for each user and management server (104) list in decryption disk
The key pair used is solely communicated, user shares the hardware encryption that key pair refers to that ECC private key is stored in encryption baling press and beats
In wrapper sheet card, and public key is stored in all decryption disks, and all identical key of public key of all decryption disks
It is right, use when which communicates when server can not know the customer identification number of specific decryption disk with all decryption disks.
Decrypt the verifying of disk (107) identity and the granting of key: after being connected to the request instruction of user terminal, management service
The private key that device (104) shares cipher key pair using user first once decrypts the request instruction of the encryption received, obtains
Decryption disk (107) identifier in request instruction, then by decryption disk (107) identifier compared with the data in database, from
And differentiate whether the user number is legitimate authorized user, if it is legitimate user, then being looked in database according to the identifier
The public key of the exclusive cipher key pair of corresponding user carries out secondary decryption to instruction out.The decryption disk obtained after secondary decryption is known
The decryption disk identifier obtained after alias and primary decryption is compared, if unanimously illustrating that decryption disk (107) identity is true, after
It is continuous to carry out in next step, if inconsistent illustrate that decrypting disk (107) identity is forged.If identity is true, management server
(104) corresponding key can be found out in the database according to the identifier of 3DES key, then uses the exclusive ECC key pair of user
In public key corresponding 3DES key is encrypted, corresponding decryption disk is sent to by internet.Decryption disk receives encryption
3DES key after using the private key of the exclusive ECC cipher key pair of user decrypt corresponding 3DES key.And by key storage
In internal storage.
The characteristic information of ECC encryption: packaged service device (102) shares the private key of cipher key pair to characteristic information using user
It is encrypted, decryption disk (107) is decrypted encrypted feature information using the public key that user shares cipher key pair.
Decrypt the decryption of disk (107) to encrypted packet: decryption disk (107) calculates 3DES using SHA256 function first and adds
The cryptographic Hash of close data chunk, if obtained cryptographic Hash and the cryptographic Hash received in characteristic information are identical, it was demonstrated that encryption number
It is original data packet according to packet, is not changed.It decrypts disk and the big data of encryption is split into data patch, then use obtains
The data patch of 3DES key pair encryption is decrypted, and original data are recovered.
Open an account authorization: each user when opening an account, it is artificial verify identity after, management server (104) is to decryption disk
(107) it is authorized, in licensing process, management server (104) receives authorized user and decrypts the user that disk (107) provide
The public key of exclusive ECC cipher key pair, private key therein oneself are generated and saved in inside by decryption disk.Management server simultaneously
(104) public key that user shares ECC cipher key pair is exported to decryption disk (107), hardware encryption is packaged board and saves accordingly
Private key.
User terminal is constituted: user terminal is made of set-top box (106), set-top box application program (APP) and decryption disk (107).
It ensure that the system can be preferably commercialized using universal set-top box (STB) (106), for different set-top box platforms such as Android
Platform needs to install the application program of different support corresponding systems.Decrypting disk (107) is core, and set-top box (106) is defeated
Encrypted video stream gives decryption disk out, and decryption disk (107), which exports the clear stream after decryption by USB interface, gives set-top box (106), so
Set-top box (106) is decoded output to clear stream afterwards.
The major function of user authorization management software: user authorization management software can be divided into different productions to different programs
Product packet and set meal packet, facilitate with different prices and manage.User management is very flexible, since each USB vision hardware is decrypted
As soon as there is a unique identifier, subscriber management server (104) is easy to be managed user disk (107), can pass through
Subscriber management server (104) and decrypt disk (107) decryption of video software, come to individual user carry out " opening authorization " and
" Guan Shouquan ".It can certainly batch " opening authorization ", " Guan Shouquan ".It is very convenient to open an account, can be by files in batch importing come batch
It opens an account, each user's separate Login website is also allowed to open an account, also two-dimensional code scanning is supported to open an account.It supplements with money and continues to pay dues easily, branch
It holds each user's separate Login website to continue to pay dues, also supports to scan the two-dimensional code to continue to pay dues, also support to send short messages to continue to pay dues.
The safety of hardware decryption: 3DES and ECC algorithm is run in the inside chip of decryption disk (107), key
It is all stored in the inside chip of decryption disk (107), during whole service, whole sensitive datas all portions in the chip,
It is not present on any external bus.Each decryption disk (107) has a unique identification code, corresponds to different ECC
Key pair, and 3DES key is to encrypt by double-deck 224 ECC algorithms, therefore encryption intensity is very high, and it is non-to crack difficulty
Chang great
The basic performance of system: an encryption packetization module youngster (103) of packaged service device (102) handles number in the system
According to speed up to 500Mbit/s, can multiple encryption packetization modules (103) superpositions.It is handled when rear end decryption disk (107) decryption
The speed of data is up to 40Mbit/s.Real-time live broadcast data can be encrypted, it, can encryption simultaneously as long as total bandwidth does not reach the upper limit
Programme televised live sum almost without the upper limit.For audio/video program compression standard there is no limit, MPEG1, MPEG2, H264,
H265 etc. is supported.
Detailed description of the invention
Fig. 1 shows that the system block diagram of internet video and file data hardware encryption transmission, Fig. 2 show that key passes
Defeated logical relation, Fig. 3 show encryption data pack arrangement.
Specific embodiment
(1) program storage video server (101): purchase or the commercial video server for renting standard.(2) clear stream interconnects
Net set-top box (106): using the general commercial set-top boxes hardware and software platform that can decode clear stream as clear stream internet machine top
Box (106), this project provide application programming interfaces, develop jointly with set-top box design person and support the application program of this system soft
Part, by the software installation of exploitation on set-top box (106).(3) user authorization management server (104): the hardware of the server
Using normal business server, the database in software uses normal business database software.Oneself develops user and awards
Management software is weighed, installation is run on the server, the software realization the opening an account of user, cancellation, classification of service, validity period pipe
Reason, anti-authorization, charge, sends the subscriber management functions such as instruction, bulletin at the authorization of user.(4) packaged service device (102): clothes
The hardware of business device uses normal business server.In order to improve the processing speed of video flowing, devises hardware encryption and be packaged mould
The block module is to be inserted into server internal by one piece the hardware board of pci bus has been used to complete, and is used on the board
Encryption is packaged chip, which has powerful CPU, Encryption Algorithm hardware co-processor.Hardware and software is combined and is completed
The functions such as the packing of data, the generation of key and management.(5) USB vision hardware decryption disk (107): by an appearance as USB is deposited
The device for storing up disk is completed, and has used deciphering chip inside the device.The chip interior have powerful CPU, hardware 3DES algorithm,
Hardware ECC algorithm coprocessor.The chip complete 3DES decryption, 3DES key acquisition, the generation and management of ECC key,
The functions such as encrypting and decrypting, the decryption disk identifier management of ECC.System realization is related to following 4 key technologies: the encryption of data
The definition of packaging method and format, the selection of Encryption Algorithm, the exchange method of key and the design realization of system, hardware realization are beaten
Packet server (102) and USB vision hardware decryption disk (107).
Claims (8)
1. a kind of internet video and file data hardware encryption transmission system, which is characterized in that this system is that hardware adds in real time
Close Transmission system, video flowing and large-data documents carry out encryption in real time and solution by hardware device in entire transmission process
Close processing is inserted into server internal by one piece, has used the hardware of pci bus to encrypt and has been packaged board (103) to complete hardware
The data encryption packaged service device (102) of cryptographic calculation is carried out to video flowing and large-data documents to complete encryption packing, insert
USB vision hardware decryption disk (107) for entering the USB port of set-top box (106) is decrypted, by user authorization management software and packing
Service software is managed and assists to be packaged, by the encrypted transmission of a whole set of video and large-data documents that they are collectively formed
And broadcast control system;Data file segmentation is the isometric data patch of 8 bytes at length by packaged service device (102) first, is connect
Data patch is encrypted using 3DES, the encrypted data patch of fixed quantity is then connected into a data chunk, it is right
The data chunk does SHA265 operation, by obtained cryptographic Hash and current and next 3DES key identifier, Yong Huguan
Reason server (104) address links together, then constitutive characteristic information does 224 ECC operations to this feature information, will
To encrypted feature information again with packet header synchronization character, packet is long, packet identifier links together, be placed on before data chunk, jointly
It is packaged into encrypted packet;User terminal is made of set-top box (106), set-top box application program and decryption disk (107), and use is general
Set-top box ensure that the system is preferably commercialized, and need to install different support corresponding systems for different set-top box platforms
Application program, decryption disk (107) is core, and set-top box (106) export encrypted video stream and gives decryption disk, and decrypting disk is core
Center portion point, set-top box (106) export encrypted video stream and give decryption disk, decrypt disk (107) for the clear stream after decryption and pass through USB interface
It exports and gives set-top box (106), then set-top box (106) is decoded output to clear stream.
2. a kind of internet video according to claim 1 and file data hardware encryption transmission system system, feature
It is, whole system is taken by data encryption packaged service device (102), user authorization management server (104), program storage video
Business device (101), general clear stream Internet set-box (106), USB vision hardware decryption disk constitute (107), and each decryption disk has
A unique identifier.
3. a kind of internet video according to claim 1 and file data hardware encryption transmission system system, feature
It is, data encryption packaged service device (102) exports encrypted packet and key identifier and decrypts disk to USB vision hardware
(107), decryption disk (107) requests corresponding key, management clothes to user authorization management server (104) according to key identifier
Device (104) are engaged in the approved qualified corresponding key of decryption disk (107) granting.
4. a kind of internet video according to claim 1 and file data hardware encryption transmission system system, feature
Be, various standards include MPEG1, MPEG2, H264, H265 video program or big data quantity file within the system
It is accordingly to be regarded as the data file of big data quantity.
5. a kind of internet video according to claim 1 and file data hardware encryption transmission system system, feature
It is, by the Internet transmission to receiving end, the key of 3DES will be transformed into next encrypted packet after continuing the regular hour
A key, transformation period interval are set by the man-machine interface of packaged service device (102), are transmitted in front in encrypted packet next
The purpose of the identifier of a key is in order to prepare next key in advance to 3DES deciphering module and provide information, to guarantee to solve
Close disk has time enough to obtain next key from empowerment management server (104), and then guarantees video when key switching
The encrypted packet received is transferred to decryption disk (107), decryption by the continuity of broadcasting, the application program on set-top box (106)
The interior software of disk (107) decouples data packet after receiving encrypted packet, obtains current and next 3DES key identifier.
6. a kind of internet video according to claim 1 and file data hardware encryption transmission system system, feature
It is, the encrypted transmission of customer management information has used two key pairs, and the exclusive key pair of user and user share key pair, use
The exclusive key pair in family refers to that ECC public key is stored in the database in management server (104), and private key is stored in decryption disk
The decryption disk and management server (104) being different from for each user individually communicate the key pair used, and user is shared
Key pair refer to ECC private key be stored in encryption baling press in hardware encryption be packaged board in, and public key be stored in it is all
Decryption disk in, and all identical key pair of public key of all decryption disks, which can not know in server
It is used when being communicated when the customer identification number of specific decryption disk with all decryption disks.
7. a kind of internet video according to claim 1 and file data hardware encryption transmission system system, feature
It is, after being connected to the request instruction of user terminal, management server (104) shares the private key of cipher key pair using user first
The request instruction of the encryption received is once decrypted, decryption disk (107) identifier in request instruction is obtained, it then will solution
Close disk (107) identifier is compared with the data in database, to differentiate whether the user is legitimate authorized user, if it is conjunction
Method user, then being carried out according to the public key that the identifier finds out the corresponding exclusive cipher key pair of user in database to instruction
The decryption disk identifier obtained after the decryption disk identifier obtained after secondary decryption and primary decryption is compared in secondary decryption
Compared with, if unanimously illustrate decrypt disk (107) identity it is true, continue in next step, if it is inconsistent illustrate decrypt disk (107) body
It part is forged, if identity is true, management server (104) can be found out in the database pair according to the identifier of 3DES key
Then the key answered encrypts corresponding 3DES key using the public key of the exclusive ECC cipher key pair of user, passes through internet
It is sent to corresponding decryption disk, decryption disk receives the private key solution that the exclusive ECC cipher key pair of user is used after the 3DES key of encryption
Close corresponding 3DES key out, and by key storage in internal storage.
8. a kind of internet video according to claim 1 and file data hardware encryption transmission system system, feature
It is, decryption disk (107) calculates the cryptographic Hash of the data chunk of 3DES encryption using SHA256 function first, if obtained Kazakhstan
The cryptographic Hash received in uncommon value and characteristic information is identical, it was demonstrated that encrypted packet is original data packet, is not changed, decryption
The big data of encryption is split into data patch by disk, then with the data patch decryption of obtained 3DES key pair encryption, is restored
Original data out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510979569.1A CN105407366B (en) | 2015-12-24 | 2015-12-24 | A kind of internet video and data file hardware encryption transmission system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510979569.1A CN105407366B (en) | 2015-12-24 | 2015-12-24 | A kind of internet video and data file hardware encryption transmission system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105407366A CN105407366A (en) | 2016-03-16 |
CN105407366B true CN105407366B (en) | 2019-03-26 |
Family
ID=55472569
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510979569.1A Active CN105407366B (en) | 2015-12-24 | 2015-12-24 | A kind of internet video and data file hardware encryption transmission system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105407366B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106961323B (en) * | 2017-05-18 | 2022-12-09 | 桀安信息安全技术(上海)有限公司 | Key decryption board card, device, system and processing method |
CN111510745B (en) * | 2020-03-27 | 2021-01-19 | 曹新 | Internet video data encryption transmission method |
CN113891147A (en) * | 2021-09-23 | 2022-01-04 | 亦非云科技(上海)有限公司 | Video service system design method based on smart television application and external hardware |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1307420A (en) * | 2000-01-27 | 2001-08-08 | 中国长城计算机深圳股份有限公司 | Sectional enciphering technology of great-capacity decument |
CN101299814A (en) * | 2008-06-11 | 2008-11-05 | 中国科学院计算技术研究所 | System and method for protection of digital electric image and sound video copyright |
CN101950345A (en) * | 2010-09-29 | 2011-01-19 | 山东大学 | Hardware decryption-based high-reliability terminal equipment and working method thereof |
CN104270242A (en) * | 2014-09-27 | 2015-01-07 | 杭州电子科技大学 | Encryption and decryption device used for network data encryption transmission |
CN204180095U (en) * | 2014-09-27 | 2015-02-25 | 杭州电子科技大学 | A kind of ciphering and deciphering device for network data encryption transmission |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SG138452A1 (en) * | 2004-05-18 | 2008-01-28 | Victor Company Of Japan | Content presentation |
-
2015
- 2015-12-24 CN CN201510979569.1A patent/CN105407366B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1307420A (en) * | 2000-01-27 | 2001-08-08 | 中国长城计算机深圳股份有限公司 | Sectional enciphering technology of great-capacity decument |
CN101299814A (en) * | 2008-06-11 | 2008-11-05 | 中国科学院计算技术研究所 | System and method for protection of digital electric image and sound video copyright |
CN101950345A (en) * | 2010-09-29 | 2011-01-19 | 山东大学 | Hardware decryption-based high-reliability terminal equipment and working method thereof |
CN104270242A (en) * | 2014-09-27 | 2015-01-07 | 杭州电子科技大学 | Encryption and decryption device used for network data encryption transmission |
CN204180095U (en) * | 2014-09-27 | 2015-02-25 | 杭州电子科技大学 | A kind of ciphering and deciphering device for network data encryption transmission |
Also Published As
Publication number | Publication date |
---|---|
CN105407366A (en) | 2016-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103873895B (en) | A kind of DVB/IPTV bimodulus interactive service protects system | |
US7162642B2 (en) | Digital content distribution system and method | |
JP5966216B2 (en) | Methods for upgrading content encryption | |
CN101719910B (en) | Terminal equipment for realizing content protection and transmission method thereof | |
US9479825B2 (en) | Terminal based on conditional access technology | |
TWI376131B (en) | Methods of broadcasting and receiving a scrambled multimedia programme, content,headend, terminal, receiver and security rpocessor for such methods | |
US20040068659A1 (en) | Method for secure distribution of digital data representing a multimedia content | |
CN106464485A (en) | System and method for securing content keys delivered in manifest files | |
US20020067914A1 (en) | Content packet distribution system | |
JPH11513159A (en) | Method and apparatus for operating a transaction server in an owned database environment | |
KR101355057B1 (en) | Enforcing softwate updates in an electronic device | |
CN101282456B (en) | Method and apparatus for receiving digital television condition | |
CN102084664B (en) | Unit and method for secure processing of access controlled audio/video data | |
CN100442839C (en) | Information transmitting method and apparatus for interactive digital broadcast television system | |
CN105407366B (en) | A kind of internet video and data file hardware encryption transmission system | |
US8782417B2 (en) | Method and processing unit for secure processing of access controlled audio/video data | |
CN103237010A (en) | Server side for providing digital content in encryption mode | |
US9544276B2 (en) | Method for transmitting and receiving a multimedia content | |
CN102111642A (en) | Method for bidirectional AIO to receive encrypted digital television without using cards | |
CN105578208A (en) | IPTV video encryption transmission system | |
CN102917252A (en) | IPTV (internet protocol television) program stream content protection system and method | |
TW201025070A (en) | Methods for transmitting, receiving and identifying, security processor and information-recording carrier for these methods | |
EP2247105A1 (en) | Method to secure access to audio/video content in a decoding unit | |
CN102427559A (en) | Identity authentication method based on digital television set card separation technology | |
TW201203991A (en) | Protection method, decrypting method, recording medium and terminal for this protection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |