CN105611318A - Method and system for video encryption playing - Google Patents

Method and system for video encryption playing Download PDF

Info

Publication number
CN105611318A
CN105611318A CN201410686775.9A CN201410686775A CN105611318A CN 105611318 A CN105611318 A CN 105611318A CN 201410686775 A CN201410686775 A CN 201410686775A CN 105611318 A CN105611318 A CN 105611318A
Authority
CN
China
Prior art keywords
video
video file
file
key
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410686775.9A
Other languages
Chinese (zh)
Inventor
张新亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI TVMINING CULTURE MEDIA Co Ltd
Original Assignee
SHANGHAI TVMINING CULTURE MEDIA Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI TVMINING CULTURE MEDIA Co Ltd filed Critical SHANGHAI TVMINING CULTURE MEDIA Co Ltd
Priority to CN201410686775.9A priority Critical patent/CN105611318A/en
Publication of CN105611318A publication Critical patent/CN105611318A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for video encryption playing. The method comprises steps: after a file header of a video file is encrypted by a secret key, the file name of the video file and the secret key are correspondingly stored in a database; and a player acquires the file name of the video file and the corresponding secret key from the database, and the secret key is used for decrypting the acquired video file and the video file is played. The video file header is encrypted in the video source file, even if the user obtains a video flow through a network analysis tool, the video file can not be played with no secret key or a decryption program, and the video safety is greatly enhanced.

Description

A kind of video-encryption player method and system
Technical field
The present invention relates to Internet technical field, particularly a kind of video-encryption player method and system.
Background technology
Along with the development of network technology, people's life also more and more be unable to do without network, various audio-video documentsCan pass through Network Capture. The saving format of the various dynamic images of the common reference of video, for example: numerical digit is lookedFrequently form, comprises DVD, and QuickTime, with MPEG-4; And the video-tape of analogy, comprise VHS withBetamax. Video can go on record and via different physical media transmission: be taken at video orDuring taking radio transmitting, being electrical signal, is magnetic signal while being recorded on tape; Video image quality realityUpper mode and the storing mode of taking and capturing with work changes.
File encryption is a kind ofly automatically the data that write storage medium to be entered at operating system layer as requestedThe technology that row is encrypted. In the queue of new type of safe product, host monitor mainly adopts periphery to besiege and chaseTechnical scheme, although information security is improved, because product self depends on operating system,Data self are not had to effective security protection, thus exist many security breaches, for example: most basicMeans are torn modes such as pulling out hard disk, the guiding of winpe CD, USB guiding open and data can be stolen, and do not stayAny vestige; This technology more can be understood as EAM software, and single product cannot meetThe requirement of user to information security.
File encryption is the main force of protecting information safety now, adopts transparent encryption and decryption technology, and data are enteredRow is forced to encrypt, and does not change the original use habit of user; This technology is to data self-encryption, no matter be de-From operating system, or the illegal security context that departs from, user data self is all safe, to complying with of environmentRely property smaller. The main technology of file encryption is on the market divided into disk encryption, application layer encryption, drivingSeveral technology such as level encryption, because the dependence of application programs is more intense, there is many holding concurrently in application layer encryptionThe problem of capacitive and secondary development, is progressively eliminated by each information security manufacturer.
We can be common to be exactly mainly disk encryption and driving stage decryption technology:
Encryption technology is to be mainly that disk is encrypted totally totally, and adopts host monitor, mine damCarry out integral protection Deng other preventive means, disk encryption is mainly user provides the operation ring of a safetyBorder, self is not encrypted data, once that operating system starts is complete, data from hard disk with expresslyForm exists, and mainly protects by modes such as besieging and chasing of mine dam. The main fraud of disk encryption technologyEnd is that the time cycle that disk is encrypted is longer, causes the project implementation cycle also longer, and user is generalBe out of patience; Disk encryption technology is that disk is encrypted totally, once operating system goes wrong. NeedRecover to be also one to data allows user compare pain in the neck feelings, the hard disk solution of a normal 500GA close required time needs 3-4 hour; Disk encryption technology really will be accomplished overall encryption comparatively speakingNot also very ripe at present, the especially protection to system disk, current Main is on the market to beingOverall not doing encrypted protection, but adopts peripheral techniques to carry out safe access control, as everybody knows operating systemVersion constantly upgrade, the security mechanism of Microsoft self is more and more higher, people are more next to the control dynamics of systemLower, especially hacking technique is climbed to a higher point layer by layer, once protection system is broken, all will expose undoubtedly.In addition, disk encryption technology is that overall information is carried out to security management and control, comprising system file, to beingThe efficiency performance of system will affect greatly.
Driving stage technology is the mainstream technology of current information encryption, and the mode of employing process+suffix is carried out safetyProtection, user can, according to the actual conditions flexible configuration of enterprises and institutions, force important dataEncrypt, greatly improved the operational efficiency of system. The maximum district of driving stage encryption technology and disk encryption technologyBe not exactly that driving stage technology can self be protected user's data, driving stage is encrypted and is adopted transparent encryption and decryptionTechnology, the existence of the imperceptible system of user, does not change original operation of user, once data depart from safetyEnvironment, user cannot use, and effectively improve the security of data; Driving stage encryption technology compares magnetic in additionDish encryption technology is managed fine granularity more, effectively realizes the lifecycle management of data, can controlService time, the number of times of file, copy, the operation such as screenshotss, video recording, and can enter the inside of fileThe control that goes out for a visit of the fine-grained empowerment management of row and data, accomplishes the comprehensive management of data. Driving stageEncryption technology give user's data bring safe in, bring certain also to user's ease of useProblem, driving stage is encrypted employing process encryption technology, same class file is all encrypted, effectively districtThe Classification Management of other personal document and enterprise's file data, the parallel running of PC and enterprise's office etc. is askedTopic.
Video-encryption software, according to certain rule, is processed and is obtained new video file video file;The algorithm of recycling software self carries out other some protections, for example: the anti-pirate recordings of video, the anti-extraction of video,Video is anti-to be copied etc. Video-encryption software mainly uses two kinds of methods at present:
1, video file is directly packed, and embed in player, when broadcasting, input after password formerVideo file discharges to be play. Because this method is not encrypted former video, so veryEasily be extracted, so this encryption method is also referred to as pseudo-encryption. This encryption method is not trueEncryption in positive meaning. But because programming complexity is lower, so most of video-encryption software is all on the marketEmploying the method is encrypted.
2, video-encryption software, by built-in algorithm engine, is recoded and is obtained original video filesThe encrypted video file with brand new after coding. In the time that user plays, after software verification mandate is passed throughUtilize specific algorithm to carry out dynamic decoder to video flowing, real time decrypting data are play. This algorithmFeature is that data are strictly encrypted; And during due to broadcasting, adopting is dynamic deciphering, so only can decode temporarilyGo out the video data needing in current point in time, cannot extract by any method source video file, soThis video encryption method is encryption truly. But owing to realizing, this cover algorithm is very complicated, at presentAdopt on the market the video-encryption software of this algorithm also very few.
Video-encryption software, by development in recent years, constantly expands new function, at present video-encryption softwareMainly there is following function.
Video watermark. When broadcasting, on video, add watermark, protection copyright.
The anti-pirate recordings of video. It is identified and shielded to video pirate recordings software and record encrypted video.
The anti-extraction of video. Video is encoded and embedded executable file (.exe), but this characteristic is to set upOn video-encryption software principle, so only have at present overtime generation video-encryption software to there is real lookingFrequently anti-abstraction function.
Video playback restriction. By licencing key, reproduction time is limited, for example restriction play the date andBroadcasting time etc.
Network authorization checking. The network platform of utilizing server to build, manages and distributes subscriber authorisation.Only need remember account and the password of businessman distribution for user, the backstage of businessman by network authorization platform is to useFamily manages. Network authorization platform is applicable to big-and-middle-sized enterprise customer, due to convenient management, controls spiritThe feature such as live, conveniently dispose, be simple and easy to use is greatly favored by consumers, and has become the main flow of video-encryption developmentDirection.
In prior art, the video of video website is all the ordinary file forms such as flv, mp4, and user is by grabbingJob contract tool is easy to get video flowing address, thus direct downloading video files, or look like to haveA little videos of paying are that (such as some video can only see 5 to the restriction of having done playing duration of front end playerMinute, after 5 minutes, prompting could continue to watch after paying), this class video major part all can be passed through network packet capturingTool analysis to after video address directly foradownloaded video source file watch, security is poor. Need badly and want oneKind safe video-encryption is play scheme, to solve asking of video playback poor stability in prior artTopic.
Summary of the invention
The invention provides a kind of video-encryption player method and system, in order to solve video-encryption in prior artPlay the problem of poor stability.
A kind of video-encryption player method, comprises the steps:
By the file header of video file by secret key encryption after, by the filename of described video file, described closeKey corresponding stored is in database;
Player obtains the filename of described video file and corresponding key from described database, described in usingThe video file that secret key decryption is obtained is also play.
Described method also comprises:
Described player obtains after described video file, according to user right, obtains institute from described databaseKey corresponding to filename of stating video file, shows and points out user to input;
Input after described key user, with the file header of video file described in described secret key decryption, and playDescribed video file.
Described method also comprises:
Described key is obtained by special key schedule, and the file header of each video file all uses uniqueAnd different secret key encryption.
Described method also comprises:
After user's registration login system, the video file that click need to be obtained;
Server authentication user's broadcasting authority, and the user who has broadcasting authority is returned to corresponding secret key;
User is according to carrying out video file broadcasting after the key input of returning.
Described method also comprises:
Detect in advance each video file, the position of finding out file header is also encrypted with different keys.
A kind of video-encryption Play System, comprising:
Ciphering unit, for by the file header of video file by secret key encryption;
Database Unit, for storing the filename of described video file, corresponding described key;
Player unit, for obtaining filename and the correspondence of described video file from described Database UnitKey, the video file obtaining by described secret key decryption and play.
Described system plays device unit also for: obtain after described video file, according to user right, from instituteState key corresponding to filename that obtains described video file in Database Unit, show and point out userInput;
Input after described key user, with the file header of video file described in described secret key decryption, and playDescribed video file.
Described system also comprises cipher key unit, for obtaining key according to special key schedule, eachThe file header of video file all uses unique and different secret key encryptions.
Described system also comprises user authority management unit, for management and the corresponding video file of authentication of usersPlay authority.
Described system also comprises video file memory cell, for storing the video literary composition after described file header is encryptedPart, and respond the request of described player unit, provide described video file to play.
In the embodiment of the present invention, by by the file header of video file by secret key encryption after, by described videoThe filename of file, described key corresponding stored are in database; Player obtains institute from described databaseState the filename of video file and corresponding key, the video file obtaining by described secret key decryption is also play.On video source file, video file head is encrypted, even if user obtains video by network analysis instrumentStream, does not have key and decrypted program cannot play this video file yet. Greatly increase the peace of videoQuan Xing.
Other features and advantages of the present invention will be set forth in the following description, and, partly from explanationIn book, become apparent, or understand by implementing the present invention. Object of the present invention and other advantages canRealize and obtain by specifically noted structure in write description, claims and accompanying drawing.
Below by drawings and Examples, technical scheme of the present invention is described in further detail.
Brief description of the drawings
Accompanying drawing is used to provide a further understanding of the present invention, and forms a part for description, with thisBright embodiment mono-is used from explanation the present invention, is not construed as limiting the invention. In the accompanying drawings:
A kind of video-encryption player method principle flow chart that Fig. 1 provides for the embodiment of the present invention 1;
A kind of news commentary encryption Play System structural representation that Fig. 2 provides for the embodiment of the present invention 3.
Detailed description of the invention
Below in conjunction with accompanying drawing, the preferred embodiments of the present invention are described, should be appreciated that described hereinPreferred embodiment only, for description and interpretation the present invention, is not intended to limit the present invention.
As shown in Figure 1, a kind of video-encryption player method principle flow chart providing for the embodiment of the present invention 1,Wherein,
Step 11, by the file header of video file by secret key encryption after, by the filename of video file, closeKey corresponding stored is in database.
In existing video file playing process, before player obtains video file, first need to lookFrequency file does pretreatment. The pretreatment has here comprised that compression to video file, encryption, index etc. isRow work. The work of existing encryption, is mainly limited to video file bulk encryption, or video file is logicalCrossing the part that player etc. pays to needs is encrypted. This obviously can not meet the needs of practical application.
In the present embodiment, first need to find the file header of video file for video file. This just needs to divideAnalyse file header and the video data of all video files, the first few bytes that draws each file is file header. ShouldThe coded message of file header meeting recording of video, as coded format, code check, video duration, waits the important letter of videoBreath.
File header is the data that are positioned at a section of file beginning and bear certain task, general all in the portion of beginningPoint. Header file is as a kind of carrier file that comprises power function, data-interface statement, for save routineStatement (declaration), and defined file is for the realization (implementation) of save routine.
Taking common mpg file as example, this is a kind of the most frequently used video file. A mpg file canOnly to comprise video content, file starts using 0x000001B3 as initial code so. With 0x000001BABeginning, just mean and comprise voice data and video data simultaneously, if there is no voice data, with0x000001B3 beginning.
A mpg file can comprise multiple pack, and the initial code of each pack is 0x000001BA,Pack does not have end code, generally runs into next 0x000001BA beginning, just means that this pack finishes.As Pack is first, should be 14 bytes, the opening code of 4 bytes or cry beginning flag position, with 0x000001BAOr 0x000001B3 is as initial code. then, followed by the packheader of 10 bytes, pack head is believedBreath, this header does not generally have too many useful content, does not resolve.
Pack forms pack_header, system_header by 3 parts, and (concrete length is head_length+4(initial code 4B)+2 (head_length2B)), PES_packets (multiple). Wherein system_headerAnd if only if, and pack is that first packet is just to exist.
The structure of PES_packets: the initial code of 4 bytes is generally 3 byte packet header start code prefixThe data flow identification stream_id of 0x000001+1 byte. The pes bag of 2 bytes is long. And then be random lengthThe peculiar information of Basic Flow, wherein comprise: 1) the pes packet header distinguishing mark of 2 bytes, or cry control markWill position, to the effect that pes scrambling control, priority, copyright and PTS DTS mark etc. (whetherPTS/DTS mark, is solution video and audio simultaneous display, prevents decoder input buffer overflow or underflowKey point). 2) the PES growth data length of 1 byte, pes packet header is long. 3) information of 0-46BDistrict. 4) byte of padding of maximum 256 bytes. Maximum length is the bag of 65526 (2^16-1-6-3) byteData.
According to the initial code of front 4 bytes in PES_packets structure, can judge current pes bag the insideThe particular content of data what are.
About video_pid, sound, Video coding mode and file type: if initial code is 0x000001B3,Pes data so are below videos and are primary flow, video_pid=0x01;Video_codec=0x02; (ElementaryStreams (primary flow), to video, sound for file_type=ESFrequently the data flow that signal and other data are carried out after compression coding is called primary flow). referring to mpeg2 standard13818-2 video section document. If initial code is 0x000001E0-0x000001EF,(stream_id >=0xe0) && (stream_id≤0xef), pes data so are below videos,Video_pid=stream_id; Video_codec=0x02; File_type=mpg. If initial code is0x000001C0-0x000001DF, i.e. ((stream_id >=0xc0) && (stream_id≤0xdf)), so afterThe pes data of face are voice data, audio_pid=stream_id; Audio_codec=0x04;File_type=MPG; Referring to mpeg2 standard 13818-3 audio-frequency unit document. If initial code is0x000001BD, i.e. stream_id==0xbd, pes data so are below AC3 voice data.
Mpg pack arrangement (pes wraps substantially). By the video-frequency basic flow of MPEG-2 compressed encoding(ES-ElementaryStream) packet is the variable packet of packet length, is called PES Packet Elementary Stream(PES-PacketizedElementaryStream). In a general sense, PES be the dedicated video of having packed,Audio frequency, data, synchronous, identifying information data channel. So-called ES, refers to and only comprises 1 information source codingThe data flow of device. Be that ES is the video data stream of coding, or the audio data stream of coding, or other codingThe general designation of data flow. Each ES is made up of several access units (AU-AccessUnit), each videoAU or audio A U are dimerous by head and coded data. By frame sequential beThe coding ES of I1P4B2B3P7B5B6, by packing, just becomes ES only to contain a kind of character ES'sPES bag, as only contained the PES bag of video ES, only wraps containing the PES of audio ES, only containing other ES'sPES bag.
1 PES bag is made up of packet header, the peculiar information of ES and 3 parts of bag data. Due to packet header andThe peculiar both information of ES can be synthesized 1 data head, so can think that 1 PES bag is by data head and bagTwo part compositions of data (payload). Packet header is by start code prefix, data flow identification and PESBag long message 3 parts form. Bag start code prefix forms with 23 continuous " 0 " and 1 " 1 ", forRepresenting the data flow identification of useful information kind, is the integer of 1 8bit. By the two synthetic 1 specialBag initial code, can be used for data flow under identification data bag (video, audio frequency, or other) character and sequence number.
PES bag length is used for wrapping long identification, shows the byte number after this field. As, PES bag is long to be identified as2B, 2 × 8=16bit word is wide, and bag overall length is 2^16-1=65535B, gives data head 9B (packet headerThe peculiar information 3B of 6B+ES), the bag data heap(ed) capacity of variable-length is 65526B. Although PES bagMaximum length can reach (2^16-1)=65535B (Byte), if but be composition ES's in normal circumstancesIn dry AU by head and coded data 1 AU length dimerous. 1 AU is equivalent to1 width video image or 1 audio frame of coding, the schematic diagram referring to Fig. 2 upper right corner from ES to PES.Also can say, each AU is actually the display unit of encoded data stream, and 1 width that is equivalent to decoding is lookedFrequently the sampling of image or 1 audio frame.
The peculiar information of ES is by PES packet header distinguishing mark, PES packet header long message, the information area with for adjustingThe PES bag control information of the byte of padding 4 part compositions that whole information area variant pack is long. Wherein, PES packet headerDistinguishing mark is made up of 12 parts: PES scrambling control information, the instruction of PES priority level, data are fittedJoin alignment indicator, whether copyright instruction, master or copy instruction, displaying time mark whether(PTS-PresentationTimeStamp)/decode time mark (DTS-DecodeTimeStamp) mark,PES packet header is Basic Flow clock reference (ESCR-ElementaryStreamClockReference) information mark whetherWill, PES packet header is Basic Flow rate information mark, digital storage media (DSM) trick mode whether whetherInformation sign, additional copy information mark, whether CRC (CRC-Cyclic of PES packet header whetherRedundancyCheck) Information sign, PES extension flag whether. There is extension flag, show also to existOut of Memory. As, in the time having transmission error code, by packet counter, make receiving terminal can with accurately countAccording to recovering data flow, or by counter status, while identifying transmission, whether there is data-bag lost.
Wherein, whether PTS/DTS mark is solution video and audio simultaneous display, prevent that decoder input is slowThe key point of storage overflow or underflow. Because PTS shows that display unit appears at System Target Decoder(STD-SystemTargetDecoder) time, DTS shows whole access unit bytes from STDMoment of removing of ES decode buffer. Video coded pictures frame order isThe ES of I1P4B2B3P7B5B6I10B8B9, adds after PTS/DTS, is packaged into video PES one by oneBag. Each PES bag has a packet header, for defining the data content in PES, provides timing data.There are a PTS and DTS in the packet header of each I, P, B frame, but PTS is the same with DTS to B frame, need not mark the DTS of B frame. To I frame and P frame, before demonstration, must be stored in Video DecoderIn rearrangement buffer, after postponing (rearrangement), show again, must indicate respectively PTSAnd DTS. For example, the picture frame order of decoder input is I1P4B2B3P7B5B6I10B8B9, according to separatingThe frame order of code device output, should P4 than B2, B3 formerly, but P4 must be than B2, B3 while showingRear, P4 will, under the time tag guide shifting to an earlier date in data inserting stream, resequence through buffer,To rebuild the front video frame order I1B2B3P4B5B6P7B8B9I10 of coding. Obviously, PTS/DTS mark tableBright when determining event or definite information decoding special target exist, rely on special markers decoder, knownThis determines the moment that event or definite information start decoding or shows road. For example, PTS/DTS mark can be used forDetermine coding, multiplexed, decoding, rebuild time.
Thereby, only obtain the file header of video file, just can know video code rate and coded video information,Decoded video file broadcasting smoothly. In the present embodiment, first find the file header of video file,Then file header is encrypted by key. Video file head after encryption and the filename of video file,Key together corresponding stored in database. The two can be retrieved each other, namely by the literary composition of video filePart name can find corresponding key.
The generation of key and setting, need to carry out according to actual key schedule the present embodiment pair conventionallyThe generation of key and the process of encryption do not limit. The file header of each video file all uses unique and differentSecret key encryption.
Step 12, player obtains the filename of video file and corresponding key from database, uses keyThe video file that deciphering is obtained is also play.
User, in needs playing video file, first needs to obtain the data of video file own, stillThe file header of the video file obtaining is what to encrypt, needs key to decipher. Now, need to be from dataThe key that this video file of middle retrieval is corresponding. Due to deposit corresponding with key of filename of this video file, because ofAnd, can retrieve corresponding key according to the filename of this video file. Thus, can use this keyThe file header of the video file that deciphering is obtained, thus the video file after deciphering obtained, play.
In common way, user opens this video network address, wants to play the video file in this network address, needsFirst registration, then logs in, and logs in rear selection and wants the video name of seeing, on interface, can show a play authorizationCode (being key), then select to play video time can point out input authorization code (inputting key), thisTime server end can send out video file head encrypt after video flowing, this key meeting for this webpage playerCall decrypted program playing again after the file header deciphering of encrypting.
Common, user needs playing video file, first needs to obtain the authority of playing this video file,Player obtains after video file, according to user right, obtains the filename pair of video file from databaseThe key of answering, shows and points out user to input; Input after key user, with secret key decryption video literary compositionThe file header of part, and playing video file. The checking of certainly, concrete user right might not be by broadcastingPut device and carry out, can also be undertaken by other module with verifying authorization in system. User registers and loginsAfter system, the video file that click need to be obtained; Server authentication user's broadcasting authority, and to there being broadcastingThe user of authority returns to corresponding secret key; User is according to carrying out video file broadcasting after the key input of returning.
Before concrete operation, first need to detect each video file, find out the position of file header and useThe key that special AES obtains is encrypted.
In the embodiment of the present invention, by by the file header of video file by secret key encryption after, by described videoThe filename of file, described key corresponding stored are in database; Player obtains institute from described databaseState the filename of video file and corresponding key, the video file obtaining by described secret key decryption is also play.On video source file, video file head is encrypted, even if user obtains video by network analysis instrumentStream, does not have key and decrypted program cannot play this video file yet. Greatly increase the peace of videoQuan Xing.
The embodiment of the present invention 2 provides a kind of video-encryption player method, and wherein, Linux server end can be depositedStore up a lot of video files, have three large process modules in this system, first is website service, and use is providedFamily registration login order video function, second be process module be analyze all video files file header andVideo data, the first few bytes that draws each file is file header (the coding letter of this file header meeting recording of videoBreath, as coded format, code check, video duration, waits video important information), this file header is passed through to keyAfter encryption, mix the information such as the storage file name of this file and deposit together mysql database in, the 3rd processBe key management process, this process (passing through AES) is for generation of key and authentication secret. Each lookingThe key of frequency file is unique, can deposit in mysql database.
User opens this video network address, wants to play the video in this network address, need to first register, then log in,Log in rear selection and want the video name of seeing, on interface, can show a play authorization code (being key), thenWhen video that selection will be play, can point out input authorization code (inputting key), at this moment server end can sendGo out the video flowing after video file head is encrypted, this webpage player can call decrypted program adding with this keyAfter the file header deciphering of close mistake, play again. Player obtains less than normal video file head, does not know videoCode check and coded video information cannot displaying videos.
As shown in Figure 2, a kind of video-encryption Play System structural representation providing for the embodiment of the present invention 3,Wherein,
Ciphering unit 31, for by the file header of video file by secret key encryption;
Database Unit 32, for storing the filename of described video file, corresponding described key;
Player unit 33, for obtaining the filename of described video file and right from described Database UnitThe key of answering, the video file obtaining by described secret key decryption is also play.
Especially, described system plays device unit 33 also for: obtain after described video file, according to useFamily authority is obtained the key corresponding to filename of described video file from described Database Unit 32, entersRow shows and points out user to input;
Input after described key user, with the file header of video file described in described secret key decryption, and playDescribed video file.
Especially, described system also comprises cipher key unit 34, for obtaining according to special key scheduleKey, the file header of each video file all uses unique and different secret key encryptions.
Especially, described system also comprises user authority management unit 35, corresponding with authentication of users for managementVideo file play authority.
Especially, described system also comprises video file memory cell 36, encrypts for storing described file headerAfter video file, and respond the request of described player unit 33, provide described video file to broadcastPut.
In sum, in the embodiment of the present invention, by by the file header of video file by secret key encryption after,By the filename of described video file, described key corresponding stored in database; Player is from described dataIn storehouse, obtain the filename of described video file and corresponding key, the video literary composition obtaining by described secret key decryptionPart is also play. On video source file, video file head is encrypted, even if user is by network analysis workTool obtains video flowing, does not have key and decrypted program also cannot play this video file. Greatly increaseThe security of video.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or meterCalculation machine program product. Therefore, the present invention can adopt complete hardware implementation example, completely implement software example or knotClose the form of the embodiment of software and hardware aspect. And the present invention can adopt at one or more wherein bagsThe computer-usable storage medium that contains computer usable program code (include but not limited to magnetic disc store andOptical memory etc.) form of the upper computer program of implementing.
The present invention is that reference is according to the method for the embodiment of the present invention, equipment (system) and computer program productThe flow chart of product and/or block diagram are described. Should understand can be by computer program instructions realization flow figure and/ or block diagram in each flow process and/or flow process in square frame and flow chart and/or block diagram and/Or the combination of square frame. Can provide these computer program instructions to all-purpose computer, special-purpose computer, embeddingThe processor of formula processor or other programmable data processing device, to produce a machine, makes by calculatingThe instruction that the processor of machine or other programmable data processing device is carried out produces for realizing at flow chart oneThe device of the function of specifying in square frame of individual flow process or multiple flow process and/or block diagram or multiple square frame.
These computer program instructions also can be stored in energy vectoring computer or other programmable data processing are establishedIn the standby computer-readable memory with ad hoc fashion work, make to be stored in this computer-readable memoryInstruction produce and comprise the manufacture of command device, this command device is realized in flow process or multiple of flow chartThe function of specifying in square frame of flow process and/or block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makeMust on computer or other programmable devices, carry out sequence of operations step to produce computer implemented placeReason, thus the instruction of carrying out on computer or other programmable devices is provided for realizing one of flow chartThe step of the function of specifying in square frame of flow process or multiple flow process and/or block diagram or multiple square frame.
Obviously, those skilled in the art can carry out various changes and modification and not depart from this present inventionThe spirit and scope of invention. Like this, if these amendments of the present invention and modification belong to the claims in the present inventionAnd within the scope of equivalent technologies, the present invention be also intended to comprise these change and modification interior.

Claims (10)

1. a video-encryption player method, is characterized in that, comprises the steps:
By the file header of video file by secret key encryption after, by the filename of described video file, described closeKey corresponding stored is in database;
Player obtains the filename of described video file and corresponding key from described database, described in usingThe video file that secret key decryption is obtained is also play.
2. the method for claim 1, is characterized in that, described method also comprises:
Described player obtains after described video file, according to user right, obtains institute from described databaseKey corresponding to filename of stating video file, shows and points out user to input;
Input after described key user, with the file header of video file described in described secret key decryption, and playDescribed video file.
3. the method for claim 1, is characterized in that, described method also comprises:
Described key is obtained by special key schedule, and the file header of each video file all uses uniqueAnd different secret key encryption.
4. the method for claim 1, is characterized in that, described method also comprises:
After user's registration login system, the video file that click need to be obtained;
Server authentication user's broadcasting authority, and the user who has broadcasting authority is returned to corresponding secret key;
User is according to carrying out video file broadcasting after the key input of returning.
5. the method for claim 1, is characterized in that, described method also comprises:
Detect in advance each video file, the position of finding out file header is also encrypted with different keys.
6. a video-encryption Play System, is characterized in that, comprising:
Ciphering unit, for by the file header of video file by secret key encryption;
Database Unit, for storing the filename of described video file, corresponding described key;
Player unit, for obtaining filename and the correspondence of described video file from described Database UnitKey, the video file obtaining by described secret key decryption and play.
7. system as claimed in claim 6, is characterized in that, described system plays device unit also for:Obtain after described video file, according to user right, from described Database Unit, obtain described video fileKey corresponding to filename, show and point out user to input;
Input after described key user, with the file header of video file described in described secret key decryption, and playDescribed video file.
8. system as claimed in claim 6, is characterized in that, described system also comprises cipher key unit,For obtaining key according to special key schedule, the file header of each video file all use unique andDifferent secret key encryptions.
9. system as claimed in claim 6, is characterized in that, described system also comprises user right pipeReason unit, plays authority for management and the corresponding video file of authentication of users.
10. system as claimed in claim 6, is characterized in that, described system also comprises that video file depositsStorage unit, for storing the video file after described file header is encrypted, and responds asking of described player unitAsk, provide described video file to play.
CN201410686775.9A 2014-11-25 2014-11-25 Method and system for video encryption playing Pending CN105611318A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410686775.9A CN105611318A (en) 2014-11-25 2014-11-25 Method and system for video encryption playing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410686775.9A CN105611318A (en) 2014-11-25 2014-11-25 Method and system for video encryption playing

Publications (1)

Publication Number Publication Date
CN105611318A true CN105611318A (en) 2016-05-25

Family

ID=55990811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410686775.9A Pending CN105611318A (en) 2014-11-25 2014-11-25 Method and system for video encryption playing

Country Status (1)

Country Link
CN (1) CN105611318A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254897A (en) * 2016-08-22 2016-12-21 深圳算云视讯科技有限公司 A kind of video-encryption player method
CN107273719A (en) * 2017-04-28 2017-10-20 努比亚技术有限公司 A kind of copy-right protection method and terminal device
CN108322778A (en) * 2018-02-09 2018-07-24 珠海迈科智能科技股份有限公司 A kind of method and device promoting DVB data sts-stream scrambling sts speed
CN108965354A (en) * 2017-05-17 2018-12-07 北京博瑞彤芸文化传播股份有限公司 A kind of method for down loading of video/audio
CN110996033A (en) * 2019-12-20 2020-04-10 上海海鸥数码照相机有限公司 Method and device for encrypting image data of oblique photography hanging cabin
CN111050213A (en) * 2020-01-17 2020-04-21 北京达佳互联信息技术有限公司 Video playing method and device, electronic equipment and storage medium
CN111741268A (en) * 2020-06-30 2020-10-02 中国建设银行股份有限公司 Video transmission method, device, server, equipment and medium
CN113641849A (en) * 2021-08-18 2021-11-12 广州佰锐网络科技有限公司 Audio and video data storage method and system
CN116016993A (en) * 2022-11-15 2023-04-25 上海热线信息网络有限公司 Video encryption and decryption method and device based on reversible cellular automaton

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1623328A (en) * 2002-01-02 2005-06-01 索尼电子有限公司 Critical packet partial encryption
CN101447008A (en) * 2008-12-23 2009-06-03 中国科学院计算技术研究所 Digital content network copyright management system and method
CN101902333A (en) * 2010-07-20 2010-12-01 中兴通讯股份有限公司 Application method of digital rights management and terminal equipment
CN102456116A (en) * 2010-10-28 2012-05-16 无锡江南计算技术研究所 File encryption method, file decryption method and devices
CN103294961A (en) * 2013-06-07 2013-09-11 北京奇虎科技有限公司 Method and device for file encrypting/decrypting

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1623328A (en) * 2002-01-02 2005-06-01 索尼电子有限公司 Critical packet partial encryption
CN101447008A (en) * 2008-12-23 2009-06-03 中国科学院计算技术研究所 Digital content network copyright management system and method
CN101902333A (en) * 2010-07-20 2010-12-01 中兴通讯股份有限公司 Application method of digital rights management and terminal equipment
CN102456116A (en) * 2010-10-28 2012-05-16 无锡江南计算技术研究所 File encryption method, file decryption method and devices
CN103294961A (en) * 2013-06-07 2013-09-11 北京奇虎科技有限公司 Method and device for file encrypting/decrypting

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254897A (en) * 2016-08-22 2016-12-21 深圳算云视讯科技有限公司 A kind of video-encryption player method
CN107273719A (en) * 2017-04-28 2017-10-20 努比亚技术有限公司 A kind of copy-right protection method and terminal device
CN108965354A (en) * 2017-05-17 2018-12-07 北京博瑞彤芸文化传播股份有限公司 A kind of method for down loading of video/audio
CN108322778A (en) * 2018-02-09 2018-07-24 珠海迈科智能科技股份有限公司 A kind of method and device promoting DVB data sts-stream scrambling sts speed
CN108322778B (en) * 2018-02-09 2020-11-20 珠海迈科智能科技股份有限公司 Method and device for increasing scrambling speed of DVB data stream
CN110996033A (en) * 2019-12-20 2020-04-10 上海海鸥数码照相机有限公司 Method and device for encrypting image data of oblique photography hanging cabin
CN110996033B (en) * 2019-12-20 2021-09-07 上海海鸥数码照相机有限公司 Method and device for encrypting image data of oblique photography hanging cabin
CN111050213B (en) * 2020-01-17 2022-08-26 北京达佳互联信息技术有限公司 Video playing method and device, electronic equipment and storage medium
CN111050213A (en) * 2020-01-17 2020-04-21 北京达佳互联信息技术有限公司 Video playing method and device, electronic equipment and storage medium
CN111741268A (en) * 2020-06-30 2020-10-02 中国建设银行股份有限公司 Video transmission method, device, server, equipment and medium
CN111741268B (en) * 2020-06-30 2022-07-05 中国建设银行股份有限公司 Video transmission method, device, server, equipment and medium
CN113641849A (en) * 2021-08-18 2021-11-12 广州佰锐网络科技有限公司 Audio and video data storage method and system
CN116016993A (en) * 2022-11-15 2023-04-25 上海热线信息网络有限公司 Video encryption and decryption method and device based on reversible cellular automaton

Similar Documents

Publication Publication Date Title
CN105611318A (en) Method and system for video encryption playing
KR100930303B1 (en) Digital media contents protection system and method thereof
JP5039830B2 (en) How to configure a digital rights management license format
JP5399377B2 (en) Method and apparatus for supporting change of content key
KR20050092688A (en) Integrated multimedia file format structure, its based multimedia service offer system and method
JP2009110636A (en) Playback apparatus and playback control method
EP2268020B1 (en) Protection of audio or video data in a playback device
US20130191626A1 (en) Recording device, terminal device, and content transmission system
KR20080103225A (en) Method for encryption transmitting and decrypting contents and apparatus thereof
US20100183148A1 (en) Recording keys in a broadcast-encryption-based system
JP2012235463A (en) Data transmission apparatus for transmitting encrypted data to conditional access module over common interface, method applied to the same, conditional access module, and system thereof
JP2011239404A (en) Content receiving device, content reproducing device, content receiving/reproducing device, content receiving method, and program
CN104254004A (en) Digital rights management method and system suitable for high-bit-rate audio and video content
CN102158759B (en) Program recording method, playback method of recorded program and set top box
WO2011072607A1 (en) File segmented protection method, apparatus and system
CN102300093A (en) Encrypting method for distributing data file
CN106096334B (en) Method and device for encrypting hypermedia data, method and device for decrypting hypermedia data
CN103765909A (en) Thwarting unauthorized content copying using media tracking code
KR100596382B1 (en) Apparatus for protecting digital content and method therefor
JPH10336624A (en) Device and method for scrambling and descrambling mpeg stream data
US8964978B2 (en) Method and apparatus for efficiently fixing transformed part of content
KR100958782B1 (en) Electronic device, home network system and method for protecting unauthorized distribution of digital contents
CN106060604A (en) Method and system for realizing digital rights management play based on BHD file
KR100635128B1 (en) Apparatus for generating encrypted motion-picture file with iso base media format and apparatus for reconstructing encrypted motion-picture, and method for reconstructing the same
US8428256B2 (en) Method and apparatus for efficiently fixing transformed part of content

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160525