CN106788970A - The method and system of secret protection is carried out to video - Google Patents
The method and system of secret protection is carried out to video Download PDFInfo
- Publication number
- CN106788970A CN106788970A CN201611139843.5A CN201611139843A CN106788970A CN 106788970 A CN106788970 A CN 106788970A CN 201611139843 A CN201611139843 A CN 201611139843A CN 106788970 A CN106788970 A CN 106788970A
- Authority
- CN
- China
- Prior art keywords
- user
- video
- password
- video file
- confidential folder
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012217 deletion Methods 0.000 claims description 12
- 230000037430 deletion Effects 0.000 claims description 12
- 230000008569 process Effects 0.000 claims description 12
- 238000007654 immersion Methods 0.000 claims description 10
- 238000012546 transfer Methods 0.000 claims description 9
- 230000003321 amplification Effects 0.000 claims 1
- 238000003199 nucleic acid amplification method Methods 0.000 claims 1
- 230000000694 effects Effects 0.000 description 8
- 238000005516 engineering process Methods 0.000 description 6
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000000151 deposition Methods 0.000 description 1
- 230000001627 detrimental effect Effects 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/4367—Establishing a secure communication between the client and a peripheral device or smart card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
Disclosure carries out method for secret protection and system to video, and method includes:Confidential folder is set up in the client of user;Prompting user sets the unlatching password for opening confidential folder;The unlatching password of user input is received, md5 encryption is carried out, md5 encryption character is formed;The scan instruction of user input is received, scanning storage is in the local video file of client;The instruction that selected video file is added confidential folder of user input is received, one or more video files that user is selected are added in confidential folder;The instruction of confidential folder is opened in the request for receiving user input, and ejection Password Input frame opens password for user input;Receive the unlatching password of user input, and the unlatching password that is set with user of the unlatching password that will be received to be converted to and open password with the MD5 ciphertexts that user is set after MD5 ciphertext character strings and compare, if matching, opens confidential folder, if mismatching, user cipher input error is pointed out.
Description
Technical field
The application is related to the technical field of video protection, specifically, is related to a kind of side that secret protection is carried out to video
Method and system.
Background technology
Information technology is fast-developing now, and everybody enjoys the facility that high-tech brings, at the same time, people's itself
Information also all can be in the public visual field, and thus, the privacy concern of people is also gradually paid attention to by everybody, and people's storage is being moved
Some private files (picture, video etc.) in dynamic terminal or apparatus such as computer, if not encipherment protection, it is easy to by other people
Seen, so as to cause the problem of privacy leakage.And if to each picture or the independent encipherment protection of video file, and greatly
Improve user operation triviality, can also increase the computing pressure of equipment, be unfavorable for the experience of user.Existing net
The form that network equipment leads to encrypted file preserves the file data that user is moved through coming, and each user checks or uses these again
During private file, it is required for being decrypted into safe cabinet file, and can not be directly seen under the respective directories of user
See or play, use very cumbersome.
Existing equipment preserves user and is moved through the small documents such as the picture that comes by the form of safe cabinet file, every time use
When family is checked or uses these private files again, it is required for reverting to these pictures original after being decrypted into safe cabinet file
The storage location come, can just be shown, and can not directly be watched under the respective directories of safe cabinet, come for user
Say, use very cumbersome;Also, user has watched in the storage location of reduction and it has been moved on into safe cabinet again again, ability
Protected again, be highly detrimental to user experience;Furthermore, existing file protection does not support that files in batch adds secrecy
Cabinet, can only move in file a to safe cabinet every time, and user's operating process is cumbersome.
Therefore it provides it is a kind of can bulk encryption protection video file and can under storage file catalogue directly opening scheme
It is this area problem demanding prompt solution.
The content of the invention
In view of this, technical problems to be solved in this application there is provided a kind of method that secret protection is carried out to video
And system, solve and be unable to bulk encryption protection video file and the direct opening under storage file catalogue in the prior art
Technical problem.
In order to solve the above-mentioned technical problem, the application has following technical scheme:
A kind of method that secret protection is carried out to video, including:
Confidential folder is set up in the client of user;
When user's request uses the confidential folder, the unlatching for pointing out user to set the opening confidential folder is close
Code;
The unlatching password of user input is received, the unlatching password is carried out into md5 encryption, form md5 encryption character,
The md5 encryption character is stored, and points out user encryption success;
The scan instruction of user input is received, and after the scan instruction is received, scanning storage is local in client
Video file, generate local video file directory;
Receive the instruction that selected video file is added confidential folder of user input, and receive it is described will be selected
After video file adds the instruction of confidential folder, one or more video files that user is selected add the classified document
In folder, and shown in the confidential folder;
The instruction of the confidential folder is opened in the request for receiving user input, and opens described the request is received
After the instruction of confidential folder, ejection Password Input frame opens password for user input;
The unlatching password of user input is received, and the unlatching password that the unlatching password that will be received is set with user is converted to
The MD5 ciphertexts set with user after MD5 ciphertext character strings are opened password and are compared, if the unlatching password of user input and user
The unlatching password match of setting, then open the confidential folder, if the unlatching for opening password and user's setting of user input
Password is mismatched, then point out user cipher input error.
Preferably, wherein:
Scanning storage opens asynchronous task in the local video file of client, stores scanning local in client
The process of video file performed in sub-line journey, and when scanned, be automatically switched off the asynchronous task, and by scanning result
Main thread is returned to show.
Preferably, wherein:
Further include:
The video playback instruction of user input is received, and after the video playback instruction is received, directly in the guarantor
Video player is called to play the video file that user chooses in close file.
Preferably, wherein:
Further include:
Receive being shifted to storing the video file in the confidential folder of user input, renaming or deletion
Instruction, and after the transfer instruction is received, the video file is transferred to the path specified, it is described heavy receiving
After name instruction, the video file is carried out into renaming, after the deletion instruction is received, the video file is carried out
Delete.
Preferably, wherein:
The display interface that the classified document is clipped in the client is set to immersion, by the way of animation prompting
Prompting user cipher input error.
A kind of system that secret protection is carried out to video, it is characterised in that including:Confidential folder is set up module, is opened
Password setup module, unlatching cryptographic handling module, video file scan module, video file preserving module and password authentification mould
Block,
The confidential folder sets up module, and confidential folder is set up for the client in user;
The unlatching password setup module, for when user's request uses the confidential folder, pointing out user to set
Open the unlatching password of the confidential folder;
The unlatching cryptographic handling module, the unlatching password for receiving user input enters the unlatching password
Row md5 encryption, forms md5 encryption character, and the md5 encryption character is stored, and points out user encryption success;
The video file scan module, the scan instruction for receiving user input, and refer to the scanning is received
After order, scanning storage generates local video file directory in the local video file of client;
The video file preserving module, confidential folder is added for receive user input by selected video file
Instruction, and receive it is described by selected video file add confidential folder instruction after, or many that user is selected
Individual video file is added in the confidential folder, and is shown in the confidential folder,
The password authentication module, the instruction of the request opening confidential folder for receiving user input, and
After receiving the instruction of the request opening confidential folder, ejection Password Input frame opens password for user input, and
Set with user for receiving the unlatching password of user input, and after the unlatching password that will be received is converted to MD5 ciphertext character strings
The MD5 ciphertexts put are opened password and are compared, if the unlatching password match for opening password and user's setting of user input, beats
The confidential folder is opened, if the password of opening of user input is mismatched with the unlatching password that user is set, points out user close
Code input error.
Preferably, wherein:
The video file scan module, is further used for scanning storage in the local video file of client, opens
Asynchronous task, makes scanning store the process in the local video file of client in the execution of sub-line journey, and when scanned, from
Move and close the asynchronous task, and scanning result is returned into main thread and show.
Preferably, wherein:
Further include:Video playback module,
The video playback module, the video playback for receiving user input is instructed, and is broadcast the video is received
After putting instruction, video player is directly called to play the video file that user chooses in the confidential folder.
Preferably, wherein:
Further include:Video file adjusting module,
The video file adjusting module, for receive user input to storing the video in the confidential folder
File is shifted, the instruction of renaming or deletion, and after the transfer instruction is received, the video file is transferred to
The path specified, after the renamed instructions are received, renaming is carried out by the video file, is receiving the deletion
After instruction, the video file is deleted.
Preferably, wherein:
The display interface that the classified document is clipped in the client is set to immersion,
The password authentication module, is further used for pointing out user cipher input error by the way of animation is reminded.
Compared with prior art, system and method described herein, has reached following effect:
First, the method and system that secret protection is carried out to video provided by the present invention can be local by user equipment
Video adds encryption folder, realizes the video during user can play encryption folder under encryption folder catalogue, keeps away
Exempt to need to remove video just play out, video file can not switch in solving encryption file directory in the prior art
The problem of broadcasting.
Second, the method and system that secret protection is carried out to video provided by the present invention, support encryption folder to create,
Delete, modification title, the operation such as shift position, also support that video file batch adds confidential folder, it is to avoid user's operation
Triviality, improve user experience.
3rd, confidential folder is shown boundary by the method and system that secret protection is carried out to video provided by the present invention
Face top column is set to immersion, have also been devised display animation effect when password is mismatched, and provides the user with preferable vision
Impression.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen
Schematic description and description please does not constitute the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of flow chart of the method that secret protection is carried out to video of the invention;
Fig. 2 is a kind of structure chart of the system that secret protection is carried out to video of the invention;
Fig. 3 is a kind of flow chart of the embodiment of the method that secret protection is carried out to video of the invention.
Specific embodiment
Some vocabulary have such as been used to censure specific components in the middle of specification and claim.Those skilled in the art should
It is understood that hardware manufacturer may call same component with different nouns.This specification and claims are not with name
The difference of title is used as distinguishing the mode of component, but the difference with component functionally is used as the criterion distinguished.Such as logical
The "comprising" of piece specification and claim mentioned in is an open language, therefore should be construed to " include but do not limit
In "." substantially " refer to that in receivable error range, those skilled in the art can solve described in the range of certain error
Technical problem, basically reaches the technique effect.Additionally, " coupling " one word herein comprising it is any directly and indirectly electric property coupling
Means.Therefore, if a first device is coupled to a second device described in text, representing the first device can direct electrical coupling
The second device is connected to, or the second device is electrically coupled to indirectly by other devices or coupling means.Specification
Subsequent descriptions be implement the application better embodiment, so it is described description be for the purpose of the rule for illustrating the application,
It is not limited to scope of the present application.The protection domain of the application ought be defined depending on the appended claims person of defining.
Embodiment 1
Shown in Figure 1 is a kind of herein described specific embodiment of the method that secret protection is carried out to video, the party
Method includes:
Step 101, set up confidential folder in the client of user;
Step 102, when user's request uses the confidential folder, point out user to set and open the confidential folder
Unlatching password;
Step 103, the unlatching password for receiving user input, md5 encryption is carried out by the unlatching password, forms MD5
Encrypted characters, store to the md5 encryption character, and point out user encryption success;
Step 104, the scan instruction for receiving user input, and after the scan instruction is received, scanning storage is in visitor
The video file at family end, generates local video file directory;
Step 105, the instruction that selected video file is added confidential folder for receiving user input, and receiving
State after selected video file is added into the instruction of confidential folder, one or more video files that user is selected add described
In confidential folder, and shown in the confidential folder;
Step 106, the request of reception user input are opened the instruction of the confidential folder, and are receiving the request
After opening the instruction of the confidential folder, ejection Password Input frame opens password for user input;
Step 107, the unlatching password for receiving user input, and the unlatching password that will be received is close with the unlatching that user is set
Code is converted to the MD5 ciphertexts unlatching password set with user after MD5 ciphertext character strings and compares, if the unlatching of user input is close
The unlatching password match that code is set with user, then open the confidential folder, if the unlatching password of user input sets with user
The unlatching password put is mismatched, then point out user cipher input error.
The method that secret protection is carried out to video provided by the present invention, classified document is established in the client of user
Folder, user sets the password for entering confidential folder according to prompting when confidential folder is used first, in use,
User may be selected one or more local video files, disposably be added in confidential folder.When need watch classified document
During video file in folder, it is necessary to which the unlatching password that input is consistent with setting password could open confidential folder, that is to say, that
Only know that the people for opening password can open the confidential folder, this kind of mode is served well to the privacy of user very well
Protection.
Additionally, by above-mentioned steps 103, the unlatching password that user is set is converted to by the encrypted characters of md5 encryption,
This kind of cipher mode is easy to the password preferably to user to play a part of protection, effectively prevent the possibility that password is cracked,
The security of confidential folder is further increased, and ensure that the privacy of user obtains relatively reliable protection.
In above-mentioned steps 105, user may be selected multiple video and disposably be added in confidential folder, realize to video text
The batch operation of part, effectively prevent the triviality of user's operation, so as to be conducive to lifting Consumer's Experience.
In above-mentioned steps 104, scanning storage opens asynchronous task in the local video file of client, deposits scanning
The process stored up in the local video file of client is performed in sub-line journey, and when scanned, is automatically switched off described asynchronous
Business, and scanning result is returned into main thread show.
During scanning local video file, opening asynchronous task carries out file scan, so allows for the process of scanning file
Other processes being carrying out with client are completed on two threads respectively, will not cause scanning to the program applied
When so that there is Caton phenomenon in the program applied, it is ensured that while scanning is smoothed out, do not influence what is be carrying out also
Process.
The method that secret protection is carried out to video provided by the present invention, further includes:Receive the video of user input
Play instruction, and after the video playback instruction is received, directly call video player to broadcast in the confidential folder
Put the video file that user chooses.
The method that secret protection is carried out to video provided by the present invention, after user input correctly opens password, can
The video file chosen directly is played in confidential folder, without video is removed into confidential folder, is efficiently solved existing
The video file in file directory is encrypted in technology can not switch the problem of broadcasting.
The method that secret protection is carried out to video provided by the present invention, further includes:Receive user input to depositing
Store up video file in the confidential folder shifted, the instruction of renaming or deletion, and receiving the transfer
After instruction, the video file is transferred to the path specified, after the renamed instructions are received, by the video file
Renaming is carried out, after the deletion instruction is received, the video file is deleted.
The video file in confidential folder is added to for user, user can also be carried out further to these video files
Treatment.For example, user can be according to the actual requirements to storing in confidential folder video file shift, transfer secrecy regard
Frequency file is realized by changing the store path of file.User can also carry out renaming to secure video file, be named
For ease of the file of identification.Additionally, for the secure video file watched, user can be also deleted it, to subtract
Few occupancy to client's end memory, effectively improves the experience of user.
In the present invention, the display interface that the classified document is clipped in the client is set to immersion, using animation
The mode of prompting points out user cipher input error.
It is provided by the present invention to carry out the method for secret protection to video, using immersion technology, by confidential folder
The color expansion on display interface top column and the status display column at overlay device interface, provide the user preferable visual impression
Receive.Additionally, also being reminded by the way of animation effect when user inputs password by mistake, the experience effect of user is equally improved
Really.
The method that secret protection is carried out to video provided by the present invention, can also design the function of broadcast, and such as user exists
During certain video watched in confidential folder, client has corrected incoming call, and now, the sound of video playback can be according to phone
The intensity of the tinkle of bells is adjusted, not influence the normal viewing of user.
Embodiment 2
Shown in Figure 2 is a kind of herein described specific embodiment of the system that secret protection is carried out to video, and this is
System includes:Confidential folder is set up module 10, unlatching password setup module 20, unlatching cryptographic handling module 30, video file and is swept
Module 40, video file preserving module 50 and password authentication module 60 are retouched,
The confidential folder sets up module 10, and confidential folder is set up for the client in user;
The unlatching password setup module 20, for when user's request uses the confidential folder, pointing out user to set
Put the unlatching password for opening the confidential folder;
The unlatching cryptographic handling module 30, the unlatching password for receiving user input, by the unlatching password
Md5 encryption is carried out, md5 encryption character is formed, the md5 encryption character is stored, and point out user encryption success;
The video file scan module 40, the scan instruction for receiving user input, and receiving the scanning
After instruction, scanning storage generates local video file directory in the local video file of client;
The video file preserving module 50, for receive user input by selected video file add confidential folder
Instruction, and receive it is described selected video file is added into the instruction of confidential folder after, user is selected one or
Multiple video files are added in the confidential folder, and are shown in the confidential folder,
The instruction of the confidential folder is opened in the password authentication module 60, the request for receiving user input, and
After the instruction for receiving the request opening confidential folder, ejection Password Input frame opens password for user input,
And for receiving the unlatching password of user input, and the unlatching password that will be received be converted to after MD5 ciphertext character strings with user
The MD5 ciphertexts of setting are opened password and are compared, if the unlatching password match for opening password and user's setting of user input,
The confidential folder is opened, if the password of opening of user input is mismatched with the unlatching password that user is set, user is pointed out
Password Input mistake.
It is provided by the present invention to carry out the system of secret protection to video, establish classified document in the client of user
Folder, user sets the password for entering confidential folder according to prompting when confidential folder is used first, in use,
User may be selected one or more local video files, disposably be added in confidential folder.When need watch classified document
During video file in folder, it is necessary to which the unlatching password that input is consistent with setting password could open confidential folder, that is to say, that
Only know that the people for opening password can open the confidential folder, this kind of mode is served well to the privacy of user very well
Protection.
Additionally, by above-mentioned unlatching cryptographic handling module 30, the unlatching password that user is set is converted to by md5 encryption
Encrypted characters, this kind of cipher mode is easy to the password preferably to user to play a part of protection, effectively prevent password quilt
The possibility for cracking, further increases the security of confidential folder, and ensure that the privacy of user obtains relatively reliable guarantor
Shield.
In said system provided by the present invention, user may be selected multiple video one by video file preserving module 50
Secondary property is added in confidential folder, realizes the batch operation to video file, effectively prevent the triviality of user's operation, from
And be conducive to lifting Consumer's Experience.
The present invention is carried out in the system of secret protection to video, and video file scan module 40 is further used for scanning and deposits
Storage opens asynchronous task in the local video file of client, scanning is stored the mistake in the local video file of client
Journey is performed in sub-line journey, and when scanned, be automatically switched off the asynchronous task, and scanning result is returned into main thread and show
Show.
When local video file is scanned, open asynchronous task carries out file scan to videoscanning module in the present invention,
Other processes completion on two threads respectively that the process and client of scanning file are carrying out so is allowed for, will not be made
When must scan the program applied so that the program applied occurs Caton phenomenon, it is ensured that what scanning was smoothed out
Meanwhile, the process being carrying out is not influenceed also.
The system that the present invention carries out secret protection to video, further includes:Video playback module,
The video playback module, the video playback for receiving user input is instructed, and is broadcast the video is received
After putting instruction, the video file for directly calling storm wind player plays user to choose in the confidential folder.
It is provided by the present invention to carry out the system of secret protection to video, after user input correctly opens password,
Video playback module can directly play the video file chosen in confidential folder, without video is removed into confidential folder,
Efficiently solve the problems, such as that the video file in encryption file directory in the prior art can not switch broadcasting.
The system that the present invention carries out secret protection to video, further includes:Video file adjusting module,
The video file adjusting module, for receive user input to storing the video in the confidential folder
File is shifted, the instruction of renaming or deletion, and after the transfer instruction is received, the video file is transferred to
The path specified, after the renamed instructions are received, renaming is carried out by the video file, is receiving the deletion
After instruction, the video file is deleted.
The video file in confidential folder is added to for user, user can also be carried out further to these video files
Treatment.For example, user can be according to the actual requirements to storing in confidential folder video file shift, transfer secrecy regard
Frequency file is realized by changing the store path of file.User can also carry out renaming to secure video file, be named
For ease of the file of identification.Additionally, for the secure video file watched, user can be also deleted it, to subtract
Few occupancy to client's end memory, effectively improves the experience of user.
The present invention is carried out in the system of secret protection to video, and the classified document is clipped in the display interface of the client
It is set to immersion.
The present invention carries out the password authentication module 60 in the system of secret protection to video, is further used for being carried using animation
Awake mode points out user cipher input error.
It is provided by the present invention to carry out the system of secret protection to video, using immersion technology, by confidential folder
The color expansion on display interface top column and the status display column at overlay device interface, provide the user preferable visual impression
Receive.Additionally, also being reminded by the way of animation effect when user inputs password by mistake, the experience effect of user is equally improved
Really.
The system that secret protection is carried out to video provided by the present invention, can also design the function of broadcast, and such as user exists
During certain video watched in confidential folder, client has corrected incoming call, and now, the sound of video playback can be according to phone
The intensity of the tinkle of bells is adjusted, not influence the normal viewing of user.
Embodiment 3
A kind of present invention presented below video is carried out the system of secret protection build and operation method application implementation
Example, referring to Fig. 3, specifically includes:
Step 201, set up confidential folder in the client of user;
Step 202, when user's request uses the confidential folder, point out user to set and open the confidential folder
Unlatching password;
Step 203, the unlatching password for receiving user input, md5 encryption is carried out by the unlatching password, forms MD5
Encrypted characters, store to the md5 encryption character, and point out user encryption success;
Step 204, the scan instruction for receiving user input, and after the scan instruction is received, asynchronous task is opened,
Scanning storage generates local video file directory in the local video file of client;
Step 205, the instruction that selected video file is added confidential folder for receiving user input, and receiving
State after selected video file is added into the instruction of confidential folder, one or more video files that user is selected add described
In confidential folder, and shown in the confidential folder;
Step 206, the request of reception user input are opened the instruction of the confidential folder, and are receiving the request
After opening the instruction of the confidential folder, ejection Password Input frame opens password for user input;
Step 207, the unlatching password for receiving user input, and the unlatching password that will be received is close with the unlatching that user is set
Code is converted to the MD5 ciphertexts unlatching password set with user after MD5 ciphertext character strings and compares, if the unlatching of user input is close
The unlatching password match that code is set with user, then open the confidential folder, if the unlatching password of user input sets with user
The unlatching password put is mismatched, then point out user cipher input error by the way of animation prompting;
Step 208, the video playback instruction for receiving user input, and after the video playback instruction is received, directly
Video player is called to play the video file that user chooses in the confidential folder;
Step 209, receive user input and shifted to storing the video file in the confidential folder, order again
Name or the instruction deleted, and after the transfer instruction is received, the video file is transferred to the path specified, receiving
To after the renamed instructions, the video file is carried out into renaming, after the deletion instruction is received, by the video
File is deleted.
By various embodiments above, the beneficial effect that the application is present is:
First, the method and system that secret protection is carried out to video provided by the present invention can be local by user equipment
Video adds encryption folder, realizes the video during user can play encryption folder under encryption folder catalogue, keeps away
Exempt to need to remove video just play out, video file can not switch in solving encryption file directory in the prior art
The problem of broadcasting.
Second, the method and system that secret protection is carried out to video provided by the present invention, support encryption folder to create,
Delete, modification title, the operation such as shift position, also support that video file batch adds confidential folder, it is to avoid user's operation
Triviality, improve user experience.
3rd, confidential folder is shown boundary by the method and system that secret protection is carried out to video provided by the present invention
Face top column is set to immersion, have also been devised display animation effect when password is mismatched, and provides the user with preferable vision
Impression.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, device or computer program
Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.And, the application can be used and wherein include the computer of computer usable program code at one or more
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) is produced
The form of product.
Described above has shown and described some preferred embodiments of the application, but as previously described, it should be understood that the application
Be not limited to form disclosed herein, be not to be taken as the exclusion to other embodiment, and can be used for various other combinations,
Modification and environment, and can be in invention contemplated scope described herein, by above-mentioned teaching or the technology or knowledge of association area
It is modified.And the change and change that those skilled in the art are carried out do not depart from spirit and scope, then all should be in this Shen
Please be in the protection domain of appended claims.
Claims (10)
1. a kind of method that secret protection is carried out to video, including:
Confidential folder is set up in the client of user;
When user's request uses the confidential folder, point out user that the unlatching password for opening the confidential folder is set;
The unlatching password of user input is received, the unlatching password is carried out into md5 encryption, md5 encryption character is formed, to institute
State md5 encryption character to be stored, and point out user encryption success;
The scan instruction of user input is received, and after the scan instruction is received, scanning storage is regarded client is local
Frequency file, generates local video file directory;
The instruction that selected video file is added confidential folder of user input is received, and it is described by selected video receiving
After file adds the instruction of confidential folder, one or more video files that user is selected add the confidential folder
In, and shown in the confidential folder;
The instruction of the confidential folder is opened in the request for receiving user input, and opens the secrecy the request is received
After the instruction of file, ejection Password Input frame opens password for user input;
The unlatching password of user input is received, and the unlatching password that the unlatching password that will be received is set with user is converted to MD5
The MD5 ciphertexts set with user after ciphertext character string are opened password and are compared, if the unlatching password of user input sets with user
The unlatching password match put, then open the confidential folder, if the unlatching password of user input is close with the unlatching that user is set
Code is mismatched, then point out user cipher input error.
2. the method for carrying out secret protection to video according to claim 1, it is characterised in that
Scanning storage opens asynchronous task in the local video file of client, stores scanning and regards client is local
The process of frequency file is performed in sub-line journey, and when scanned, is automatically switched off the asynchronous task, and scanning result is returned
Shown to main thread.
3. the method for carrying out secret protection to video according to claim 1, it is characterised in that further include:
The video playback instruction of user input is received, and after the video playback instruction is received, directly in the secrecy text
Video player is called to play the video file that user chooses in part folder.
4. the method for carrying out secret protection to video according to claim 1, it is characterised in that further include:
Receive the finger of being shifted to storing the video file in the confidential folder of user input, renaming or deletion
Order, and after the transfer instruction is received, the video file is transferred to the path specified, receiving the renaming
After instruction, the video file is carried out into renaming, after the deletion instruction is received, the video file is deleted
Remove.
5. the method for carrying out secret protection to video according to claim 1, it is characterised in that
The display interface that the classified document is clipped in the client is set to immersion, is pointed out by the way of animation prompting
User cipher input error.
6. a kind of system that secret protection is carried out to video, it is characterised in that including:Confidential folder sets up module, opens close
Code setup module, unlatching cryptographic handling module, video file scan module, video file preserving module and password authentication module,
The confidential folder sets up module, and confidential folder is set up for the client in user;
The unlatching password setup module, for when user's request uses the confidential folder, pointing out user to set and opening
The unlatching password of the confidential folder;
The unlatching password is carried out MD5 by the unlatching cryptographic handling module, the unlatching password for receiving user input
Encryption, forms md5 encryption character, and the md5 encryption character is stored, and points out user encryption success;
The video file scan module, the scan instruction for receiving user input, and after the scan instruction is received,
Scanning storage generates local video file directory in the local video file of client;
The video file preserving module, the finger that selected video file is added confidential folder for receiving user input
Order, and receive it is described by selected video file add confidential folder instruction after, one or more that user is selected
Video file is added in the confidential folder, and is shown in the confidential folder,
The instruction of the confidential folder is opened in the password authentication module, the request for receiving user input, and is being received
After opening the instruction of the confidential folder to the request, ejection Password Input frame opens password for user input, and is used for
Receive the unlatching password of user input, and the unlatchings password that will be received be converted to after MD5 ciphertext character strings with user's setting
MD5 ciphertexts are opened password and are compared, if the unlatching password match for opening password and user's setting of user input, opens institute
Confidential folder is stated, if the password of opening of user input is mismatched with the unlatching password that user is set, points out user cipher defeated
Enter mistake.
7. the system for carrying out secret protection to video according to claim 6, it is characterised in that
The video file scan module, is further used for scanning storage in the local video file of client, opens asynchronous
Task, makes scanning store the process in the local video file of client in the execution of sub-line journey, and when scanned, it is automatic to close
The asynchronous task is closed, and scanning result is returned into main thread and shown.
8. the system for carrying out secret protection to video according to claim 6, it is characterised in that further include:Video is broadcast
Amplification module,
The video playback module, the video playback for receiving user input is instructed, and is referred to the video playback is received
After order, video player is directly called to play the video file that user chooses in the confidential folder.
9. the system for carrying out secret protection to video according to claim 6, it is characterised in that further include:Video text
Part adjusting module,
The video file adjusting module, for receive user input to storing the video file in the confidential folder
Shifted, the instruction of renaming or deletion, and after the transfer instruction is received, the video file is transferred to specified
Path, after the renamed instructions are received, the video file is carried out into renaming, receiving it is described delete instruction
Afterwards, the video file is deleted.
10. the system for carrying out secret protection to video according to claim 6, it is characterised in that
The display interface that the classified document is clipped in the client is set to immersion,
The password authentication module, is further used for pointing out user cipher input error by the way of animation is reminded.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611139843.5A CN106788970A (en) | 2016-12-12 | 2016-12-12 | The method and system of secret protection is carried out to video |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611139843.5A CN106788970A (en) | 2016-12-12 | 2016-12-12 | The method and system of secret protection is carried out to video |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106788970A true CN106788970A (en) | 2017-05-31 |
Family
ID=58875594
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611139843.5A Pending CN106788970A (en) | 2016-12-12 | 2016-12-12 | The method and system of secret protection is carried out to video |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106788970A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113676781A (en) * | 2021-08-23 | 2021-11-19 | 深圳市唐为电子有限公司 | Audio-visual broadcast control system of smart mobile phone |
CN114399313A (en) * | 2021-12-30 | 2022-04-26 | 广东职业技术学院 | Water dispenser water source anti-counterfeiting method, equipment and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101170507A (en) * | 2007-11-14 | 2008-04-30 | 中兴通讯股份有限公司 | Asynchronous concurrent processing method |
CN102843430A (en) * | 2012-08-28 | 2012-12-26 | 电子科技大学 | Advertisement pushing method based on mobile internet |
CN103838986A (en) * | 2012-11-21 | 2014-06-04 | 腾讯科技(深圳)有限公司 | Multimedia file encryption method and device |
CN105678186A (en) * | 2016-01-05 | 2016-06-15 | 上海卓易科技股份有限公司 | Information encryption method and device |
CN106022148A (en) * | 2016-05-26 | 2016-10-12 | 北京金山安全软件有限公司 | File encryption method and device |
-
2016
- 2016-12-12 CN CN201611139843.5A patent/CN106788970A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101170507A (en) * | 2007-11-14 | 2008-04-30 | 中兴通讯股份有限公司 | Asynchronous concurrent processing method |
CN102843430A (en) * | 2012-08-28 | 2012-12-26 | 电子科技大学 | Advertisement pushing method based on mobile internet |
CN103838986A (en) * | 2012-11-21 | 2014-06-04 | 腾讯科技(深圳)有限公司 | Multimedia file encryption method and device |
CN105678186A (en) * | 2016-01-05 | 2016-06-15 | 上海卓易科技股份有限公司 | Information encryption method and device |
CN106022148A (en) * | 2016-05-26 | 2016-10-12 | 北京金山安全软件有限公司 | File encryption method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113676781A (en) * | 2021-08-23 | 2021-11-19 | 深圳市唐为电子有限公司 | Audio-visual broadcast control system of smart mobile phone |
CN114399313A (en) * | 2021-12-30 | 2022-04-26 | 广东职业技术学院 | Water dispenser water source anti-counterfeiting method, equipment and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11070530B2 (en) | System and method for authenticating users | |
US20170346851A1 (en) | Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements. | |
JP2005012732A (en) | Device authentication system, terminal device, authentication server, service server, terminal device method, authentication method, terminal device program, authentication program, service server program, and storage medium | |
EP0456553A1 (en) | Method for obtaining a secure authentification in clear text in a distributed information system environment | |
US20170310488A1 (en) | A challenge-response method and associated computing device | |
CN109547198A (en) | The method and system of network transmission video file | |
WO2024012517A1 (en) | End-to-end data transmission method, and device and medium | |
CN107733636A (en) | Authentication method and Verification System | |
CN106357678A (en) | Cloud encryption storage method for intelligent terminal and intelligent terminal | |
WO2008053279A1 (en) | Logging on a user device to a server | |
CN110069916A (en) | A kind of cryptosecurity management system and method | |
CN106603920A (en) | Encrypted picture shooting method and system based on fingerprint identification | |
Vaddeti et al. | Graphical passwords: Behind the attainment of goals | |
CN106203141A (en) | The data processing method of a kind of application and device | |
CN106788970A (en) | The method and system of secret protection is carried out to video | |
Koh et al. | Encrypted cloud photo storage using Google photos | |
WO2021018306A1 (en) | Method and system for protecting authentication credentials | |
FR2881596A1 (en) | METHOD FOR PROTECTING AUDIO AND / OR VIDEO DIGITAL CONTENTS AND ELECTRONIC DEVICES USING THE SAME | |
CN107292133B (en) | Artificial intelligence confusion technical method and device | |
CN104239809A (en) | File protecting method, file protecting device, file decryption method, file decryption device and terminal | |
JP2020004424A (en) | Method and device for protecting privacy of mobile terminal and mobile terminal | |
JP2012068930A (en) | Password authentication system and method, and encrypted communication system and method | |
CN112181556B (en) | Terminal control processing method and device, electronic equipment and storage medium | |
Khalind | Steganography-based password management: A conceptual model | |
WO2020238537A1 (en) | Method for establishing and verifying input value using asymmetric encryption algorithm, and application thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |