CN106788970A - The method and system of secret protection is carried out to video - Google Patents

The method and system of secret protection is carried out to video Download PDF

Info

Publication number
CN106788970A
CN106788970A CN201611139843.5A CN201611139843A CN106788970A CN 106788970 A CN106788970 A CN 106788970A CN 201611139843 A CN201611139843 A CN 201611139843A CN 106788970 A CN106788970 A CN 106788970A
Authority
CN
China
Prior art keywords
user
video
password
video file
confidential folder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611139843.5A
Other languages
Chinese (zh)
Inventor
贾磊
贺振增
王丁
王一丁
张鹏宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Storm Group Ltd By Share Ltd
Original Assignee
Storm Group Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Storm Group Ltd By Share Ltd filed Critical Storm Group Ltd By Share Ltd
Priority to CN201611139843.5A priority Critical patent/CN106788970A/en
Publication of CN106788970A publication Critical patent/CN106788970A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/4367Establishing a secure communication between the client and a peripheral device or smart card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

Disclosure carries out method for secret protection and system to video, and method includes:Confidential folder is set up in the client of user;Prompting user sets the unlatching password for opening confidential folder;The unlatching password of user input is received, md5 encryption is carried out, md5 encryption character is formed;The scan instruction of user input is received, scanning storage is in the local video file of client;The instruction that selected video file is added confidential folder of user input is received, one or more video files that user is selected are added in confidential folder;The instruction of confidential folder is opened in the request for receiving user input, and ejection Password Input frame opens password for user input;Receive the unlatching password of user input, and the unlatching password that is set with user of the unlatching password that will be received to be converted to and open password with the MD5 ciphertexts that user is set after MD5 ciphertext character strings and compare, if matching, opens confidential folder, if mismatching, user cipher input error is pointed out.

Description

The method and system of secret protection is carried out to video
Technical field
The application is related to the technical field of video protection, specifically, is related to a kind of side that secret protection is carried out to video Method and system.
Background technology
Information technology is fast-developing now, and everybody enjoys the facility that high-tech brings, at the same time, people's itself Information also all can be in the public visual field, and thus, the privacy concern of people is also gradually paid attention to by everybody, and people's storage is being moved Some private files (picture, video etc.) in dynamic terminal or apparatus such as computer, if not encipherment protection, it is easy to by other people Seen, so as to cause the problem of privacy leakage.And if to each picture or the independent encipherment protection of video file, and greatly Improve user operation triviality, can also increase the computing pressure of equipment, be unfavorable for the experience of user.Existing net The form that network equipment leads to encrypted file preserves the file data that user is moved through coming, and each user checks or uses these again During private file, it is required for being decrypted into safe cabinet file, and can not be directly seen under the respective directories of user See or play, use very cumbersome.
Existing equipment preserves user and is moved through the small documents such as the picture that comes by the form of safe cabinet file, every time use When family is checked or uses these private files again, it is required for reverting to these pictures original after being decrypted into safe cabinet file The storage location come, can just be shown, and can not directly be watched under the respective directories of safe cabinet, come for user Say, use very cumbersome;Also, user has watched in the storage location of reduction and it has been moved on into safe cabinet again again, ability Protected again, be highly detrimental to user experience;Furthermore, existing file protection does not support that files in batch adds secrecy Cabinet, can only move in file a to safe cabinet every time, and user's operating process is cumbersome.
Therefore it provides it is a kind of can bulk encryption protection video file and can under storage file catalogue directly opening scheme It is this area problem demanding prompt solution.
The content of the invention
In view of this, technical problems to be solved in this application there is provided a kind of method that secret protection is carried out to video And system, solve and be unable to bulk encryption protection video file and the direct opening under storage file catalogue in the prior art Technical problem.
In order to solve the above-mentioned technical problem, the application has following technical scheme:
A kind of method that secret protection is carried out to video, including:
Confidential folder is set up in the client of user;
When user's request uses the confidential folder, the unlatching for pointing out user to set the opening confidential folder is close Code;
The unlatching password of user input is received, the unlatching password is carried out into md5 encryption, form md5 encryption character, The md5 encryption character is stored, and points out user encryption success;
The scan instruction of user input is received, and after the scan instruction is received, scanning storage is local in client Video file, generate local video file directory;
Receive the instruction that selected video file is added confidential folder of user input, and receive it is described will be selected After video file adds the instruction of confidential folder, one or more video files that user is selected add the classified document In folder, and shown in the confidential folder;
The instruction of the confidential folder is opened in the request for receiving user input, and opens described the request is received After the instruction of confidential folder, ejection Password Input frame opens password for user input;
The unlatching password of user input is received, and the unlatching password that the unlatching password that will be received is set with user is converted to The MD5 ciphertexts set with user after MD5 ciphertext character strings are opened password and are compared, if the unlatching password of user input and user The unlatching password match of setting, then open the confidential folder, if the unlatching for opening password and user's setting of user input Password is mismatched, then point out user cipher input error.
Preferably, wherein:
Scanning storage opens asynchronous task in the local video file of client, stores scanning local in client The process of video file performed in sub-line journey, and when scanned, be automatically switched off the asynchronous task, and by scanning result Main thread is returned to show.
Preferably, wherein:
Further include:
The video playback instruction of user input is received, and after the video playback instruction is received, directly in the guarantor Video player is called to play the video file that user chooses in close file.
Preferably, wherein:
Further include:
Receive being shifted to storing the video file in the confidential folder of user input, renaming or deletion Instruction, and after the transfer instruction is received, the video file is transferred to the path specified, it is described heavy receiving After name instruction, the video file is carried out into renaming, after the deletion instruction is received, the video file is carried out Delete.
Preferably, wherein:
The display interface that the classified document is clipped in the client is set to immersion, by the way of animation prompting Prompting user cipher input error.
A kind of system that secret protection is carried out to video, it is characterised in that including:Confidential folder is set up module, is opened Password setup module, unlatching cryptographic handling module, video file scan module, video file preserving module and password authentification mould Block,
The confidential folder sets up module, and confidential folder is set up for the client in user;
The unlatching password setup module, for when user's request uses the confidential folder, pointing out user to set Open the unlatching password of the confidential folder;
The unlatching cryptographic handling module, the unlatching password for receiving user input enters the unlatching password Row md5 encryption, forms md5 encryption character, and the md5 encryption character is stored, and points out user encryption success;
The video file scan module, the scan instruction for receiving user input, and refer to the scanning is received After order, scanning storage generates local video file directory in the local video file of client;
The video file preserving module, confidential folder is added for receive user input by selected video file Instruction, and receive it is described by selected video file add confidential folder instruction after, or many that user is selected Individual video file is added in the confidential folder, and is shown in the confidential folder,
The password authentication module, the instruction of the request opening confidential folder for receiving user input, and After receiving the instruction of the request opening confidential folder, ejection Password Input frame opens password for user input, and Set with user for receiving the unlatching password of user input, and after the unlatching password that will be received is converted to MD5 ciphertext character strings The MD5 ciphertexts put are opened password and are compared, if the unlatching password match for opening password and user's setting of user input, beats The confidential folder is opened, if the password of opening of user input is mismatched with the unlatching password that user is set, points out user close Code input error.
Preferably, wherein:
The video file scan module, is further used for scanning storage in the local video file of client, opens Asynchronous task, makes scanning store the process in the local video file of client in the execution of sub-line journey, and when scanned, from Move and close the asynchronous task, and scanning result is returned into main thread and show.
Preferably, wherein:
Further include:Video playback module,
The video playback module, the video playback for receiving user input is instructed, and is broadcast the video is received After putting instruction, video player is directly called to play the video file that user chooses in the confidential folder.
Preferably, wherein:
Further include:Video file adjusting module,
The video file adjusting module, for receive user input to storing the video in the confidential folder File is shifted, the instruction of renaming or deletion, and after the transfer instruction is received, the video file is transferred to The path specified, after the renamed instructions are received, renaming is carried out by the video file, is receiving the deletion After instruction, the video file is deleted.
Preferably, wherein:
The display interface that the classified document is clipped in the client is set to immersion,
The password authentication module, is further used for pointing out user cipher input error by the way of animation is reminded.
Compared with prior art, system and method described herein, has reached following effect:
First, the method and system that secret protection is carried out to video provided by the present invention can be local by user equipment Video adds encryption folder, realizes the video during user can play encryption folder under encryption folder catalogue, keeps away Exempt to need to remove video just play out, video file can not switch in solving encryption file directory in the prior art The problem of broadcasting.
Second, the method and system that secret protection is carried out to video provided by the present invention, support encryption folder to create, Delete, modification title, the operation such as shift position, also support that video file batch adds confidential folder, it is to avoid user's operation Triviality, improve user experience.
3rd, confidential folder is shown boundary by the method and system that secret protection is carried out to video provided by the present invention Face top column is set to immersion, have also been devised display animation effect when password is mismatched, and provides the user with preferable vision Impression.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, this Shen Schematic description and description please does not constitute the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of flow chart of the method that secret protection is carried out to video of the invention;
Fig. 2 is a kind of structure chart of the system that secret protection is carried out to video of the invention;
Fig. 3 is a kind of flow chart of the embodiment of the method that secret protection is carried out to video of the invention.
Specific embodiment
Some vocabulary have such as been used to censure specific components in the middle of specification and claim.Those skilled in the art should It is understood that hardware manufacturer may call same component with different nouns.This specification and claims are not with name The difference of title is used as distinguishing the mode of component, but the difference with component functionally is used as the criterion distinguished.Such as logical The "comprising" of piece specification and claim mentioned in is an open language, therefore should be construed to " include but do not limit In "." substantially " refer to that in receivable error range, those skilled in the art can solve described in the range of certain error Technical problem, basically reaches the technique effect.Additionally, " coupling " one word herein comprising it is any directly and indirectly electric property coupling Means.Therefore, if a first device is coupled to a second device described in text, representing the first device can direct electrical coupling The second device is connected to, or the second device is electrically coupled to indirectly by other devices or coupling means.Specification Subsequent descriptions be implement the application better embodiment, so it is described description be for the purpose of the rule for illustrating the application, It is not limited to scope of the present application.The protection domain of the application ought be defined depending on the appended claims person of defining.
Embodiment 1
Shown in Figure 1 is a kind of herein described specific embodiment of the method that secret protection is carried out to video, the party Method includes:
Step 101, set up confidential folder in the client of user;
Step 102, when user's request uses the confidential folder, point out user to set and open the confidential folder Unlatching password;
Step 103, the unlatching password for receiving user input, md5 encryption is carried out by the unlatching password, forms MD5 Encrypted characters, store to the md5 encryption character, and point out user encryption success;
Step 104, the scan instruction for receiving user input, and after the scan instruction is received, scanning storage is in visitor The video file at family end, generates local video file directory;
Step 105, the instruction that selected video file is added confidential folder for receiving user input, and receiving State after selected video file is added into the instruction of confidential folder, one or more video files that user is selected add described In confidential folder, and shown in the confidential folder;
Step 106, the request of reception user input are opened the instruction of the confidential folder, and are receiving the request After opening the instruction of the confidential folder, ejection Password Input frame opens password for user input;
Step 107, the unlatching password for receiving user input, and the unlatching password that will be received is close with the unlatching that user is set Code is converted to the MD5 ciphertexts unlatching password set with user after MD5 ciphertext character strings and compares, if the unlatching of user input is close The unlatching password match that code is set with user, then open the confidential folder, if the unlatching password of user input sets with user The unlatching password put is mismatched, then point out user cipher input error.
The method that secret protection is carried out to video provided by the present invention, classified document is established in the client of user Folder, user sets the password for entering confidential folder according to prompting when confidential folder is used first, in use, User may be selected one or more local video files, disposably be added in confidential folder.When need watch classified document During video file in folder, it is necessary to which the unlatching password that input is consistent with setting password could open confidential folder, that is to say, that Only know that the people for opening password can open the confidential folder, this kind of mode is served well to the privacy of user very well Protection.
Additionally, by above-mentioned steps 103, the unlatching password that user is set is converted to by the encrypted characters of md5 encryption, This kind of cipher mode is easy to the password preferably to user to play a part of protection, effectively prevent the possibility that password is cracked, The security of confidential folder is further increased, and ensure that the privacy of user obtains relatively reliable protection.
In above-mentioned steps 105, user may be selected multiple video and disposably be added in confidential folder, realize to video text The batch operation of part, effectively prevent the triviality of user's operation, so as to be conducive to lifting Consumer's Experience.
In above-mentioned steps 104, scanning storage opens asynchronous task in the local video file of client, deposits scanning The process stored up in the local video file of client is performed in sub-line journey, and when scanned, is automatically switched off described asynchronous Business, and scanning result is returned into main thread show.
During scanning local video file, opening asynchronous task carries out file scan, so allows for the process of scanning file Other processes being carrying out with client are completed on two threads respectively, will not cause scanning to the program applied When so that there is Caton phenomenon in the program applied, it is ensured that while scanning is smoothed out, do not influence what is be carrying out also Process.
The method that secret protection is carried out to video provided by the present invention, further includes:Receive the video of user input Play instruction, and after the video playback instruction is received, directly call video player to broadcast in the confidential folder Put the video file that user chooses.
The method that secret protection is carried out to video provided by the present invention, after user input correctly opens password, can The video file chosen directly is played in confidential folder, without video is removed into confidential folder, is efficiently solved existing The video file in file directory is encrypted in technology can not switch the problem of broadcasting.
The method that secret protection is carried out to video provided by the present invention, further includes:Receive user input to depositing Store up video file in the confidential folder shifted, the instruction of renaming or deletion, and receiving the transfer After instruction, the video file is transferred to the path specified, after the renamed instructions are received, by the video file Renaming is carried out, after the deletion instruction is received, the video file is deleted.
The video file in confidential folder is added to for user, user can also be carried out further to these video files Treatment.For example, user can be according to the actual requirements to storing in confidential folder video file shift, transfer secrecy regard Frequency file is realized by changing the store path of file.User can also carry out renaming to secure video file, be named For ease of the file of identification.Additionally, for the secure video file watched, user can be also deleted it, to subtract Few occupancy to client's end memory, effectively improves the experience of user.
In the present invention, the display interface that the classified document is clipped in the client is set to immersion, using animation The mode of prompting points out user cipher input error.
It is provided by the present invention to carry out the method for secret protection to video, using immersion technology, by confidential folder The color expansion on display interface top column and the status display column at overlay device interface, provide the user preferable visual impression Receive.Additionally, also being reminded by the way of animation effect when user inputs password by mistake, the experience effect of user is equally improved Really.
The method that secret protection is carried out to video provided by the present invention, can also design the function of broadcast, and such as user exists During certain video watched in confidential folder, client has corrected incoming call, and now, the sound of video playback can be according to phone The intensity of the tinkle of bells is adjusted, not influence the normal viewing of user.
Embodiment 2
Shown in Figure 2 is a kind of herein described specific embodiment of the system that secret protection is carried out to video, and this is System includes:Confidential folder is set up module 10, unlatching password setup module 20, unlatching cryptographic handling module 30, video file and is swept Module 40, video file preserving module 50 and password authentication module 60 are retouched,
The confidential folder sets up module 10, and confidential folder is set up for the client in user;
The unlatching password setup module 20, for when user's request uses the confidential folder, pointing out user to set Put the unlatching password for opening the confidential folder;
The unlatching cryptographic handling module 30, the unlatching password for receiving user input, by the unlatching password Md5 encryption is carried out, md5 encryption character is formed, the md5 encryption character is stored, and point out user encryption success;
The video file scan module 40, the scan instruction for receiving user input, and receiving the scanning After instruction, scanning storage generates local video file directory in the local video file of client;
The video file preserving module 50, for receive user input by selected video file add confidential folder Instruction, and receive it is described selected video file is added into the instruction of confidential folder after, user is selected one or Multiple video files are added in the confidential folder, and are shown in the confidential folder,
The instruction of the confidential folder is opened in the password authentication module 60, the request for receiving user input, and After the instruction for receiving the request opening confidential folder, ejection Password Input frame opens password for user input, And for receiving the unlatching password of user input, and the unlatching password that will be received be converted to after MD5 ciphertext character strings with user The MD5 ciphertexts of setting are opened password and are compared, if the unlatching password match for opening password and user's setting of user input, The confidential folder is opened, if the password of opening of user input is mismatched with the unlatching password that user is set, user is pointed out Password Input mistake.
It is provided by the present invention to carry out the system of secret protection to video, establish classified document in the client of user Folder, user sets the password for entering confidential folder according to prompting when confidential folder is used first, in use, User may be selected one or more local video files, disposably be added in confidential folder.When need watch classified document During video file in folder, it is necessary to which the unlatching password that input is consistent with setting password could open confidential folder, that is to say, that Only know that the people for opening password can open the confidential folder, this kind of mode is served well to the privacy of user very well Protection.
Additionally, by above-mentioned unlatching cryptographic handling module 30, the unlatching password that user is set is converted to by md5 encryption Encrypted characters, this kind of cipher mode is easy to the password preferably to user to play a part of protection, effectively prevent password quilt The possibility for cracking, further increases the security of confidential folder, and ensure that the privacy of user obtains relatively reliable guarantor Shield.
In said system provided by the present invention, user may be selected multiple video one by video file preserving module 50 Secondary property is added in confidential folder, realizes the batch operation to video file, effectively prevent the triviality of user's operation, from And be conducive to lifting Consumer's Experience.
The present invention is carried out in the system of secret protection to video, and video file scan module 40 is further used for scanning and deposits Storage opens asynchronous task in the local video file of client, scanning is stored the mistake in the local video file of client Journey is performed in sub-line journey, and when scanned, be automatically switched off the asynchronous task, and scanning result is returned into main thread and show Show.
When local video file is scanned, open asynchronous task carries out file scan to videoscanning module in the present invention, Other processes completion on two threads respectively that the process and client of scanning file are carrying out so is allowed for, will not be made When must scan the program applied so that the program applied occurs Caton phenomenon, it is ensured that what scanning was smoothed out Meanwhile, the process being carrying out is not influenceed also.
The system that the present invention carries out secret protection to video, further includes:Video playback module,
The video playback module, the video playback for receiving user input is instructed, and is broadcast the video is received After putting instruction, the video file for directly calling storm wind player plays user to choose in the confidential folder.
It is provided by the present invention to carry out the system of secret protection to video, after user input correctly opens password, Video playback module can directly play the video file chosen in confidential folder, without video is removed into confidential folder, Efficiently solve the problems, such as that the video file in encryption file directory in the prior art can not switch broadcasting.
The system that the present invention carries out secret protection to video, further includes:Video file adjusting module,
The video file adjusting module, for receive user input to storing the video in the confidential folder File is shifted, the instruction of renaming or deletion, and after the transfer instruction is received, the video file is transferred to The path specified, after the renamed instructions are received, renaming is carried out by the video file, is receiving the deletion After instruction, the video file is deleted.
The video file in confidential folder is added to for user, user can also be carried out further to these video files Treatment.For example, user can be according to the actual requirements to storing in confidential folder video file shift, transfer secrecy regard Frequency file is realized by changing the store path of file.User can also carry out renaming to secure video file, be named For ease of the file of identification.Additionally, for the secure video file watched, user can be also deleted it, to subtract Few occupancy to client's end memory, effectively improves the experience of user.
The present invention is carried out in the system of secret protection to video, and the classified document is clipped in the display interface of the client It is set to immersion.
The present invention carries out the password authentication module 60 in the system of secret protection to video, is further used for being carried using animation Awake mode points out user cipher input error.
It is provided by the present invention to carry out the system of secret protection to video, using immersion technology, by confidential folder The color expansion on display interface top column and the status display column at overlay device interface, provide the user preferable visual impression Receive.Additionally, also being reminded by the way of animation effect when user inputs password by mistake, the experience effect of user is equally improved Really.
The system that secret protection is carried out to video provided by the present invention, can also design the function of broadcast, and such as user exists During certain video watched in confidential folder, client has corrected incoming call, and now, the sound of video playback can be according to phone The intensity of the tinkle of bells is adjusted, not influence the normal viewing of user.
Embodiment 3
A kind of present invention presented below video is carried out the system of secret protection build and operation method application implementation Example, referring to Fig. 3, specifically includes:
Step 201, set up confidential folder in the client of user;
Step 202, when user's request uses the confidential folder, point out user to set and open the confidential folder Unlatching password;
Step 203, the unlatching password for receiving user input, md5 encryption is carried out by the unlatching password, forms MD5 Encrypted characters, store to the md5 encryption character, and point out user encryption success;
Step 204, the scan instruction for receiving user input, and after the scan instruction is received, asynchronous task is opened, Scanning storage generates local video file directory in the local video file of client;
Step 205, the instruction that selected video file is added confidential folder for receiving user input, and receiving State after selected video file is added into the instruction of confidential folder, one or more video files that user is selected add described In confidential folder, and shown in the confidential folder;
Step 206, the request of reception user input are opened the instruction of the confidential folder, and are receiving the request After opening the instruction of the confidential folder, ejection Password Input frame opens password for user input;
Step 207, the unlatching password for receiving user input, and the unlatching password that will be received is close with the unlatching that user is set Code is converted to the MD5 ciphertexts unlatching password set with user after MD5 ciphertext character strings and compares, if the unlatching of user input is close The unlatching password match that code is set with user, then open the confidential folder, if the unlatching password of user input sets with user The unlatching password put is mismatched, then point out user cipher input error by the way of animation prompting;
Step 208, the video playback instruction for receiving user input, and after the video playback instruction is received, directly Video player is called to play the video file that user chooses in the confidential folder;
Step 209, receive user input and shifted to storing the video file in the confidential folder, order again Name or the instruction deleted, and after the transfer instruction is received, the video file is transferred to the path specified, receiving To after the renamed instructions, the video file is carried out into renaming, after the deletion instruction is received, by the video File is deleted.
By various embodiments above, the beneficial effect that the application is present is:
First, the method and system that secret protection is carried out to video provided by the present invention can be local by user equipment Video adds encryption folder, realizes the video during user can play encryption folder under encryption folder catalogue, keeps away Exempt to need to remove video just play out, video file can not switch in solving encryption file directory in the prior art The problem of broadcasting.
Second, the method and system that secret protection is carried out to video provided by the present invention, support encryption folder to create, Delete, modification title, the operation such as shift position, also support that video file batch adds confidential folder, it is to avoid user's operation Triviality, improve user experience.
3rd, confidential folder is shown boundary by the method and system that secret protection is carried out to video provided by the present invention Face top column is set to immersion, have also been devised display animation effect when password is mismatched, and provides the user with preferable vision Impression.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, device or computer program Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.And, the application can be used and wherein include the computer of computer usable program code at one or more The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) is produced The form of product.
Described above has shown and described some preferred embodiments of the application, but as previously described, it should be understood that the application Be not limited to form disclosed herein, be not to be taken as the exclusion to other embodiment, and can be used for various other combinations, Modification and environment, and can be in invention contemplated scope described herein, by above-mentioned teaching or the technology or knowledge of association area It is modified.And the change and change that those skilled in the art are carried out do not depart from spirit and scope, then all should be in this Shen Please be in the protection domain of appended claims.

Claims (10)

1. a kind of method that secret protection is carried out to video, including:
Confidential folder is set up in the client of user;
When user's request uses the confidential folder, point out user that the unlatching password for opening the confidential folder is set;
The unlatching password of user input is received, the unlatching password is carried out into md5 encryption, md5 encryption character is formed, to institute State md5 encryption character to be stored, and point out user encryption success;
The scan instruction of user input is received, and after the scan instruction is received, scanning storage is regarded client is local Frequency file, generates local video file directory;
The instruction that selected video file is added confidential folder of user input is received, and it is described by selected video receiving After file adds the instruction of confidential folder, one or more video files that user is selected add the confidential folder In, and shown in the confidential folder;
The instruction of the confidential folder is opened in the request for receiving user input, and opens the secrecy the request is received After the instruction of file, ejection Password Input frame opens password for user input;
The unlatching password of user input is received, and the unlatching password that the unlatching password that will be received is set with user is converted to MD5 The MD5 ciphertexts set with user after ciphertext character string are opened password and are compared, if the unlatching password of user input sets with user The unlatching password match put, then open the confidential folder, if the unlatching password of user input is close with the unlatching that user is set Code is mismatched, then point out user cipher input error.
2. the method for carrying out secret protection to video according to claim 1, it is characterised in that
Scanning storage opens asynchronous task in the local video file of client, stores scanning and regards client is local The process of frequency file is performed in sub-line journey, and when scanned, is automatically switched off the asynchronous task, and scanning result is returned Shown to main thread.
3. the method for carrying out secret protection to video according to claim 1, it is characterised in that further include:
The video playback instruction of user input is received, and after the video playback instruction is received, directly in the secrecy text Video player is called to play the video file that user chooses in part folder.
4. the method for carrying out secret protection to video according to claim 1, it is characterised in that further include:
Receive the finger of being shifted to storing the video file in the confidential folder of user input, renaming or deletion Order, and after the transfer instruction is received, the video file is transferred to the path specified, receiving the renaming After instruction, the video file is carried out into renaming, after the deletion instruction is received, the video file is deleted Remove.
5. the method for carrying out secret protection to video according to claim 1, it is characterised in that
The display interface that the classified document is clipped in the client is set to immersion, is pointed out by the way of animation prompting User cipher input error.
6. a kind of system that secret protection is carried out to video, it is characterised in that including:Confidential folder sets up module, opens close Code setup module, unlatching cryptographic handling module, video file scan module, video file preserving module and password authentication module,
The confidential folder sets up module, and confidential folder is set up for the client in user;
The unlatching password setup module, for when user's request uses the confidential folder, pointing out user to set and opening The unlatching password of the confidential folder;
The unlatching password is carried out MD5 by the unlatching cryptographic handling module, the unlatching password for receiving user input Encryption, forms md5 encryption character, and the md5 encryption character is stored, and points out user encryption success;
The video file scan module, the scan instruction for receiving user input, and after the scan instruction is received, Scanning storage generates local video file directory in the local video file of client;
The video file preserving module, the finger that selected video file is added confidential folder for receiving user input Order, and receive it is described by selected video file add confidential folder instruction after, one or more that user is selected Video file is added in the confidential folder, and is shown in the confidential folder,
The instruction of the confidential folder is opened in the password authentication module, the request for receiving user input, and is being received After opening the instruction of the confidential folder to the request, ejection Password Input frame opens password for user input, and is used for Receive the unlatching password of user input, and the unlatchings password that will be received be converted to after MD5 ciphertext character strings with user's setting MD5 ciphertexts are opened password and are compared, if the unlatching password match for opening password and user's setting of user input, opens institute Confidential folder is stated, if the password of opening of user input is mismatched with the unlatching password that user is set, points out user cipher defeated Enter mistake.
7. the system for carrying out secret protection to video according to claim 6, it is characterised in that
The video file scan module, is further used for scanning storage in the local video file of client, opens asynchronous Task, makes scanning store the process in the local video file of client in the execution of sub-line journey, and when scanned, it is automatic to close The asynchronous task is closed, and scanning result is returned into main thread and shown.
8. the system for carrying out secret protection to video according to claim 6, it is characterised in that further include:Video is broadcast Amplification module,
The video playback module, the video playback for receiving user input is instructed, and is referred to the video playback is received After order, video player is directly called to play the video file that user chooses in the confidential folder.
9. the system for carrying out secret protection to video according to claim 6, it is characterised in that further include:Video text Part adjusting module,
The video file adjusting module, for receive user input to storing the video file in the confidential folder Shifted, the instruction of renaming or deletion, and after the transfer instruction is received, the video file is transferred to specified Path, after the renamed instructions are received, the video file is carried out into renaming, receiving it is described delete instruction Afterwards, the video file is deleted.
10. the system for carrying out secret protection to video according to claim 6, it is characterised in that
The display interface that the classified document is clipped in the client is set to immersion,
The password authentication module, is further used for pointing out user cipher input error by the way of animation is reminded.
CN201611139843.5A 2016-12-12 2016-12-12 The method and system of secret protection is carried out to video Pending CN106788970A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611139843.5A CN106788970A (en) 2016-12-12 2016-12-12 The method and system of secret protection is carried out to video

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611139843.5A CN106788970A (en) 2016-12-12 2016-12-12 The method and system of secret protection is carried out to video

Publications (1)

Publication Number Publication Date
CN106788970A true CN106788970A (en) 2017-05-31

Family

ID=58875594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611139843.5A Pending CN106788970A (en) 2016-12-12 2016-12-12 The method and system of secret protection is carried out to video

Country Status (1)

Country Link
CN (1) CN106788970A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676781A (en) * 2021-08-23 2021-11-19 深圳市唐为电子有限公司 Audio-visual broadcast control system of smart mobile phone
CN114399313A (en) * 2021-12-30 2022-04-26 广东职业技术学院 Water dispenser water source anti-counterfeiting method, equipment and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170507A (en) * 2007-11-14 2008-04-30 中兴通讯股份有限公司 Asynchronous concurrent processing method
CN102843430A (en) * 2012-08-28 2012-12-26 电子科技大学 Advertisement pushing method based on mobile internet
CN103838986A (en) * 2012-11-21 2014-06-04 腾讯科技(深圳)有限公司 Multimedia file encryption method and device
CN105678186A (en) * 2016-01-05 2016-06-15 上海卓易科技股份有限公司 Information encryption method and device
CN106022148A (en) * 2016-05-26 2016-10-12 北京金山安全软件有限公司 File encryption method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101170507A (en) * 2007-11-14 2008-04-30 中兴通讯股份有限公司 Asynchronous concurrent processing method
CN102843430A (en) * 2012-08-28 2012-12-26 电子科技大学 Advertisement pushing method based on mobile internet
CN103838986A (en) * 2012-11-21 2014-06-04 腾讯科技(深圳)有限公司 Multimedia file encryption method and device
CN105678186A (en) * 2016-01-05 2016-06-15 上海卓易科技股份有限公司 Information encryption method and device
CN106022148A (en) * 2016-05-26 2016-10-12 北京金山安全软件有限公司 File encryption method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113676781A (en) * 2021-08-23 2021-11-19 深圳市唐为电子有限公司 Audio-visual broadcast control system of smart mobile phone
CN114399313A (en) * 2021-12-30 2022-04-26 广东职业技术学院 Water dispenser water source anti-counterfeiting method, equipment and system

Similar Documents

Publication Publication Date Title
US11070530B2 (en) System and method for authenticating users
US20170346851A1 (en) Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements.
JP2005012732A (en) Device authentication system, terminal device, authentication server, service server, terminal device method, authentication method, terminal device program, authentication program, service server program, and storage medium
EP0456553A1 (en) Method for obtaining a secure authentification in clear text in a distributed information system environment
US20170310488A1 (en) A challenge-response method and associated computing device
CN109547198A (en) The method and system of network transmission video file
WO2024012517A1 (en) End-to-end data transmission method, and device and medium
CN107733636A (en) Authentication method and Verification System
CN106357678A (en) Cloud encryption storage method for intelligent terminal and intelligent terminal
WO2008053279A1 (en) Logging on a user device to a server
CN110069916A (en) A kind of cryptosecurity management system and method
CN106603920A (en) Encrypted picture shooting method and system based on fingerprint identification
Vaddeti et al. Graphical passwords: Behind the attainment of goals
CN106203141A (en) The data processing method of a kind of application and device
CN106788970A (en) The method and system of secret protection is carried out to video
Koh et al. Encrypted cloud photo storage using Google photos
WO2021018306A1 (en) Method and system for protecting authentication credentials
FR2881596A1 (en) METHOD FOR PROTECTING AUDIO AND / OR VIDEO DIGITAL CONTENTS AND ELECTRONIC DEVICES USING THE SAME
CN107292133B (en) Artificial intelligence confusion technical method and device
CN104239809A (en) File protecting method, file protecting device, file decryption method, file decryption device and terminal
JP2020004424A (en) Method and device for protecting privacy of mobile terminal and mobile terminal
JP2012068930A (en) Password authentication system and method, and encrypted communication system and method
CN112181556B (en) Terminal control processing method and device, electronic equipment and storage medium
Khalind Steganography-based password management: A conceptual model
WO2020238537A1 (en) Method for establishing and verifying input value using asymmetric encryption algorithm, and application thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination