CN106791986A - A kind of live index list encrypted antitheft catenary systems of HLS and method - Google Patents
A kind of live index list encrypted antitheft catenary systems of HLS and method Download PDFInfo
- Publication number
- CN106791986A CN106791986A CN201710016198.6A CN201710016198A CN106791986A CN 106791986 A CN106791986 A CN 106791986A CN 201710016198 A CN201710016198 A CN 201710016198A CN 106791986 A CN106791986 A CN 106791986A
- Authority
- CN
- China
- Prior art keywords
- client
- server
- index list
- key
- token
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
Abstract
The invention discloses a kind of live index list encrypted antitheft chain methods of HLS, its key step is as follows:1) client obtains User Token by the authenticated client server of system, and User Token is bound with the IP address of client;2) client obtains M3U8 broadcast address;3) client obtains URL addresses and the M3U8 encryption datas of key;4) standard M3U8 playlist texts are obtained;5) obtain and TS files and play out, client by the TS file downloads address in the standard M3U8 playlists after decryption, from content distributing server foradownloaded video section TS files.The live index list encrypted antitheft catenary systems of HLS of the invention, content is encrypted when client obtains M3U8 files, even if having directly downloaded these files cannot also get video file address, so as to serve the effect of door chain, avoiding decryption TS files needs to consume a large amount of cpu resources, solves the problems, such as low-performance equipment smooth playing.
Description
Technical field
The present invention relates to computer realm, specifically a kind of live index list encrypted antitheft catenary systems of HLS and method.
Background technology
HTTP Live Streaming (HLS) playing frame uses HTTP Live Streaming (HLS) Extension
Content encryption technique, it sends the video flowing of encryption to client by HTTP, and client obtains decryption by DRM server
Key is played after being decrypted to media file, and client covers the main flow terminal such as including STB, mobile terminal, Website.DRM
Link employs Advanced Encryption Standard (AES-128), HTTPS agreements and other technologies seamlessly to protect content not illegal
Download or pirate.
It is to TS video files encrypting and decrypting in itself, so comparing hardware requirement in traditional HLS DRM schemes
It is high.TS video files are decrypted in the poor equipment of hardware performance slow, it may appear that play video cardton phenomenon, Er Qiexu
It is related to chip-scale to dock, construction cost is higher.
The content of the invention
It is an object of the invention to provide a kind of live index list encrypted antitheft catenary systems of HLS, to solve above-mentioned background
The problem proposed in technology.
To achieve the above object, the present invention provides following technical scheme:
A kind of live index list encrypted antitheft catenary systems of HLS, including client, authenticated client server, server, rope
Draw listserv, key server, http file services unit, content distributing server, coding transcoding service unit, section
Service unit and media control centre;The client is connected to authenticated client server, and client is from authenticated client server
Middle acquisition User Token is simultaneously bound User Token with the IP address of client;Client is connected to server, client
M3U8 addresses are obtained from server;Client is connected to index list server, the URL ground of index list client-stored keys
Location and M3U8 encryption datas, and be distributed to client, the request of client is received, client is connected to key server,
Key server is received client and is verified by the UserToken that two-way HTTPS POST agreements send;The content point
Hair server is connected to client, and content distributing server receives client by the download in the normal playlist after decryption
Address, by video segment TS file distributings to client;The coding transcoding service unit is connected to section service unit, cuts into slices
Service unit is connected to http file service units, and http file service units are connected to content distributing server, media control
Center is respectively connecting to coding transcoding service unit and section service unit, and the coding transcoding service unit is connected to comprehensive solution
Code DVB and VOD material units.
As further scheme of the invention:The authenticated client server provides user authentication, service and awards to client
Power, billed services, provide issuing and verifying service for User Token;User authentication be used to verifying the identity of user with it is usable
Network service;Authorization of service is used to be serviced to user according to authentication result open network;Billed services are used to record user to each
The consumption of network service is planted, and is supplied to charge system.
As further scheme of the invention:The client is Set Top Box, mobile terminal device and Website terminals
In one kind.
As further scheme of the invention:The server is used to provide M3U8 broadcast address, and enters to client
Row distribution;And the service request of client is received, incoming UserToken is verified by certificate server.
As further scheme of the invention:The key server is used for storage content and decrypts public key, and to client
End is distributed.
As further scheme of the invention:The media control centre unify the Video coding of managing and control system, transcoding,
The production links such as section.
As further scheme of the invention:The coding transcoding service unit and section service unit are responsible for Streaming Media
File process, is cut into small documents and then is divided by http file service units by service unit of cutting into slices by files in stream media
Hair.
A kind of method of the live index list encrypted antitheft chains of HLS, its key step is as follows:
Step 101, client obtains User Token by the authenticated client server of system, and by User Token and client
The IP address at end is bound;Authenticated client server is provided and obtains subscription authentication and token authentication interface, it can be ensured that nothing
Effect token and the user without purchase content can not watch;
Step 102, client obtains M3U8 broadcast address, when user end to server sends service request, incoming User
Whether Token, server is legal to verify this token by the client ip bound, if legal, server then returns to client
End request needs or M3U8 broadcast address;Do not allow otherwise to ask EPG;
Step 103, client obtains URL addresses and the M3U8 encryption datas of key, and client is taken MU and broadcast from server
Address is put, is sent to index list server and asked, the incoming UserToken in request, index list server is by binding
Client ip it is whether legal to verify this Token.If legal return #KEYURI (representing the URL addresses of key) and #BODY
(representing M3U8 encryption datas), AES is AES128;
Step 104, obtains standard M3U8 playlist texts, client according to the URL addresses of key, by two-way
User Token after encryption is posed to key server by HTTPS POST agreements, for obtaining content decryption public key, to M3U8 plus
Ciphertext data is decrypted, obtain standard M3U8 playlist texts, key server simultaneously can by bind client ip come
Whether legal verify this Token;
Step 105, obtains TS files and plays out, and client is by the TS in the standard M3U8 playlists after decryption
File download address, from content distributing server foradownloaded video section TS files.As further scheme of the invention.
Compared with prior art, the beneficial effects of the invention are as follows:
The live index list encrypted antitheft catenary systems of HLS of the invention, enter when client obtains M3U8 files to content
Encryption is gone, even if having directly downloaded these files cannot also get video file address, so as to serve the work of door chain
With.Because having solved the problems, such as to steal chain need not be again encrypted to TS video files, it is to avoid decryption TS files
Need to consume a large amount of cpu resources, because TS video files can be played directly, solve asking for low-performance equipment smooth playing
Topic.Present invention compatibility is stronger in addition, does not rely on operation platform and framework.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the live index list encrypted antitheft chain methods of HLS.
Fig. 2 is the structural framing figure of the live index list encrypted antitheft catenary systems of HLS.
In figure:10- clients, 20- authenticated client servers, 30- servers, 40- index list servers, 50- keys
Server, 60- content distributing servers, 70- media control centre, 1- synthesis decoding DVBs, 2- encoding service units,
3- section service units, 4-http file service units, 12-VOD material units.
Specific embodiment
Technical scheme is described in more detail with reference to specific embodiment.
Fig. 1 is referred to, a kind of live index list encrypted antitheft chain methods of HLS, key step is as follows:
First, in step 101, client 10 obtains User Token by the authenticated client server 20 of system, and will use
Family token is bound with the IP address of client 10.When client 10 obtains User Token by authenticated client server 20,
GEOBLOCK (IP limitations) mechanism is had, cannot be logged in unauthorized country.
The User Token and client ip are bound, and have time limit, it is expired after can fail.The token of each user
All different, logging in again can issue new token, and former token ceases to be in force automatically, and user needs to log in again.
Authenticated client server 20 is provided and obtains subscription authentication and token authentication interface, it can be ensured that invalid token and do not had
The user for having purchase content can not watch.Authenticated client server 20 is provided for client:User authentication, authorization of service, book keeping operation
Service;Issuing and verifying service for User Token (UserToken) is provided.
User authentication (Authentication):Identity and usable network service for verifying user;
Authorization of service (Authorization):For being serviced to user according to authentication result open network;
The service of accounting (Accounting):For recording consumption of the user to various network services, and it is supplied to charging system
System.
In step 102, client 10 obtains M3U8 broadcast address.User end to server 30 (EPG Server) sends
When EPG is asked, (with other incoming parameters together by encryption during incoming Token parameters, server is obtained incoming User Token
Decrypted after taking), whether server 30 is legal to verify this token by the client ip bound.If legal, server 30 is then
Return to the request of client 10 needs or M3U8 broadcast address;Do not allow otherwise to ask EPG.Server 30 return content be also
Encryption, client 10 needs decryption after obtaining data.
In step 103, client 10 obtains URL addresses and the M3U8 encryption datas of key.Client 10 is from server 30
M3U8 broadcast address is taken, is sent to index list server 40 (M3U8Server) and asked, the incoming UserToken in request
(with other incoming parameters together by encryption during incoming Token parameters, M3U8Server is decrypted after obtaining), index list takes
Whether business device 40 is legal to verify this Token by the client ip bound.If legal return #KEYURI (represents key
URL addresses) and #BODY (representing M3U8 encryption datas), AES is AES128.
It is similar to following content:
#KEYURI=http://keyservice.test.itv.cn/M3U8key/textVersion=
21e35dc0-502c-4434-8f5f-122375246bc6&id=d62fe937-ac96-40 1f-9b52-
7c917b8baaf9&type=live
#BODY=decq9iVcu4s09qphlXCszBqskPBHBVH5QCGUP//
5UgYOQ04pXMMFtQ7ROctc5ZYzZm5tCcIWzGMRGj/E20JnjEAQnWg/
Ui0Ykh3mBUqaOsOThDy5U2ES0twVK1FqbSdGtAcna0FYBU83gjiU KO4xA3JY8lM2F4YkI+
4lh6TXuu7ljTR1gb0veTei3bzkumQjbr1N961LTYYUn3wd6SNux7fK64 8py M==
In step 104, standard M3U8 playlist texts are obtained.Client 10 according to the URL addresses of key, by two-way
User Token after encryption is posed to key server 50 (key server) by HTTPS POST agreements, for obtaining content decryption
Public key (this key can be changed at any time, and have local private key), is decrypted to M3U8 encryption datas, obtains standard M3U8 and plays
List text.Whether key server 50 simultaneously can legal to verify this Token by the client ip bound.Result after decryption
As follows (standard M3U8 files):
#EXTM3U
#EXT-X-VERSION:3
#EXT-X-TARGETDURATION:15
#EXT-X-MEDIA-SEQUENCE:1668778
#EXTINF:3.000,
#KEYURI=http://keyservice.domian/M3U8keyVersion=3a3cd4c4-e3c9-
4102-afad-25baf3eb9b22_0&id=8bad9f20-ff22-46b8-94ed-dced 10dcfdeb&type=live
http://src.domian/s03/465bd596-1297-4335-91f3-247f0e3b8844/1000/
20141203/1000_1417596194_5714597_45534609.ts
#EXTINF:3.000,
http://src.domian/s03/465bd596-1297-4335-91f3-247f0e3b8844/1000/
20141203/1000_1417596197_2618938_45537609.ts
#EXTINF:3.000,
http://src.domian/s03/465bd596-1297-4335-91f3-247f0e3b8844/1000/
20141203/1000_1417596200_2105875_45540609.ts
In step 5, obtain TS files and play out.Client 10 is by the standard M3U8 playlists after decryption
TS file downloads address, from content distributing server 60 (CDN Server) foradownloaded video section TS files, because this TS file
Without encryption so can directly play, CDN Front End Authentications module can filter illegal request (User-Agent verifications, IP during download
Address validation, User Token checking).Because TS files are not encrypted solving asking for low-performance equipment smooth playing video
Topic.
Fig. 2 is the live index list encrypted antitheft catenary system structure charts of HLS according to the present invention, as shown in Fig. 2 of the invention
The live index list encrypted antitheft catenary systems of HLS, including, client 10, authenticated client server 20, server 30, index
Listserv 40, key server 50, http file services unit 4, content distributing server 60, coding transcoding service unit
2nd, section service unit 3 and media control centre 70;
The client 10 is connected to authenticated client server 20, and client 10 obtains use from authenticated client server 20
Family token is simultaneously bound User Token with the IP address of client 10;Client 10 is connected to server 30, client 10
M3u8 addresses are obtained from server 30;M3U8 encryption datas to encrypting are decrypted, and obtain standard M3U8 playlists, and root
Played out according to the download address foradownloaded video section TS files in standard M3U8 playlists.Client 10 is Set Top Box
(STB), one kind in mobile terminal device and Website terminals.
Authenticated client server 20 is provided and obtains subscription authentication and token authentication interface, it can be ensured that invalid token and do not had
The user for having purchase content can not watch.The authenticated client server 20 to client 10 provide user authentication, authorization of service,
Billed services;Issuing and verifying service for User Token (UserToken) is provided.User authentication (Authentication):Test
Demonstrate,prove the identity and usable network service of user;Authorization of service (Authorization):According to authentication result open network clothes
It is engaged in user;Account (Accounting):Consumption of the user to various network services is recorded, and is supplied to charge system.
Server 30 provides M3U8 broadcast address, and is distributed to client 10.The service request of client 10 is received,
Incoming UserToken is verified by certificate server 10.If legal, server 30 then returns to the request of client 10 and needs
The M3U8 broadcast address wanted.
The URL addresses of the storage key of index list server 40 and M3U8 encryption datas, and be distributed to client 10.
The request of client is received, incoming UserToken, UserAgent are verified, if legal, M3U8Server is then returned
The URL addresses of the key that the request of client 10 needs and M3U8 encryption datas, AES is AES128.
Key server 50 is used for storage content and decrypts public key, and is distributed to client 10.Key server 50 connects
Receive client 10 to be verified by the UserToken that two-way HTTPS POST agreements send, such as decrypt public key by by content
Return to client 10.
Content distributing server 60 (CDN Server), TS file of the storage without encryption, being distributed to client 10 is carried out
Play.Content distributing server 60 receives client 10 by the download address in the normal playlist after decryption, by video
Section TS file distributings are to client 10.
The production links such as media control centre 70, Video coding, transcoding, the section of unified managing and control system.
Coding transcoding service unit 2 and section service unit 3 are responsible for files in stream media treatment, favourable by being cut into small documents
It is distributed in by http file services unit 4.
The live index list encrypted antitheft catenary systems of HLS of the invention and system, client obtain M3U8 files when pair
Content is encrypted, antitheft so as to serve even if having directly downloaded these files cannot also get video file address
The effect of chain.Because having solved the problems, such as to steal chain TS video files need not be again encrypted (decryption TS files
Need to consume a large amount of cpu resources) because TS video files can be played directly, solve asking for low-performance equipment smooth playing
Topic.
Better embodiment of the invention is explained in detail above, but the present invention is not limited to above-mentioned embodiment party
Formula, in the ken that one skilled in the relevant art possesses, can also be on the premise of present inventive concept not be departed from
Various changes can be made.
Claims (8)
1. live index list encrypted antitheft catenary systems of a kind of HLS, it is characterised in that taken including client (10), authenticated client
It is business device (20), server (30), index list server (40), key server (50), http file services unit (4), interior
Hold Distributor (60), coding transcoding service unit (2), section service unit (3) and media control centre (70);The visitor
Family end (10) is connected to authenticated client server (20), and client (10) obtains User Token from authenticated client server (20)
And User Token is bound with the IP address of client (10);Client (10) is connected to server (30), client
(10) M3U8 addresses are obtained from server (30);Client (10) is connected to index list server (40), index list service
The URL addresses of device (40) storage key and M3U8 encryption datas, and be distributed to client (10), receive client (10)
Request, client (10) is connected to key server (50), and key server (50) receives client (10) by two-way HTTPS
The UserToken that POST agreements send is verified;The content distributing server (60) is connected to client (10), content point
Hair server (60) receives client (10) by the download address in the normal playlist after decryption, by video segment TS texts
Part is distributed to client (10);Coding transcoding service unit (2) is connected to section service unit (3), service unit of cutting into slices
(3) http file services unit (4) are connected to, http file services unit (4) are connected to content distributing server (60), media
Control centre (70) is respectively connecting to coding transcoding service unit (2) and section service unit (3), and the coding transcoding service is single
First (2) are connected to comprehensive decoding DVB (1) and VOD materials unit (12).
2. live index list encrypted antitheft catenary systems of HLS according to claim 1, it is characterised in that the client recognizes
Card server (20) provides user authentication, authorization of service, billed services, provides User Token and issue and school to client (10)
The service of testing;User authentication is used to verify the identity and usable network service of user;Authorization of service is used for according to authentication result
Open network is serviced to user;Billed services are used to record consumption of the user to various network services, and are supplied to charge system.
3. live index list encrypted antitheft catenary systems of HLS according to claim 1, it is characterised in that the client
(10) be Set Top Box, the one kind in mobile terminal device and Website terminals.
4. live index list encrypted antitheft catenary systems of HLS according to claim 1, it is characterised in that the server
(30) for providing M3U8 broadcast address, and it is distributed to client (10);And the service request of client (10) is received, it is right
Incoming UserToken is verified by certificate server (10).
5. live index list encrypted antitheft catenary systems of HLS according to claim 1, it is characterised in that the key clothes
Business device (50) decrypts public key for storage content, and is distributed to client (10).
6. live index list encrypted antitheft catenary systems of HLS according to claim 1, it is characterised in that the media control
The production links such as Video coding, transcoding, the section of the unified managing and control system of center (70) processed.
7. live index list encrypted antitheft catenary systems of HLS according to claim 1, it is characterised in that the coding turns
Code service unit (2) and section service unit (3) are responsible for files in stream media and are processed, by service unit of cutting into slices (3) by Streaming Media
File is cut into small documents and then is distributed by http file services unit (4).
8. the method for the live index list encrypted antitheft chains of a kind of HLS as described in claim 1-7 is any, it is characterised in that
Its key step is as follows:
Step 101, client (10) obtains User Token by the authenticated client server (20) of system, and by User Token with
The IP address of client (10) is bound;Authenticated client server (20) connects there is provided acquisition subscription authentication and token authentication
Mouthful, it can be ensured that invalid token and the user without purchase content can not watch;
Step 102, client (10) obtains M3U8 broadcast address, when client (10) sends service request to server (30),
Whether incoming User Token, server (30) is legal to verify this token by the client ip bound, if legal, clothes
Business device (30) then returns to client (10) request needs or M3U8 broadcast address;Do not allow otherwise to ask EPG;
Step 103, client (10) obtains URL addresses and the M3U8 encryption datas of key, and client (10) is from server (30)
M3U8 broadcast address is taken, is sent to index list server (40) and asked, incoming UserToken, index list in request
Whether server (40) is legal to verify this Token by the client ip bound.If legal return #KEYURI (is represented close
The URL addresses of key) and #BODY (representing M3U8 encryption datas), AES is AES128;
Step 104, obtains standard M3U8 playlist texts, client (10) according to the URL addresses of key, by two-way
User Token after encryption is posed to key server (50) by HTTPS POST agreements, right for obtaining content decryption public key
M3U8 encryption datas are decrypted, and obtain standard M3U8 playlist texts, key server (50) while can be by binding
Whether client ip is legal to verify this Token;
Step 105, obtains TS files and plays out, and client (10) is by the TS in the standard M3U8 playlists after decryption
File download address, from content distributing server (60) foradownloaded video section TS files.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710016198.6A CN106791986A (en) | 2017-01-10 | 2017-01-10 | A kind of live index list encrypted antitheft catenary systems of HLS and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710016198.6A CN106791986A (en) | 2017-01-10 | 2017-01-10 | A kind of live index list encrypted antitheft catenary systems of HLS and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106791986A true CN106791986A (en) | 2017-05-31 |
Family
ID=58949273
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710016198.6A Pending CN106791986A (en) | 2017-01-10 | 2017-01-10 | A kind of live index list encrypted antitheft catenary systems of HLS and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106791986A (en) |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107547948A (en) * | 2017-09-05 | 2018-01-05 | 成都索贝数码科技股份有限公司 | It is a kind of while the method and system that high code and low code media data access is provided |
CN107659829A (en) * | 2017-11-06 | 2018-02-02 | 网宿科技股份有限公司 | A kind of method and system of video-encryption |
CN107888623A (en) * | 2017-12-19 | 2018-04-06 | 湖南机友科技有限公司 | The live anti-abduction method and device of software audio and video data streams |
CN108156490A (en) * | 2017-12-27 | 2018-06-12 | 深圳康佳信息网络有限公司 | A kind of method, system and storage medium using mobile terminal playback live telecast |
CN108712684A (en) * | 2018-06-07 | 2018-10-26 | 深圳市茁壮网络股份有限公司 | A kind of local TS stream files playback method, third party's player and terminal |
CN108882055A (en) * | 2018-06-28 | 2018-11-23 | 广州虎牙信息科技有限公司 | The method and device of net cast method and system, synthetic video stream |
CN108924595A (en) * | 2018-08-15 | 2018-11-30 | 广东南方新媒体股份有限公司 | Realize the method and system of TS slice door chain |
CN109450923A (en) * | 2018-11-30 | 2019-03-08 | 武汉烽火众智数字技术有限责任公司 | A kind of Video transmission system and method |
CN109447029A (en) * | 2018-11-12 | 2019-03-08 | 公安部第三研究所 | Electronic identity license generates system and method |
CN109672670A (en) * | 2018-12-11 | 2019-04-23 | 中新金桥数字科技(北京)有限公司 | A method of based on mobile phone H5 safe web page playing stream media |
WO2019153433A1 (en) * | 2018-02-09 | 2019-08-15 | 网宿科技股份有限公司 | Secret key providing method, video playback method, server and client |
CN110139136A (en) * | 2019-04-30 | 2019-08-16 | 北京数字太和科技有限责任公司 | A kind of method and device that the Web TV based on DRM technology plays |
CN110139131A (en) * | 2018-02-09 | 2019-08-16 | 网宿科技股份有限公司 | A kind of method and terminal of playing video file |
CN110798714A (en) * | 2019-10-23 | 2020-02-14 | 深圳创维新世界科技有限公司 | HLS-based local video playing system and playing method |
CN111182357A (en) * | 2019-09-29 | 2020-05-19 | 腾讯科技(深圳)有限公司 | Internet media playing method, device and system based on interactive network television |
CN111526430A (en) * | 2020-03-26 | 2020-08-11 | 王东 | File matching method and device and electronic equipment |
CN111556340A (en) * | 2020-05-21 | 2020-08-18 | 西安工业大学 | Safe cross-platform video stream playing method |
CN111818365A (en) * | 2020-06-19 | 2020-10-23 | 华新(北京)网络科技有限公司 | Video secure transmission method based on SM series state cryptographic algorithm |
CN112261444A (en) * | 2020-10-16 | 2021-01-22 | 成都华栖云科技有限公司 | Media stream encryption method based on high-performance virtual gateway |
CN113329242A (en) * | 2021-05-27 | 2021-08-31 | 北京沃东天骏信息技术有限公司 | Resource management method and device |
CN113965775A (en) * | 2021-10-22 | 2022-01-21 | 武汉博晟安全技术股份有限公司 | Multimedia video safe playing method based on slice and intelligent CDN acceleration |
CN114157643A (en) * | 2021-12-20 | 2022-03-08 | 海看网络科技(山东)股份有限公司 | Method for fixing code rate parameters based on transcoder HLS protocol |
CN114189706A (en) * | 2021-12-09 | 2022-03-15 | 北京航星永志科技有限公司 | Media playing method, system, device and computer equipment |
CN114363721A (en) * | 2022-01-19 | 2022-04-15 | 平安国际智慧城市科技股份有限公司 | HLS-based video playing method, device, equipment and storage medium |
WO2023039694A1 (en) * | 2021-09-14 | 2023-03-23 | 果核数位股份有限公司 | Streaming service method and system capable of realizing information security level customization |
CN117241067A (en) * | 2023-11-15 | 2023-12-15 | 华录出版传媒有限公司 | Video security retrieval method and system based on fingerprint watermark |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120246462A1 (en) * | 2011-03-23 | 2012-09-27 | General Instrument Corporation | System and methods for providing live streaming content using digital rights management-based key management |
US20130163758A1 (en) * | 2011-12-22 | 2013-06-27 | Viswanathan Swaminathan | Methods and Apparatus for Key Delivery in HTTP Live Streaming |
CN104283845A (en) * | 2013-07-03 | 2015-01-14 | 中国电信股份有限公司 | Hotlink protecting method and system, CDN server and client side |
CN104320377A (en) * | 2014-09-25 | 2015-01-28 | 华为技术有限公司 | An anti-stealing-link method and device for stream media file |
CN104410901A (en) * | 2014-11-18 | 2015-03-11 | 上海天脉聚源文化传媒有限公司 | Play method and play device of M3U8 format live stream |
-
2017
- 2017-01-10 CN CN201710016198.6A patent/CN106791986A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120246462A1 (en) * | 2011-03-23 | 2012-09-27 | General Instrument Corporation | System and methods for providing live streaming content using digital rights management-based key management |
US20130163758A1 (en) * | 2011-12-22 | 2013-06-27 | Viswanathan Swaminathan | Methods and Apparatus for Key Delivery in HTTP Live Streaming |
CN104283845A (en) * | 2013-07-03 | 2015-01-14 | 中国电信股份有限公司 | Hotlink protecting method and system, CDN server and client side |
CN104320377A (en) * | 2014-09-25 | 2015-01-28 | 华为技术有限公司 | An anti-stealing-link method and device for stream media file |
CN104410901A (en) * | 2014-11-18 | 2015-03-11 | 上海天脉聚源文化传媒有限公司 | Play method and play device of M3U8 format live stream |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107547948B (en) * | 2017-09-05 | 2020-05-05 | 成都索贝数码科技股份有限公司 | Method and system for simultaneously providing high code and low code media data access |
CN107547948A (en) * | 2017-09-05 | 2018-01-05 | 成都索贝数码科技股份有限公司 | It is a kind of while the method and system that high code and low code media data access is provided |
CN107659829A (en) * | 2017-11-06 | 2018-02-02 | 网宿科技股份有限公司 | A kind of method and system of video-encryption |
CN107659829B (en) * | 2017-11-06 | 2020-05-22 | 网宿科技股份有限公司 | Video encryption method and system |
CN107888623A (en) * | 2017-12-19 | 2018-04-06 | 湖南机友科技有限公司 | The live anti-abduction method and device of software audio and video data streams |
CN108156490A (en) * | 2017-12-27 | 2018-06-12 | 深圳康佳信息网络有限公司 | A kind of method, system and storage medium using mobile terminal playback live telecast |
CN108156490B (en) * | 2017-12-27 | 2020-12-04 | 深圳康佳信息网络有限公司 | Method, system and storage medium for playing back live television by using mobile terminal |
CN110139131A (en) * | 2018-02-09 | 2019-08-16 | 网宿科技股份有限公司 | A kind of method and terminal of playing video file |
WO2019153433A1 (en) * | 2018-02-09 | 2019-08-15 | 网宿科技股份有限公司 | Secret key providing method, video playback method, server and client |
CN110138716A (en) * | 2018-02-09 | 2019-08-16 | 网宿科技股份有限公司 | A kind of offer of key, video broadcasting method, server and client |
US11055429B2 (en) | 2018-02-09 | 2021-07-06 | Wangsu Science & Technology Co., Ltd. | Key providing method, video playing method, server and client |
CN110138716B (en) * | 2018-02-09 | 2020-11-27 | 网宿科技股份有限公司 | Key providing method, video playing method, server and client |
CN108712684B (en) * | 2018-06-07 | 2021-04-06 | 深圳市茁壮网络股份有限公司 | Local TS (transport stream) file playing method, third-party player and terminal |
CN108712684A (en) * | 2018-06-07 | 2018-10-26 | 深圳市茁壮网络股份有限公司 | A kind of local TS stream files playback method, third party's player and terminal |
CN108882055A (en) * | 2018-06-28 | 2018-11-23 | 广州虎牙信息科技有限公司 | The method and device of net cast method and system, synthetic video stream |
CN108924595A (en) * | 2018-08-15 | 2018-11-30 | 广东南方新媒体股份有限公司 | Realize the method and system of TS slice door chain |
CN109447029A (en) * | 2018-11-12 | 2019-03-08 | 公安部第三研究所 | Electronic identity license generates system and method |
CN109450923B (en) * | 2018-11-30 | 2021-06-15 | 武汉烽火众智数字技术有限责任公司 | Video transmission system and method |
CN109450923A (en) * | 2018-11-30 | 2019-03-08 | 武汉烽火众智数字技术有限责任公司 | A kind of Video transmission system and method |
CN109672670A (en) * | 2018-12-11 | 2019-04-23 | 中新金桥数字科技(北京)有限公司 | A method of based on mobile phone H5 safe web page playing stream media |
CN110139136B (en) * | 2019-04-30 | 2021-11-26 | 北京数字太和科技有限责任公司 | Method and device for playing network television based on DRM technology |
CN110139136A (en) * | 2019-04-30 | 2019-08-16 | 北京数字太和科技有限责任公司 | A kind of method and device that the Web TV based on DRM technology plays |
CN111182357A (en) * | 2019-09-29 | 2020-05-19 | 腾讯科技(深圳)有限公司 | Internet media playing method, device and system based on interactive network television |
CN110798714B (en) * | 2019-10-23 | 2022-02-01 | 深圳创维新世界科技有限公司 | HLS-based local video playing system and playing method |
CN110798714A (en) * | 2019-10-23 | 2020-02-14 | 深圳创维新世界科技有限公司 | HLS-based local video playing system and playing method |
CN111526430A (en) * | 2020-03-26 | 2020-08-11 | 王东 | File matching method and device and electronic equipment |
CN111556340A (en) * | 2020-05-21 | 2020-08-18 | 西安工业大学 | Safe cross-platform video stream playing method |
CN111818365A (en) * | 2020-06-19 | 2020-10-23 | 华新(北京)网络科技有限公司 | Video secure transmission method based on SM series state cryptographic algorithm |
CN112261444A (en) * | 2020-10-16 | 2021-01-22 | 成都华栖云科技有限公司 | Media stream encryption method based on high-performance virtual gateway |
CN113329242A (en) * | 2021-05-27 | 2021-08-31 | 北京沃东天骏信息技术有限公司 | Resource management method and device |
WO2023039694A1 (en) * | 2021-09-14 | 2023-03-23 | 果核数位股份有限公司 | Streaming service method and system capable of realizing information security level customization |
CN113965775A (en) * | 2021-10-22 | 2022-01-21 | 武汉博晟安全技术股份有限公司 | Multimedia video safe playing method based on slice and intelligent CDN acceleration |
CN114189706A (en) * | 2021-12-09 | 2022-03-15 | 北京航星永志科技有限公司 | Media playing method, system, device and computer equipment |
CN114157643A (en) * | 2021-12-20 | 2022-03-08 | 海看网络科技(山东)股份有限公司 | Method for fixing code rate parameters based on transcoder HLS protocol |
CN114157643B (en) * | 2021-12-20 | 2023-01-13 | 海看网络科技(山东)股份有限公司 | Method for fixing code rate parameters based on transcoder HLS protocol |
CN114363721A (en) * | 2022-01-19 | 2022-04-15 | 平安国际智慧城市科技股份有限公司 | HLS-based video playing method, device, equipment and storage medium |
CN117241067A (en) * | 2023-11-15 | 2023-12-15 | 华录出版传媒有限公司 | Video security retrieval method and system based on fingerprint watermark |
CN117241067B (en) * | 2023-11-15 | 2024-02-09 | 华录出版传媒有限公司 | Video security retrieval method and system based on fingerprint watermark |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106791986A (en) | A kind of live index list encrypted antitheft catenary systems of HLS and method | |
US9900306B2 (en) | Device authentication for secure key retrieval for streaming media players | |
US10698985B2 (en) | Extending data confidentiality into a player application | |
CN106936770B (en) | A kind of HLS index list encrypted antitheft catenary system and method | |
US10389689B2 (en) | Systems and methods for securely streaming media content | |
US8752194B2 (en) | Progressive download or streaming of digital media securely through a localized container and communication protocol proxy | |
US9026782B2 (en) | Token-based entitlement verification for streaming media decryption | |
CN105939484B (en) | A kind of the encryption playback method and its system of audio-video | |
US20080216177A1 (en) | Contents Distribution System | |
US20060200415A1 (en) | Videonline security network architecture and methods therefor | |
CN103957436A (en) | Video anti-stealing-link method based on OTT service | |
CA2473851A1 (en) | Encryption, authentication, and key management for multimedia content pre-encryption | |
US9330250B2 (en) | Authorization of media content transfer between home media server and client device | |
CN1964479A (en) | Method for realizing management of digital copyright based on stream media broadcast | |
CN108881205A (en) | A kind of safety broadcasting system and playback method of HLS Streaming Media | |
CN102523495A (en) | IPTV system and method for realizing playing hotlinking prevention | |
US20140165209A1 (en) | Digital content delivery platform for multiple retailers | |
CN106936815A (en) | A kind of document transmission system and its method based on encrypted audio stream | |
CN110572454A (en) | Advertisement delivery system for guaranteeing safety of advertisement delivery process | |
CN110139136B (en) | Method and device for playing network television based on DRM technology | |
Nam et al. | Interlock system for DRM interoperability of streaming contents |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20200228 |