CN108777688A - Video security monitoring method and system - Google Patents

Video security monitoring method and system Download PDF

Info

Publication number
CN108777688A
CN108777688A CN201810580956.1A CN201810580956A CN108777688A CN 108777688 A CN108777688 A CN 108777688A CN 201810580956 A CN201810580956 A CN 201810580956A CN 108777688 A CN108777688 A CN 108777688A
Authority
CN
China
Prior art keywords
video
code stream
frame data
key frame
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810580956.1A
Other languages
Chinese (zh)
Inventor
杨双仕
徐雷
郭志斌
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810580956.1A priority Critical patent/CN108777688A/en
Publication of CN108777688A publication Critical patent/CN108777688A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/045Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption

Abstract

A kind of Video security monitoring method of present invention offer and system, this method include:Obtain the key frame data of video source code stream;The key frame data of video source code stream is encrypted, the first encryption information is generated;Obtain the key frame data of video end code stream;The key frame data of video end code stream is encrypted, the second encryption information is generated;The first encryption information and the second encryption information are decrypted respectively, and compare the key frame data of the key frame data and video end code stream of the video source code stream after decryption, obtains comparing result;Judge whether content code stream is abnormal according to the comparing result.In the technical solution of Video security monitoring method and system provided by the invention, reduce the data volume of encrypted content, code stream monitoring delay time is shortened, to improve code stream monitoring efficiency and real-time;The accuracy of code stream monitoring can also be improved simultaneously.

Description

Video security monitoring method and system
Technical field
The present invention relates to fields of communication technology, and in particular, to a kind of Video security monitoring method and system.
Background technology
With the continuous development of Internet technology, the raising of network bandwidth capabilities, explosive growth is presented in video traffic, depending on Frequency viewing user has reached considerable scale, is asked so the safety problem of transmission of video increasingly becomes in the urgent need to address Topic, especially IPTV (Internet Protocol Television, live video business) should seek real-time, and require Safety monitors difficulty bigger.In the transmission process of video, content code stream is easy to be tampered or be replaced, and may lead Cause illegal contents in terminal plays, there are security risks.
In the related art, mainly there are DRM (Digital Rights Management, digital copyright management), MD5 (Message Digest 5, Message Digest Algorithm 5) safety detection technology and the strong secure transmission technique of two-stage key etc. Method protects video code flow transmission.But for DRM technology, there is presently no IPTV at home to be used widely, and at Ben Taigao.
For MD5 safety detection technologies:Since single security key cannot be guaranteed that encrypted safety, security key are passing All there is the risk being tampered, the dangerous safety for being just likely to influence video code flow of key during defeated or other Property.
For the strong secure transmission technique of two-stage key:Since this technology needs to carry out two-stage to the video code flow of all transmission It signs and verifies, need to expend a large amount of computing resource and time, verification process is complicated, and the run time period is too long, especially right The high live broadcast service of requirement of real-time, cannot be satisfied requirement.
Invention content
The present invention is directed at least solve one of the technical problems existing in the prior art, it is proposed that a kind of Video security monitoring Method and system, which reduce the data volumes of encrypted content, shorten code stream monitoring delay time, to improve code stream monitoring Efficiency and real-time;The accuracy of code stream monitoring can also be improved simultaneously.
A kind of Video security monitoring method is provided to achieve the purpose of the present invention, including:
Obtain the key frame data of video source code stream;
The key frame data of the video source code stream is encrypted, the first encryption information is generated;
Obtain the key frame data of video end code stream;
The key frame data of video end code stream is encrypted, the second encryption information is generated;
First encryption information and the second encryption information are decrypted respectively, and compare the video source after decryption The key frame data of the key frame data and video end code stream of code stream is held, comparing result is obtained;
Judge whether content code stream is abnormal according to the comparing result.
Optionally, the step of key frame data for obtaining video source code stream, including:
From the source, and/or content distributing network Centroid, and/or content distributing network transcoding node of video code flow In, the first authentic copy of video code flow is obtained, as the video source code stream;
Key frame data is extracted from the video source code stream.
Optionally, the step of key frame data for obtaining video end code stream, including:
From in the routing device of the terminal of video code flow, and/or purpose terminal, the triplicate of video code flow is obtained, is made For the video source code stream;
Key frame data is extracted from the code stream of the video end.
Optionally, the key frame data to the video source code stream is encrypted, and generates the video source code The step of encryption information of stream, including:
Generate and distribute the first public key and the first private key;
Signature is encrypted to the key frame data of the video source code stream using pre-defined algorithm and first private key, Generate the first signing messages.
Optionally, the key frame data to video end code stream is encrypted, and generates the video end code The step of encryption information of stream, including:
Generate and distribute the second public key and the second private key;
Signature is encrypted to the key frame data of video end code stream using pre-defined algorithm and second private key, Generate the second signing messages.
Optionally, described that first encryption information and the second encryption information are decrypted respectively, and after comparing decryption The video source code stream key frame data and video end code stream key frame data, obtain comparing result the step of, Including:
First signing messages is decrypted using pre-defined algorithm and first public key;
Second signing messages is decrypted using pre-defined algorithm and second public key;
The key frame data of the key frame data and video end code stream of the video source code stream after comparison decryption, is obtained Obtain comparing result.
Optionally, described that the whether abnormal step of content code stream is judged according to the comparing result, including:
Judge whether content code stream is abnormal according to the comparing result;If so, alert.
As another technical solution, the present invention also provides a kind of Video securities to monitor system comprising:
Acquiring unit, the crucial frame number of key frame data and video end code stream for obtaining video source code stream According to;
Encryption unit is encrypted for the key frame data to the video source code stream, generates the first encryption information; And the key frame data of video end code stream is encrypted, generate the second encryption information;
Authentication unit for first encryption information and the second encryption information to be decrypted respectively, and compares decryption The key frame data of the key frame data and video end code stream of the video source code stream afterwards obtains comparing result;Then Judge whether content code stream is abnormal according to the comparing result.
Optionally, the acquiring unit includes taking out frame device, is closed for being extracted from the video source code stream received Key frame data, and extract key frame data from the video end code stream received;Wherein,
The video source code stream is from the source, and/or content distributing network Centroid of video code flow, and/or interior The first authentic copy of the video code flow obtained in content distributing network transcoding node;
Video end code stream regards for what is obtained from the routing device of the terminal of video code flow, and/or purpose terminal The triplicate of frequency code stream.
Optionally, the encryption unit includes:
Key Management server, for generating and distributing the first public key and the first private key and the second public key and the second private Key;
Signature server, for using the crucial frame number of pre-defined algorithm and first private key to the video source code stream According to signature is encrypted, the first signing messages is generated, and using pre-defined algorithm and second private key to the video end Signature is encrypted in the key frame data of code stream, generates the second signing messages.
The invention has the advantages that:
In the technical solution of Video security monitoring method and system provided by the invention, by obtaining video source code respectively The key frame data of stream and video end code stream, and be encrypted, reduce the data volume of encrypted content, shortens code stream monitoring Delay time, to improve code stream monitoring efficiency and real-time.Meanwhile by video source code stream and video end code stream Key frame data compared, can improve code stream monitoring accuracy.
Description of the drawings
Fig. 1 is the flow diagram of Video security monitoring method provided in an embodiment of the present invention;
Fig. 2 is a kind of functional block diagram that Video security provided in an embodiment of the present invention monitors system;
Fig. 3 is another functional block diagram that Video security provided in an embodiment of the present invention monitors system.
Specific implementation mode
To make those skilled in the art more fully understand technical scheme of the present invention, come below in conjunction with the accompanying drawings to the present invention The Video security monitoring method and system of offer are described in detail.
Referring to Fig. 1, Video security monitoring method provided in an embodiment of the present invention comprising:
Step S1 obtains the key frame data of video source code stream;
The key frame data of video source code stream is encrypted in step S2, generates the first encryption information;
Step S3 obtains the key frame data of video end code stream;
The key frame data of video end code stream is encrypted in step S4, generates the second encryption information;
Step S5 is respectively decrypted the first encryption information and the second encryption information, and compares the video source after decryption The key frame data of the key frame data and video end code stream of code stream is held, comparing result is obtained;
Step S6 judges whether content code stream is abnormal according to comparing result.
Video code flow generally comprises:I frames (frame completely encoded), P frames are (by the I frames generation before referring to only comprising poor The frame of different code segment) and B frames (by the frame encoded with reference to front and back frame).Wherein, I frames are also known as intracoded frame, be it is a kind of from Independent frame with all information can be independently decoded without reference to other images, can simply be interpreted as a static picture Face, therefore, I frames are the key frames of video, if video code flow is tampered, I frames also necessarily change.
Based on this, Video security monitoring method provided in an embodiment of the present invention need to only extract key frame data, and to it It is monitored, the safety monitoring to video not only may be implemented, but also the data volume of encrypted content can be reduced, shorten code stream prison Delay time is surveyed, to improve code stream monitoring efficiency and real-time.Meanwhile by video source code stream and video end code The key frame data of stream is compared, and the accuracy of code stream monitoring can be improved.
It should be noted that in practical applications, above-mentioned steps S1 and step S3 can be carried out at the same time, or can also be adopted It is successively carried out with random order.
Above-mentioned steps S1, further comprises:
Step S11, from the source, and/or content distributing network Centroid, and/or content distributing network of video code flow In transcoding node, the first authentic copy of video code flow is obtained, as video source code stream;
Step S12 extracts key frame data from video source code stream.
Optionally, in above-mentioned steps S12, key frame data can be extracted according to the flag of video frame header format.
Above-mentioned steps S3, further comprises:
Step S31 obtains the second of video code flow from the routing device of the terminal of video code flow, and/or purpose terminal Copy, as video source code stream;
Step S32 extracts key frame data from the code stream of video end.
Optionally, in above-mentioned steps 32, mirror image or spectroscopic modes can be utilized to obtain the triplicate of video code flow.
Above-mentioned steps S2, further comprises:
Step S21 generates and distributes the first public key and the first private key;
Signature is encrypted to the key frame data of video source code stream using pre-defined algorithm and the first private key in step S22, Generate the first signing messages.
In above-mentioned steps S21, by DES Cipher or 3DES, under after video source code stream symmetric cryptography, It generates and distributes the first public key and the first private key.
In above-mentioned steps S22, pre-defined algorithm can be Digital Signature Algorithm comprising but be not limited to:RSA, ElGamal, Fiat-Shamir, Schnorr, Des/DSA and elliptic curve digital signature algorithm etc..
Above-mentioned steps S4, further comprises:
Above-mentioned steps S41 further generates and distributes the second public key and the second private key;
Above-mentioned steps S42, further use pre-defined algorithm and the second private key to the key frame data of video end code stream into Row ciphering signature generates the second signing messages.
In above-mentioned steps S41, by DES Cipher or 3DES, under after video source code stream symmetric cryptography, It generates and distributes the first public key and the first private key.
In above-mentioned steps S42, pre-defined algorithm can be Digital Signature Algorithm comprising but be not limited to:RSA, ElGamal, Fiat-Shamir, Schnorr, Des/DSA and elliptic curve digital signature algorithm etc..
Above-mentioned steps S5, further comprises:
Step S51 is decrypted using pre-defined algorithm and first the first signing messages of public key pair;
Step S52 is decrypted using pre-defined algorithm and second the second signing messages of public key pair;
Step S53, the crucial frame number of the key frame data and video end code stream of the video source code stream after comparison decryption According to acquisition comparing result.
Optionally, above-mentioned comparing result is the crucial frame number of the key frame data and video end code stream of video source code stream According to whether consistent.
Above-mentioned steps S6, including:
Judge whether content code stream is abnormal according to above-mentioned comparing result;If so, alert.
The abnormal conditions of content code stream include:Content code stream is tampered or is replaced, so as to lead to illegal contents In terminal plays, there are security risks.
Optionally, if comparison result is inconsistent, code stream can be generated and be tampered warning message, and with the side such as short message, mail Formula informs maintenance personnel.
As another technical solution, also referring to Fig. 2 and Fig. 3, the embodiment of the present invention also provides a kind of Video security Monitoring system comprising acquiring unit 1, encryption unit 2 and authentication unit 3.Wherein, acquiring unit 1 is for obtaining video source The key frame data of code stream and the key frame data of video end code stream.
Optionally, which can be to take out frame device 11, crucial for being extracted from the video source code stream received Frame data, and extract key frame data from the video end code stream received;Wherein, video source code stream is from video codes The video code flow obtained in the source, and/or content distributing network Centroid, and/or content distributing network transcoding node of stream The first authentic copy;Video end code stream is the video obtained from the routing device of the terminal of video code flow, and/or purpose terminal The triplicate of code stream.
Encryption unit 2 generates the first encryption information for the key frame data of video source code stream to be encrypted;With And the key frame data of video end code stream is encrypted, generate the second encryption information.
Optionally, encryption unit 2 includes:
Key Management server 21, for generating and distributing the first public key and the first private key and the second public key and second Private key;
Signature server 22, for being carried out to the key frame data of video source code stream using pre-defined algorithm and the first private key Ciphering signature generates the first signing messages, and uses the crucial frame number of pre-defined algorithm and the second private key to video end code stream According to signature is encrypted, the second signing messages is generated.
Authentication unit 3 is for being respectively decrypted the first encryption information and the second encryption information, and after comparing decryption The key frame data of the key frame data and video end code stream of video source code stream obtains comparing result, then according to comparison As a result judge whether content code stream is abnormal.
Authentication unit 3 is, for example, authentication server 31.
Optionally, Video security monitoring system further includes alarm unit 4, for according to the instruction sent from authentication unit It generates code stream and is tampered warning message, and maintenance personnel is informed in a manner of short message, mail etc..
In conclusion in the technical solution of Video security monitoring method provided by the invention and system, by obtaining respectively The key frame data of video source code stream and video end code stream, and be encrypted, reduce the data volume of encrypted content, shortens Code stream monitors delay time, to improving code stream monitoring efficiency and real-time.Meanwhile by video source code stream and regarding The key frame data of frequency end code stream is compared, and the accuracy of code stream monitoring can be improved.
It is understood that the principle that embodiment of above is intended to be merely illustrative of the present and the exemplary implementation that uses Mode, however the present invention is not limited thereto.For those skilled in the art, in the essence for not departing from the present invention In the case of refreshing and essence, various changes and modifications can be made therein, these variations and modifications are also considered as protection scope of the present invention.

Claims (10)

1. a kind of Video security monitoring method, which is characterized in that including:
Obtain the key frame data of video source code stream;
The key frame data of the video source code stream is encrypted, the first encryption information is generated;
Obtain the key frame data of video end code stream;
The key frame data of video end code stream is encrypted, the second encryption information is generated;
First encryption information and the second encryption information are decrypted respectively, and compare the video source code after decryption The key frame data of the key frame data and video end code stream of stream obtains comparing result;
Judge whether content code stream is abnormal according to the comparing result.
2. Video security monitoring method according to claim 1, which is characterized in that the pass for obtaining video source code stream The step of key frame data, including:
From the source, and/or content distributing network Centroid of video code flow, and/or content distributing network transcoding node, obtain The first authentic copy for taking video code flow, as the video source code stream;
Key frame data is extracted from the video source code stream.
3. Video security monitoring method according to claim 1, which is characterized in that the pass for obtaining video end code stream The step of key frame data, including:
From in the routing device of the terminal of video code flow, and/or purpose terminal, the triplicate of video code flow is obtained, as institute State video source code stream;
Key frame data is extracted from the code stream of the video end.
4. Video security monitoring method according to claim 1, which is characterized in that described to the video source code stream Key frame data is encrypted, the step of generating the encryption information of the video source code stream, including:
Generate and distribute the first public key and the first private key;
Signature is encrypted to the key frame data of the video source code stream using pre-defined algorithm and first private key, is generated First signing messages.
5. Video security monitoring method according to claim 4, which is characterized in that described to video end code stream Key frame data is encrypted, the step of generating the encryption information of video end code stream, including:
Generate and distribute the second public key and the second private key;
Signature is encrypted to the key frame data of video end code stream using pre-defined algorithm and second private key, is generated Second signing messages.
6. Video security monitoring method according to claim 5, which is characterized in that described to believe respectively first encryption Breath and the second encryption information are decrypted, and compare key frame data and the video end of the video source code stream after decryption The step of key frame data of code stream, acquisition comparing result, including:
First signing messages is decrypted using pre-defined algorithm and first public key;
Second signing messages is decrypted using pre-defined algorithm and second public key;
The key frame data of the key frame data and video end code stream of the video source code stream after comparison decryption, acquisition pair Compare result.
7. Video security monitoring method according to claim 1, which is characterized in that described to be judged according to the comparing result The whether abnormal step of content code stream, including:
Judge whether content code stream is abnormal according to the comparing result;If so, alert.
8. a kind of Video security monitors system, which is characterized in that including:
Acquiring unit, the key frame data of key frame data and video end code stream for obtaining video source code stream;
Encryption unit is encrypted for the key frame data to the video source code stream, generates the first encryption information;With And the key frame data of video end code stream is encrypted, generate the second encryption information;
Authentication unit, for first encryption information and the second encryption information to be decrypted respectively, and compare decryption after The key frame data of the key frame data and video end code stream of the video source code stream obtains comparing result;Then basis The comparing result judges whether content code stream is abnormal.
9. Video security according to claim 8 monitors system, which is characterized in that the acquiring unit includes taking out frame device, For extracting key frame data from the video source code stream received, and from the video end code stream received Middle extraction key frame data;Wherein,
The video source code stream is from the source, and/or content distributing network Centroid, and/or content of video code flow point The first authentic copy of the video code flow obtained in hairnet network transcoding node;
Video end code stream is the video codes obtained from the routing device of the terminal of video code flow, and/or purpose terminal The triplicate of stream.
10. Video security according to claim 8 monitors system, which is characterized in that the encryption unit includes:
Key Management server, for generating and distributing the first public key and the first private key and the second public key and the second private key;
Signature server, for using pre-defined algorithm and first private key to the key frame data of the video source code stream into Row ciphering signature generates the first signing messages, and using pre-defined algorithm and second private key to video end code stream Key frame data be encrypted signature, generate the second signing messages.
CN201810580956.1A 2018-06-07 2018-06-07 Video security monitoring method and system Pending CN108777688A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810580956.1A CN108777688A (en) 2018-06-07 2018-06-07 Video security monitoring method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810580956.1A CN108777688A (en) 2018-06-07 2018-06-07 Video security monitoring method and system

Publications (1)

Publication Number Publication Date
CN108777688A true CN108777688A (en) 2018-11-09

Family

ID=64025759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810580956.1A Pending CN108777688A (en) 2018-06-07 2018-06-07 Video security monitoring method and system

Country Status (1)

Country Link
CN (1) CN108777688A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110427781A (en) * 2019-07-16 2019-11-08 浙江大华技术股份有限公司 Tamper resistant method, terminal device and the storage medium of media data
CN111586477A (en) * 2020-04-30 2020-08-25 许周 E-commerce live broadcast processing method based on big data and network security live broadcast platform
WO2021027846A1 (en) * 2019-08-12 2021-02-18 南京中兴新软件有限责任公司 Method, apparatus, and system for detecting video code stream
CN117156125A (en) * 2023-10-25 2023-12-01 帕科视讯科技(杭州)股份有限公司 IPTV live stream real-time monitoring method and server based on artificial intelligence

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604640A (en) * 2004-10-28 2005-04-06 武汉大学 A video information encrypting-decrypting method
US8401188B1 (en) * 2009-10-30 2013-03-19 Adobe Systems Incorporated System and method for partial encryption of frame-based electronic content
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN105307054A (en) * 2015-10-28 2016-02-03 成都三零凯天通信实业有限公司 Inter cut prevention method for terrestrial digital television
CN105959696A (en) * 2016-04-28 2016-09-21 成都三零凯天通信实业有限公司 Video content safety monitoring method based on SIFT characteristic algorithm
CN107370712A (en) * 2016-05-11 2017-11-21 中兴通讯股份有限公司 A kind of code stream distorts monitoring method, device and communication system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1604640A (en) * 2004-10-28 2005-04-06 武汉大学 A video information encrypting-decrypting method
US8401188B1 (en) * 2009-10-30 2013-03-19 Adobe Systems Incorporated System and method for partial encryption of frame-based electronic content
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN105307054A (en) * 2015-10-28 2016-02-03 成都三零凯天通信实业有限公司 Inter cut prevention method for terrestrial digital television
CN105959696A (en) * 2016-04-28 2016-09-21 成都三零凯天通信实业有限公司 Video content safety monitoring method based on SIFT characteristic algorithm
CN107370712A (en) * 2016-05-11 2017-11-21 中兴通讯股份有限公司 A kind of code stream distorts monitoring method, device and communication system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110427781A (en) * 2019-07-16 2019-11-08 浙江大华技术股份有限公司 Tamper resistant method, terminal device and the storage medium of media data
WO2021027846A1 (en) * 2019-08-12 2021-02-18 南京中兴新软件有限责任公司 Method, apparatus, and system for detecting video code stream
CN112449237A (en) * 2019-08-12 2021-03-05 中兴通讯股份有限公司 Method, device and system for detecting video code stream
US11729436B2 (en) 2019-08-12 2023-08-15 Zte Corporation Method, apparatus, and system for detecting video code stream
CN111586477A (en) * 2020-04-30 2020-08-25 许周 E-commerce live broadcast processing method based on big data and network security live broadcast platform
CN117156125A (en) * 2023-10-25 2023-12-01 帕科视讯科技(杭州)股份有限公司 IPTV live stream real-time monitoring method and server based on artificial intelligence

Similar Documents

Publication Publication Date Title
CN109218825B (en) Video encryption system
CN108777688A (en) Video security monitoring method and system
CN109151508B (en) Video encryption method
CN101163228B (en) Video data encrypted system and method for network video monitoring
CN104349135B (en) Monitoring server, method for processing data of monitoring server and monitoring system
CN111274578B (en) Data safety protection system and method for video monitoring system
WO2018001193A1 (en) Method, device and system for secure playback on internet protocol television channel
JP2003517218A (en) Method for protecting audio / visual data through an NRSS interface
US7602903B2 (en) Cryptography correctness detection methods and apparatuses
CN107613316B (en) Live network push stream verification method and system
CN109495258B (en) Method and device for decrypting monitoring data, computer equipment and storage medium
JP4650267B2 (en) Transmitting apparatus and method, receiving apparatus and method, data transmission system, and data transmission method
US20170353745A1 (en) Secure media player
WO2017193949A1 (en) Code stream tampering monitoring method and device and communication system
CN107947937A (en) A kind of safe audio-video encryption system and terminal authentication implementation method
CN113128999A (en) Block chain privacy protection method and device
CN112749232A (en) Production data monitoring method and device, block chain node and storage medium
CN107872324A (en) A kind of safe audio-video encryption client and certification implementation method
CN112702582B (en) Secure transmission method and device for monitoring video based on SM2
CN112769783B (en) Data transmission method, cloud server, receiving end and sending end
Sharma et al. Digital Image Encryption Techniques: A Review
CN112104874A (en) Data transmission method and system
CN114422266A (en) IDaaS system based on dual verification mechanism
CN111757062A (en) Efficient and safe transmission method and system for video stream
JP2013042331A (en) Unidirectional communication system, method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181109