CN108881205B - HLS streaming media safe playing system and playing method - Google Patents
HLS streaming media safe playing system and playing method Download PDFInfo
- Publication number
- CN108881205B CN108881205B CN201810590071.XA CN201810590071A CN108881205B CN 108881205 B CN108881205 B CN 108881205B CN 201810590071 A CN201810590071 A CN 201810590071A CN 108881205 B CN108881205 B CN 108881205B
- Authority
- CN
- China
- Prior art keywords
- key
- server
- client
- token
- identity authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/321—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
- H04L9/3213—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
Abstract
The invention discloses a system and a method for safely playing HLS streaming media, which ensure the safety of a secret key by encrypting a slice secret key. Meanwhile, a secret key generation algorithm agreed by the client and the server is adopted, and a randomly generated and continuously updated authentication token is generated into a secret key for encrypting and decrypting a video slice secret key, so that the safety of the secret key is further improved, and the safety of the streaming media file is further improved; in addition, because the symmetric key used for decryption by the client is generated by adopting a specified algorithm, the higher security is achieved, and meanwhile, the complex operation of installing an additional client certificate and the like is avoided, so that the user can keep simple and convenient playing the video.
Description
Technical Field
The invention belongs to the technical field of streaming media security systems, and particularly relates to a secure playing system of HLS streaming media and a secure playing method of the HLS streaming media.
Background
HLS (HTTP Live Streaming, HTTP-based Streaming media network transport protocol) allows content providers to provide near real-time audiovisual Streaming services to clients through web servers. Its working principle is to split the entire stream into individual small HTTP-based slice files for downloading, only a few at a time. When a streaming media session is started, the client downloads an M3U8 index list file containing metadata for finding available media streams. HLS supports achieving media copyright protection by encrypting slices.
In the prior art, an Advanced Encryption Standard (AES-128) audio and video code stream data Encryption method is provided in an HLS protocol. The server generates slice files of the streaming media, encrypts the slices by using a key of AES-128, and then generates an M3U8 index list file. The M3U8 indexes the URL address containing the encrypted slice and slice key in the list file and then publishes it to the HTTP server. The client downloads and analyzes the M3U8 index list file, and then downloads the slice file and the key corresponding to the slice for decryption and playing.
However, the protection mode is only to encrypt the streaming media slice, which cannot ensure the security of the key file, and the security of the streaming media file is affected by the insecurity of the key file.
Disclosure of Invention
The invention aims to provide a system for safely playing HLS streaming media, which can improve the safety of streaming media files.
The first technical scheme adopted by the invention is that the system for safely playing the HLS streaming media comprises a server module and a client;
the server module comprises a content distribution server, the content distribution server is respectively connected with an identity authentication server and an index list server, a verification module and a token generation module are arranged in the identity authentication server, the index list server is sequentially connected with a key server and an encryption server and forms an encryption closed loop, and the identity authentication server is connected with the encryption server;
the client side is internally provided with a key generation module, a decryption module and a playing module, is connected with the content distribution server through a network and can send out a service request.
The invention is also characterized in that:
the content distribution server can receive a request of a client through a network, has a reverse proxy function, and provides a distribution service instruction.
The identity authentication server can perform identity authentication, generate a corresponding token and update the token, and adopts token-based identity authentication.
The key server can randomly generate the key-ts and can also convert the received token into the key-key through a specified key generation algorithm.
The encryption server can enable the key-ts to encrypt the video slice, and enable the key-key to encrypt the key-ts to obtain the encrypted video slice and the encryption key-ts.
The index list server is internally provided with an M3U8 index list file, and the M3U8 index list file can write the URL address of the encrypted video slice and the URL address of the encryption key-ts.
The client can perform identity authentication to the identity authentication server, the client requests the index list file of M3U8 from the index list server and analyzes the index list file of M3U8, and the client generates a key-key by adopting a specified key generation algorithm; and the client decrypts the encryption key-ts by using the key-key to obtain the key-ts, and decrypts and plays the encrypted video slice by using the key-ts.
The invention adopts another technical scheme that a safe playing method of HLS streaming media uses a safe playing system of HLS streaming media, and is implemented according to the following steps:
step 1, a key server randomly generates a key-ts, and an encryption server encrypts a video slice through the key-ts to obtain an encrypted video slice;
step 4, the client requests the index list server for the M3U8 index list file, and analyzes the M3U8 index list file to obtain an encrypted video slice and an encryption key-ts; meanwhile, the client converts the authentication token into a key-key by using a specified key generation algorithm;
and 5, decrypting the encryption key-ts through the key-key to obtain the key-ts, and decrypting the video slice ciphertext by using the key-ts to realize the playing of the video slice.
In the step 1, the key-ts and the key-key are both 128-bit symmetric keys.
The specific process of the step 2 is as follows: the method comprises the steps that an identity authentication request is sent to a content distribution server through a client, the content distribution server processes the identity authentication request into an identity authentication service instruction, the identity authentication service instruction is transmitted to a verification module for identity verification, the identity authentication service instruction is transmitted to a token generation module after the verification is passed, the identity authentication service instruction is converted into a login token in the token generation module, the login token is transmitted to the client through the content distribution server, the client sends a request to a server module through the login token, the identity authentication server verifies the token, and after the verification is passed, the content distribution server generates an authentication token.
The invention has the beneficial effects that:
by encrypting the slice key, the security of the key is ensured. Meanwhile, a secret key generation algorithm agreed by the client and the server is adopted, and a randomly generated and continuously updated authentication token is generated into a secret key to be used for encrypting and decrypting the video slice secret key, so that the safety of the secret key is further improved, and the safety of the streaming media file is further improved.
In addition, because the symmetric key used for decryption by the client is generated by adopting a specified algorithm, the higher security is achieved, and meanwhile, the complex operation of installing an additional client certificate and the like is avoided, so that the user can keep simple and convenient playing the video.
Drawings
Fig. 1 is a schematic structural diagram of a secure playback system for HLS streaming media according to the present invention;
fig. 2 is a flowchart of a secure playing method for HLS streaming media according to the present invention.
In the figure, 1 is a content distribution server, 2 is an identity authentication server, 3 is an index list server, 4 is a key server, 5 is an encryption server, and 6 is a client.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.
The invention relates to a safe playing system of HLS streaming media, which comprises a server module and a client 6, as shown in figure 1;
the server module comprises a content distribution server 1, the content distribution server 1 is respectively connected with an identity authentication server 2 and an index list server 3, a verification module and a token generation module are arranged in the identity authentication server 2, the index list server 3 is sequentially connected with a key server 4 and an encryption server 5 to form an encryption closed loop, and the identity authentication server 2 is connected with the encryption server 5;
the client 6 is provided with a key generation module, a decryption module and a playing module, and the client 6 is connected with the content distribution server 1 through a network and can send out a service request.
The content distribution server 1 can receive a request of the client 6 through the network, has a reverse proxy function, and provides a distribution service instruction.
The identity authentication server 2 can perform identity authentication, generate a corresponding token, and update the token, and the identity authentication server 2 performs token-based identity authentication.
The key server 4 can randomly generate the key-ts and can also convert the received token into the key-key through a designated key generation algorithm.
The encryption server 5 can encrypt the video slice by the key-ts and encrypt the key-ts by the key-key at the same time, so as to obtain the encrypted video slice and the encryption key-ts.
The index list server 3 has built therein an M3U8 index list file, and the M3U8 index list file is capable of writing URL addresses of encrypted video slices and URL addresses of encryption keys key-ts.
The client 6 can perform identity authentication to the identity authentication server 2, the client 6 requests the index list server 3 for the M3U8 index list file and analyzes the M3U8 index list file, and the client 6 generates a key-key by adopting a specified key generation algorithm; the client 6 decrypts the encryption key-ts by using the key-key to obtain the key-ts, and decrypts and plays the encrypted video slice by using the key-ts.
A secure playing method of HLS streaming media, as shown in fig. 2, uses a secure playing system of HLS streaming media, and is implemented according to the following steps:
step 1, a key server 4 randomly generates a key-ts, and an encryption server 5 encrypts the video slice through the key-ts to obtain an encrypted video slice; the key-ts and key-key are both 128-bit symmetric keys.
the specific process is as follows: the method comprises the steps that an identity authentication request is sent to a content distribution server 1 through a client 6, the content distribution server 1 processes the identity authentication request into an identity authentication service instruction, the identity authentication service instruction is transmitted to a verification module for identity verification, the identity authentication service instruction is transmitted to a token generation module after the verification is passed, the identity authentication service instruction is converted into a login token in the token generation module, the login token is transmitted to the client 6 through the content distribution server, the client 6 sends the request to a server module through the login token, the identity authentication server 2 verifies the login token, and after the verification is passed, the content distribution server 1 generates an authentication token.
Step 4, the client 6 requests the index list server 3 for the M3U8 index list file, and analyzes the M3U8 index list file to obtain an encrypted video slice and an encryption key-ts; meanwhile, the client 6 converts the authentication token into a key-key with a specified key generation algorithm.
And 5, decrypting the encryption key-ts through the key-key to obtain the key-ts, and decrypting the video slice ciphertext by using the key-ts to realize the playing of the video slice.
Through the mode, the HLS streaming media safe playing system and the HLS streaming media safe playing method provided by the invention have the advantages that the slice key is encrypted, and the security of the key is ensured. Meanwhile, a secret key generation algorithm agreed by the client and the server is adopted, and a randomly generated and continuously updated authentication token is generated into a secret key for encrypting and decrypting a video slice secret key, so that the safety of the secret key is further improved, and the safety of the streaming media file is further improved; in addition, because the symmetric key used for decryption by the client is generated by adopting a specified algorithm, the higher security is achieved, and meanwhile, the complex operation of installing an additional client certificate and the like is avoided, so that the user can keep simple and convenient playing the video.
Claims (7)
1. A safe playing system of HLS streaming media is characterized by comprising a server module and a client (6);
the server module comprises a content distribution server (1), the content distribution server (1) is respectively connected with an identity authentication server (2) and an index list server (3), the identity authentication server (2) is internally provided with a verification module and a token generation module, the index list server (3) is sequentially connected with a key server (4) and an encryption server (5) to form an encryption closed loop, and the identity authentication server (2) is connected with the encryption server (5);
the key server (4) can randomly generate a key-ts and can convert the received token into the key-key through a specified key generation algorithm;
the identity authentication server (2) can perform identity authentication, generate a corresponding token and update the token, and the identity authentication server (2) adopts token-based identity authentication;
the client (6) is internally provided with a key generation module, a decryption module and a playing module, and the client (6) is connected with the content distribution server (1) through a network and can send out a service request;
the content distribution server (1) is capable of receiving a request from a client (6) via a network, has a reverse proxy function, and provides a distribution service instruction.
2. The system for securely playing the HLS streaming media as claimed in claim 1, wherein the encryption server (5) is capable of enabling the key-ts to encrypt the video slice, and enabling the key-key to encrypt the key-ts to obtain the encrypted video slice and the encryption key-ts.
3. The system for secure playback of HLS streaming media according to claim 2, characterized in that the index list server (3) has built in M3U8 index list file, where M3U8 index list file is able to write URL addresses of encrypted video slices and URL addresses of encryption key-ts.
4. The system for secure playback of HLS streaming media according to claim 3, wherein said client (6) is capable of authenticating with said authentication server (2), said client (6) requests the M3U8 index list file from said index list server (3) and parses the M3U8 index list file, said client (6) generates a key-key using a specified key generation algorithm; and the client (6) decrypts the encryption key-ts by using the key-key to obtain the key-ts, and decrypts and plays the encrypted video slice by using the key-ts.
5. A secure playing method for HLS streaming media, which is implemented by using the secure playing system for HLS streaming media according to claim 1, and specifically includes the following steps:
step 1, a key server (4) randomly generates a key-ts, and an encryption server (5) encrypts a video slice through the key-ts to obtain an encrypted video slice;
step 2, the client (6) sends an identity authentication request to the content distribution server (1) and the identity authentication server (2) to obtain a login token, the login token is transmitted to the client (6), the client (6) sends the request to the server module by using the login token, the identity authentication server (2) verifies the login token, generates an authentication token after verification, and transmits the authentication token to the client (6) and the key server (4) respectively;
step 3, the key server (4) generates the authentication token into a key-key through a key generation algorithm, and encrypts the key-ts through the key-key to obtain an encryption key-ts; writing the URL address of the encrypted video slice and the URL address of the encryption key-ts into an M3U8 index list file of an index list server (3);
step 4, the client (6) requests the index list server (3) for the M3U8 index list file, and analyzes the M3U8 index list file to obtain an encrypted video slice and an encryption key-ts; meanwhile, the client (6) converts the authentication token into a key-key by using a specified key generation algorithm;
and 5, decrypting the encryption key-ts through the key-key to obtain the key-ts, and decrypting the video slice ciphertext by using the key-ts to realize the playing of the video slice.
6. The method for safely playing the HLS streaming media as claimed in claim 5, wherein the key-ts and the key-key in step 1 are both 128-bit symmetric keys.
7. The method for safely playing the HLS streaming media according to claim 5, wherein the specific process in the step 2 is as follows: the method comprises the steps that an identity authentication request is sent to a content distribution server (1) through a client (6), the content distribution server (1) processes the identity authentication request into an identity authentication service instruction, the identity authentication service instruction is transmitted to a verification module for identity verification, the identity authentication service instruction is transmitted to a token generation module after the verification is passed, the token generation module is converted into a login token, the login token is transmitted to the client (6) through the content distribution server, the client (6) sends the request to a server module through the login token, the identity authentication server (2) verifies the login token, and after the verification is passed, the content distribution server (1) generates an authentication token.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810590071.XA CN108881205B (en) | 2018-06-08 | 2018-06-08 | HLS streaming media safe playing system and playing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810590071.XA CN108881205B (en) | 2018-06-08 | 2018-06-08 | HLS streaming media safe playing system and playing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108881205A CN108881205A (en) | 2018-11-23 |
CN108881205B true CN108881205B (en) | 2020-11-17 |
Family
ID=64338580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810590071.XA Expired - Fee Related CN108881205B (en) | 2018-06-08 | 2018-06-08 | HLS streaming media safe playing system and playing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108881205B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743170B (en) * | 2018-11-30 | 2021-12-10 | 视联动力信息技术股份有限公司 | Method and device for logging in streaming media and encrypting data transmission |
CN109672670A (en) * | 2018-12-11 | 2019-04-23 | 中新金桥数字科技(北京)有限公司 | A method of based on mobile phone H5 safe web page playing stream media |
TR201909266A2 (en) * | 2019-06-21 | 2019-07-22 | Medianova Internet Hizmetleri Ve Ticaret Anonim Sirketi | A Media Streaming System Compatible with Content Delivery Networks |
CN111294667A (en) * | 2020-03-09 | 2020-06-16 | 联通沃音乐文化有限公司 | Online video anti-theft system and method based on encryption timestamp |
CN112188308B (en) * | 2020-08-31 | 2022-08-12 | 北京火眼目测科技有限公司 | Method and device for generating encrypted video file library |
CN114501069A (en) * | 2020-11-13 | 2022-05-13 | 北京新氧科技有限公司 | HLS-based multimedia playing method, system, device and storage medium |
CN115811625A (en) * | 2021-09-14 | 2023-03-17 | 果核数位股份有限公司 | Streaming media service method and system for customizing information security level |
WO2023039694A1 (en) * | 2021-09-14 | 2023-03-23 | 果核数位股份有限公司 | Streaming service method and system capable of realizing information security level customization |
CN114666616A (en) * | 2022-03-16 | 2022-06-24 | 同方知网数字出版技术股份有限公司 | Low-cost high-confidentiality live broadcast playback method |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1498479A (en) * | 2002-01-31 | 2004-05-19 | ���ṫ˾ | Streaming system for delivering encrypted data and streaming method thereof |
CN1964479A (en) * | 2006-11-24 | 2007-05-16 | 清华大学 | Method for realizing management of digital copyright based on stream media broadcast |
JP2010130054A (en) * | 2008-11-25 | 2010-06-10 | Renesas Electronics Corp | Descrambler, descrambling method and control program |
CN102255886A (en) * | 2011-04-02 | 2011-11-23 | 南京邮电大学 | Encryption and decryption methods of streaming media on-demand system |
CN104283686A (en) * | 2014-05-27 | 2015-01-14 | 深圳市天朗时代科技有限公司 | Digital right management method and system |
CN106464485A (en) * | 2014-02-11 | 2017-02-22 | 爱立信股份有限公司 | System and method for securing content keys delivered in manifest files |
CN106790074A (en) * | 2016-12-21 | 2017-05-31 | 中国传媒大学 | A kind of fine granularity streaming media video encryption and decryption method based on HLS protocol |
CN106936770A (en) * | 2015-12-30 | 2017-07-07 | 玲珑视界科技(北京)有限公司 | A kind of HLS index lists encrypted antitheft catenary system and method |
CN107707504A (en) * | 2016-08-08 | 2018-02-16 | 中国电信股份有限公司 | A kind of player method of Streaming Media, system and server and client side |
CN108038355A (en) * | 2017-12-14 | 2018-05-15 | 安徽新华传媒股份有限公司 | IPTV system for numeral copyright management and its method based on Database Systems on-line authentication |
CN108111876A (en) * | 2017-12-21 | 2018-06-01 | 北京四达时代软件技术股份有限公司 | A kind of LAN video contents of streaming media method for security protection, terminal and server |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5167079B2 (en) * | 2008-11-13 | 2013-03-21 | キヤノン株式会社 | Receiving apparatus and control method thereof |
-
2018
- 2018-06-08 CN CN201810590071.XA patent/CN108881205B/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1498479A (en) * | 2002-01-31 | 2004-05-19 | ���ṫ˾ | Streaming system for delivering encrypted data and streaming method thereof |
CN1964479A (en) * | 2006-11-24 | 2007-05-16 | 清华大学 | Method for realizing management of digital copyright based on stream media broadcast |
JP2010130054A (en) * | 2008-11-25 | 2010-06-10 | Renesas Electronics Corp | Descrambler, descrambling method and control program |
CN102255886A (en) * | 2011-04-02 | 2011-11-23 | 南京邮电大学 | Encryption and decryption methods of streaming media on-demand system |
CN106464485A (en) * | 2014-02-11 | 2017-02-22 | 爱立信股份有限公司 | System and method for securing content keys delivered in manifest files |
CN104283686A (en) * | 2014-05-27 | 2015-01-14 | 深圳市天朗时代科技有限公司 | Digital right management method and system |
CN106936770A (en) * | 2015-12-30 | 2017-07-07 | 玲珑视界科技(北京)有限公司 | A kind of HLS index lists encrypted antitheft catenary system and method |
CN107707504A (en) * | 2016-08-08 | 2018-02-16 | 中国电信股份有限公司 | A kind of player method of Streaming Media, system and server and client side |
CN106790074A (en) * | 2016-12-21 | 2017-05-31 | 中国传媒大学 | A kind of fine granularity streaming media video encryption and decryption method based on HLS protocol |
CN108038355A (en) * | 2017-12-14 | 2018-05-15 | 安徽新华传媒股份有限公司 | IPTV system for numeral copyright management and its method based on Database Systems on-line authentication |
CN108111876A (en) * | 2017-12-21 | 2018-06-01 | 北京四达时代软件技术股份有限公司 | A kind of LAN video contents of streaming media method for security protection, terminal and server |
Also Published As
Publication number | Publication date |
---|---|
CN108881205A (en) | 2018-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108881205B (en) | HLS streaming media safe playing system and playing method | |
US10698985B2 (en) | Extending data confidentiality into a player application | |
CN105939484B (en) | A kind of the encryption playback method and its system of audio-video | |
TWI510066B (en) | Systems and methods for securely streaming media content | |
CN107707504B (en) | Streaming media playing method and system, server and client | |
WO2019153433A1 (en) | Secret key providing method, video playback method, server and client | |
KR101541911B1 (en) | Apparatus and method for providing security service of User Interface | |
JP5021639B2 (en) | Protected content transport using streaming control and transport protocols | |
KR101238477B1 (en) | Delivering policy updates for protected content | |
US20150074393A1 (en) | Method, Apparatus, and System for Implementing Media Data Processing | |
CN109547198B (en) | System for network transmission video file | |
KR20070029864A (en) | Method and apparatus for securely transmitting and receiving data in peer to peer | |
US10181949B2 (en) | Data distributing over network to user devices | |
CN113259720B (en) | Video encryption method and system based on HLS protocol | |
MX2008002829A (en) | Method and apparatus for distribution and synchronization of cryptographic context information. | |
CN101640785B (en) | Encrypting/decrypting system and encrypting/decrypting method for interactive network television | |
CN108768920B (en) | Recorded broadcast data processing method and device | |
US7886160B2 (en) | Information processing apparatus and method, and computer program | |
CN101980500B (en) | Digital signature-based point-to-point flow control method and system | |
EP2713576B1 (en) | Method and device for processing streaming media content | |
CN102694819A (en) | Streaming media transmission method based on broadcast encryption | |
CN111917756B (en) | Encryption system and encryption method of law enforcement recorder based on public key routing | |
JP2013042331A (en) | Unidirectional communication system, method, and program | |
CN112752122B (en) | Video encryption transmission method of intelligent camera and computer readable storage medium | |
CN114189706B (en) | Media playing method, system, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201117 |