CN109275030A - WEB terminal key based on HLS technology obscures incorrect order video encryption method - Google Patents
WEB terminal key based on HLS technology obscures incorrect order video encryption method Download PDFInfo
- Publication number
- CN109275030A CN109275030A CN201811462494.XA CN201811462494A CN109275030A CN 109275030 A CN109275030 A CN 109275030A CN 201811462494 A CN201811462494 A CN 201811462494A CN 109275030 A CN109275030 A CN 109275030A
- Authority
- CN
- China
- Prior art keywords
- key
- web terminal
- file
- video
- obscures
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000005516 engineering process Methods 0.000 title claims abstract description 15
- 238000012795 verification Methods 0.000 claims abstract description 11
- 238000004422 calculation algorithm Methods 0.000 claims description 22
- 230000004048 modification Effects 0.000 claims description 10
- 238000012986 modification Methods 0.000 claims description 10
- 230000008859 change Effects 0.000 claims description 8
- 238000000926 separation method Methods 0.000 claims description 4
- 238000000605 extraction Methods 0.000 claims description 3
- 238000004519 manufacturing process Methods 0.000 claims description 2
- 230000001010 compromised effect Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 14
- 238000004590 computer program Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 230000000694 effects Effects 0.000 description 4
- 241000208340 Araliaceae Species 0.000 description 3
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 3
- 235000003140 Panax quinquefolius Nutrition 0.000 description 3
- 235000008434 ginseng Nutrition 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 238000003860 storage Methods 0.000 description 2
- 238000012549 training Methods 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000739 chaotic effect Effects 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 201000009032 substance abuse Diseases 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses a kind of WEB terminal keys based on HLS technology to obscure incorrect order video encryption method, transport stream parameter and signature parameter including integrating video file using browser in WEB terminal;The m3u8 file of video file is requested from WEB terminal to server;Server carries out signature parameter verification to the request of WEB terminal, judges whether the request of WEB terminal is legal, if legal, server continues key verification to the request of WEB terminal, and WEB terminal obtains correct m3u8 file and legal key by request;WEB terminal uses obtained legal key, the correct m3u8 file of normal play.If illegal, WEB terminal can not request correct m3u8 file, can not also play correct m3u8 file.The problem of high safety and reliability of the present invention, effective solution HLS key leakage, file is stayed for audio-video, the safety of its propagation is improved, prevents the audio/video flow file from getting compromised or usurping.
Description
Technical field
The invention discloses a kind of WEB terminal keys based on HLS technology to obscure incorrect order video encryption method, is related to audio-video
Safe and secret technical field.
Background technique
Fast propagation Internet-based, the multimedia application of audio-video class is increasingly at indispensable in for people's lives
Part.Short net cast software such as trill or quick worker etc APP program it is hot, greatly expand audio video transmission technology
Usage scenario.But the problem of network audio-video piracy and robber's link, is also following.Such as by taking Online Video training as an example,
Training organization moves to copyright course original under line in line platform, but horizontal competition opponent or other network audiences,
Utilize downloading, piracy, steal link etc. various ways and means, it is easy to acquisition video content, thus to author generate not
Benefit influences.
In the prior art, for abuses such as network audio-video piracy, drainage flows, there has also been the existing skills of some maturations
Art, such as:
Application No. is the Chinese patent applications of 201711398364.X " a kind of safe retransmission method of video flowing and system " to disclose
A kind of method that video flowing forwards safely, comprising: certification and client and forwarding between forwarding platform and remote camera
Certification between platform.Certification, client between forwarding platform and remote camera and the verification process between forwarding platform
Unanimously.Bidirectional safe certification is realized by asymmetric encryption techniques between end and end.It is final guarantee illegal user can not with it is long-range
Video camera, forwarding service platform interact.
Application No. is 201810008483.8 Chinese patent application " a kind of method for authenticating and device of video flowing address "
Provide the method for authenticating and device of a kind of video flowing address, method therein includes: to receive the log-on message of client, and root
The first information for authentication is generated according to the log-on message;The first information for authentication is encrypted, generates and uses
Second information for authenticating, solution confidential information and user authentication are sent in the second information of authentication, and to the client
Information;Receive the video flowing address request information that the client is sent;Institute is obtained according to the video flowing address request information
The first authentication values are stated, and the second authentication values are determined according to the first information for authentication and the user authentication information;
Judge whether first authentication values match with second authentication values, if it does, making the client by video flowing
Location authentication.
Application No. is the 201810049368.5 Chinese patent application " video-encryptions based on AES-CTR and chaos algorithm
Method and video flowing method for safety monitoring ", chaos iteration initial key Kc is sent into Logistic pseudorandom sequence first by this method
In column generator, each iteration of chaotic maps can produce 32bits binary number, after 4 iteration respectively with Counter value
Result is subjected to the processing of standard AES block encryption, AES key Key after XOR operation;After encryption again with first 128bits
Clear packets block carries out exclusive or and handles to obtain ciphertext block block;And so on, using concurrent operation by the key of H.264 video flowing
Frame is all by being encrypted to ensure that the high securities of data.
By taking the above-mentioned prior art as an example, the cipher mode being directed to it is common include:
Broadcast address is hidden, and website is based on http protocol, and audio-video is propagated also based on http protocol.Due to http agreement
Opening, many browsers or plug-in unit all develop corresponding sniff download function, however by the way of address hiding, address
Be it is after all fixed, be relatively easy to be downloaded.
It is verified using dynamic url, is usually deposited using the timeliness prevention downloading and robber's chain, such download address of dynamic url
In the timestamp verification of parameter verification, such as sign, still, computation rule in the prior art is generally all fairly simple, is easy
Penetrated forgery.
Video playing is carried out using the agreement of non-http, such as stability and safety more preferably rtmp agreement.But rtmp
Agreement needs dedicated server, as FMS or the red5 of open source, technical costs are relatively high.
Broadcast address custom algorithm is encoded using URL coding encrypting, creates the broadcast address of proprietary protocol, playing needs
Want dedicated player into row address decoding.Generally existing Encryption Algorithm is too simple in this method.
HLS (HTTPLiveStreaming) is a kind of dynamic code rate adaptive technique, the index text including a m3u (8)
Part, TS media slicing file and key encrypt string file.This method can be cross-platform with effective solution flash compatibility issue
And loophole, while realizing the video protection of web terminal and mobile terminal.It is relatively broad using appleHLS agreement at present.
Summary of the invention
The technical problems to be solved by the present invention are: in view of the drawbacks of the prior art, provide a kind of based on HLS technology
WEB terminal key obscures incorrect order video encryption method, and based on the HLS protocol after customized optimization, the side of incorrect order is obscured with key
Formula carries out key handling, realizes video-encryption.
The present invention uses following technical scheme to solve above-mentioned technical problem:
A kind of WEB terminal key based on HLS technology obscures incorrect order video encryption method, and described method includes following steps:
Step 1: the transport stream parameter (ts parameter) and signature parameter (sign ginseng of video file are integrated using browser in WEB terminal
Number);
Step 2: requesting the m3u8 file of video file from WEB terminal to server;
Step 3: server carries out signature parameter verification to the request of WEB terminal, judge whether the request of WEB terminal is legal, if closed
Method is then transferred to step 4;If non-rule is transferred to step 5;
Step 4: server carries out key verification to the request of WEB terminal, key therein carries out coding encrypting by obscuring incorrect order;
WEB terminal obtains correct m3u8 file and legal key by request;WEB terminal is using obtained legal key, and normal play is just
True m3u8 file;
Step 5: WEB terminal can not request correct m3u8 file, correct m3u8 file can not be also played.
As a further preferred embodiment of the present invention, in the step 4, the key obscures incorrect order and carries out coding encrypting
Method and step include:
16 byte key in step 401, the extraction primary agreement of HLS;
Step 402, using Zig-Zag scrambling algorithm, key is carried out to 16 byte key and obscures incorrect order;
Step 403 passes through pure scrambling algorithm scramble byte stream, and key obtains 20 byte key after obscuring;
Step 404 is decrypted using specific broadcast decoder device;
Original cipher key is gone back in step 405, reset;
Step 406 decodes playing audio-video using reset key.
It is described to use Zig-Zag scrambling algorithm in the step 402 as a further preferred embodiment of the present invention, to 16
Byte key carries out the specific method that key obscures incorrect order specifically:
Zig-Zag scanning sequency is replaced using a random scrambling sequence, each 8 × 8 pieces of DCT coefficient is mapped to
One 1 × 64 vector, specific steps include:
Step (1) generates the scrambling sequence table that a radix is 64;
DC coefficient is divided into two numbers for being less than given threshold by step (2);
8 × 8 pieces through separating treatment are mapped to 1 × 64 sequence with random scrambling sequence table by step (3).
As a further preferred embodiment of the present invention, the method for obscuring incorrect order to 16 byte key progress key is also wrapped
It includes:
Every 8 blocks are divided into one group, 8 DC coefficients are combined, then use des encryption;
The result of encryption is mapped back in 8 blocks by byte, and then the step (1) is to step (3), with separation process and scramble
Every piece is encrypted.
As a further preferred embodiment of the present invention, the specific method of the step 404 includes: to be set by pure scrambling algorithm
Random byte stream, the radix of scramble keying sequence according to level of confidentiality and application demand dynamically changeable, using 64 several scrambling sequences or
1/8 scrambling sequence of one long I frame.
As a further preferred embodiment of the present invention, the encryption method further include: change is used to video file
The video encryption algorithm of Huffman code table is handled, and specific method includes:
For the video encoding standard that entropy coding is encoded with Huffman, will be used after the modification of general Huffman code table, after modification
Special Huffman code table as key;
Illicit reception side cannot be correctly decoded video information without this special code table.
As a further preferred embodiment of the present invention, it is corresponding to change each integrated mode for the change Huffman code table
Huffman code word is made by the probability that various hyte syntypes in statistics code stream occur, high to the frequency of occurrences in data flow
Hyte syntype corresponds to short code word, and the low hyte syntype of the frequency of occurrences corresponds to long code word.
The invention adopts the above technical scheme compared with prior art, has following technical effect that of the invention safe and reliable
Property it is high, the problem of effective solution HLS key leakage, stay file for audio-video, improve the safety of its propagation, prevent
Audio/video flow file gets compromised or usurps.
Detailed description of the invention
Fig. 1 is method flow schematic diagram of the invention.
Fig. 2 is in a specific embodiment of the invention, and m3u8 file obscures incorrect order using key and carries out coding encrypting
Effect diagram.
Fig. 3 is in a specific embodiment of the invention, and broadcast decoder device uses interface schematic diagram.
Fig. 4 is in the method for the invention, and key obscures the method and step schematic diagram that incorrect order carries out coding encrypting.
Specific embodiment
Embodiments of the present invention are described below in detail, the example of the embodiment is shown in the accompanying drawings, wherein from beginning
Same or similar element or element with the same or similar functions are indicated to same or similar label eventually.Below by ginseng
The embodiment for examining attached drawing description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Technical solution of the present invention is described in further detail with reference to the accompanying drawing:
Method flow schematic diagram of the invention is as shown in Figure 1, which comprises
Step 1: the transport stream parameter (ts parameter) and signature parameter (sign ginseng of video file are integrated using browser in WEB terminal
Number);
Step 2: requesting the m3u8 file of video file from WEB terminal to server;
Step 3: server carries out signature parameter verification to the request of WEB terminal, judge whether the request of WEB terminal is legal, if closed
Method is then transferred to step 4;If non-rule is transferred to step 5;
Step 4: server carries out key verification to the request of WEB terminal, key therein carries out coding encrypting by obscuring incorrect order;
WEB terminal obtains correct m3u8 file and legal key by request;WEB terminal is using obtained legal key, and normal play is just
True m3u8 file;
Step 5: WEB terminal can not request correct m3u8 file, correct m3u8 file can not be also played.
In one particular embodiment of the present invention, m3u8 file obscures the effect that incorrect order carries out coding encrypting using key
Schematic diagram is as shown in Fig. 2, broadcast decoder device is as shown in Figure 3 using interface schematic diagram.In this embodiment, as schemed institute
Show, the address of key is 20 byte key when accessing first time, and " f8864726x4r6f34w4r36 " is visited thereafter every time
It asks and is all different 16 byte key.In fact, true key is hidden in inside the 20 byte key of first time, then generate
16 byte key are false keys.
In the method for the invention, key obscures incorrect order and carries out the method and step schematic diagram of coding encrypting as shown in figure 4, packet
Include step:
16 byte key in step 401, the extraction primary agreement of HLS;
Step 402, using Zig-Zag scrambling algorithm, key is carried out to 16 byte key and obscures incorrect order;
Step 403 passes through pure scrambling algorithm scramble byte stream, and key obtains 20 byte key after obscuring;
Step 404 is decrypted using specific broadcast decoder device;
Original cipher key is gone back in step 405, reset;
Step 406 decodes playing audio-video using reset key.
The Zig-Zag scrambling algorithm replaces Zig-Zag scanning sequency using a random scrambling sequence, will
Each 8 × 8 pieces of DCT coefficient is mapped to 1 × 64 vector.
Rudimentary algorithm is made of three steps, and steps are as follows:
(1) the scrambling sequence table that a radix is 64 is generated;
(2) DC coefficient is divided into the number of two smaller values.Assuming that DC is binary number d7d6d5d4d3d2d1d0, two are divided it into
Number d7d6d5d4 and d3d2d1d0, their range is all in [0,15].Then DC coefficient is set to d7d6d5d4, it will be former last
One AC coefficient is set to d3d2d1d0.This separating treatment is based on following two points: (1) usually DC coefficient value is much larger than AC coefficient
Value, therefore be easily identified after random ordering.Separation is difficult to distinguish from AC coefficient after becoming smaller;(2) the last AC system
Number effect very littles, usually 0, it can be used to store d3d2d1d0, when recovery takes 0 value, does not influence image quality, does not also increase number
According to amount.
(3) 8 × 8 pieces through separating treatment are mapped to 1 × 64 sequence (vector) with random scrambling sequence table.
In a preferred embodiment of the invention, using the safety of other two kinds of addition methods enhancing algorithm
(security):
Method 1: being divided into one group for every 8 blocks, and 8 DC coefficients are combined (every coefficient 8, lucky 64), are then transported
Use des encryption.The result of encryption is mapped back in 8 blocks by byte, then (is pressed 1~3 step above) with separation process and is set
Disorderly every piece is encrypted.
Method 2: generating two different scrambling sequence tables (Tables 1 and 2), and to each 8 × 8 pieces of throwing coins, reverse side is used
Table 1, front table 2.The positive and negative sequence for throwing coin generation and two tables are as password.
As a further preferred embodiment of the present invention, the specific method of the step 404 includes: to be set by pure scrambling algorithm
Random byte stream, the radix of scramble keying sequence according to level of confidentiality and application demand dynamically changeable, using 64 several scrambling sequences or
1/8 scrambling sequence of one long I frame.
As a further preferred embodiment of the present invention, the encryption method further include: change is used to video file
The video encryption algorithm of Huffman code table is handled, and specific method includes: the video for entropy coding Huffman coding
Coding standard will use after the modification of general Huffman code table, and modified special Huffman code table is as key;Illicit reception
Side cannot be correctly decoded video information without this special code table.The change Huffman code table, it is corresponding to change each integrated mode
Huffman code word is made by the probability that various hyte syntypes in statistics code stream occur, high to the frequency of occurrences in data flow
Hyte syntype corresponds to short code word, and the low hyte syntype of the frequency of occurrences corresponds to long code word.
The algorithm does not increase calculation amount completely.Suitable for the various videos and image compression encoding for using Huffman to encode
Standard and algorithm.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications can be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention
The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention
And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.
Claims (7)
1. a kind of WEB terminal key based on HLS technology obscures incorrect order video encryption method, which is characterized in that the method includes
Following steps:
Step 1: the transport stream parameter and signature parameter of video file are integrated using browser in WEB terminal;
Step 2: requesting the m3u8 file of video file from WEB terminal to server;
Step 3: server carries out signature parameter verification to the request of WEB terminal, judge whether the request of WEB terminal is legal, if closed
Method is then transferred to step 4;If non-rule is transferred to step 5;
Step 4: server carries out key verification to the request of WEB terminal, key therein carries out coding encrypting by obscuring incorrect order;
WEB terminal obtains correct m3u8 file and legal key by request;WEB terminal is using obtained legal key, and normal play is just
True m3u8 file;
Step 5: WEB terminal can not request correct m3u8 file, correct m3u8 file can not be also played.
2. a kind of WEB terminal key based on HLS technology as described in claim 1 obscures incorrect order video encryption method, feature
It is, in the step 4, the method and step that the key obscures incorrect order progress coding encrypting includes:
16 byte key in step 401, the extraction primary agreement of HLS;
Step 402, using Zig-Zag scrambling algorithm, key is carried out to 16 byte key and obscures incorrect order;
Step 403 passes through pure scrambling algorithm scramble byte stream, and key obtains 20 byte key after obscuring;
Step 404 is decrypted using specific broadcast decoder device;
Original cipher key is gone back in step 405, reset;
Step 406 decodes playing audio-video using reset key.
3. a kind of WEB terminal key based on HLS technology as claimed in claim 2 obscures incorrect order video encryption method, feature
It is, it is described to use Zig-Zag scrambling algorithm in the step 402, key is carried out to 16 byte key and obscures the specific of incorrect order
Method specifically:
Zig-Zag scanning sequency is replaced using a random scrambling sequence, each 8 × 8 pieces of DCT coefficient is mapped to
One 1 × 64 vector, specific steps include:
Step (1) generates the scrambling sequence table that a radix is 64;
DC coefficient is divided into two numbers for being less than given threshold by step (2);
8 × 8 pieces through separating treatment are mapped to 1 × 64 sequence with random scrambling sequence table by step (3).
4. a kind of WEB terminal key based on HLS technology as claimed in claim 3 obscures incorrect order video encryption method, feature
It is, it is described that 16 byte key are carried out with the method that key obscures incorrect order further include:
Every 8 blocks are divided into one group, 8 DC coefficients are combined, then use des encryption;
The result of encryption is mapped back in 8 blocks by byte, and then the step (1) is to step (3), with separation process and scramble
Every piece is encrypted.
5. a kind of WEB terminal key based on HLS technology as claimed in claim 2 obscures incorrect order video encryption method, feature
It is, the specific method of the step 404 includes: by pure scrambling algorithm scramble byte stream, the radix root of scramble keying sequence
According to level of confidentiality and application demand dynamically changeable, 1/8 scrambling sequence of the long I frame of 64 several scrambling sequences or one is used.
6. a kind of WEB terminal key based on HLS technology as described in claim 1 obscures incorrect order video encryption method, feature
It is, the encryption method further include: video file is handled using the video encryption algorithm for changing Huffman code table,
Specific method includes:
For the video encoding standard that entropy coding is encoded with Huffman, will be used after the modification of general Huffman code table, after modification
Special Huffman code table as key;
Illicit reception side cannot be correctly decoded video information without this special code table.
7. a kind of WEB terminal key based on HLS technology as claimed in claim 6 obscures incorrect order video encryption method, feature
Be: the change Huffman code table changes the corresponding Huffman code word of each integrated mode, passes through various positions in statistics code stream
The probability production that integrated mode occurs, the hyte syntype high to the frequency of occurrences in data flow correspond to short code word, and the frequency of occurrences is low
Hyte syntype correspond to long code word.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811462494.XA CN109275030A (en) | 2018-12-03 | 2018-12-03 | WEB terminal key based on HLS technology obscures incorrect order video encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811462494.XA CN109275030A (en) | 2018-12-03 | 2018-12-03 | WEB terminal key based on HLS technology obscures incorrect order video encryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109275030A true CN109275030A (en) | 2019-01-25 |
Family
ID=65186660
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811462494.XA Pending CN109275030A (en) | 2018-12-03 | 2018-12-03 | WEB terminal key based on HLS technology obscures incorrect order video encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109275030A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113163232A (en) * | 2021-04-21 | 2021-07-23 | 杭州叙简科技股份有限公司 | Chaos-based multi-user video file encryption system and method |
CN115002089A (en) * | 2022-06-30 | 2022-09-02 | 兰州乐智教育科技有限责任公司 | Streaming media transmission method and device, electronic equipment and storage medium |
CN116827914A (en) * | 2023-04-19 | 2023-09-29 | 广州好智信息技术有限公司 | Method and system for preventing hijacking and stealing of video information of mobile terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130163758A1 (en) * | 2011-12-22 | 2013-06-27 | Viswanathan Swaminathan | Methods and Apparatus for Key Delivery in HTTP Live Streaming |
CN106331751A (en) * | 2016-08-31 | 2017-01-11 | 广州易方信息科技有限公司 | Online encrypted slice video playing method based on iOS operating system |
CN107197328A (en) * | 2017-06-11 | 2017-09-22 | 成都吱吖科技有限公司 | A kind of interactive panoramic video safe transmission method and device for being related to virtual reality |
-
2018
- 2018-12-03 CN CN201811462494.XA patent/CN109275030A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130163758A1 (en) * | 2011-12-22 | 2013-06-27 | Viswanathan Swaminathan | Methods and Apparatus for Key Delivery in HTTP Live Streaming |
CN106331751A (en) * | 2016-08-31 | 2017-01-11 | 广州易方信息科技有限公司 | Online encrypted slice video playing method based on iOS operating system |
CN107197328A (en) * | 2017-06-11 | 2017-09-22 | 成都吱吖科技有限公司 | A kind of interactive panoramic video safe transmission method and device for being related to virtual reality |
Non-Patent Citations (3)
Title |
---|
PM_605: "在线视频常见加密方式及安全性透析", 《CSDN》 * |
保利威: "视频版权保护体系之解密密钥-web授权", 《保利威产品动态》 * |
蒋拥军: "面向国家关键应用的视频基础平台设计", 《中国优秀博硕士学位论文全文数据库 (硕士)》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113163232A (en) * | 2021-04-21 | 2021-07-23 | 杭州叙简科技股份有限公司 | Chaos-based multi-user video file encryption system and method |
CN115002089A (en) * | 2022-06-30 | 2022-09-02 | 兰州乐智教育科技有限责任公司 | Streaming media transmission method and device, electronic equipment and storage medium |
CN115002089B (en) * | 2022-06-30 | 2023-09-19 | 兰州乐智教育科技有限责任公司 | Streaming media transmission method and device, electronic equipment and storage medium |
CN116827914A (en) * | 2023-04-19 | 2023-09-29 | 广州好智信息技术有限公司 | Method and system for preventing hijacking and stealing of video information of mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100442835C (en) | Digital copyright and digital watermark protecting method for video program | |
CN107707504B (en) | Streaming media playing method and system, server and client | |
CN110401818B (en) | Safe communication system for power video transmission | |
CN106331751B (en) | A kind of online encrypted slice video broadcasting method based on iOS operating system | |
CN101719910B (en) | Terminal equipment for realizing content protection and transmission method thereof | |
CN101977190B (en) | Digital content encryption transmission method and server side | |
JP2008011535A (en) | Device and method for providing video stream having integrity | |
CN108111876A (en) | A kind of LAN video contents of streaming media method for security protection, terminal and server | |
WO2017016447A1 (en) | Two-dimensional code mask encryption and decryption method and system | |
US20170353745A1 (en) | Secure media player | |
CN109275030A (en) | WEB terminal key based on HLS technology obscures incorrect order video encryption method | |
WO2015024426A1 (en) | Identity authentication system, apparatus, and method, and identity authentication request apparatus | |
EP2832102A1 (en) | Methods and systems for cryptographic access control of video | |
CN109348293A (en) | The end APP key based on HLS technology obscures incorrect order video encryption method | |
CN105704545A (en) | Secret key synchronizing information transmission method based on H.264 video stream | |
CN100401769C (en) | Method for enciphering and deciphering living-broadcasting flow-medium data | |
JP2007318745A (en) | Content distribution system | |
CN109547198A (en) | The method and system of network transmission video file | |
CN103237010A (en) | Server side for providing digital content in encryption mode | |
CN106791923B (en) | A kind of stream of video frames processing method and video server | |
CN103237011B (en) | Digital content encryption transmission method and server end | |
CN109218837A (en) | A kind of method and apparatus showing virtual present special efficacy | |
CN111081338A (en) | Safe human health parameter acquisition method | |
CN104272748B (en) | anti-encrypted watermark | |
KR102236897B1 (en) | Video data protection system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190125 |