CN109275030A - WEB terminal key based on HLS technology obscures incorrect order video encryption method - Google Patents

WEB terminal key based on HLS technology obscures incorrect order video encryption method Download PDF

Info

Publication number
CN109275030A
CN109275030A CN201811462494.XA CN201811462494A CN109275030A CN 109275030 A CN109275030 A CN 109275030A CN 201811462494 A CN201811462494 A CN 201811462494A CN 109275030 A CN109275030 A CN 109275030A
Authority
CN
China
Prior art keywords
key
web terminal
file
video
obscures
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811462494.XA
Other languages
Chinese (zh)
Inventor
刘云恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Forest Police College
Original Assignee
Nanjing Forest Police College
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Forest Police College filed Critical Nanjing Forest Police College
Priority to CN201811462494.XA priority Critical patent/CN109275030A/en
Publication of CN109275030A publication Critical patent/CN109275030A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a kind of WEB terminal keys based on HLS technology to obscure incorrect order video encryption method, transport stream parameter and signature parameter including integrating video file using browser in WEB terminal;The m3u8 file of video file is requested from WEB terminal to server;Server carries out signature parameter verification to the request of WEB terminal, judges whether the request of WEB terminal is legal, if legal, server continues key verification to the request of WEB terminal, and WEB terminal obtains correct m3u8 file and legal key by request;WEB terminal uses obtained legal key, the correct m3u8 file of normal play.If illegal, WEB terminal can not request correct m3u8 file, can not also play correct m3u8 file.The problem of high safety and reliability of the present invention, effective solution HLS key leakage, file is stayed for audio-video, the safety of its propagation is improved, prevents the audio/video flow file from getting compromised or usurping.

Description

WEB terminal key based on HLS technology obscures incorrect order video encryption method
Technical field
The invention discloses a kind of WEB terminal keys based on HLS technology to obscure incorrect order video encryption method, is related to audio-video Safe and secret technical field.
Background technique
Fast propagation Internet-based, the multimedia application of audio-video class is increasingly at indispensable in for people's lives Part.Short net cast software such as trill or quick worker etc APP program it is hot, greatly expand audio video transmission technology Usage scenario.But the problem of network audio-video piracy and robber's link, is also following.Such as by taking Online Video training as an example, Training organization moves to copyright course original under line in line platform, but horizontal competition opponent or other network audiences, Utilize downloading, piracy, steal link etc. various ways and means, it is easy to acquisition video content, thus to author generate not Benefit influences.
In the prior art, for abuses such as network audio-video piracy, drainage flows, there has also been the existing skills of some maturations Art, such as:
Application No. is the Chinese patent applications of 201711398364.X " a kind of safe retransmission method of video flowing and system " to disclose A kind of method that video flowing forwards safely, comprising: certification and client and forwarding between forwarding platform and remote camera Certification between platform.Certification, client between forwarding platform and remote camera and the verification process between forwarding platform Unanimously.Bidirectional safe certification is realized by asymmetric encryption techniques between end and end.It is final guarantee illegal user can not with it is long-range Video camera, forwarding service platform interact.
Application No. is 201810008483.8 Chinese patent application " a kind of method for authenticating and device of video flowing address " Provide the method for authenticating and device of a kind of video flowing address, method therein includes: to receive the log-on message of client, and root The first information for authentication is generated according to the log-on message;The first information for authentication is encrypted, generates and uses Second information for authenticating, solution confidential information and user authentication are sent in the second information of authentication, and to the client Information;Receive the video flowing address request information that the client is sent;Institute is obtained according to the video flowing address request information The first authentication values are stated, and the second authentication values are determined according to the first information for authentication and the user authentication information; Judge whether first authentication values match with second authentication values, if it does, making the client by video flowing Location authentication.
Application No. is the 201810049368.5 Chinese patent application " video-encryptions based on AES-CTR and chaos algorithm Method and video flowing method for safety monitoring ", chaos iteration initial key Kc is sent into Logistic pseudorandom sequence first by this method In column generator, each iteration of chaotic maps can produce 32bits binary number, after 4 iteration respectively with Counter value Result is subjected to the processing of standard AES block encryption, AES key Key after XOR operation;After encryption again with first 128bits Clear packets block carries out exclusive or and handles to obtain ciphertext block block;And so on, using concurrent operation by the key of H.264 video flowing Frame is all by being encrypted to ensure that the high securities of data.
By taking the above-mentioned prior art as an example, the cipher mode being directed to it is common include:
Broadcast address is hidden, and website is based on http protocol, and audio-video is propagated also based on http protocol.Due to http agreement Opening, many browsers or plug-in unit all develop corresponding sniff download function, however by the way of address hiding, address Be it is after all fixed, be relatively easy to be downloaded.
It is verified using dynamic url, is usually deposited using the timeliness prevention downloading and robber's chain, such download address of dynamic url In the timestamp verification of parameter verification, such as sign, still, computation rule in the prior art is generally all fairly simple, is easy Penetrated forgery.
Video playing is carried out using the agreement of non-http, such as stability and safety more preferably rtmp agreement.But rtmp Agreement needs dedicated server, as FMS or the red5 of open source, technical costs are relatively high.
Broadcast address custom algorithm is encoded using URL coding encrypting, creates the broadcast address of proprietary protocol, playing needs Want dedicated player into row address decoding.Generally existing Encryption Algorithm is too simple in this method.
HLS (HTTPLiveStreaming) is a kind of dynamic code rate adaptive technique, the index text including a m3u (8) Part, TS media slicing file and key encrypt string file.This method can be cross-platform with effective solution flash compatibility issue And loophole, while realizing the video protection of web terminal and mobile terminal.It is relatively broad using appleHLS agreement at present.
Summary of the invention
The technical problems to be solved by the present invention are: in view of the drawbacks of the prior art, provide a kind of based on HLS technology WEB terminal key obscures incorrect order video encryption method, and based on the HLS protocol after customized optimization, the side of incorrect order is obscured with key Formula carries out key handling, realizes video-encryption.
The present invention uses following technical scheme to solve above-mentioned technical problem:
A kind of WEB terminal key based on HLS technology obscures incorrect order video encryption method, and described method includes following steps:
Step 1: the transport stream parameter (ts parameter) and signature parameter (sign ginseng of video file are integrated using browser in WEB terminal Number);
Step 2: requesting the m3u8 file of video file from WEB terminal to server;
Step 3: server carries out signature parameter verification to the request of WEB terminal, judge whether the request of WEB terminal is legal, if closed Method is then transferred to step 4;If non-rule is transferred to step 5;
Step 4: server carries out key verification to the request of WEB terminal, key therein carries out coding encrypting by obscuring incorrect order; WEB terminal obtains correct m3u8 file and legal key by request;WEB terminal is using obtained legal key, and normal play is just True m3u8 file;
Step 5: WEB terminal can not request correct m3u8 file, correct m3u8 file can not be also played.
As a further preferred embodiment of the present invention, in the step 4, the key obscures incorrect order and carries out coding encrypting Method and step include:
16 byte key in step 401, the extraction primary agreement of HLS;
Step 402, using Zig-Zag scrambling algorithm, key is carried out to 16 byte key and obscures incorrect order;
Step 403 passes through pure scrambling algorithm scramble byte stream, and key obtains 20 byte key after obscuring;
Step 404 is decrypted using specific broadcast decoder device;
Original cipher key is gone back in step 405, reset;
Step 406 decodes playing audio-video using reset key.
It is described to use Zig-Zag scrambling algorithm in the step 402 as a further preferred embodiment of the present invention, to 16 Byte key carries out the specific method that key obscures incorrect order specifically:
Zig-Zag scanning sequency is replaced using a random scrambling sequence, each 8 × 8 pieces of DCT coefficient is mapped to One 1 × 64 vector, specific steps include:
Step (1) generates the scrambling sequence table that a radix is 64;
DC coefficient is divided into two numbers for being less than given threshold by step (2);
8 × 8 pieces through separating treatment are mapped to 1 × 64 sequence with random scrambling sequence table by step (3).
As a further preferred embodiment of the present invention, the method for obscuring incorrect order to 16 byte key progress key is also wrapped It includes:
Every 8 blocks are divided into one group, 8 DC coefficients are combined, then use des encryption;
The result of encryption is mapped back in 8 blocks by byte, and then the step (1) is to step (3), with separation process and scramble Every piece is encrypted.
As a further preferred embodiment of the present invention, the specific method of the step 404 includes: to be set by pure scrambling algorithm Random byte stream, the radix of scramble keying sequence according to level of confidentiality and application demand dynamically changeable, using 64 several scrambling sequences or 1/8 scrambling sequence of one long I frame.
As a further preferred embodiment of the present invention, the encryption method further include: change is used to video file The video encryption algorithm of Huffman code table is handled, and specific method includes:
For the video encoding standard that entropy coding is encoded with Huffman, will be used after the modification of general Huffman code table, after modification Special Huffman code table as key;
Illicit reception side cannot be correctly decoded video information without this special code table.
As a further preferred embodiment of the present invention, it is corresponding to change each integrated mode for the change Huffman code table Huffman code word is made by the probability that various hyte syntypes in statistics code stream occur, high to the frequency of occurrences in data flow Hyte syntype corresponds to short code word, and the low hyte syntype of the frequency of occurrences corresponds to long code word.
The invention adopts the above technical scheme compared with prior art, has following technical effect that of the invention safe and reliable Property it is high, the problem of effective solution HLS key leakage, stay file for audio-video, improve the safety of its propagation, prevent Audio/video flow file gets compromised or usurps.
Detailed description of the invention
Fig. 1 is method flow schematic diagram of the invention.
Fig. 2 is in a specific embodiment of the invention, and m3u8 file obscures incorrect order using key and carries out coding encrypting Effect diagram.
Fig. 3 is in a specific embodiment of the invention, and broadcast decoder device uses interface schematic diagram.
Fig. 4 is in the method for the invention, and key obscures the method and step schematic diagram that incorrect order carries out coding encrypting.
Specific embodiment
Embodiments of the present invention are described below in detail, the example of the embodiment is shown in the accompanying drawings, wherein from beginning Same or similar element or element with the same or similar functions are indicated to same or similar label eventually.Below by ginseng The embodiment for examining attached drawing description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Technical solution of the present invention is described in further detail with reference to the accompanying drawing:
Method flow schematic diagram of the invention is as shown in Figure 1, which comprises
Step 1: the transport stream parameter (ts parameter) and signature parameter (sign ginseng of video file are integrated using browser in WEB terminal Number);
Step 2: requesting the m3u8 file of video file from WEB terminal to server;
Step 3: server carries out signature parameter verification to the request of WEB terminal, judge whether the request of WEB terminal is legal, if closed Method is then transferred to step 4;If non-rule is transferred to step 5;
Step 4: server carries out key verification to the request of WEB terminal, key therein carries out coding encrypting by obscuring incorrect order; WEB terminal obtains correct m3u8 file and legal key by request;WEB terminal is using obtained legal key, and normal play is just True m3u8 file;
Step 5: WEB terminal can not request correct m3u8 file, correct m3u8 file can not be also played.
In one particular embodiment of the present invention, m3u8 file obscures the effect that incorrect order carries out coding encrypting using key Schematic diagram is as shown in Fig. 2, broadcast decoder device is as shown in Figure 3 using interface schematic diagram.In this embodiment, as schemed institute Show, the address of key is 20 byte key when accessing first time, and " f8864726x4r6f34w4r36 " is visited thereafter every time It asks and is all different 16 byte key.In fact, true key is hidden in inside the 20 byte key of first time, then generate 16 byte key are false keys.
In the method for the invention, key obscures incorrect order and carries out the method and step schematic diagram of coding encrypting as shown in figure 4, packet Include step:
16 byte key in step 401, the extraction primary agreement of HLS;
Step 402, using Zig-Zag scrambling algorithm, key is carried out to 16 byte key and obscures incorrect order;
Step 403 passes through pure scrambling algorithm scramble byte stream, and key obtains 20 byte key after obscuring;
Step 404 is decrypted using specific broadcast decoder device;
Original cipher key is gone back in step 405, reset;
Step 406 decodes playing audio-video using reset key.
The Zig-Zag scrambling algorithm replaces Zig-Zag scanning sequency using a random scrambling sequence, will Each 8 × 8 pieces of DCT coefficient is mapped to 1 × 64 vector.
Rudimentary algorithm is made of three steps, and steps are as follows:
(1) the scrambling sequence table that a radix is 64 is generated;
(2) DC coefficient is divided into the number of two smaller values.Assuming that DC is binary number d7d6d5d4d3d2d1d0, two are divided it into Number d7d6d5d4 and d3d2d1d0, their range is all in [0,15].Then DC coefficient is set to d7d6d5d4, it will be former last One AC coefficient is set to d3d2d1d0.This separating treatment is based on following two points: (1) usually DC coefficient value is much larger than AC coefficient Value, therefore be easily identified after random ordering.Separation is difficult to distinguish from AC coefficient after becoming smaller;(2) the last AC system Number effect very littles, usually 0, it can be used to store d3d2d1d0, when recovery takes 0 value, does not influence image quality, does not also increase number According to amount.
(3) 8 × 8 pieces through separating treatment are mapped to 1 × 64 sequence (vector) with random scrambling sequence table.
In a preferred embodiment of the invention, using the safety of other two kinds of addition methods enhancing algorithm (security):
Method 1: being divided into one group for every 8 blocks, and 8 DC coefficients are combined (every coefficient 8, lucky 64), are then transported Use des encryption.The result of encryption is mapped back in 8 blocks by byte, then (is pressed 1~3 step above) with separation process and is set Disorderly every piece is encrypted.
Method 2: generating two different scrambling sequence tables (Tables 1 and 2), and to each 8 × 8 pieces of throwing coins, reverse side is used Table 1, front table 2.The positive and negative sequence for throwing coin generation and two tables are as password.
As a further preferred embodiment of the present invention, the specific method of the step 404 includes: to be set by pure scrambling algorithm Random byte stream, the radix of scramble keying sequence according to level of confidentiality and application demand dynamically changeable, using 64 several scrambling sequences or 1/8 scrambling sequence of one long I frame.
As a further preferred embodiment of the present invention, the encryption method further include: change is used to video file The video encryption algorithm of Huffman code table is handled, and specific method includes: the video for entropy coding Huffman coding Coding standard will use after the modification of general Huffman code table, and modified special Huffman code table is as key;Illicit reception Side cannot be correctly decoded video information without this special code table.The change Huffman code table, it is corresponding to change each integrated mode Huffman code word is made by the probability that various hyte syntypes in statistics code stream occur, high to the frequency of occurrences in data flow Hyte syntype corresponds to short code word, and the low hyte syntype of the frequency of occurrences corresponds to long code word.
The algorithm does not increase calculation amount completely.Suitable for the various videos and image compression encoding for using Huffman to encode Standard and algorithm.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications can be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from this hair to the embodiment of the present invention The spirit and scope of bright embodiment.In this way, if these modifications and variations of the embodiment of the present invention belong to the claims in the present invention And its within the scope of equivalent technologies, then the present invention is also intended to include these modifications and variations.

Claims (7)

1. a kind of WEB terminal key based on HLS technology obscures incorrect order video encryption method, which is characterized in that the method includes Following steps:
Step 1: the transport stream parameter and signature parameter of video file are integrated using browser in WEB terminal;
Step 2: requesting the m3u8 file of video file from WEB terminal to server;
Step 3: server carries out signature parameter verification to the request of WEB terminal, judge whether the request of WEB terminal is legal, if closed Method is then transferred to step 4;If non-rule is transferred to step 5;
Step 4: server carries out key verification to the request of WEB terminal, key therein carries out coding encrypting by obscuring incorrect order; WEB terminal obtains correct m3u8 file and legal key by request;WEB terminal is using obtained legal key, and normal play is just True m3u8 file;
Step 5: WEB terminal can not request correct m3u8 file, correct m3u8 file can not be also played.
2. a kind of WEB terminal key based on HLS technology as described in claim 1 obscures incorrect order video encryption method, feature It is, in the step 4, the method and step that the key obscures incorrect order progress coding encrypting includes:
16 byte key in step 401, the extraction primary agreement of HLS;
Step 402, using Zig-Zag scrambling algorithm, key is carried out to 16 byte key and obscures incorrect order;
Step 403 passes through pure scrambling algorithm scramble byte stream, and key obtains 20 byte key after obscuring;
Step 404 is decrypted using specific broadcast decoder device;
Original cipher key is gone back in step 405, reset;
Step 406 decodes playing audio-video using reset key.
3. a kind of WEB terminal key based on HLS technology as claimed in claim 2 obscures incorrect order video encryption method, feature It is, it is described to use Zig-Zag scrambling algorithm in the step 402, key is carried out to 16 byte key and obscures the specific of incorrect order Method specifically:
Zig-Zag scanning sequency is replaced using a random scrambling sequence, each 8 × 8 pieces of DCT coefficient is mapped to One 1 × 64 vector, specific steps include:
Step (1) generates the scrambling sequence table that a radix is 64;
DC coefficient is divided into two numbers for being less than given threshold by step (2);
8 × 8 pieces through separating treatment are mapped to 1 × 64 sequence with random scrambling sequence table by step (3).
4. a kind of WEB terminal key based on HLS technology as claimed in claim 3 obscures incorrect order video encryption method, feature It is, it is described that 16 byte key are carried out with the method that key obscures incorrect order further include:
Every 8 blocks are divided into one group, 8 DC coefficients are combined, then use des encryption;
The result of encryption is mapped back in 8 blocks by byte, and then the step (1) is to step (3), with separation process and scramble Every piece is encrypted.
5. a kind of WEB terminal key based on HLS technology as claimed in claim 2 obscures incorrect order video encryption method, feature It is, the specific method of the step 404 includes: by pure scrambling algorithm scramble byte stream, the radix root of scramble keying sequence According to level of confidentiality and application demand dynamically changeable, 1/8 scrambling sequence of the long I frame of 64 several scrambling sequences or one is used.
6. a kind of WEB terminal key based on HLS technology as described in claim 1 obscures incorrect order video encryption method, feature It is, the encryption method further include: video file is handled using the video encryption algorithm for changing Huffman code table, Specific method includes:
For the video encoding standard that entropy coding is encoded with Huffman, will be used after the modification of general Huffman code table, after modification Special Huffman code table as key;
Illicit reception side cannot be correctly decoded video information without this special code table.
7. a kind of WEB terminal key based on HLS technology as claimed in claim 6 obscures incorrect order video encryption method, feature Be: the change Huffman code table changes the corresponding Huffman code word of each integrated mode, passes through various positions in statistics code stream The probability production that integrated mode occurs, the hyte syntype high to the frequency of occurrences in data flow correspond to short code word, and the frequency of occurrences is low Hyte syntype correspond to long code word.
CN201811462494.XA 2018-12-03 2018-12-03 WEB terminal key based on HLS technology obscures incorrect order video encryption method Pending CN109275030A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811462494.XA CN109275030A (en) 2018-12-03 2018-12-03 WEB terminal key based on HLS technology obscures incorrect order video encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811462494.XA CN109275030A (en) 2018-12-03 2018-12-03 WEB terminal key based on HLS technology obscures incorrect order video encryption method

Publications (1)

Publication Number Publication Date
CN109275030A true CN109275030A (en) 2019-01-25

Family

ID=65186660

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811462494.XA Pending CN109275030A (en) 2018-12-03 2018-12-03 WEB terminal key based on HLS technology obscures incorrect order video encryption method

Country Status (1)

Country Link
CN (1) CN109275030A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113163232A (en) * 2021-04-21 2021-07-23 杭州叙简科技股份有限公司 Chaos-based multi-user video file encryption system and method
CN115002089A (en) * 2022-06-30 2022-09-02 兰州乐智教育科技有限责任公司 Streaming media transmission method and device, electronic equipment and storage medium
CN116827914A (en) * 2023-04-19 2023-09-29 广州好智信息技术有限公司 Method and system for preventing hijacking and stealing of video information of mobile terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130163758A1 (en) * 2011-12-22 2013-06-27 Viswanathan Swaminathan Methods and Apparatus for Key Delivery in HTTP Live Streaming
CN106331751A (en) * 2016-08-31 2017-01-11 广州易方信息科技有限公司 Online encrypted slice video playing method based on iOS operating system
CN107197328A (en) * 2017-06-11 2017-09-22 成都吱吖科技有限公司 A kind of interactive panoramic video safe transmission method and device for being related to virtual reality

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130163758A1 (en) * 2011-12-22 2013-06-27 Viswanathan Swaminathan Methods and Apparatus for Key Delivery in HTTP Live Streaming
CN106331751A (en) * 2016-08-31 2017-01-11 广州易方信息科技有限公司 Online encrypted slice video playing method based on iOS operating system
CN107197328A (en) * 2017-06-11 2017-09-22 成都吱吖科技有限公司 A kind of interactive panoramic video safe transmission method and device for being related to virtual reality

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
PM_605: "在线视频常见加密方式及安全性透析", 《CSDN》 *
保利威: "视频版权保护体系之解密密钥-web授权", 《保利威产品动态》 *
蒋拥军: "面向国家关键应用的视频基础平台设计", 《中国优秀博硕士学位论文全文数据库 (硕士)》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113163232A (en) * 2021-04-21 2021-07-23 杭州叙简科技股份有限公司 Chaos-based multi-user video file encryption system and method
CN115002089A (en) * 2022-06-30 2022-09-02 兰州乐智教育科技有限责任公司 Streaming media transmission method and device, electronic equipment and storage medium
CN115002089B (en) * 2022-06-30 2023-09-19 兰州乐智教育科技有限责任公司 Streaming media transmission method and device, electronic equipment and storage medium
CN116827914A (en) * 2023-04-19 2023-09-29 广州好智信息技术有限公司 Method and system for preventing hijacking and stealing of video information of mobile terminal

Similar Documents

Publication Publication Date Title
CN100442835C (en) Digital copyright and digital watermark protecting method for video program
CN107707504B (en) Streaming media playing method and system, server and client
CN110401818B (en) Safe communication system for power video transmission
JP4907450B2 (en) Apparatus and method for providing a video stream that ensures integrity
CN101719910B (en) Terminal equipment for realizing content protection and transmission method thereof
CN106331751B (en) A kind of online encrypted slice video broadcasting method based on iOS operating system
CN101977190B (en) Digital content encryption transmission method and server side
CN108111876A (en) A kind of LAN video contents of streaming media method for security protection, terminal and server
WO2017016447A1 (en) Two-dimensional code mask encryption and decryption method and system
CN109275030A (en) WEB terminal key based on HLS technology obscures incorrect order video encryption method
WO2015024426A1 (en) Identity authentication system, apparatus, and method, and identity authentication request apparatus
US20170353745A1 (en) Secure media player
EP2832102A1 (en) Methods and systems for cryptographic access control of video
CN109348293A (en) The end APP key based on HLS technology obscures incorrect order video encryption method
CN105704545A (en) Secret key synchronizing information transmission method based on H.264 video stream
CN100401769C (en) Method for enciphering and deciphering living-broadcasting flow-medium data
JP2007318745A (en) Content distribution system
CN109547198A (en) The method and system of network transmission video file
CN103237010B (en) The server end of digital content is cryptographically provided
CN106791923B (en) A kind of stream of video frames processing method and video server
CN103237011B (en) Digital content encryption transmission method and server end
TWI708508B (en) Encryption method and apparatus of video and audio signal stream
CN109218837A (en) A kind of method and apparatus showing virtual present special efficacy
CN111081338A (en) Safe human health parameter acquisition method
CN104272748B (en) anti-encrypted watermark

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190125