CN109413449A - A kind of video-encryption decryption method and system - Google Patents

A kind of video-encryption decryption method and system Download PDF

Info

Publication number
CN109413449A
CN109413449A CN201811326457.6A CN201811326457A CN109413449A CN 109413449 A CN109413449 A CN 109413449A CN 201811326457 A CN201811326457 A CN 201811326457A CN 109413449 A CN109413449 A CN 109413449A
Authority
CN
China
Prior art keywords
video
key
terminal
time
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811326457.6A
Other languages
Chinese (zh)
Other versions
CN109413449B (en
Inventor
张伟伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GOSPELL DIGITAL TECHNOLOGY Co Ltd
Original Assignee
GOSPELL DIGITAL TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GOSPELL DIGITAL TECHNOLOGY Co Ltd filed Critical GOSPELL DIGITAL TECHNOLOGY Co Ltd
Priority to CN201811326457.6A priority Critical patent/CN109413449B/en
Publication of CN109413449A publication Critical patent/CN109413449A/en
Application granted granted Critical
Publication of CN109413449B publication Critical patent/CN109413449B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • H04N21/23473Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption by pre-encrypting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • H04N21/23476Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Closed-Circuit Television Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The present invention relates to a kind of video-encryption decryption method and systems, a kind of video-encryption decryption method of the invention includes: S1, before carrying out video record, video generates terminal and obtains first key K1, and Key Management Center receives video and generates the identifier of terminal to generate and corresponding second key K2 at the first time;S2, during video record, video generates terminal according to recording time and the Relation acquisition of first time the second key K2, generates third key K3, and encrypt the corresponding recorded video of recording time to obtain encrypted video by third key K3;S3, video using terminal obtain encrypted video, video generates the identifier of terminal and the recording time of encrypted video, according to identifier, recording time and the second key of the Relation acquisition of first time K2;S4, video using terminal obtain first key K1 and generate third key K3 decryption encrypted video.Implement the safety that the present invention improves monitor video.

Description

A kind of video-encryption decryption method and system
Technical field
The present invention relates to video-encryption decryption technology field, more specifically to a kind of video-encryption decryption method and System.
Background technique
Currently, being carried forward in big strides with social informatization, Video Surveillance Industry is in high speed like a raging fire Developing stage is concentrated mainly on the special sectors such as government and finance, public security, traffic, electric power and industry by past application, prolongs The shadow that present nearly all industry and field have monitoring is reached, especially in recent years, personal user is to household safe Attention degree is growing, ensures that the consciousness of house safety is obviously reinforced using video monitoring system, more and more video prisons Control system is put into use.All come therewith, it is very different to cause greatly since mud and sand are carried along for miscellaneous monitoring system The individual privacy of amount user is leaked, and how to be protected the individual privacy of all users, is ensured that the privacy equity of user is most important.
Summary of the invention
The technical problem to be solved in the present invention is that providing a kind of view for the above-mentioned prior art defect of the prior art Frequency encrypting and decrypting method and system.
The technical solution adopted by the present invention to solve the technical problems is: constructing a kind of video-encryption decryption method, applies In video monitoring, comprising the following steps:
S1, before carrying out video record, video generates terminal and obtains first key K1, and Key Management Center receives the view Frequency generates the identifier of terminal to generate and corresponding second key K2 at the first time;
S2, during video record, the video generates terminal according to the relationship of recording time and the first time The second key K2 is obtained, and third key K3 is generated according to the first key K1 and the second key K2, and by described Third key K3 encrypts to obtain encrypted video the corresponding recorded video of the recording time;
S3, video using terminal obtain the encrypted video, the video generates the identifier and the encryption of terminal The recording time of video, second is close according to the Relation acquisition of the identifier, the recording time with the first time Key K2;
S4, the video using terminal obtain the first key K1 to generate the third according to the second key K2 Key K3 decrypts the encrypted video by the third key K3.
Preferably, in the step S1, the Key Management Center generates and corresponding second key K2 at the first time Include:
The Key Management Center divides system time according to preset time rule, to obtain multiple continuous institutes It states at the first time, generates the multiple second key K2s corresponding with described the sub- time.
Preferably, the method also includes:
When S301, the video using terminal are recorded according to one of encrypted video described in the preset time Rule Between, according to the recording time and the relationship of the first time from the Key Management Center obtain its corresponding described second Key K2;
S302, the video using terminal generate the third key according to the first key K1 and the second key K2 K3, to decrypt the corresponding encrypted video of the recording time by the third key K3;
S303, decrypted after the corresponding encrypted video of the recording time, obtain another recording time thereafter and obtain Its corresponding second key K2;And step S302 is executed, it is completed until the encrypted video of all recording times is decrypted.
Preferably, the method also includes:
S311, the video using terminal according to encrypted video described in the preset time Rule multiple recordings when Between, according to multiple recording time and the relationship of the first time from the Key Management Center obtain its corresponding multiple Two key K2;
S312, the video using terminal generate third key K3 according to the first key K1 and the second key K2, with The encrypted video in corresponding recording time is successively decrypted by third key K3;
S313, during decrypting the encrypted video of multiple recording time, it is another after obtaining the multiple recording time Outer multiple recording times simultaneously obtain its corresponding multiple second key K2, execute step S312, until all recording times add Close decryption of video is completed.
Preferably, the first time and the recording time are all made of the time of the Key Management Center.
Preferably, in the step S1, the acquisition first key K1, comprising: it is raw that user password is inputted by user At the first key K1;And/or
In the step S4, the video using terminal obtains the first secret key K1 and includes:
User password, which is inputted, by user generates the first key K1.
Preferably, in the step S4, the identifier for obtaining the video and generating terminal, comprising:
The video using terminal inputs the identifier for obtaining the video and generating terminal by user;Or
The video using terminal obtains the identifier that the video generates terminal by interpreting the encrypted video.
Preferably, in the step S3, the recording time that the video using terminal obtains the encrypted video includes:
When the video using terminal interprets recording of the attribute information of the encrypted video to obtain the encrypted video Between.
The present invention also constructs a kind of video-encryption decryption system, is applied to video monitoring, comprising: video generates terminal, close Key administrative center and video using terminal;
The video generates terminal and is used to obtain first key K1 before carrying out video record;
The identifier that the Key Management Center is used to receive the video generation terminal is corresponding with first time to generate The second key K2;
The video generates terminal and is also used to during video record according to the pass of recording time and the first time System obtains the second key K2, and generates third key K3 according to the first key K1 and the second key K2, to pass through Third key K3 is stated to encrypt to obtain encrypted video the corresponding recorded video of the recording time;
Video using terminal is used to obtain the encrypted video, the video generates the identifier and the encryption of terminal The recording time of video, second is close according to the Relation acquisition of the identifier, the recording time with the first time Key K2;
The video using terminal is also used to obtain the first key K1 according to the second key K2 generation Third key K3 decrypts the encrypted video by the third key K3.
Preferably, video-encryption decryption system of the invention further includes connecting the video to generate terminal and video use The Cloud Server of terminal, the Cloud Server are used to receive the video and generate the encrypted video of terminal generation and be sent to described Video using terminal.
Implement of the invention a kind of video-encryption decryption method and system, has the advantages that raising monitor video Safety.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is a kind of program flow diagram of video-encryption decryption method first embodiment of the present invention;
Fig. 2 is a kind of program flow diagram of video-encryption decryption method second embodiment of the present invention;
Fig. 3 is a kind of program flow diagram of video-encryption decryption method 3rd embodiment of the present invention;
Fig. 4 is a kind of logic diagram of the first embodiment of video-encryption decryption system of the present invention;
Fig. 5 is a kind of operation principle schematic diagram of the first embodiment of video-encryption decryption system of the present invention;
Fig. 6 is a kind of operation principle schematic diagram of the second embodiment of video-encryption decryption system of the present invention.
Specific embodiment
For a clearer understanding of the technical characteristics, objects and effects of the present invention, now control attached drawing is described in detail A specific embodiment of the invention.
As shown in Figure 1, it is applied to video monitoring in a kind of video-encryption decryption method first embodiment of the invention, The following steps are included: S1, before carrying out video record, video generate terminal 10 obtain first key K1, Key Management Center 30 It receives video and generates the identifier of terminal 10 to generate and corresponding second key K2 at the first time;Specifically, video generates eventually End 10 is here it can be appreciated that monitor video generation terminal 10 can pass through user before being monitored generation monitor video First key K1 is inputted, herein, first key spoon K1 can be generated terminal 10 in configuration phase by monitor video, pass through WEB Configuration interface is the first secret key of user setting K1, to ensure that monitor video is finally rested in user hand using right.Some In embodiment, AES128 algorithm can be taken, the first key K1 of generation is 16HEX byte.Detailed process can be compiled by user A string of any character passwords are collected, convert it into 16HEX byte using algorithm is secondary, encrypting storing monitor video generates terminal 10 In security context.Here the identifier that monitor video generates terminal 10 is the identity distinguished different monitoring video and generate terminal 10 ID can generate terminal 10 in production phase burning unique end GID using in monitor video here.Key Management Center 30 connects Corresponding second key K2 at the first time can be generated according to the identifier by receiving the identifier, and Key Management Center 30 is regarded according to monitoring Frequency generates the uniqueness that the GID of terminal 10 has, and derives from corresponding unique code key, accomplishes that a monitor video generates terminal 10 One code key.In this way, being cracked key when a monitor video generates terminal 10, other monitor videos generate terminal 10 also not It can equally be cracked.In order to increase the difficulty cracked, first time, which is added, simultaneously for Key Management Center 30 derives from, and generates each First time corresponding unique code key i.e. the second key K2 of monitor video generation terminal 10.Cryptographic operation can take AES128 Algorithm, it may be 16HEX byte that this, which requires derivative second code key K2,.
S2, during video record, video generates terminal 10 according to recording time and the Relation acquisition of first time the Two key K2, and third key K3 is generated according to first key K1 and the second key K2, and when by third key K3 to recording Between the encryption of corresponding recorded video to obtain encrypted video;Specifically, monitor video generates terminal 10 during video record The second key K2 can be obtained from Key Management Center 30 according to the corresponding relationship of video record time and first time, for example, this In first time be a time point perhaps a period when recording between when being the time point or period, then Will obtain the time point or period corresponding second key K2, and according to first key K1 and the second key K2 generate with The first time corresponding second key K3, then adds the recorded video in the recording time by third key K3 Close acquisition encrypted video, it is to be understood that, recording time continues up, when recording between when changing, with One time, corresponding relationship can also change, can be according to new recording time and the then after completing a recording time The corresponding relationship of one time obtains the second new key K2, new third key K3 is generated, to the recording in new recording time Video is encrypted, and is successively gone on, and the recorded video of different recording times is obtained, and is regarded with finally obtaining complete record Frequently.
S3, video using terminal 20 obtain encrypted video, video generates the identifier of terminal 10 and the record of encrypted video Time processed, according to identifier, recording time and the second key of the Relation acquisition of first time K2;Specifically, video using terminal 20 receive the encrypted video, while obtaining the corresponding video of the video and generating the identifier of terminal 10 and the recording of encrypted video Time, it is to be understood that, video using terminal 20 can get the knowledge that the video generates terminal 10 by the encrypted video Not Fu and encrypted video recording time, as outlined above, Key Management Center 30 generate the second key K2 and video frequency Generate terminal identifier and at the first time at one-to-one relationship, then video using terminal 20 can be according to the view got Frequency generates the identifier of terminal 10 and the recording time and the corresponding relationship of first time of encrypted video, from key management The heart 30 obtains corresponding second key K2.
S4, video using terminal 20 obtain first key K1 to generate third key K3 according to the second key K2, by the Three key K3 decrypt encrypted video.Specifically, video using terminal 20 obtains the first key K1 of user simultaneously, it is close according to first Key K1 and the second key K2 generates third key K3, and the method that third key K3 is generated here is referred to above description.Then The encrypted video is decrypted by third key K3.It is to be understood that the video record time can be to be multiple, according to different The corresponding relationship of video record time and first time can obtain corresponding second key of each recording time respectively here K2 generates corresponding third key K3, successively the encrypted video of different recording times is decrypted, until completing entire encryption The decryption of video.
Further, in step sl, Key Management Center 30 is generated includes: with corresponding second key K2 at the first time Key Management Center 30 divides system time according to preset time rule, raw to obtain multiple continuous first times At multiple second key K2s corresponding with first sub- time.Specifically, first time here can be preset, example Such as, the time can be divided according to certain rules, rule here can be divided according to identical interval time, each A interval time corresponding first time, each interval time includes an initial time and terminates the time here, here may be used To be calculated with interval time and identifier, corresponding second key K2 is generated.Here the initial time of first time and end Only the time is certain, then the second key K2 generated is also unique corresponding with first time.
Further, as shown in Fig. 2, a kind of video-encryption decryption method of the invention further include:
S301, video using terminal 20 according to preset time Rule encrypted video a recording time, according to recording Time obtains its corresponding second key K2 from Key Management Center 30 with the relationship of first time;Specifically, video uses eventually Rule is arranged according to the same time used when generating with the second key K2 in end 20, by the video pair in preset time rule It should be a recording time, and according to the relationship of the video record time and the first time of preset time rule, such as here The video record time is corresponding at the first time with this, then the first time corresponding second key K2 can be obtained.Here also It is appreciated that the recording time progress during video record is segmented according to preset time rule, this time will be met The recording time of rule positions same recording time, it is only necessary to obtain the according to the recording time and first time corresponding relationship Two key K2.
S302, video using terminal 20 generate third key K3 according to first key K1 and the second key K2, to pass through the Three key K3 decrypt the corresponding encrypted video of the recording time;Specifically, the recording time is one corresponding according to the key pair Encrypted video in time interval is decrypted.
S303, decrypted after the corresponding encrypted video of the recording time, obtain another recording time thereafter and obtain Its corresponding second key K2;And step S302 is executed, it is completed until the encrypted video of all recording times is decrypted.Specifically, When having decrypted the encrypted video in the interval time, then by the way of above, obtain next interval time section, obtain should between Every a period corresponding recording time, corresponding second key K2 is obtained, third key K3 is generated, carries out the interval time The encrypted video of section, circuits sequentially in this way, the encrypted video until completing entire recording time.
Further, as shown in figure 3, a kind of video-encryption decryption method of the invention further include:
S311, video using terminal 20 according to preset time Rule encrypted video multiple recording times, according to this Multiple recording times obtain its corresponding multiple second key K2 from Key Management Center 30 with the relationship of first time;Specifically , video using terminal 20 can also obtain continuous multiple according to prefixed time interval identical with Key Management Center 30 Recording time in prefixed time interval, each recording time corresponds to a first time here, then multiple recording times It corresponding multiple and different first time, in this way can be according to recording time with the corresponding relationship of first time, from key management The heart 30 disposably gets multiple second key K2.
S312, video using terminal 20 generate third key K3 according to first key K1 and the second key K2, by being somebody's turn to do Third key K3 successively decrypts the encrypted video in corresponding recording time;Specifically, video using terminal 20 was being got After second key K2, it can successively calculate according to the sequence of recording time and generate third key K3, then successively decrypt multiple record Time processed corresponding encrypted video, calculate here third key K3 be also possible to once calculate it is multiple, such as when from key management After center 30 gets multiple second key K2, calculating is carried out to multiple second key K2 and gets multiple third key K3, Then successively the corresponding encrypted video of each recording time is solved with the corresponding relationship of recording time according to third key K3 It is close.
S313, during decrypting the encrypted video of multiple recording time, it is other more after obtaining multiple recording times A recording time simultaneously obtains its corresponding multiple second key K2, executes step S312, until the encryption of all recording times regards Frequency decryption is completed.Specifically, can be obtained simultaneously multiple during decrypting the encrypted video of above-mentioned multiple recording times The subsequent other multiple recording times of recording time, then obtain the second key K2 according to method described above, are calculated Corresponding third key K3 is obtained to decrypt encrypted document.It is to be understood that subsequent multiple recording times are corresponding It is carried out again after the completion of the corresponding encrypted video decryption of acquisition multiple recording times necessarily in front of second key K2, it can be with The corresponding encryption of one or more recording time behind is arrived in the corresponding encrypted video decryption of multiple recording times in front It goes to obtain again after the completion of decryption of video, ensure that the continuity of decrypting process and the delay or shakiness due to network in this way Video playing is interrupted caused by fixed.
Further, the time of Key Management Center 30 is all made of with recording time at the first time.Specifically, here One time and recording time are all made of the time of Key Management Center 30, this ensures that video generates terminal 10 and key pipe The time at reason center 30 can be unified, while also be avoided that video occur generates the modification of 10 time of terminal and cause key can not Corresponding situation.Guarantee that different videos generates terminal 10 and generates the second key K2 specification by Key Management Center 30 simultaneously Property.
Further, in some embodiments, in step sl, first key K1 is obtained, comprising: input and use by user Family password generates first key K1;In further embodiments, in step s 4, video using terminal 20 obtains the first secret key K1 It include: to input user password by user to generate first key K1.Specifically, boundary can be configured by WEB by user terminal Face is that user setting level-one encrypts code key K1, here it is further appreciated that user terminal can be same with video using terminal 20 It is a, such as user mobile phone, account and password can be inputted by user mobile phone, first key is generated according to the account and password K1.Here video using terminal 20 equally can also input account and password by user to generate first key K1.
Further, in one embodiment, in step s 4, the identifier that video generates terminal 10 is obtained, comprising: video Using terminal 20 inputs the identifier for obtaining video and generating terminal 10 by user;In another embodiment, video using terminal 20 obtain the identifier that video generates terminal 10 by interpreting encrypted video.It is produced specifically, video using terminal 20 obtains video The identifier of raw terminal 10, the GID that terminal 10 can be generated by user's input video are obtained, such as video generates terminal 10 and exists When carrying out GID generation, while terminal 10 generated in video, visual GID acquisition modes are provided, such as can pass through bar code, two dimension Code perhaps gets GID then video using terminal 20 such as mobile phone or computer by way of setting inquiry, can input Or scan the GID.For convenience, also sometimes, video generates terminal 10 during video generates, in the attribute of video The GID that video used in the video record generates terminal 10 is added in information, which does not need to decrypt or only need letter Single decryption can obtain, and such video using terminal 20 can be got by interpreting some public informations of encrypted video The corresponding video of the video generates the GID of terminal 10.
Further, in step s3, it includes: that video uses that video using terminal 20, which obtains the recording time of encrypted video, Terminal 20 interprets the attribute information of encrypted video to obtain the recording time of encrypted video.Specifically, video using terminal 20 obtains The recording time of encrypted video is taken, can be obtained by the attribute information of encrypted video, here during video record, meeting Attribute information comprising generating the video record time, here can also be regular according to preset interval above, during video, Recording time is divided, and is added to the attribute information of video, understand attribute information here for disclosure or only needs letter Single decryption, such video using terminal 20 only need to interpret the attribute information of the encrypted video, both available to arrive video record Time.
Here it with one embodiment, is described in detail, Key Management Center 30 generates terminal according to monitor video 10GID and its time, which pass through, derives from the second key K2 of algorithm Input (GID, Duration)=Ouptut (K2x) generation, here Each period D1, D2, D3 ... Dn is taken according to predeterminable event interval, then the second key K2 generated is followed successively by K2_1, K2_ It is corresponding that 2, K2_3 ... K2_n respectively correspond key time section D1, D2, D3 ... Dn.According to algorithm Input (K1, K2_1)= Output (K3_1), monitor video generate terminal 10 and encrypt K2_1 with first key K1, obtain K3_1;Monitor video generates terminal 10 encrypt monitoring video video using K3_1.Before the period, D1 was exhausted, monitor video generates terminal 10 can be to key Administrative center 30 obtains the second code key K2_2 of subsequent time period D2, obtains third key with first key K1 encryption K2_2 K3_2 encrypts monitoring video video using K3_2 when D1, which terminates D2, to be started.And so on complete entire video record during Video-encryption.
During decryption of video, monitor video using terminal 20 is when playing back video, when can obtain the video record Between and corresponded to obtain corresponding K2_1 according to recording time, and with period D1, then decrypted by first key K1 K2_1 obtains third key K3_1, the encryption video obtained by K3_1 decryption.Meanwhile passing through new recording time and D2 Corresponding relationship obtain K2_2, by first key K1 decrypt K2_2 obtain third key K3_2, reached when the D1 time, in the time Continue decryption by third key K3_2 in section D2 to play, and so on.And so on know the solution for completing entire encrypted video It is close.
In addition, as shown in Figure 4 and Figure 5, a kind of video-encryption decryption system of the invention is applied to video monitoring, comprising: view Frequency generates terminal 10, Key Management Center 30 and video using terminal 20;Video generates terminal 10 and is used to carry out video record Preceding acquisition first key K1;Key Management Center 30 is used to receive video and generates the identifier of terminal 10 to generate and first time Corresponding second key K2;Video generates terminal 10 and is also used to during video record according to recording time and first time Relation acquisition the second key K2, and third key K3 is generated according to first key K1 and the second key K2, to pass through third key K3 encrypts to obtain encrypted video the corresponding recorded video of recording time;Video using terminal 20 for obtain encrypted video, Video generates the identifier of terminal 10 and the recording time of encrypted video, according to identifier, recording time and first time The second key of Relation acquisition K2;Video using terminal 20 is also used to obtain first key K1 to generate third according to the second key K2 Key K3 decrypts encrypted video by third key K3.Specifically, video generates terminal 10, Key Management Center 30 and video Using terminal 20 realizes the process of video-encryption and decryption referring to previously mentioned jointly, and which is not described herein again.
Further, as shown in fig. 6, a kind of video-encryption decryption system of the invention, further includes that connection video generates eventually The Cloud Server 4040 at end 10 and video using terminal 20, Cloud Server 4040 are used to receive video and generate adding for the generation of terminal 10 Close video is simultaneously sent to video using terminal 20.Specifically, video generates terminal 10 and carries out video here on the basis of above The encrypted video got after recording encryption can be uploaded to Cloud Server 4040 or platform is stored and is managed collectively, video Using terminal 20 obtains the encrypted video from Cloud Server 4040 or platform as needed and broadcasting is decrypted.
It should be understood that above embodiments only express the preferred embodiment of the present invention, description is more specific and detailed Carefully, but it cannot be understood as limitations on the scope of the patent of the present invention;It should be pointed out that for the common skill of this field For art personnel, without departing from the inventive concept of the premise, above-mentioned technical characterstic can be freely combined, can also be done Several modifications and improvements out, these are all within the scope of protection of the present invention;Therefore, all to be done with scope of the invention as claimed Equivalents and modification, should belong to the covering scope of the claims in the present invention.

Claims (10)

1. a kind of video-encryption decryption method is applied to video monitoring, which comprises the following steps:
S1, before carrying out video record, video generates terminal and obtains first key K1, and Key Management Center receives the video and produces The identifier of raw terminal is to generate and corresponding second key K2 at the first time;
S2, during video record, the video generates terminal according to the Relation acquisition of recording time and the first time The second key K2, and third key K3 is generated according to the first key K1 and the second key K2, and pass through the third Key K3 encrypts to obtain encrypted video the corresponding recorded video of the recording time;
S3, video using terminal obtain the encrypted video, the identifier of video generation terminal and the encrypted video Recording time, according to the second key K2 described in the identifier, the Relation acquisition of the recording time and the first time;
S4, the video using terminal obtain the first key K1 to generate the third key according to the second key K2 K3 decrypts the encrypted video by the third key K3.
2. video-encryption decryption method according to claim 1, which is characterized in that in the step S1, the key Administrative center generates includes: with corresponding second key K2 at the first time
The Key Management Center divides system time according to preset time rule, to obtain multiple continuous described the One time generated the multiple second key K2s corresponding with the first time.
3. video-encryption decryption method according to claim 2, which is characterized in that the method also includes:
The recording time of S301, the video using terminal according to encrypted video described in the preset time Rule, root Its corresponding second key is obtained from the Key Management Center with the relationship of the first time according to the recording time K2;
S302, the video using terminal generate the third key K3 according to the first key K1 and the second key K2, with The corresponding encrypted video of the recording time is decrypted by the third key K3;
S303, decrypted after the corresponding encrypted video of the recording time, obtain another recording time thereafter and to obtain its right The the second key K2 answered;And step S302 is executed, it is completed until the encrypted video of all recording times is decrypted.
4. video-encryption decryption method according to claim 2, which is characterized in that the method also includes:
S311, the video using terminal according to encrypted video described in the preset time Rule multiple recording times, According to multiple recording time and the relationship of the first time from the Key Management Center obtain its corresponding multiple second Key K2;
S312, the video using terminal generate third key K3 according to the first key K1 and the second key K2, to pass through Third key K3 successively decrypts the encrypted video in corresponding recording time;
S313, during decrypting the encrypted video of multiple recording time, it is other more after obtaining the multiple recording time A recording time simultaneously obtains its corresponding multiple second key K2, executes step S312, until the encryption of all recording times regards Frequency decryption is completed.
5. video-encryption decryption method according to claim 1, which is characterized in that when the first time and the recording Between be all made of time of the Key Management Center.
6. video-encryption decryption method according to claim 1, which is characterized in that in the step S1, the acquisition First key K1, comprising: user password is inputted by user and generates the first key K1;And/or
In the step S4, the video using terminal obtains the first secret key K1 and includes:
User password, which is inputted, by user generates the first key K1.
7. video-encryption decryption method according to claim 1, which is characterized in that in the step S4, the acquisition The video generates the identifier of terminal, comprising:
The video using terminal inputs the identifier for obtaining the video and generating terminal by user;Or
The video using terminal obtains the identifier that the video generates terminal by interpreting the encrypted video.
8. video-encryption decryption method according to claim 1, which is characterized in that in the step S3, the video The recording time that using terminal obtains the encrypted video includes:
The video using terminal interprets the attribute information of the encrypted video to obtain the recording time of the encrypted video.
9. a kind of video-encryption decryption system is applied to video monitoring characterized by comprising video generates terminal, key pipe Reason center and video using terminal;
The video generates terminal and is used to obtain first key K1 before carrying out video record;
The Key Management Center is used to receive the video and generates the identifier of terminal to generate corresponding with first time the Two key K2;
The video generates terminal and is also used to obtain during video record according to recording time and the relationship of the first time It takes the second key K2, and third key K3 is generated according to the first key K1 and the second key K2, to pass through described the Three key K3 encrypt to obtain encrypted video the corresponding recorded video of the recording time;
Video using terminal is used to obtain the encrypted video, the identifier of video generation terminal and the encrypted video Recording time, according to the second key K2 described in the identifier, the Relation acquisition of the recording time and the first time;
The video using terminal is also used to obtain the first key K1 to generate the third according to the second key K2 Key K3 decrypts the encrypted video by the third key K3.
10. video-encryption decryption system according to claim 6, which is characterized in that further include connecting the video to generate The Cloud Server of terminal and video using terminal, the Cloud Server are used to receive the video and generate the encryption view that terminal generates Frequency is simultaneously sent to the video using terminal.
CN201811326457.6A 2018-11-08 2018-11-08 Video encryption and decryption method and system Active CN109413449B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811326457.6A CN109413449B (en) 2018-11-08 2018-11-08 Video encryption and decryption method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811326457.6A CN109413449B (en) 2018-11-08 2018-11-08 Video encryption and decryption method and system

Publications (2)

Publication Number Publication Date
CN109413449A true CN109413449A (en) 2019-03-01
CN109413449B CN109413449B (en) 2021-02-05

Family

ID=65472375

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811326457.6A Active CN109413449B (en) 2018-11-08 2018-11-08 Video encryption and decryption method and system

Country Status (1)

Country Link
CN (1) CN109413449B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113613040A (en) * 2021-10-11 2021-11-05 北京创米智汇物联科技有限公司 Video file encryption method, decryption method and key management method
CN114338176A (en) * 2021-12-29 2022-04-12 支付宝(杭州)信息技术有限公司 Data transmission method, device and network card
CN118520478A (en) * 2024-05-28 2024-08-20 北京点控互联信息技术有限公司 Efficient encryption method for financial data based on blockchain

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060009247A1 (en) * 2004-07-12 2006-01-12 Kelley Sean S Method and apparatus for controlling a delivery of a broadcast-multicast flow in a packet data communication system
US20100246826A1 (en) * 2009-03-27 2010-09-30 Sony Corporation Digital cinema management device and digital cinema management method
CN102821110A (en) * 2012-09-06 2012-12-12 深圳英飞拓科技股份有限公司 Password finding method used for audio/video storage device
CN103200387A (en) * 2013-02-16 2013-07-10 北京视博数字电视科技有限公司 Protection method and protection system of surveillance video content
EP2804388A1 (en) * 2013-05-14 2014-11-19 TP Vision Holding B.V. Common interface host and common interface conditional access module
CN104270614A (en) * 2014-10-16 2015-01-07 浙江宇视科技有限公司 Video encryption and decryption method and device
US20150326393A1 (en) * 2014-05-09 2015-11-12 Sony Pictures Entertainment Inc. Content individualization
CN105721903A (en) * 2014-12-26 2016-06-29 乐视网信息技术(北京)股份有限公司 Method and system for playing online videos
CN106791935A (en) * 2016-12-23 2017-05-31 中山大学 A kind of Internet video first broadcast method and system
CN108768920A (en) * 2018-03-26 2018-11-06 苏州科达科技股份有限公司 A kind of recorded broadcast data processing method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060009247A1 (en) * 2004-07-12 2006-01-12 Kelley Sean S Method and apparatus for controlling a delivery of a broadcast-multicast flow in a packet data communication system
US20100246826A1 (en) * 2009-03-27 2010-09-30 Sony Corporation Digital cinema management device and digital cinema management method
CN102821110A (en) * 2012-09-06 2012-12-12 深圳英飞拓科技股份有限公司 Password finding method used for audio/video storage device
CN103200387A (en) * 2013-02-16 2013-07-10 北京视博数字电视科技有限公司 Protection method and protection system of surveillance video content
EP2804388A1 (en) * 2013-05-14 2014-11-19 TP Vision Holding B.V. Common interface host and common interface conditional access module
US20150326393A1 (en) * 2014-05-09 2015-11-12 Sony Pictures Entertainment Inc. Content individualization
CN104270614A (en) * 2014-10-16 2015-01-07 浙江宇视科技有限公司 Video encryption and decryption method and device
CN105721903A (en) * 2014-12-26 2016-06-29 乐视网信息技术(北京)股份有限公司 Method and system for playing online videos
CN106791935A (en) * 2016-12-23 2017-05-31 中山大学 A kind of Internet video first broadcast method and system
CN108768920A (en) * 2018-03-26 2018-11-06 苏州科达科技股份有限公司 A kind of recorded broadcast data processing method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王浩: "基于MPEG4的网络视频流加密技术的研究", 《电脑知识与技术》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113613040A (en) * 2021-10-11 2021-11-05 北京创米智汇物联科技有限公司 Video file encryption method, decryption method and key management method
CN114338176A (en) * 2021-12-29 2022-04-12 支付宝(杭州)信息技术有限公司 Data transmission method, device and network card
CN118520478A (en) * 2024-05-28 2024-08-20 北京点控互联信息技术有限公司 Efficient encryption method for financial data based on blockchain

Also Published As

Publication number Publication date
CN109413449B (en) 2021-02-05

Similar Documents

Publication Publication Date Title
CN113037460B (en) Federal learning privacy protection method based on homomorphic encryption and secret sharing
US12113891B2 (en) Encrypting and decrypting information
US20230108682A1 (en) Data processing method and apparatus, device, and computer-readable storage medium
US7477748B2 (en) Session key distribution methods using a hierarchy of key servers
CN111130757A (en) Multi-cloud CP-ABE access control method based on block chain
CN109413449A (en) A kind of video-encryption decryption method and system
CN113033828A (en) Model training method, using method, system, credible node and equipment
Xu et al. An integrated privacy preserving attribute-based access control framework supporting secure deduplication
CN106878013B (en) File encryption and decryption method and device
CN104134022A (en) Information hiding and protecting method based on image
CN108768647B (en) Random number generation method for block chain
WO2020003821A1 (en) Information processing system, information processing method, and information processing device
CN113411323B (en) Medical record data access control system and method based on attribute encryption
WO2017033843A1 (en) Searchable cryptograph processing system
CN103607278A (en) Safe data cloud storage method
CN115765965A (en) Medical data safety sharing method based on federal learning and double union block chains
Xiong et al. A secure document self-destruction scheme: an ABE approach
CN104168320B (en) The method and system that a kind of user data is shared
CN115801276A (en) Automobile network threat information security sharing method, system and storage medium
CN113630250B (en) Model training method and system based on data encryption
CN113132345B (en) Agent privacy set intersection method with searchable function
CN113810184A (en) Equipment password escrow method and system based on dynamic threshold multi-secret sharing
CN109120576A (en) Data sharing method and device, computer equipment and storage medium
Gong [Retracted] Application Research of Data Encryption Algorithm in Computer Security Management
CN116668149A (en) Electronic medical data sharing method based on policy hiding and attribute updating

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant