CN109413449A - A kind of video-encryption decryption method and system - Google Patents
A kind of video-encryption decryption method and system Download PDFInfo
- Publication number
- CN109413449A CN109413449A CN201811326457.6A CN201811326457A CN109413449A CN 109413449 A CN109413449 A CN 109413449A CN 201811326457 A CN201811326457 A CN 201811326457A CN 109413449 A CN109413449 A CN 109413449A
- Authority
- CN
- China
- Prior art keywords
- video
- key
- terminal
- time
- encrypted
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000012544 monitoring process Methods 0.000 claims description 13
- 238000010586 diagram Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 206010044565 Tremor Diseases 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000004576 sand Substances 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
- H04N21/23473—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption by pre-encrypting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
- H04N21/23476—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption by partially encrypting, e.g. encrypting the ending portion of a movie
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Closed-Circuit Television Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The present invention relates to a kind of video-encryption decryption method and systems, a kind of video-encryption decryption method of the invention includes: S1, before carrying out video record, video generates terminal and obtains first key K1, and Key Management Center receives video and generates the identifier of terminal to generate and corresponding second key K2 at the first time;S2, during video record, video generates terminal according to recording time and the Relation acquisition of first time the second key K2, generates third key K3, and encrypt the corresponding recorded video of recording time to obtain encrypted video by third key K3;S3, video using terminal obtain encrypted video, video generates the identifier of terminal and the recording time of encrypted video, according to identifier, recording time and the second key of the Relation acquisition of first time K2;S4, video using terminal obtain first key K1 and generate third key K3 decryption encrypted video.Implement the safety that the present invention improves monitor video.
Description
Technical field
The present invention relates to video-encryption decryption technology field, more specifically to a kind of video-encryption decryption method and
System.
Background technique
Currently, being carried forward in big strides with social informatization, Video Surveillance Industry is in high speed like a raging fire
Developing stage is concentrated mainly on the special sectors such as government and finance, public security, traffic, electric power and industry by past application, prolongs
The shadow that present nearly all industry and field have monitoring is reached, especially in recent years, personal user is to household safe
Attention degree is growing, ensures that the consciousness of house safety is obviously reinforced using video monitoring system, more and more video prisons
Control system is put into use.All come therewith, it is very different to cause greatly since mud and sand are carried along for miscellaneous monitoring system
The individual privacy of amount user is leaked, and how to be protected the individual privacy of all users, is ensured that the privacy equity of user is most important.
Summary of the invention
The technical problem to be solved in the present invention is that providing a kind of view for the above-mentioned prior art defect of the prior art
Frequency encrypting and decrypting method and system.
The technical solution adopted by the present invention to solve the technical problems is: constructing a kind of video-encryption decryption method, applies
In video monitoring, comprising the following steps:
S1, before carrying out video record, video generates terminal and obtains first key K1, and Key Management Center receives the view
Frequency generates the identifier of terminal to generate and corresponding second key K2 at the first time;
S2, during video record, the video generates terminal according to the relationship of recording time and the first time
The second key K2 is obtained, and third key K3 is generated according to the first key K1 and the second key K2, and by described
Third key K3 encrypts to obtain encrypted video the corresponding recorded video of the recording time;
S3, video using terminal obtain the encrypted video, the video generates the identifier and the encryption of terminal
The recording time of video, second is close according to the Relation acquisition of the identifier, the recording time with the first time
Key K2;
S4, the video using terminal obtain the first key K1 to generate the third according to the second key K2
Key K3 decrypts the encrypted video by the third key K3.
Preferably, in the step S1, the Key Management Center generates and corresponding second key K2 at the first time
Include:
The Key Management Center divides system time according to preset time rule, to obtain multiple continuous institutes
It states at the first time, generates the multiple second key K2s corresponding with described the sub- time.
Preferably, the method also includes:
When S301, the video using terminal are recorded according to one of encrypted video described in the preset time Rule
Between, according to the recording time and the relationship of the first time from the Key Management Center obtain its corresponding described second
Key K2;
S302, the video using terminal generate the third key according to the first key K1 and the second key K2
K3, to decrypt the corresponding encrypted video of the recording time by the third key K3;
S303, decrypted after the corresponding encrypted video of the recording time, obtain another recording time thereafter and obtain
Its corresponding second key K2;And step S302 is executed, it is completed until the encrypted video of all recording times is decrypted.
Preferably, the method also includes:
S311, the video using terminal according to encrypted video described in the preset time Rule multiple recordings when
Between, according to multiple recording time and the relationship of the first time from the Key Management Center obtain its corresponding multiple
Two key K2;
S312, the video using terminal generate third key K3 according to the first key K1 and the second key K2, with
The encrypted video in corresponding recording time is successively decrypted by third key K3;
S313, during decrypting the encrypted video of multiple recording time, it is another after obtaining the multiple recording time
Outer multiple recording times simultaneously obtain its corresponding multiple second key K2, execute step S312, until all recording times add
Close decryption of video is completed.
Preferably, the first time and the recording time are all made of the time of the Key Management Center.
Preferably, in the step S1, the acquisition first key K1, comprising: it is raw that user password is inputted by user
At the first key K1;And/or
In the step S4, the video using terminal obtains the first secret key K1 and includes:
User password, which is inputted, by user generates the first key K1.
Preferably, in the step S4, the identifier for obtaining the video and generating terminal, comprising:
The video using terminal inputs the identifier for obtaining the video and generating terminal by user;Or
The video using terminal obtains the identifier that the video generates terminal by interpreting the encrypted video.
Preferably, in the step S3, the recording time that the video using terminal obtains the encrypted video includes:
When the video using terminal interprets recording of the attribute information of the encrypted video to obtain the encrypted video
Between.
The present invention also constructs a kind of video-encryption decryption system, is applied to video monitoring, comprising: video generates terminal, close
Key administrative center and video using terminal;
The video generates terminal and is used to obtain first key K1 before carrying out video record;
The identifier that the Key Management Center is used to receive the video generation terminal is corresponding with first time to generate
The second key K2;
The video generates terminal and is also used to during video record according to the pass of recording time and the first time
System obtains the second key K2, and generates third key K3 according to the first key K1 and the second key K2, to pass through
Third key K3 is stated to encrypt to obtain encrypted video the corresponding recorded video of the recording time;
Video using terminal is used to obtain the encrypted video, the video generates the identifier and the encryption of terminal
The recording time of video, second is close according to the Relation acquisition of the identifier, the recording time with the first time
Key K2;
The video using terminal is also used to obtain the first key K1 according to the second key K2 generation
Third key K3 decrypts the encrypted video by the third key K3.
Preferably, video-encryption decryption system of the invention further includes connecting the video to generate terminal and video use
The Cloud Server of terminal, the Cloud Server are used to receive the video and generate the encrypted video of terminal generation and be sent to described
Video using terminal.
Implement of the invention a kind of video-encryption decryption method and system, has the advantages that raising monitor video
Safety.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is a kind of program flow diagram of video-encryption decryption method first embodiment of the present invention;
Fig. 2 is a kind of program flow diagram of video-encryption decryption method second embodiment of the present invention;
Fig. 3 is a kind of program flow diagram of video-encryption decryption method 3rd embodiment of the present invention;
Fig. 4 is a kind of logic diagram of the first embodiment of video-encryption decryption system of the present invention;
Fig. 5 is a kind of operation principle schematic diagram of the first embodiment of video-encryption decryption system of the present invention;
Fig. 6 is a kind of operation principle schematic diagram of the second embodiment of video-encryption decryption system of the present invention.
Specific embodiment
For a clearer understanding of the technical characteristics, objects and effects of the present invention, now control attached drawing is described in detail
A specific embodiment of the invention.
As shown in Figure 1, it is applied to video monitoring in a kind of video-encryption decryption method first embodiment of the invention,
The following steps are included: S1, before carrying out video record, video generate terminal 10 obtain first key K1, Key Management Center 30
It receives video and generates the identifier of terminal 10 to generate and corresponding second key K2 at the first time;Specifically, video generates eventually
End 10 is here it can be appreciated that monitor video generation terminal 10 can pass through user before being monitored generation monitor video
First key K1 is inputted, herein, first key spoon K1 can be generated terminal 10 in configuration phase by monitor video, pass through WEB
Configuration interface is the first secret key of user setting K1, to ensure that monitor video is finally rested in user hand using right.Some
In embodiment, AES128 algorithm can be taken, the first key K1 of generation is 16HEX byte.Detailed process can be compiled by user
A string of any character passwords are collected, convert it into 16HEX byte using algorithm is secondary, encrypting storing monitor video generates terminal 10
In security context.Here the identifier that monitor video generates terminal 10 is the identity distinguished different monitoring video and generate terminal 10
ID can generate terminal 10 in production phase burning unique end GID using in monitor video here.Key Management Center 30 connects
Corresponding second key K2 at the first time can be generated according to the identifier by receiving the identifier, and Key Management Center 30 is regarded according to monitoring
Frequency generates the uniqueness that the GID of terminal 10 has, and derives from corresponding unique code key, accomplishes that a monitor video generates terminal 10
One code key.In this way, being cracked key when a monitor video generates terminal 10, other monitor videos generate terminal 10 also not
It can equally be cracked.In order to increase the difficulty cracked, first time, which is added, simultaneously for Key Management Center 30 derives from, and generates each
First time corresponding unique code key i.e. the second key K2 of monitor video generation terminal 10.Cryptographic operation can take AES128
Algorithm, it may be 16HEX byte that this, which requires derivative second code key K2,.
S2, during video record, video generates terminal 10 according to recording time and the Relation acquisition of first time the
Two key K2, and third key K3 is generated according to first key K1 and the second key K2, and when by third key K3 to recording
Between the encryption of corresponding recorded video to obtain encrypted video;Specifically, monitor video generates terminal 10 during video record
The second key K2 can be obtained from Key Management Center 30 according to the corresponding relationship of video record time and first time, for example, this
In first time be a time point perhaps a period when recording between when being the time point or period, then
Will obtain the time point or period corresponding second key K2, and according to first key K1 and the second key K2 generate with
The first time corresponding second key K3, then adds the recorded video in the recording time by third key K3
Close acquisition encrypted video, it is to be understood that, recording time continues up, when recording between when changing, with
One time, corresponding relationship can also change, can be according to new recording time and the then after completing a recording time
The corresponding relationship of one time obtains the second new key K2, new third key K3 is generated, to the recording in new recording time
Video is encrypted, and is successively gone on, and the recorded video of different recording times is obtained, and is regarded with finally obtaining complete record
Frequently.
S3, video using terminal 20 obtain encrypted video, video generates the identifier of terminal 10 and the record of encrypted video
Time processed, according to identifier, recording time and the second key of the Relation acquisition of first time K2;Specifically, video using terminal
20 receive the encrypted video, while obtaining the corresponding video of the video and generating the identifier of terminal 10 and the recording of encrypted video
Time, it is to be understood that, video using terminal 20 can get the knowledge that the video generates terminal 10 by the encrypted video
Not Fu and encrypted video recording time, as outlined above, Key Management Center 30 generate the second key K2 and video frequency
Generate terminal identifier and at the first time at one-to-one relationship, then video using terminal 20 can be according to the view got
Frequency generates the identifier of terminal 10 and the recording time and the corresponding relationship of first time of encrypted video, from key management
The heart 30 obtains corresponding second key K2.
S4, video using terminal 20 obtain first key K1 to generate third key K3 according to the second key K2, by the
Three key K3 decrypt encrypted video.Specifically, video using terminal 20 obtains the first key K1 of user simultaneously, it is close according to first
Key K1 and the second key K2 generates third key K3, and the method that third key K3 is generated here is referred to above description.Then
The encrypted video is decrypted by third key K3.It is to be understood that the video record time can be to be multiple, according to different
The corresponding relationship of video record time and first time can obtain corresponding second key of each recording time respectively here
K2 generates corresponding third key K3, successively the encrypted video of different recording times is decrypted, until completing entire encryption
The decryption of video.
Further, in step sl, Key Management Center 30 is generated includes: with corresponding second key K2 at the first time
Key Management Center 30 divides system time according to preset time rule, raw to obtain multiple continuous first times
At multiple second key K2s corresponding with first sub- time.Specifically, first time here can be preset, example
Such as, the time can be divided according to certain rules, rule here can be divided according to identical interval time, each
A interval time corresponding first time, each interval time includes an initial time and terminates the time here, here may be used
To be calculated with interval time and identifier, corresponding second key K2 is generated.Here the initial time of first time and end
Only the time is certain, then the second key K2 generated is also unique corresponding with first time.
Further, as shown in Fig. 2, a kind of video-encryption decryption method of the invention further include:
S301, video using terminal 20 according to preset time Rule encrypted video a recording time, according to recording
Time obtains its corresponding second key K2 from Key Management Center 30 with the relationship of first time;Specifically, video uses eventually
Rule is arranged according to the same time used when generating with the second key K2 in end 20, by the video pair in preset time rule
It should be a recording time, and according to the relationship of the video record time and the first time of preset time rule, such as here
The video record time is corresponding at the first time with this, then the first time corresponding second key K2 can be obtained.Here also
It is appreciated that the recording time progress during video record is segmented according to preset time rule, this time will be met
The recording time of rule positions same recording time, it is only necessary to obtain the according to the recording time and first time corresponding relationship
Two key K2.
S302, video using terminal 20 generate third key K3 according to first key K1 and the second key K2, to pass through the
Three key K3 decrypt the corresponding encrypted video of the recording time;Specifically, the recording time is one corresponding according to the key pair
Encrypted video in time interval is decrypted.
S303, decrypted after the corresponding encrypted video of the recording time, obtain another recording time thereafter and obtain
Its corresponding second key K2;And step S302 is executed, it is completed until the encrypted video of all recording times is decrypted.Specifically,
When having decrypted the encrypted video in the interval time, then by the way of above, obtain next interval time section, obtain should between
Every a period corresponding recording time, corresponding second key K2 is obtained, third key K3 is generated, carries out the interval time
The encrypted video of section, circuits sequentially in this way, the encrypted video until completing entire recording time.
Further, as shown in figure 3, a kind of video-encryption decryption method of the invention further include:
S311, video using terminal 20 according to preset time Rule encrypted video multiple recording times, according to this
Multiple recording times obtain its corresponding multiple second key K2 from Key Management Center 30 with the relationship of first time;Specifically
, video using terminal 20 can also obtain continuous multiple according to prefixed time interval identical with Key Management Center 30
Recording time in prefixed time interval, each recording time corresponds to a first time here, then multiple recording times
It corresponding multiple and different first time, in this way can be according to recording time with the corresponding relationship of first time, from key management
The heart 30 disposably gets multiple second key K2.
S312, video using terminal 20 generate third key K3 according to first key K1 and the second key K2, by being somebody's turn to do
Third key K3 successively decrypts the encrypted video in corresponding recording time;Specifically, video using terminal 20 was being got
After second key K2, it can successively calculate according to the sequence of recording time and generate third key K3, then successively decrypt multiple record
Time processed corresponding encrypted video, calculate here third key K3 be also possible to once calculate it is multiple, such as when from key management
After center 30 gets multiple second key K2, calculating is carried out to multiple second key K2 and gets multiple third key K3,
Then successively the corresponding encrypted video of each recording time is solved with the corresponding relationship of recording time according to third key K3
It is close.
S313, during decrypting the encrypted video of multiple recording time, it is other more after obtaining multiple recording times
A recording time simultaneously obtains its corresponding multiple second key K2, executes step S312, until the encryption of all recording times regards
Frequency decryption is completed.Specifically, can be obtained simultaneously multiple during decrypting the encrypted video of above-mentioned multiple recording times
The subsequent other multiple recording times of recording time, then obtain the second key K2 according to method described above, are calculated
Corresponding third key K3 is obtained to decrypt encrypted document.It is to be understood that subsequent multiple recording times are corresponding
It is carried out again after the completion of the corresponding encrypted video decryption of acquisition multiple recording times necessarily in front of second key K2, it can be with
The corresponding encryption of one or more recording time behind is arrived in the corresponding encrypted video decryption of multiple recording times in front
It goes to obtain again after the completion of decryption of video, ensure that the continuity of decrypting process and the delay or shakiness due to network in this way
Video playing is interrupted caused by fixed.
Further, the time of Key Management Center 30 is all made of with recording time at the first time.Specifically, here
One time and recording time are all made of the time of Key Management Center 30, this ensures that video generates terminal 10 and key pipe
The time at reason center 30 can be unified, while also be avoided that video occur generates the modification of 10 time of terminal and cause key can not
Corresponding situation.Guarantee that different videos generates terminal 10 and generates the second key K2 specification by Key Management Center 30 simultaneously
Property.
Further, in some embodiments, in step sl, first key K1 is obtained, comprising: input and use by user
Family password generates first key K1;In further embodiments, in step s 4, video using terminal 20 obtains the first secret key K1
It include: to input user password by user to generate first key K1.Specifically, boundary can be configured by WEB by user terminal
Face is that user setting level-one encrypts code key K1, here it is further appreciated that user terminal can be same with video using terminal 20
It is a, such as user mobile phone, account and password can be inputted by user mobile phone, first key is generated according to the account and password
K1.Here video using terminal 20 equally can also input account and password by user to generate first key K1.
Further, in one embodiment, in step s 4, the identifier that video generates terminal 10 is obtained, comprising: video
Using terminal 20 inputs the identifier for obtaining video and generating terminal 10 by user;In another embodiment, video using terminal
20 obtain the identifier that video generates terminal 10 by interpreting encrypted video.It is produced specifically, video using terminal 20 obtains video
The identifier of raw terminal 10, the GID that terminal 10 can be generated by user's input video are obtained, such as video generates terminal 10 and exists
When carrying out GID generation, while terminal 10 generated in video, visual GID acquisition modes are provided, such as can pass through bar code, two dimension
Code perhaps gets GID then video using terminal 20 such as mobile phone or computer by way of setting inquiry, can input
Or scan the GID.For convenience, also sometimes, video generates terminal 10 during video generates, in the attribute of video
The GID that video used in the video record generates terminal 10 is added in information, which does not need to decrypt or only need letter
Single decryption can obtain, and such video using terminal 20 can be got by interpreting some public informations of encrypted video
The corresponding video of the video generates the GID of terminal 10.
Further, in step s3, it includes: that video uses that video using terminal 20, which obtains the recording time of encrypted video,
Terminal 20 interprets the attribute information of encrypted video to obtain the recording time of encrypted video.Specifically, video using terminal 20 obtains
The recording time of encrypted video is taken, can be obtained by the attribute information of encrypted video, here during video record, meeting
Attribute information comprising generating the video record time, here can also be regular according to preset interval above, during video,
Recording time is divided, and is added to the attribute information of video, understand attribute information here for disclosure or only needs letter
Single decryption, such video using terminal 20 only need to interpret the attribute information of the encrypted video, both available to arrive video record
Time.
Here it with one embodiment, is described in detail, Key Management Center 30 generates terminal according to monitor video
10GID and its time, which pass through, derives from the second key K2 of algorithm Input (GID, Duration)=Ouptut (K2x) generation, here
Each period D1, D2, D3 ... Dn is taken according to predeterminable event interval, then the second key K2 generated is followed successively by K2_1, K2_
It is corresponding that 2, K2_3 ... K2_n respectively correspond key time section D1, D2, D3 ... Dn.According to algorithm Input (K1, K2_1)=
Output (K3_1), monitor video generate terminal 10 and encrypt K2_1 with first key K1, obtain K3_1;Monitor video generates terminal
10 encrypt monitoring video video using K3_1.Before the period, D1 was exhausted, monitor video generates terminal 10 can be to key
Administrative center 30 obtains the second code key K2_2 of subsequent time period D2, obtains third key with first key K1 encryption K2_2
K3_2 encrypts monitoring video video using K3_2 when D1, which terminates D2, to be started.And so on complete entire video record during
Video-encryption.
During decryption of video, monitor video using terminal 20 is when playing back video, when can obtain the video record
Between and corresponded to obtain corresponding K2_1 according to recording time, and with period D1, then decrypted by first key K1
K2_1 obtains third key K3_1, the encryption video obtained by K3_1 decryption.Meanwhile passing through new recording time and D2
Corresponding relationship obtain K2_2, by first key K1 decrypt K2_2 obtain third key K3_2, reached when the D1 time, in the time
Continue decryption by third key K3_2 in section D2 to play, and so on.And so on know the solution for completing entire encrypted video
It is close.
In addition, as shown in Figure 4 and Figure 5, a kind of video-encryption decryption system of the invention is applied to video monitoring, comprising: view
Frequency generates terminal 10, Key Management Center 30 and video using terminal 20;Video generates terminal 10 and is used to carry out video record
Preceding acquisition first key K1;Key Management Center 30 is used to receive video and generates the identifier of terminal 10 to generate and first time
Corresponding second key K2;Video generates terminal 10 and is also used to during video record according to recording time and first time
Relation acquisition the second key K2, and third key K3 is generated according to first key K1 and the second key K2, to pass through third key
K3 encrypts to obtain encrypted video the corresponding recorded video of recording time;Video using terminal 20 for obtain encrypted video,
Video generates the identifier of terminal 10 and the recording time of encrypted video, according to identifier, recording time and first time
The second key of Relation acquisition K2;Video using terminal 20 is also used to obtain first key K1 to generate third according to the second key K2
Key K3 decrypts encrypted video by third key K3.Specifically, video generates terminal 10, Key Management Center 30 and video
Using terminal 20 realizes the process of video-encryption and decryption referring to previously mentioned jointly, and which is not described herein again.
Further, as shown in fig. 6, a kind of video-encryption decryption system of the invention, further includes that connection video generates eventually
The Cloud Server 4040 at end 10 and video using terminal 20, Cloud Server 4040 are used to receive video and generate adding for the generation of terminal 10
Close video is simultaneously sent to video using terminal 20.Specifically, video generates terminal 10 and carries out video here on the basis of above
The encrypted video got after recording encryption can be uploaded to Cloud Server 4040 or platform is stored and is managed collectively, video
Using terminal 20 obtains the encrypted video from Cloud Server 4040 or platform as needed and broadcasting is decrypted.
It should be understood that above embodiments only express the preferred embodiment of the present invention, description is more specific and detailed
Carefully, but it cannot be understood as limitations on the scope of the patent of the present invention;It should be pointed out that for the common skill of this field
For art personnel, without departing from the inventive concept of the premise, above-mentioned technical characterstic can be freely combined, can also be done
Several modifications and improvements out, these are all within the scope of protection of the present invention;Therefore, all to be done with scope of the invention as claimed
Equivalents and modification, should belong to the covering scope of the claims in the present invention.
Claims (10)
1. a kind of video-encryption decryption method is applied to video monitoring, which comprises the following steps:
S1, before carrying out video record, video generates terminal and obtains first key K1, and Key Management Center receives the video and produces
The identifier of raw terminal is to generate and corresponding second key K2 at the first time;
S2, during video record, the video generates terminal according to the Relation acquisition of recording time and the first time
The second key K2, and third key K3 is generated according to the first key K1 and the second key K2, and pass through the third
Key K3 encrypts to obtain encrypted video the corresponding recorded video of the recording time;
S3, video using terminal obtain the encrypted video, the identifier of video generation terminal and the encrypted video
Recording time, according to the second key K2 described in the identifier, the Relation acquisition of the recording time and the first time;
S4, the video using terminal obtain the first key K1 to generate the third key according to the second key K2
K3 decrypts the encrypted video by the third key K3.
2. video-encryption decryption method according to claim 1, which is characterized in that in the step S1, the key
Administrative center generates includes: with corresponding second key K2 at the first time
The Key Management Center divides system time according to preset time rule, to obtain multiple continuous described the
One time generated the multiple second key K2s corresponding with the first time.
3. video-encryption decryption method according to claim 2, which is characterized in that the method also includes:
The recording time of S301, the video using terminal according to encrypted video described in the preset time Rule, root
Its corresponding second key is obtained from the Key Management Center with the relationship of the first time according to the recording time
K2;
S302, the video using terminal generate the third key K3 according to the first key K1 and the second key K2, with
The corresponding encrypted video of the recording time is decrypted by the third key K3;
S303, decrypted after the corresponding encrypted video of the recording time, obtain another recording time thereafter and to obtain its right
The the second key K2 answered;And step S302 is executed, it is completed until the encrypted video of all recording times is decrypted.
4. video-encryption decryption method according to claim 2, which is characterized in that the method also includes:
S311, the video using terminal according to encrypted video described in the preset time Rule multiple recording times,
According to multiple recording time and the relationship of the first time from the Key Management Center obtain its corresponding multiple second
Key K2;
S312, the video using terminal generate third key K3 according to the first key K1 and the second key K2, to pass through
Third key K3 successively decrypts the encrypted video in corresponding recording time;
S313, during decrypting the encrypted video of multiple recording time, it is other more after obtaining the multiple recording time
A recording time simultaneously obtains its corresponding multiple second key K2, executes step S312, until the encryption of all recording times regards
Frequency decryption is completed.
5. video-encryption decryption method according to claim 1, which is characterized in that when the first time and the recording
Between be all made of time of the Key Management Center.
6. video-encryption decryption method according to claim 1, which is characterized in that in the step S1, the acquisition
First key K1, comprising: user password is inputted by user and generates the first key K1;And/or
In the step S4, the video using terminal obtains the first secret key K1 and includes:
User password, which is inputted, by user generates the first key K1.
7. video-encryption decryption method according to claim 1, which is characterized in that in the step S4, the acquisition
The video generates the identifier of terminal, comprising:
The video using terminal inputs the identifier for obtaining the video and generating terminal by user;Or
The video using terminal obtains the identifier that the video generates terminal by interpreting the encrypted video.
8. video-encryption decryption method according to claim 1, which is characterized in that in the step S3, the video
The recording time that using terminal obtains the encrypted video includes:
The video using terminal interprets the attribute information of the encrypted video to obtain the recording time of the encrypted video.
9. a kind of video-encryption decryption system is applied to video monitoring characterized by comprising video generates terminal, key pipe
Reason center and video using terminal;
The video generates terminal and is used to obtain first key K1 before carrying out video record;
The Key Management Center is used to receive the video and generates the identifier of terminal to generate corresponding with first time the
Two key K2;
The video generates terminal and is also used to obtain during video record according to recording time and the relationship of the first time
It takes the second key K2, and third key K3 is generated according to the first key K1 and the second key K2, to pass through described the
Three key K3 encrypt to obtain encrypted video the corresponding recorded video of the recording time;
Video using terminal is used to obtain the encrypted video, the identifier of video generation terminal and the encrypted video
Recording time, according to the second key K2 described in the identifier, the Relation acquisition of the recording time and the first time;
The video using terminal is also used to obtain the first key K1 to generate the third according to the second key K2
Key K3 decrypts the encrypted video by the third key K3.
10. video-encryption decryption system according to claim 6, which is characterized in that further include connecting the video to generate
The Cloud Server of terminal and video using terminal, the Cloud Server are used to receive the video and generate the encryption view that terminal generates
Frequency is simultaneously sent to the video using terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811326457.6A CN109413449B (en) | 2018-11-08 | 2018-11-08 | Video encryption and decryption method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811326457.6A CN109413449B (en) | 2018-11-08 | 2018-11-08 | Video encryption and decryption method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109413449A true CN109413449A (en) | 2019-03-01 |
CN109413449B CN109413449B (en) | 2021-02-05 |
Family
ID=65472375
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811326457.6A Active CN109413449B (en) | 2018-11-08 | 2018-11-08 | Video encryption and decryption method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109413449B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113613040A (en) * | 2021-10-11 | 2021-11-05 | 北京创米智汇物联科技有限公司 | Video file encryption method, decryption method and key management method |
CN114338176A (en) * | 2021-12-29 | 2022-04-12 | 支付宝(杭州)信息技术有限公司 | Data transmission method, device and network card |
CN118520478A (en) * | 2024-05-28 | 2024-08-20 | 北京点控互联信息技术有限公司 | Efficient encryption method for financial data based on blockchain |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060009247A1 (en) * | 2004-07-12 | 2006-01-12 | Kelley Sean S | Method and apparatus for controlling a delivery of a broadcast-multicast flow in a packet data communication system |
US20100246826A1 (en) * | 2009-03-27 | 2010-09-30 | Sony Corporation | Digital cinema management device and digital cinema management method |
CN102821110A (en) * | 2012-09-06 | 2012-12-12 | 深圳英飞拓科技股份有限公司 | Password finding method used for audio/video storage device |
CN103200387A (en) * | 2013-02-16 | 2013-07-10 | 北京视博数字电视科技有限公司 | Protection method and protection system of surveillance video content |
EP2804388A1 (en) * | 2013-05-14 | 2014-11-19 | TP Vision Holding B.V. | Common interface host and common interface conditional access module |
CN104270614A (en) * | 2014-10-16 | 2015-01-07 | 浙江宇视科技有限公司 | Video encryption and decryption method and device |
US20150326393A1 (en) * | 2014-05-09 | 2015-11-12 | Sony Pictures Entertainment Inc. | Content individualization |
CN105721903A (en) * | 2014-12-26 | 2016-06-29 | 乐视网信息技术(北京)股份有限公司 | Method and system for playing online videos |
CN106791935A (en) * | 2016-12-23 | 2017-05-31 | 中山大学 | A kind of Internet video first broadcast method and system |
CN108768920A (en) * | 2018-03-26 | 2018-11-06 | 苏州科达科技股份有限公司 | A kind of recorded broadcast data processing method and device |
-
2018
- 2018-11-08 CN CN201811326457.6A patent/CN109413449B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060009247A1 (en) * | 2004-07-12 | 2006-01-12 | Kelley Sean S | Method and apparatus for controlling a delivery of a broadcast-multicast flow in a packet data communication system |
US20100246826A1 (en) * | 2009-03-27 | 2010-09-30 | Sony Corporation | Digital cinema management device and digital cinema management method |
CN102821110A (en) * | 2012-09-06 | 2012-12-12 | 深圳英飞拓科技股份有限公司 | Password finding method used for audio/video storage device |
CN103200387A (en) * | 2013-02-16 | 2013-07-10 | 北京视博数字电视科技有限公司 | Protection method and protection system of surveillance video content |
EP2804388A1 (en) * | 2013-05-14 | 2014-11-19 | TP Vision Holding B.V. | Common interface host and common interface conditional access module |
US20150326393A1 (en) * | 2014-05-09 | 2015-11-12 | Sony Pictures Entertainment Inc. | Content individualization |
CN104270614A (en) * | 2014-10-16 | 2015-01-07 | 浙江宇视科技有限公司 | Video encryption and decryption method and device |
CN105721903A (en) * | 2014-12-26 | 2016-06-29 | 乐视网信息技术(北京)股份有限公司 | Method and system for playing online videos |
CN106791935A (en) * | 2016-12-23 | 2017-05-31 | 中山大学 | A kind of Internet video first broadcast method and system |
CN108768920A (en) * | 2018-03-26 | 2018-11-06 | 苏州科达科技股份有限公司 | A kind of recorded broadcast data processing method and device |
Non-Patent Citations (1)
Title |
---|
王浩: "基于MPEG4的网络视频流加密技术的研究", 《电脑知识与技术》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113613040A (en) * | 2021-10-11 | 2021-11-05 | 北京创米智汇物联科技有限公司 | Video file encryption method, decryption method and key management method |
CN114338176A (en) * | 2021-12-29 | 2022-04-12 | 支付宝(杭州)信息技术有限公司 | Data transmission method, device and network card |
CN118520478A (en) * | 2024-05-28 | 2024-08-20 | 北京点控互联信息技术有限公司 | Efficient encryption method for financial data based on blockchain |
Also Published As
Publication number | Publication date |
---|---|
CN109413449B (en) | 2021-02-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113037460B (en) | Federal learning privacy protection method based on homomorphic encryption and secret sharing | |
US12113891B2 (en) | Encrypting and decrypting information | |
US20230108682A1 (en) | Data processing method and apparatus, device, and computer-readable storage medium | |
US7477748B2 (en) | Session key distribution methods using a hierarchy of key servers | |
CN111130757A (en) | Multi-cloud CP-ABE access control method based on block chain | |
CN109413449A (en) | A kind of video-encryption decryption method and system | |
CN113033828A (en) | Model training method, using method, system, credible node and equipment | |
Xu et al. | An integrated privacy preserving attribute-based access control framework supporting secure deduplication | |
CN106878013B (en) | File encryption and decryption method and device | |
CN104134022A (en) | Information hiding and protecting method based on image | |
CN108768647B (en) | Random number generation method for block chain | |
WO2020003821A1 (en) | Information processing system, information processing method, and information processing device | |
CN113411323B (en) | Medical record data access control system and method based on attribute encryption | |
WO2017033843A1 (en) | Searchable cryptograph processing system | |
CN103607278A (en) | Safe data cloud storage method | |
CN115765965A (en) | Medical data safety sharing method based on federal learning and double union block chains | |
Xiong et al. | A secure document self-destruction scheme: an ABE approach | |
CN104168320B (en) | The method and system that a kind of user data is shared | |
CN115801276A (en) | Automobile network threat information security sharing method, system and storage medium | |
CN113630250B (en) | Model training method and system based on data encryption | |
CN113132345B (en) | Agent privacy set intersection method with searchable function | |
CN113810184A (en) | Equipment password escrow method and system based on dynamic threshold multi-secret sharing | |
CN109120576A (en) | Data sharing method and device, computer equipment and storage medium | |
Gong | [Retracted] Application Research of Data Encryption Algorithm in Computer Security Management | |
CN116668149A (en) | Electronic medical data sharing method based on policy hiding and attribute updating |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |