CN109525893A - Video segment method based on slice file duration threshold value - Google Patents

Video segment method based on slice file duration threshold value Download PDF

Info

Publication number
CN109525893A
CN109525893A CN201811385708.8A CN201811385708A CN109525893A CN 109525893 A CN109525893 A CN 109525893A CN 201811385708 A CN201811385708 A CN 201811385708A CN 109525893 A CN109525893 A CN 109525893A
Authority
CN
China
Prior art keywords
file
video
slice
duration threshold
threshold value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811385708.8A
Other languages
Chinese (zh)
Inventor
欧兴宁
黄海亮
梁瑛玮
洪行健
李长杰
冷冬
丁一
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yifang Information Technology Co Ltd
Original Assignee
Guangzhou Yifang Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yifang Information Technology Co Ltd filed Critical Guangzhou Yifang Information Technology Co Ltd
Priority to CN201811385708.8A priority Critical patent/CN109525893A/en
Publication of CN109525893A publication Critical patent/CN109525893A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/108Resource delivery mechanisms characterised by resources being split in blocks or fragments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4402Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving reformatting operations of video signals for household redistribution, storage or real-time display
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/845Structuring of content, e.g. decomposing content into time segments
    • H04N21/8456Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/85Assembly of content; Generation of multimedia applications
    • H04N21/854Content authoring
    • H04N21/8547Content authoring involving timestamps for synchronizing content

Abstract

The invention discloses a kind of video segment methods based on slice file duration threshold value, and including the following steps: will be locally downloading the video file of Web Video Service platform to be processed from distributed memory system;Extract all key frame informations of source video;The start-stop position of quantity and each slice file in source video file according to the key frame information of source video based on duration threshold calculations slice file;Based on the whole slice location informations being calculated, source video file is cut in specified start-stop position, then saves as binary file respectively;The metadata of source video is saved as into text file with JSON format by server end and uploads to distributed memory system;The load and broadcasting of slice of data are realized according to the content of text file by video player.The present invention has taken into account the safety and performance of video-encryption, and video file is cut into several small documents, greatly reduces the pressure and load of server end.

Description

Video segment method based on slice file duration threshold value
Technical field
The present invention relates to video processing and data encryption technology fields, relate more specifically to a kind of based on slice file duration The video segment method of threshold value is sliced video file by key frame, and is added to several data files after slice It is close.
Background technique
With continuous speed-raising, the rapid development of internet especially mobile Internet and the smart phone etc. of network broadband The continuous promotion of terminal device performance, network video have been increasingly becoming the important information carrier of internet, by network video into Row information propagation becomes increasingly prevalent.Correspondingly, Web Video Service platform comes into being, these platforms predominantly have video The focal pointe of publication demand provides the functions such as video upload, storage, distribution, broadcasting, reduces the technical threshold of Video Applications, So that business and application based on network video can Quick threads.
For Web Video Service platform, the antitheft copyright protection with video content of video is very important core Function.User uploads the video to Video service platform, and platform will carry out coded treatment to video, then the video handled well It is distributed by CDN, enables video to be propagated and played by internet, as shown in Figure 1.In this process, such as What prevents malicious person's unauthorized theft video or plays unwarranted video, protects the legal power of video uploader Benefit, it appears be even more important and great challenge.
Currently, the scheme that many Video service platforms are taken in terms of Video security protection mainly has video link antitheft Chain, video playing anti-record screen, use DRM system of third party manufacturer etc. at video content simple encryption.
Video link door chain be mainly access registrar mechanism increased to the chained address of video, such as to access source into Row legitimacy verifies generally verify the HTTP head or required parameter of request, allow to access if through verification, if Verification does not pass through, then server, which will be considered that, requests illegal, denied access.Door chain is mainly used for preventing illegal download, and HTTP and required parameter can all be forged, therefore the safety of this protection of resources scheme is relatively poor, generally requires Cooperate other encipherment schemes to implement the protection to resource.
Video playing anti-record screen mainly inhibited or interfered with using some technological means video viewers by screen come Illegal admission video content, usually there are two types of implementation methods: first is that video player has detected whether during playing video Browser plug-in records the content in player region, if there is then player is automatically stopped broadcasting;Second is that video playing Device shows dynamic text or copyright notice information in player region at random, plays interference screen during playing video The effect of recording.Anti- record screen can not protect the copyright of video content well, by technological means, the video such as acting on behalf of, distorting Stealer is also possible to steal video content.
Video content simple encryption is that video content is encrypted using Encryption Algorithm, and player is needed before broadcasting First video stream data is decrypted, this is video-encryption scheme truly, but since network video needs support Streaming broadcasting, i.e. player play while download video stream, and since client CPU, memory etc. are resource-constrained, to view Frequency plays experience and requires, and is generally not suitable for using complicated, time-consuming Encryption Algorithm, calculated usually using exclusive or come to data into Row encryption and decryption, safety are lower.By the analysis to video encapsulation format, while by some data analysis tools, very It is easy that video content can be cracked.Therefore, this simple encipherment scheme does not have higher safety, is unable to effective protection view The copyright of frequency content.
DRM system using third party manufacturer is the mainstream solution of video content copyright protection, and DRM protection technique is straight Junction permits the disposition of content content itself by defining each participant in entire operation flow, using various encryptions and Authentication mechanism ensures the equity of the participants such as contents producer, editor, publisher, network operator.DRM solution is logical It is commonly present following problems or limitation:
The encryption of part is once cracked, and entire DRM system will perform practically no function, and can not implement effective safeguard protection again; Concurrent online viewing number is limited to the service ability of License Server, in a large number of users simultaneously to License Server In the case where applying for authorization identifying, DRM system often blocks, on-hook, influences the viewing of user and the normal operation of system;It awards Power certification experience is poor, in the case where Network status is unstable, may result in the licensing damage of downloading, can not play view Frequently.Meanwhile user needs to install drm agent when watching the video of DRM protection, process is cumbersome, and user experience is poor;Deployment DRM system has higher technical threshold, and needs to put into a large amount of fund, therefore is unfavorable for universal use.
Summary of the invention
In view of the above technical problems, the purpose of the present invention is to provide a kind of videos based on slice file duration threshold value to cut Piece method, so-called duration threshold value refer to the playing duration of each slice file, for example duration threshold value is 10 seconds, then it represents that view Playing duration about 10 seconds of each slice file after frequency file slice, the playing duration of all slice files are added as whole The playing duration of a source video file.Video segment technology easily several hundred million video file can be divided into several several million Slice small documents, slice small documents and the big file of source video be more easily than through transmission on Internet and distribution, can be according to broadcasting The adaptively selected suitable code rate of network speed speed for putting end plays out, and obtains more preferably video playing and experiences, while can be right Slice small documents are respectively adopted different algorithm and key and are encrypted, to increase the difficulty for cracking video, can more effectively protect Protect video content copyright.
To achieve the above object, the present invention is realized according to following technical scheme:
A kind of video segment method based on slice file duration threshold value, includes the following steps:
Step S1: the video file of Web Video Service platform to be processed will be downloaded to from distributed memory system It is local;
Step S2: extracting all key frame informations of source video, and wherein video is multiple continuous picture group compositions, closes Key frame information includes position where frame, locating timestamp;
Step S3: it quantity according to the key frame information of source video based on duration threshold calculations slice file and each cuts Start-stop position of the piece file in source video file;
Step S4: based on the whole slice location informations being calculated, specified start-stop position to source video file into Row cutting, then saves as binary file respectively;
Step S5: the metadata of source video is saved as with JSON format by text file by server end and is uploaded to point Cloth storage system;
Step S6: the load and broadcasting of slice of data are realized according to the content of text file by video player.
In above-mentioned technical proposal, the text file also includes the acquisition of Encryption Algorithm used by each slice, key Mode.
In above-mentioned technical proposal, step S5 specifically comprises the following steps:
Step S501: encrypting several slice files being cut into respectively, and the key of encryption generates at random, And it saves in the database;
Step S502: the playing duration of video, file size, the quantity for being sliced file, each index for being sliced file Number, playing duration, byte length, access path metadata save as text file with JSON format;
Step S503: all slice files and meta data file are uploaded in distributed memory system;
Slice file: being pushed to CDN node by step S504 in advance so that video player when playing video directly from Slice file is removed in CDN node drawing, shortens the time required for downloading slice file.
In above-mentioned technical proposal, step S6 specifically comprises the following steps:
Step S601: video player before playing video, using HTTPS agreement obtain video slice information and The meta data file of encryption information;
Step S602: video player obtains key by accessing the XML file of another encryption come decryption element number According to file;
Step S603: the meta data file after decryption is downloaded and is cached in memory, video player is distinguished in order Download each slice file;
Step S604: file is sliced with the encryption XML decryption requested before this by the index of slice file, after decryption It is to be played that buffer area etc. is added to after slice file;
Step S605: video is played out by the video stream data of decoding buffer zone;
Step S606: call the event handling function pre-defined monitor occur in video display process it is secondary slow Punching occurs broadcasting dragging, suspends the event for playing, restoring broadcasting.
Compared with the prior art, the invention has the following advantages:
The present invention has taken into account the safety and performance of video-encryption, and video file is cut into several small documents, respectively Each small documents are encrypted using different algorithm and key, are on the one hand conducive to accelerate what small documents were downloaded by network On the other hand speed enhances safety since each slice uses different Encryption Algorithm and key to a certain extent, It does not need to greatly reduce the pressure and load of server end by network come transmission key and progress authentication simultaneously, by Distribute slice file in having used CDN, therefore even if having a large amount of user while watching video, source server will not be enabled to go out Now obstruction or on-hook, to improve the availability of entire protection system.Meanwhile system integrates anti-record screen technology again, it can be effective It prevents from stealing video by way of screen recording, thus the copyright of effective protection video content.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the issuing process schematic diagram of network video;
Fig. 2 is the video segment processing flow schematic diagram based on duration threshold value;
Fig. 3 is the process flow according to source video key frame and threshold calculations slice location information.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.
Firstly, the technical term presented in used technical solution is explained and illustrated in the present invention, specifically Wherein network video: ground refers to the video for being transmitted and being played by internet, including movie and video programs, educational training video, prison Control video etc..The abbreviation of CDN:Content Delivery Network, i.e. content distributing network, by being deployed in various regions Edge Server obtains user nearby in institute by functional modules such as the load balancing, content distribution, scheduling of central platform Hold, reduce network congestion, improves user's access response speed and hit rate.
The abbreviation of DRM:Digital Rights Management, i.e. digital copyright management refer to that publisher is used to control Some technologies of the right to use of protected object processed (such as: software, film, music).Digital copyright management is with audio-video Program wide-scale distribution and a kind of new technology for growing up on the internet, the purpose is to protect the copyright of Digital Media, from skill The bootlegging of Digital Media is prevented in art, or makes to replicate to a certain extent highly difficult, and end user must be awarded Power could use Digital Media.
HTTP:Hyper Text Transfer Protocol, hypertext transfer protocol are that interconnection web-based applications are the widest A kind of general network protocol.
Video segment: refer to and existing video file is cut into several small documents or data flow by certain means.
Code rate (Bit Rate): referring to the data volume that video file uses within the unit time, usually using kbps (kilobit It is per second) it is used as unit.Frame per second (Frame Rate): refer to the video frame number shown in the unit time, unit is fps (Frames per Second)。
Multimedia container (Multimedia Container): i.e. multimedia encapsulation format is referred to encoded pressure The video track and audio track to have contracted is saved in a file according to the format of regulation, and the extension name of usual file is exactly to encapsulate lattice Name of formula, such as FLV, MP4, AVI, MKV etc..
The solution of FFmpeg: one open source code, free processing video and audio, it contains some views Frequently/audio coding decoding library.
The abbreviation of AES:Advanced EncryptionStandard, i.e. Advanced Encryption Standard, in cryptography also known as Rijndael enciphered method is a kind of block encryption standard that U.S. Federal Government uses, and has been analyzed in many ways and widely full generation Used in boundary.
The abbreviation of JSON:JavaScript ObjectNotation is a kind of data interchange format of lightweight, its base In a subset of ECMAScript, data are stored and indicated using the text formatting for being totally independent of programming language, are had Succinct and clear hierarchical structure feature is easy to people and reads and write, while being also easy to machine parsing and generating, and effectively being promoted Network transmission efficiency.
The present invention first analyzes the key frame of video, and video slicing is cut at several with duration threshold value according to key frame information Piece file carries out symmetric cryptography using different algorithm and key to each slice file respectively further according to condition.End is being played, Player first passes through HTTPS agreement and obtains encrypted video information and slice the file information, calculates further according to rule function every Encryption Algorithm and key used by a slice file play out, in order to prevent player after decrypting to slice file data Software is needed to carry out player code high level to obscure processing by decompiling.
Specifically, embodiments of the present invention disclose a kind of video segment method based on slice file duration threshold value, Process flow is as shown in FIG. 2 and 3, includes the following steps:
Step S1: the video file of Web Video Service platform to be processed will be downloaded to from distributed memory system It is local;Here, the video file of Web Video Service platform is typically stored in distributed system.
Step S2: extracting all key frame informations of source video, and wherein video is multiple continuous picture group compositions, closes Key frame information includes position where frame, locating timestamp;In a specific embodiment of the invention, using FFmpeg tool Extract all key frame informations of video.
Wherein, every section of picture group is made of an I frame and several B frames or P frame, is one group of continuous picture.Picture group In I frame be intra-coded frame and as key frame, P frame is forward predicted frame, and B frame is two-way interpolation frame.Use open-source generation The FFmpeg tool of code finds out all I frame informations of source video.
Step S3: it quantity according to the key frame information of source video based on duration threshold calculations slice file and each cuts Start-stop position of the piece file in source video file;Slice needs to be cut in the position of key frame, is otherwise playing end matching Connect the situation that will appear blank screen when broadcasting.Generally, due to can receive in the playing duration and threshold value for comparing slice Error, therefore the playing duration of each slice file is not necessarily exactly equal to threshold value, is likely less than or is greater than threshold value.
Step S4: based on the whole slice location informations being calculated, specified start-stop position to source video file into Row cutting, then saves as binary file respectively;
Step S5: the metadata of source video is saved as with JSON format by text file by server end and is uploaded to point Cloth storage system;
Step S6: the load and broadcasting of slice of data are realized according to the content of text file by video player.
In the present invention, if encrypted to slice file, it is also necessary to include each slice institute in text file Encryption Algorithm, the acquisition modes of key of use.Slice of data can be realized according to the content of this text file in video player Load and broadcasting.
Step S5 specifically comprises the following steps:
Step S501: encrypting several slice files being cut into respectively, and the key of encryption generates at random, And it saves in the database;
For several slice files being cut into, these are sliced the arrangement number of being ordered into of files, it is assumed that algorithms library There is N kind Encryption Algorithm, Encryption Algorithm used in file can be sliced by taking slice file serial number to determine N modulus, The key of encryption can generate at random, save in the database.
Step S502: the playing duration of video, file size, the quantity for being sliced file, each index for being sliced file Number, playing duration, byte length, access path metadata save as text file with JSON format;
Wherein, how many slice files, the access address of each slice file, slice have been cut into for video file The serial number of file, the ciphertext offset being sliced in file, is sliced the data such as size and the playing duration of file, is referred to as first number According to.After the completion of all slice file process, the text file these meta-data preservations at a JSON format is needed, is played Device needs this meta data file when playing video to handle slice of data, therefore using AES encryption algorithm to meta data file It is encrypted, can be transmitted in a network.
Step S503: all slice files and meta data file are uploaded in distributed memory system;
Step S504: slice file is pushed to CDN node in advance, wherein slice file is pushed to CDN node in advance Purpose be to provide for preferably play experience so that video player when playing video directly from CDN node draw go to cut Piece file, does not need to return to source station and pulls, and shortens the time required for downloading slice file.
Step S6 specifically comprises the following steps:
Step S601: video player before playing video, using HTTPS agreement obtain video slice information and The meta data file of encryption information;
Step S602: video player obtains key by accessing the XML file of another encryption come decryption element number According to file;
Since it is to be understood that the meta data file of video is the text file of a JSON format, this document is used Aes algorithm is encrypted, therefore player needs first to decrypt this file, and the key of decryption is by accessing another encryption XML file obtains.
Step S603: the meta data file after decryption is downloaded and is cached in memory, video player is distinguished in order Download each slice file;
Player downloads each slice file after the meta data file for having parsed JSON format respectively in order, and right The decryption oprerations for being sliced file are just carried out after the completion of all ciphertext data are all downloaded, it is therefore desirable to first the data of downloading Caching in memory, is decrypted again after waiting all ciphertext data for having downloaded slice file.
Step S604: file is sliced with the encryption XML decryption requested before this by the index of slice file, after decryption It is to be played that buffer area etc. is added to after slice file;
Step S605: video is played out by the video stream data of decoding buffer zone;
Step S606: call the event handling function pre-defined monitor occur in video display process it is secondary slow Punching occurs broadcasting dragging, suspends the event for playing, restoring broadcasting.
It is illustrated below entirely based on the video segment process of duration threshold value:
The video for being 25.80 seconds to a playing duration, we use its frame of the FFmpeg tool analysis of open source code Information extracts all key frames (I frame), obtains following 14 key frame informations.
Assuming that the duration threshold value that the present invention defines slice is 10 seconds, i.e., the playing duration of each slice file is about 10 Second, the start-stop position that then we cut according to the pkt_pts_time information of each key frame come calculation document, wherein the 1st The pkt_pts_time=0.000000 of a key frame, the pkt_pts_time=2.000000 of the 2nd key frame, the 3rd pass The pkt_pts_time=4.000000 ... of key frame, the pkt_pts_time=10.000000 of the 6th key frame, meets threshold Value, then the 1st slice file initial position be the 1st key frame (pkt_pts=0 | pkt_pts_time= 0.00000), end position is the 6th key frame (pkt_pts=10000 | pkt_pts_time=10.000000).It needs This explains that there are two types of timestamps in Ffmpeg: dts (decoding time stamp) and pts (presentation Time stamp), the former is the decoded time, and the latter is the time shown, and frame image exists pkt_pts_time here thus When point is shown, this timestamp of each key frame should be different.When watching video, under player Mono- progress bar of Fang Huiyou, having time scale on progress bar, is exactly to show what frame, the length of progress bar on what scale It is exactly total playing duration of video.
Similarly, can determine the 2nd slice file initial position be the 6th key frame (pkt_pts=10000 | pkt_ Pts_time=10.000000), end position be the 11st key frame (pkt_pts=19800 | pkt_pts_time= 19.800000).3rd slice file initial position be the 11st key frame (pkt_pts=19800 | pkt_pts_time =19.800000), since remaining duration is not enough to reach threshold value, ending of the end position to original video file.
According to the calculated result of previous step, original video is cut into 3 data blocks in the start-stop position of each slice, and divide Bao Cun not be at binary file, these binary files become slice file.Wherein binary file refers to byte data, this A little byte datas are saved into binary file, are realized by the interface of call operation system, and different programming languages use Interface may be different, for example can be developed with Java be exactly to call directly the IO packet of JDK to operate.
According to the information such as the store path of the calculated result of step 2 and step 3 slice file, the member of creation slice video Data content (uses JSON format), and saves as text file, and the meta data file for being sliced video is JSON format, includes Field has: all server identifications of video ID, playing duration, total file size, slice version number, slice, are cut at the slice time Piece listed files, wherein slice listed files is an array, each array element includes reference number of a document, position, slice The playing duration of file, the access address for being sliced file, please refer to example JSON.
Although above having used general explanation and specific embodiment, the present invention is described in detail, at this On the basis of invention, it can be made some modifications or improvements, this will be apparent to those skilled in the art.Therefore, These modifications or improvements without departing from theon the basis of the spirit of the present invention are fallen within the scope of the claimed invention.

Claims (4)

1. a kind of video segment method based on slice file duration threshold value, which comprises the steps of:
Step S1: the video file of Web Video Service platform to be processed will be downloaded to this from distributed memory system Ground;
Step S2: extracting all key frame informations of source video, and wherein video is multiple continuous picture group compositions, key frame Information includes position where frame, locating timestamp;
Step S3: quantity and each slice text according to the key frame information of source video based on duration threshold calculations slice file Start-stop position of the part in source video file;
Step S4: based on the whole slice location informations being calculated, source video file is cut in specified start-stop position It cuts, then saves as binary file respectively;
Step S5: the metadata of source video is saved as with JSON format by text file by server end and uploads to distribution Storage system;
Step S6: the load and broadcasting of slice of data are realized according to the content of text file by video player.
2. a kind of video segment method based on slice file duration threshold value according to claim 1, which is characterized in that institute Stating text file also includes Encryption Algorithm used by each slice, the acquisition modes of key.
3. a kind of video segment method based on slice file duration threshold value according to claim 2, which is characterized in that step Rapid S5 specifically comprises the following steps:
Step S501: several slice files being cut into are encrypted respectively, the key of encryption generates at random, and protects It deposits in the database;
Step S502: the playing duration of video, file size, be sliced file quantity, it is each slice file index number, Playing duration, byte length, access path metadata save as text file with JSON format;
Step S503: all slice files and meta data file are uploaded in distributed memory system;
Slice file: being pushed to CDN node by step S504 in advance, so that video player is when playing video directly from CDN Slice file is removed in node drawing, shortens the time required for downloading slice file.
4. a kind of video segment method based on slice file duration threshold value according to claim 3, which is characterized in that step Rapid S6 specifically comprises the following steps:
Step S601: video player obtains the slice information and encryption of video using HTTPS agreement before playing video The meta data file of information;
Step S602: video player obtains key by accessing the XML file of another encryption come decrypted metadata text Part;
Step S603: the meta data file after decryption being downloaded and is cached in memory, and video player is downloaded respectively in order Each slice file;
Step S604: file is sliced with the encryption XML decryption requested before this by the index of slice file, by the slice after decryption It is to be played that buffer area etc. is added to after file;
Step S605: video is played out by the video stream data of decoding buffer zone;
Step S606: the event handling function pre-defined is called to monitor the secondary buffer occurred in video display process, hair Raw play pulls, pause broadcasting, restores the event played.
CN201811385708.8A 2018-11-20 2018-11-20 Video segment method based on slice file duration threshold value Pending CN109525893A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811385708.8A CN109525893A (en) 2018-11-20 2018-11-20 Video segment method based on slice file duration threshold value

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811385708.8A CN109525893A (en) 2018-11-20 2018-11-20 Video segment method based on slice file duration threshold value

Publications (1)

Publication Number Publication Date
CN109525893A true CN109525893A (en) 2019-03-26

Family

ID=65776694

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811385708.8A Pending CN109525893A (en) 2018-11-20 2018-11-20 Video segment method based on slice file duration threshold value

Country Status (1)

Country Link
CN (1) CN109525893A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109996095A (en) * 2019-03-28 2019-07-09 湖南快乐阳光互动娱乐传媒有限公司 A kind of network video-on-demand prevents from stealing method, system and the medium of chain broadcasting
CN110896505A (en) * 2019-11-29 2020-03-20 天脉聚源(杭州)传媒科技有限公司 Video link anti-theft method, system, device and storage medium
CN111741377A (en) * 2020-05-19 2020-10-02 北京奥鹏远程教育中心有限公司 Video processing method
CN111800649A (en) * 2019-10-31 2020-10-20 北京沃东天骏信息技术有限公司 Method and device for storing video and method and device for generating video
CN112637694A (en) * 2020-12-16 2021-04-09 杭州当虹科技股份有限公司 HLS information source one-speed-multiple transmission control method
CN114821936A (en) * 2022-03-21 2022-07-29 慧之安信息技术股份有限公司 Method and device for detecting illegal criminal behaviors based on edge calculation
CN115119016A (en) * 2022-06-29 2022-09-27 王雨佳 Information data encryption algorithm
CN117336311A (en) * 2023-11-30 2024-01-02 深圳市小溪流科技有限公司 Method and device for keeping consistency of multiple HLS server slices

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN105282627A (en) * 2014-07-22 2016-01-27 中兴通讯股份有限公司 Method for acquiring a live video clip and server
US20160198202A1 (en) * 2012-12-10 2016-07-07 Koninklijke Kpn N.V. Digital Rights Management for Segmented Content
CN106331752A (en) * 2016-08-31 2017-01-11 杭州当虹科技有限公司 Streaming media video file protection method
CN107483978A (en) * 2017-07-19 2017-12-15 河南神州数码索贝科技有限公司 A kind of video anti-stealing link method based on FFMPEG
CN108769807A (en) * 2018-04-19 2018-11-06 上海大学 A kind of video encryption method based on Android platform

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160198202A1 (en) * 2012-12-10 2016-07-07 Koninklijke Kpn N.V. Digital Rights Management for Segmented Content
CN105282627A (en) * 2014-07-22 2016-01-27 中兴通讯股份有限公司 Method for acquiring a live video clip and server
CN105208404A (en) * 2015-08-26 2015-12-30 北京新东方迅程网络科技有限公司 Video encryption and decryption method and device
CN106331752A (en) * 2016-08-31 2017-01-11 杭州当虹科技有限公司 Streaming media video file protection method
CN107483978A (en) * 2017-07-19 2017-12-15 河南神州数码索贝科技有限公司 A kind of video anti-stealing link method based on FFMPEG
CN108769807A (en) * 2018-04-19 2018-11-06 上海大学 A kind of video encryption method based on Android platform

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109996095A (en) * 2019-03-28 2019-07-09 湖南快乐阳光互动娱乐传媒有限公司 A kind of network video-on-demand prevents from stealing method, system and the medium of chain broadcasting
CN111800649A (en) * 2019-10-31 2020-10-20 北京沃东天骏信息技术有限公司 Method and device for storing video and method and device for generating video
CN110896505A (en) * 2019-11-29 2020-03-20 天脉聚源(杭州)传媒科技有限公司 Video link anti-theft method, system, device and storage medium
CN111741377A (en) * 2020-05-19 2020-10-02 北京奥鹏远程教育中心有限公司 Video processing method
CN112637694A (en) * 2020-12-16 2021-04-09 杭州当虹科技股份有限公司 HLS information source one-speed-multiple transmission control method
CN114821936A (en) * 2022-03-21 2022-07-29 慧之安信息技术股份有限公司 Method and device for detecting illegal criminal behaviors based on edge calculation
CN115119016A (en) * 2022-06-29 2022-09-27 王雨佳 Information data encryption algorithm
CN117336311A (en) * 2023-11-30 2024-01-02 深圳市小溪流科技有限公司 Method and device for keeping consistency of multiple HLS server slices
CN117336311B (en) * 2023-11-30 2024-03-12 深圳市小溪流科技有限公司 Method and device for keeping consistency of multiple HLS server slices

Similar Documents

Publication Publication Date Title
CN109348292A (en) A kind of video segment method based on slice file byte-threshold
CN109525893A (en) Video segment method based on slice file duration threshold value
US20230214459A1 (en) Digital rights management for http-based media streaming
US9038147B2 (en) Progressive download or streaming of digital media securely through a localized container and communication protocol proxy
US20130283051A1 (en) Persistent License for Stored Content
KR101854919B1 (en) Method and apparatus for providing drm service
CN106375834B (en) A kind of offline playback method of online encrypted slice video and device based on iOS operating system
JP2013534684A (en) Method and apparatus for providing DRM service
US20090044241A1 (en) Broadcasting content protection/management system
CA2973611C (en) Reducing start-up delay in streaming media sessions
US8081756B2 (en) Implementation of media-protection policies
US20220245220A1 (en) Content recording and group encryption
US11373009B2 (en) Content playlist integrity
CN106209896B (en) Streaming media encryption method and module based on audio and video formats
US20070050293A1 (en) Method and apparatus for distributing content to a client device
KR100635128B1 (en) Apparatus for generating encrypted motion-picture file with iso base media format and apparatus for reconstructing encrypted motion-picture, and method for reconstructing the same
EP3468164A1 (en) A method for delivering digital content to at least one client device
US11949933B2 (en) Systems and methods for managing access to content assets
CN117241067B (en) Video security retrieval method and system based on fingerprint watermark
US8656499B1 (en) Client-side bit-stripping system and method
US10515194B2 (en) Key rotation scheme for DRM system in dash-based media service
Park et al. Protecting ASF movie on VOD
CA2516909A1 (en) Method and apparatus for distributing content to a client device
KR20100103474A (en) Method for recording and restoring a ciphered content by a processing unit

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190326

RJ01 Rejection of invention patent application after publication