CN109547198B - System for network transmission video file - Google Patents

System for network transmission video file Download PDF

Info

Publication number
CN109547198B
CN109547198B CN201811367842.5A CN201811367842A CN109547198B CN 109547198 B CN109547198 B CN 109547198B CN 201811367842 A CN201811367842 A CN 201811367842A CN 109547198 B CN109547198 B CN 109547198B
Authority
CN
China
Prior art keywords
video file
terminal
module
server
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811367842.5A
Other languages
Chinese (zh)
Other versions
CN109547198A (en
Inventor
陆郝凌
栾敏文
吴猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Zijin Mountain Virtual Reality Technology Research Institute Co Ltd
Original Assignee
Nanjing Zijin Mountain Virtual Reality Technology Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Zijin Mountain Virtual Reality Technology Research Institute Co Ltd filed Critical Nanjing Zijin Mountain Virtual Reality Technology Research Institute Co Ltd
Priority to CN201811367842.5A priority Critical patent/CN109547198B/en
Publication of CN109547198A publication Critical patent/CN109547198A/en
Application granted granted Critical
Publication of CN109547198B publication Critical patent/CN109547198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Abstract

The invention discloses a system for transmitting video files through a network, which comprises a server end and at least one terminal capable of establishing communication connection with the server end, wherein the server end is provided with a service server and a data server: the data server comprises a video database and a key database: the service server comprises an identity verification module, a verification code generation module and a secret key generation module: the terminal is set to respond to passing of identity authentication, a video file downloading request is made to the server side, request data are encrypted according to the authentication code, the server side receives the request, confirms the downloading request according to the authentication code, and sends a video file and a dynamic secret key corresponding to the downloading request to the terminal, and the terminal comprises an encryption module and a playing module. The invention is beneficial to effectively solving the problem of utilization of the computing resources of the server and ensuring the security of the file.

Description

System for network transmission video file
Technical Field
The invention relates to the technical field of internet data communication, in particular to a method for transmitting video files through a network.
Background
With the rapid development of computer technology, network technology and communication technology, network users (especially terminal users) can quickly and conveniently search and acquire video files, and due to the wide storage and transmission of the files, the problems of stealing, tampering, illegal transmission and the like of the video files are more serious, and the legitimate rights and interests of originators are damaged. The importance and universality of the encryption protection of video files are also increasingly emphasized.
At present, most encryption methods for network transmission of video files are concentrated on a server side, the encryption process of the video files is completed on the server through methods such as an encryption algorithm, the video files in a database are completely encrypted or partially encrypted, and then other modules are added to a client side or the server to increase the security. For example, CN101572805B discloses a secure video transmission system, in which video data is encrypted at a server, decrypted at a client, and a watermark embedding module is added to increase security. CN103647971B discloses an encryption and decryption method and system based on video transmission, where a fast transcoding encryption technique is completed in a server, and transmission and encryption of each video are independently completed by using a secure sandbox technique. CN105939491A discloses a playing method for video encryption and decryption, where the system includes a proxy service plug-in, the proxy service plug-in obtains an encrypted video stream from a server, and the client decrypts the encrypted video stream through the proxy service plug-in and plays the decrypted video stream.
However, with the rapid increase of large data files such as video, the encryption work performed on the server affects the work efficiency of the database server system, and the system is overwhelmed. The encryption process occupies a large amount of computing resources of the server, so that the speed of the server responding to other instructions is reduced, for example, the speed of a plurality of users applying for obtaining video files at the same time at the client is reduced, and the use experience is influenced.
Generally, a temporary folder for video files transmitted and stored locally through a network is the highest risk part in the whole video file transmission process, and therefore, the security of the folder needs to be ensured as much as possible to ensure the security of data files.
Disclosure of Invention
The invention aims to provide a system and a method for transmitting video files through a network, which can effectively solve the problem of utilization of computing resources of a server and can ensure the security of the files.
In order to achieve the purpose, the technical scheme adopted by the invention is as follows:
the system for transmitting the video file by the network comprises a server end and at least one terminal capable of establishing communication connection with the server end,
the server side is provided with a service server and a data server:
-the data server comprises a video database and a key store:
the video database is used for storing video files in a specified format;
the key bank is used for storing dynamic keys corresponding to the video files;
-the service server comprises an identity verification module, a verification code generation module and a key generation module:
the identity authentication module is used for performing identity authentication according to a received user identity authentication request from the terminal;
the verification code generation module is used for responding to the passing of the identity verification, generating a unique verification code corresponding to the terminal which makes the request and returning the unique verification code to the terminal; the verification code is configured to encrypt communication data with the verification code within a set time period of communication between the requesting terminal and the server side;
the key generation module is used for generating a dynamic key of a video file with a specified format;
the terminal is set to respond to the passing of identity authentication, a request for downloading a video file is made to the server side, the requested data is encrypted according to the authentication code, the server side receives the request, confirms the downloading request according to the authentication code, and sends the video file and the dynamic secret key corresponding to the downloading request to the terminal, and the terminal comprises an encryption module and a playing module: the encryption module is used for encrypting the downloaded video file according to the dynamic key when the downloaded video file is received, and forming a local encrypted file at the terminal; the playing module is provided with a decryption component, and before playing the video file, the playing module plays the video file after decrypting through the decryption component.
In some embodiments, the service server further includes a source file processing module and a source file database, the source file processing module is configured to perform format check and conversion on the source video file uploaded to the server, the source file database temporarily stores the source video file as a buffer, and: if the source video file is in the designated format, generating a dynamic key, and storing the dynamic key and the source video file into a data server; if the source video file is in the non-specified format, the source video file is firstly converted into the specified format and then is generated into the dynamic key, and the dynamic key and the converted video file are stored in the data server together.
In some embodiments, the terminal is further provided with a cleaning module configured to clean the dense library in response to playing the completed video file.
According to the disclosure of the present invention, a method for transmitting a video file over a network is also provided, which comprises the following steps:
the terminal sends an identity authentication request to the server;
the server verifies the request and returns a result message to the terminal, wherein the result message comprises a unique verification code generated by the server and corresponding to the proposed request terminal in response to passing of the identity verification; the verification code is configured to encrypt communication data with the verification code within a set time period of communication between the requesting terminal and the server side;
a terminal sends a video file downloading request to a server;
the server decrypts the downloading request content according to the verification code corresponding to the terminal and sends the corresponding video file and the dynamic key corresponding to the video file to the terminal;
after receiving the video file and the dynamic key, the terminal encrypts the video file according to the dynamic key to form an encrypted file and stores the encrypted file into a secret library in a local memory of the terminal;
before the terminal plays the video file, the encrypted file is decrypted and then played through the player.
In a further embodiment, at the terminal, in response to the player completing playing the video file, the library is cleared.
By the technical scheme, the invention has the remarkable advantages that:
1. the video file encryption process is completed at the client, so that the computing resources of the server are saved, the working efficiency of the server is improved, a user can use the video file at the client more quickly and efficiently, the safety of the user can be ensured, the copyright and the confidentiality of the file are protected, and the video file is prevented from being stolen, transferred, stolen and plagiarized randomly
2. Verification of a verification code in the communication process ensures that all communication data interaction between the terminal and the server within the login time is encrypted through a Key, so that the privacy of communication is ensured;
3. the video files are stored in a designated uniform format at the server side, and are stored in a plaintext at the server side, so that later calling and processing are facilitated, and the problems that multiplexing is difficult and a public database is difficult to form at the later stage due to the fact that the traditional encrypted storage is in the server are avoided; the integrity and the safety of the video file effectively stored at the server end are guaranteed, and meanwhile, all data are encrypted through a symmetric encryption algorithm after being downloaded to the terminal, so that the data are guaranteed against being stolen and used.
It should be understood that all combinations of the foregoing concepts and additional concepts described in greater detail below can be considered as part of the inventive subject matter of this disclosure unless such concepts are mutually inconsistent. In addition, all combinations of claimed subject matter are considered a part of the presently disclosed subject matter.
The foregoing and other aspects, embodiments and features of the present teachings can be more fully understood from the following description taken in conjunction with the accompanying drawings. Additional aspects of the present invention, such as features and/or advantages of exemplary embodiments, will be apparent from the description which follows, or may be learned by practice of specific embodiments in accordance with the teachings of the present invention.
Drawings
The drawings are not intended to be drawn to scale. In the drawings, each identical or nearly identical component that is illustrated in various figures may be represented by a like numeral. For purposes of clarity, not every component may be labeled in every drawing. Embodiments of various aspects of the present invention will now be described, by way of example, with reference to the accompanying drawings, in which:
fig. 1 is a system diagram of network transmission of video files according to the present invention.
Fig. 2 is a flow chart of network transmission of video files of the present invention.
Fig. 3 is a flow chart of an end user requesting to upload a video file.
Fig. 4 is a flow chart of an end user requesting a video file download.
FIG. 5 is a schematic diagram of a source file processing module.
Detailed Description
In order to better understand the technical content of the present invention, specific embodiments are described below with reference to the accompanying drawings.
In this disclosure, aspects of the present invention are described with reference to the accompanying drawings, in which a number of illustrative embodiments are shown. Embodiments of the present disclosure are not necessarily intended to include all aspects of the invention. It should be appreciated that the various concepts and embodiments described above, as well as those described in greater detail below, may be implemented in any of numerous ways, and that the concepts and embodiments disclosed herein are not limited to any embodiment. In addition, some aspects of the present disclosure may be used alone, or in any suitable combination with other aspects of the present disclosure.
Referring to fig. 1 to 4, a system for network transmission of video files according to an embodiment of the present invention includes a server 100 and at least one terminal 200, where the terminal 200 may establish a communication connection with the server through a network to perform data transmission and communication.
The server 100 has at least one cloud server or an array of multiple cloud servers, and is configured to provide authentication, storage of video files, downloading of video files, and other service request processing.
The terminal 200, such as a mobile nb (note book), a Smart Phone terminal (Smart Phone), a Smart mobile Device (PD), etc., has a processor, a memory, a display, an IO interface unit, a communication unit, an input/output unit, etc., which are physically and electrically connected through a system bus to transmit and interact data, so as to implement data processing and service.
In some examples, the terminal 200 stores an application program in memory to be called by the processor to perform one or more procedures to implement the functions and services of the program. Such as encryption programs, player applications, etc.
In connection with the example of fig. 1, the server side 100 has a service server 110 and a data server 120.
The service server 110 includes an authentication module 111, a verification code generation module 112, and a key generation module 113.
The authentication module 111 is configured to perform authentication according to a user authentication request received from the terminal, and the authentication method is especially selectable to perform password verification, such as a password character string formed by more than 6 digits, letters and a combination thereof. Of course, in other embodiments, biometric authentication such as fingerprint verification, facial recognition verification, etc. may also be used for identity verification.
And the verification code generation module 112 is configured to generate a unique verification code corresponding to the requested terminal in response to the identity verification being passed, and return the unique verification code to the terminal.
In this embodiment, the generated verification code is configured to encrypt the communication data with the verification code within a set time period of the communication between the requesting terminal and the server. This time period is set to be within the time range of the login.
The verification code is preferably in the form of a fixed-length character string, so as to facilitate quick verification.
And a key generation module 113, configured to generate a dynamic key of the video file in the specified format. Each video file corresponds to a dynamic key to form a data linked list to be stored in the server. The video file and the dynamic key are stored in the data server 120.
The data server 120 includes a video database 121 and a key store 122: the video database 121 is used for storing video files in a specified format; the keystore 122 is configured to store dynamic keys corresponding to video files.
In conjunction with fig. 2, the terminal 200 is configured to respond to the authentication passing, and when it is desired to download the video file for playing, may make a request for downloading the video file to the server 100 and encrypt the requested data according to the received authentication code.
The service server 110 at the server receives the download request, confirms the download request according to the verification code, and sends the video file and the dynamic key corresponding to the download request to the terminal 200. And after receiving the local cipher text, the terminal locally encrypts the local cipher text to form a local cipher text, and then decrypts and plays the local cipher text through the dynamic key during playing.
The terminal 200 includes an encryption module 210, a play module 220, and a secret library 230 disposed in a memory.
The encryption module 210 is configured to encrypt the downloaded video file according to the dynamic key when receiving the video file, and form a local encrypted file at the terminal; the playing module 220 is provided with a decryption component, and before playing the video file, the playing module plays the video file after decrypting through the decryption component.
A secret library 230 for storing encrypted video files.
Preferably, the encryption module 210 performs encryption processing by using a symmetric encryption algorithm.
Preferably, the terminal 200 is further provided with a cleaning module 240 configured to clean the key bank in response to the video file being played, so that the video file and the dynamic key can be cleaned in time after the video file is used up by the terminal user, and the privacy of the video file is protected.
In conjunction with fig. 1, the business server 110 further includes a source file processing module 114 and a source file database 115. The source file processing module 114 is configured to perform format check and conversion on the source video file uploaded to the server side, and the source file database 115 temporarily stores the source video file as a buffer.
If the source video file is in the specified format, a dynamic key is generated and stored in the data server 120 together with the source video file; if the source video file is in the non-specified format, the source video file is converted into the specified format and then the dynamic key is generated and stored in the data server 120 together with the converted video file. Therefore, the method ensures the uniformity of the format, is beneficial to forming a public database, and is convenient for uniform downloading and calling and the consistent use of the client.
In some specific examples, the source file processing module 114 includes a format checking module 114A for identifying a format of a source video file uploaded to the server to determine whether the source video file is in a specified format, and a format converting module 114B for converting a source video file in a non-specified format into a video file in a specified format.
Preferably, the file of the designated format is a video file of MP4 format.
As shown in fig. 3, the user terminal sends a video uploading request to the service server, the service server verifies the user identity first, when the identity information is illegal, the service server feeds back information to inform the user terminal, and when the user identity information passes the verification, the user terminal can start to upload the source video file; after receiving a source video file uploaded by a user, a business server judges whether the file is a file with a specified format, if the file is not in a format, the format of the source video file is converted, then a key generation module generates a corresponding dynamic key of the video file, the key is stored in a database server key bank, and the video file with the specified format is stored in a plaintext database of a data server, namely a video database; if the format of the uploaded source video file is the specified format, the uploaded source video file is directly stored in a video database, a key generation module generates a corresponding dynamic key of the video file, and the key is stored in a key database of a database server.
Referring to fig. 1, a method for network transmission of video files according to another aspect of the present invention includes:
the terminal sends an identity authentication request to the server;
then the server verifies the request and returns a result message to the terminal, wherein the result message comprises a unique verification code which is generated by the server and corresponds to the proposed request terminal in response to passing of the identity verification; the verification code is configured to encrypt communication data with the verification code within a set time period of communication between the requesting terminal and the server side;
then, the terminal sends a video file downloading request to the server;
the server decrypts the downloading request content according to the verification code corresponding to the terminal and sends the corresponding video file and the dynamic key corresponding to the video file to the terminal;
after receiving the video file and the dynamic key, the terminal encrypts the video file according to the dynamic key to form an encrypted file and stores the encrypted file into a secret library in a local memory of the terminal;
before the terminal plays the video file, the encrypted file is decrypted and then played through the player.
Preferably, the terminal cleans the secret library in response to the player playing the finished video file.
As shown in fig. 3, this figure describes an exemplary flow of a client requesting to download a playing video file.
The user terminal sends a video downloading and playing request to the service server, the identity authentication module authenticates the identity of the user, when the identity information is illegal, the service server feeds back information to inform the user, and after the identity information of the user passes the authentication, the user can start downloading a video file from the video database; the data server transmits the selected video file and the dynamic key thereof to the terminal, and the terminal encrypts the video file by adopting a symmetric encryption algorithm after receiving the video file and the dynamic key thereof and stores the video file into a secret library; when the terminal calls the video file data in the ciphertext library, the decryption playing module calls a dynamic key corresponding to the video file and starts to decrypt and play the video file. After the video file is used, the terminal automatically cleans the corresponding video file and the dynamic key in the ciphertext folder phase.
By the scheme, the integrity and the safety of the data are guaranteed, all the data are encrypted through a symmetric encryption algorithm, and the data are protected from being stolen and used; meanwhile, the encryption process is finished at the client, so that the computing resources of the server are saved, the working efficiency of the server is improved, a user can use the video file at the client more quickly and efficiently, and the safety of the user can be ensured.
Although the present invention has been described with reference to the preferred embodiments, it is not intended to be limited thereto. Those skilled in the art can make various changes and modifications without departing from the spirit and scope of the invention. Therefore, the protection scope of the present invention should be determined by the appended claims.

Claims (6)

1. A system for network transmission of video files, comprising a server and at least one terminal capable of establishing a communication connection with the server, wherein:
the server side is provided with a service server and a data server:
-the data server comprises a video database and a key store:
the video database is used for storing video files in a specified format;
the key bank is used for storing dynamic keys corresponding to the video files;
-the service server comprises an identity verification module, a verification code generation module and a key generation module:
the identity authentication module is used for performing identity authentication according to a received user identity authentication request from the terminal;
the verification code generation module is used for responding to the passing of the identity verification, generating a unique verification code corresponding to the terminal which makes the request and returning the unique verification code to the terminal; the verification code is configured to encrypt communication data with the verification code within a set time period of communication between the requesting terminal and the service server;
the key generation module is used for generating a dynamic key of a video file with a specified format;
the terminal is set to respond to the passing of identity authentication, a request for downloading a video file is made to the data server side, the requested data is encrypted according to the authentication code, the data server side receives the request, confirms the downloading request according to the authentication code, and sends the video file and the dynamic key corresponding to the downloading request to the terminal, and the terminal comprises an encryption module and a playing module:
the encryption module is used for encrypting the downloaded video file according to the dynamic key when the downloaded video file is received, and forming a local encrypted file at the terminal;
the playing module is provided with a decryption component, and before playing the video file, the playing module plays the video file after decrypting through the decryption component;
the service server further comprises a source file processing module and a source file database, wherein the source file processing module is configured to perform format check and conversion on a source video file uploaded to the data server, the source file database serves as a buffer area to temporarily store the source video file, and: if the source video file is in the designated format, generating a dynamic key, and storing the dynamic key and the source video file into a data server; if the source video file is in the non-specified format, the source video file is firstly converted into the specified format and then is generated into the dynamic key, and the dynamic key and the converted video file are stored in the data server together.
2. The system for network transmission of video files according to claim 1, wherein:
the source file processing module comprises a format checking module and a format conversion module, wherein the format checking module is used for identifying the format of a source video file uploaded to the data server so as to judge whether the source video file is in a specified format, and the format conversion module is used for converting a source video file in a non-specified format into a video file in a specified format.
3. The system for network transmission of video files according to claim 1, wherein:
and a secret library is arranged in a memory of the terminal and used for storing encrypted video files.
4. The system for network transmission of video files according to claim 3, wherein:
the terminal is further provided with a cleaning module configured to clean the close library in response to playing the completed video file.
5. The system for network transmission of video files according to claim 1, wherein:
and the encryption module of the terminal adopts a symmetric encryption algorithm to carry out encryption processing.
6. The system for network transmission of video files according to claim 1, wherein:
the verification code generation module is configured to generate the verification code in a fixed-length character string manner.
CN201811367842.5A 2018-11-16 2018-11-16 System for network transmission video file Active CN109547198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811367842.5A CN109547198B (en) 2018-11-16 2018-11-16 System for network transmission video file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811367842.5A CN109547198B (en) 2018-11-16 2018-11-16 System for network transmission video file

Publications (2)

Publication Number Publication Date
CN109547198A CN109547198A (en) 2019-03-29
CN109547198B true CN109547198B (en) 2020-03-10

Family

ID=65847914

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811367842.5A Active CN109547198B (en) 2018-11-16 2018-11-16 System for network transmission video file

Country Status (1)

Country Link
CN (1) CN109547198B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112118208B (en) * 2019-06-20 2023-06-27 北京沃东天骏信息技术有限公司 Method and device for reporting data
CN110248166B (en) * 2019-07-12 2021-04-20 东软集团股份有限公司 Video information processing method, client, electronic device and storage medium
CN111885397A (en) * 2020-06-17 2020-11-03 视联动力信息技术股份有限公司 Data encryption and decryption method and device
CN113489729B (en) * 2021-07-09 2023-08-29 福州数据技术研究院有限公司 Webpage verification generation method and system based on preset video
CN115086730B (en) * 2022-06-16 2024-04-02 平安国际融资租赁有限公司 Subscription video generation method, subscription video generation system, computer equipment and subscription video generation medium
CN115361593B (en) * 2022-08-19 2023-04-07 湖北巨字传媒有限公司 Video equipment data secure transmission method and system
CN115914677A (en) * 2022-09-19 2023-04-04 上海辰锐信息科技有限公司 Intelligent video safety networking device and server
CN117454363B (en) * 2023-12-22 2024-03-12 北京安泰伟奥信息技术有限公司 Public accumulation fund extraction supervision method and equipment based on master-slave terminal information identification

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621661B (en) * 2008-06-30 2013-02-13 北京中星微电子有限公司 Audio-video encryption and decryption transmission system
US20110179444A1 (en) * 2010-01-19 2011-07-21 Electronics And Telecommunications Research Institute Apparatus and method for downloading conditional access images
CN102984115B (en) * 2011-09-02 2016-03-16 中国长城计算机深圳股份有限公司 A kind of network security method and client-server
CN104270614B (en) * 2014-10-16 2017-07-14 浙江宇视科技有限公司 A kind of video-encryption decryption method and device
CN104602033A (en) * 2015-01-08 2015-05-06 深圳市同洲电子股份有限公司 Encrypting, playing method and playing system of VOD video
CN106572367A (en) * 2015-10-08 2017-04-19 中移(杭州)信息技术有限公司 Multimedia file obtaining method, device and system
CN106650482A (en) * 2015-11-04 2017-05-10 阿里巴巴集团控股有限公司 Electronic file encryption method and device, electronic file decryption method and device and electronic file encryption and decryption system
CN107347058B (en) * 2016-05-06 2021-07-23 阿里巴巴集团控股有限公司 Data encryption method, data decryption method, device and system
CN106559573B (en) * 2016-11-11 2019-09-06 努比亚技术有限公司 Mobile terminal and multimedia data processing method

Also Published As

Publication number Publication date
CN109547198A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
CN109547198B (en) System for network transmission video file
CN109151053B (en) Anti-quantum computing cloud storage method and system based on public asymmetric key pool
CN109962784B (en) Data encryption, decryption and recovery method based on multiple digital envelope certificates
CN107707504B (en) Streaming media playing method and system, server and client
CN104917741B (en) A kind of plain text document public network secure transmission system based on USBKEY
CN110855671A (en) Trusted computing method and system
CN101977190B (en) Digital content encryption transmission method and server side
CN113067699B (en) Data sharing method and device based on quantum key and computer equipment
CN111447214A (en) Method for centralized service of public key and password based on fingerprint identification
CN108809633B (en) Identity authentication method, device and system
CN110868291B (en) Data encryption transmission method, device, system and storage medium
CN109684129B (en) Data backup recovery method, storage medium, encryption machine, client and server
CN107920052B (en) Encryption method and intelligent device
CN112597523B (en) File processing method, file conversion encryption machine, terminal, server and medium
JPH07325785A (en) Network user identifying method, ciphering communication method, application client and server
CN113452687B (en) Method and system for encrypting sent mail based on quantum security key
CN109347923B (en) Anti-quantum computing cloud storage method and system based on asymmetric key pool
CN111639357B (en) Encryption network disk system and authentication method and device thereof
CN108809936A (en) A kind of intelligent mobile terminal auth method and its realization system based on Hybrid Encryption algorithm
CN111600948B (en) Cloud platform application and data security processing method, system, storage medium and program based on identification password
CN114154181A (en) Privacy calculation method based on distributed storage
CN114765543A (en) Encryption communication method and system of quantum cryptography network expansion equipment
CN109412788B (en) Anti-quantum computing agent cloud storage security control method and system based on public key pool
CN111368271A (en) Method and system for realizing password management based on multiple encryption
JP2001344214A (en) Method for certifying terminal and cipher communication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant