CN110769306B - Subtitle decryption method and device, client and storage medium - Google Patents
Subtitle decryption method and device, client and storage medium Download PDFInfo
- Publication number
- CN110769306B CN110769306B CN201910969381.7A CN201910969381A CN110769306B CN 110769306 B CN110769306 B CN 110769306B CN 201910969381 A CN201910969381 A CN 201910969381A CN 110769306 B CN110769306 B CN 110769306B
- Authority
- CN
- China
- Prior art keywords
- key
- ciphertext
- subtitle
- decrypting
- stored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/435—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream
- H04N21/4353—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream involving decryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/60—Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client
- H04N21/63—Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
- H04N21/633—Control signals issued by server directed to the network components or client
- H04N21/6332—Control signals issued by server directed to the network components or client directed to client
- H04N21/6334—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
- H04N21/63345—Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Studio Circuits (AREA)
Abstract
The disclosure relates to a subtitle decryption method and device, a client and a storage medium. The subtitle decryption method comprises the following steps: acquiring subtitle ciphertext of a resource to be played; if the first key ciphertext for decrypting the subtitle ciphertext is determined to be stored locally, decrypting the first key ciphertext stored locally by using a locally pre-stored second key to obtain a first key; and decrypting the caption ciphertext by using the first key to obtain a caption plaintext. According to the embodiment, the first key ciphertext is decrypted by using the locally pre-stored second key to obtain the first key, and the subtitle ciphertext is decrypted by using the first key to obtain the subtitle plaintext, namely the embodiment adopts a double decryption mode to obtain the subtitle plaintext, so that the safety of subtitle transmission can be ensured.
Description
Technical Field
The present disclosure relates to the field of communications, and in particular, to a subtitle decryption method and apparatus, a client, and a storage medium.
Background
In order to enable a hearing impaired user or a user inconvenient to start equipment sound to use a video application program (app), a function of displaying subtitles is added when the video is played, subtitle data sources are characters generated after main sounds in the video are intelligently identified, and the subtitles can be synchronously displayed at the bottom of the video along with the video playing, and are similar to subtitles of film and television works.
The subtitle file, like the video file, is also part of the platform resource, which is stored and transmitted separately from the video file. However, unlike commercial movie works or lyrics, some subtitle files are private, i.e., they contain user privacy and require secure storage.
The subtitle file is the same in magnitude as the video file, and is therefore to be stored on a content delivery network (Content Delivery Network, CDN for short) for delivery to users. How to ensure the security of the subtitle file during the storage or transmission process is a technical problem that needs to be solved at present.
Disclosure of Invention
The disclosure provides a subtitle decryption method and device, a client and a storage medium, so as to at least solve the security problem in the subtitle file storage or transmission process in the related art. The technical scheme of the present disclosure is as follows:
according to a first aspect of an embodiment of the present disclosure, there is provided a subtitle decryption method, applied to a client, including:
acquiring subtitle ciphertext of a resource to be played;
if the first key ciphertext for decrypting the subtitle ciphertext is determined to be stored locally, decrypting the first key ciphertext stored locally by using a locally pre-stored second key to obtain a first key;
And decrypting the caption ciphertext by using the first key to obtain a caption plaintext.
In one embodiment, the determining that the first key ciphertext for decrypting the subtitle ciphertext is stored locally includes:
analyzing the caption ciphertext to obtain a first version number of a first key for decrypting the caption ciphertext;
and if the first key ciphertext corresponding to the first version number is determined to be stored locally, the first key ciphertext for decrypting the subtitle ciphertext is determined to be stored locally.
In an embodiment, the method further comprises:
if it is determined that the first key ciphertext corresponding to the first version number is not stored locally, a first request is sent to a server, wherein the first request is used for requesting to acquire a first key ciphertext list from the server, and the first key ciphertext list at least comprises first key ciphertext corresponding to the first version number;
the first key ciphertext list and all the first key ciphers in the first key ciphertext list are obtained from the server and stored;
sequentially decrypting all the first key ciphers in the acquired first key ciphertext list by using the second key;
The step of decrypting the caption ciphertext by using the first key to obtain caption plaintext comprises the following steps:
and decrypting the caption ciphertext by using a first key obtained by decrypting the first key ciphertext corresponding to the first version number to obtain a caption plaintext.
In an embodiment, after decrypting the currently stored first key ciphertext using the locally stored second key, the method further comprises:
if the decryption of the first key ciphertext fails, deleting the first key ciphertext stored locally, and sending a second request to a server, wherein the second request is used for requesting to acquire a first key ciphertext list from the server, and the first key ciphertext list at least comprises a first key ciphertext corresponding to the first version number;
the first key ciphertext list and all the first key ciphers in the first key ciphertext list are obtained from the server and stored;
sequentially decrypting all the first key ciphers in the acquired first key ciphertext list by using the second key;
the step of decrypting the caption ciphertext by using the first key to obtain caption plaintext comprises the following steps:
And decrypting the caption ciphertext by using a first key obtained by decrypting the first key ciphertext corresponding to the first version number to obtain a caption plaintext.
In an embodiment, the method further comprises:
receiving a first key ciphertext list generated by a server after detecting first key leakage, wherein the first key ciphertext list at least comprises first key ciphertext with a second version number generated by the server after detecting the first key leakage;
and decrypting the first key ciphertext corresponding to the second version number by using the second key.
In an embodiment, after the subtitle plaintext is obtained, the method further includes:
caching the caption plaintext and counting the caching time;
and if the caching time is longer than the preset time, re-executing the step of acquiring the subtitle ciphertext of the resource to be played.
In one embodiment, the second key is pre-stored locally in encrypted form;
the decrypting the first key ciphertext using a locally pre-stored second key includes:
decrypting a second key pre-stored in an encrypted form to obtain the second key;
decrypting the first key ciphertext using the second key.
In an embodiment, the encrypted form comprises a picture form, an audio form, or a video form.
According to a second aspect of the embodiments of the present disclosure, there is provided a subtitle decrypting apparatus, applied to a client, including:
the acquisition module is configured to acquire subtitle ciphertext of the resource to be played;
the first decryption module is configured to decrypt the first key ciphertext stored currently by using a locally pre-stored second key if the first key ciphertext used for decrypting the subtitle ciphertext acquired by the acquisition module is determined to be stored locally, so as to obtain a first key;
and the second decryption module is configured to decrypt the caption ciphertext by using the first key obtained by the first decryption module to obtain caption plaintext.
In an embodiment, the first decryption module includes:
the analysis submodule is configured to analyze the subtitle ciphertext to obtain a first version number of a first key used for decrypting the subtitle ciphertext;
and the determining submodule is configured to determine that the first key ciphertext for decrypting the subtitle ciphertext is locally stored if the first key ciphertext corresponding to the first version number obtained by the analyzing submodule is locally stored.
In an embodiment, the device further comprises:
the first sending module is configured to send a first request to a server if it is determined that a first key ciphertext corresponding to the first version number is not stored locally, where the first request is used to request that a first key ciphertext list is obtained from the server, and the first key ciphertext list at least includes a first key ciphertext corresponding to the first version number;
the first acquisition and storage module is configured to acquire the first key ciphertext list and all first key ciphertexts in the first key ciphertext list from the server according to the first request sent by the first sending module and store the first key ciphertext list and all first key ciphertexts in the first key ciphertext list;
a third decryption module configured to sequentially decrypt all first key ciphers in the first key ciphertext list stored based on the first acquisition storage module using the second key;
the second decryption module is configured to decrypt the caption ciphertext by using a first key obtained by decrypting a first key ciphertext corresponding to the first version number, so as to obtain a caption plaintext.
In an embodiment, the device further comprises:
the deleting and transmitting module is configured to delete the first key ciphertext locally stored if decryption of the first key ciphertext fails after the first decrypting module decrypts the first key ciphertext stored by using a locally pre-stored second key, and transmit a second request to a server, where the second request is used for requesting to acquire a first key ciphertext list from the server, and the first key ciphertext list at least includes a first key ciphertext corresponding to the first version number;
The second acquisition and storage module is configured to acquire the first key ciphertext list and all the first key ciphertexts from the server according to the second request sent by the deletion and transmission module and store the first key ciphertext list and all the first key ciphertexts;
a fourth decryption module configured to sequentially decrypt all the first key ciphers in the first key ciphertext list stored by the second acquisition storage module using the second key;
wherein the second decryption module is configured to: and decrypting the caption ciphertext by using a first key obtained by decrypting the first key ciphertext corresponding to the first version number to obtain a caption plaintext.
In an embodiment, the device further comprises:
the receiving module is configured to receive a first key ciphertext list generated after the server detects the first key leakage obtained by the analysis sub-module, wherein the first key ciphertext list at least comprises first key ciphertexts with second version numbers generated after the server detects the first key leakage;
and a fifth decryption module configured to decrypt, using the second key, a first key ciphertext corresponding to the second version number included in the first key ciphertext list received by the reception module.
In an embodiment, the device further comprises:
the buffer statistics module is configured to buffer the caption plaintext after the second decryption module obtains the caption plaintext, and to count the buffer duration;
and the calling module is configured to recall the step of acquiring the subtitle ciphertext of the resource to be played if the cache time period counted by the cache counting module is longer than a preset time period.
In one embodiment, the second key is pre-stored locally in encrypted form;
the first decryption module includes:
the first decryption sub-module is configured to decrypt a second key pre-stored in an encrypted form to obtain the second key;
and the second decryption sub-module is configured to decrypt the first key ciphertext by using the second key obtained by the first decryption sub-module.
In an embodiment, the encrypted form comprises a picture form, an audio form, or a video form.
According to a third aspect of embodiments of the present disclosure, there is provided a client, comprising:
a processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the caption decryption method described above.
According to a fourth aspect of embodiments of the present disclosure, there is provided a storage medium, which when executed by a processor of a client, enables the client to perform the above-described subtitle decryption method.
According to a fifth aspect of embodiments of the present disclosure, there is provided a computer program product, which when run on an electronic device, causes the electronic device to perform the above-described subtitle decryption method.
The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:
the first key ciphertext is decrypted by using the locally pre-stored second key, the first key is obtained, and the subtitle ciphertext is decrypted by using the first key, so that the subtitle plaintext is obtained, namely the subtitle plaintext is obtained by adopting a double decryption mode in the embodiment, and the safety of subtitle transmission can be ensured.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure and do not constitute an undue limitation on the disclosure.
Fig. 1 is a flowchart illustrating a subtitle decryption method according to an exemplary embodiment of the present disclosure.
Fig. 2 is a flowchart illustrating another subtitle decryption method according to an exemplary embodiment of the present disclosure.
Fig. 3 is a flowchart illustrating a subtitle storing method according to an exemplary embodiment of the present disclosure.
Fig. 4 is a flowchart illustrating another subtitle storing method according to an exemplary embodiment of the present disclosure.
Fig. 5A is a block diagram of a subtitle decryption apparatus according to an exemplary embodiment of the present disclosure.
Fig. 5B is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure.
Fig. 5C is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure.
Fig. 5D is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure.
Fig. 5E is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure.
Fig. 5F is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure.
Fig. 6 is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure.
Fig. 7 is a block diagram of a device in which a client is located, according to an exemplary embodiment of the present disclosure.
Fig. 8 is a block diagram of an apparatus suitable for a subtitle decryption method according to an exemplary embodiment of the present disclosure.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present disclosure, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the foregoing figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
Fig. 1 is a flowchart of a subtitle decryption method according to an exemplary embodiment of the present disclosure, which is applied to a client, as shown in fig. 1, and includes the steps of:
In step S101, a subtitle ciphertext of a resource to be played is acquired.
The resources to be played may include, but are not limited to, video, audio, and other resources.
In this embodiment, the client may display a list of resources to be played and CDN URL corresponding to the subtitle, and when the user wants to view the subtitle of the resources to be played, may obtain the subtitle ciphertext from the CDN through a CDN uniform resource locator (Uniform Resource Locator, abbreviated as URL) corresponding to the subtitle.
In step S102, if it is determined that the first key ciphertext for decrypting the subtitle ciphertext is locally stored, the locally stored first key ciphertext is decrypted using the locally stored second key, thereby obtaining the first key.
In this embodiment, the subtitle ciphertext may be parsed to obtain a first version number of a first key used to decrypt the subtitle ciphertext, and if it is determined that the first key ciphertext corresponding to the first version number is locally stored, it is determined that the first key ciphertext used to decrypt the subtitle ciphertext is locally stored.
For example, the first version number of the first key used to decrypt the subtitle ciphertext may be obtained by parsing the first five bytes of the subtitle ciphertext.
In this embodiment, the second key is an encryption key of the first key, the second key being pre-stored locally in an encrypted form, which may include, but is not limited to, a picture form, an audio form, a video form, or the like.
In this embodiment, the second key pre-stored in encrypted form may be decrypted to obtain the second key, and the first key ciphertext may be decrypted using the second key.
In this embodiment, the second key is solidified in the client in an encrypted form, for example, in a picture form, and is not required to be transmitted, and is not cracked by Trojan, so that the security is strong. Therefore, the malicious software can not decrypt after crawling the subtitle ciphertext or the first key ciphertext, and the aim of preventing the subtitle from being crawled can be achieved.
In step S103, the caption ciphertext is decrypted using the first key, thereby obtaining caption plaintext.
In this embodiment, after the first key is obtained, the caption ciphertext is decrypted using the first key to obtain the caption plaintext.
Optionally, after obtaining the subtitle plaintext, the method may further include: and (3) caching the caption plaintext, counting the caching time, and if the caching time is longer than the preset time, re-executing the steps S101 to S103 to re-download the caption ciphertext and decrypt the caption ciphertext.
The preset time period may be set as required, for example, 20 minutes.
In the embodiment, the resources occupied by the captions are reduced by setting the caching duration of the captions and the plaintext.
According to the embodiment, the first key ciphertext is decrypted by using the locally pre-stored second key to obtain the first key, and the subtitle ciphertext is decrypted by using the first key to obtain the subtitle plaintext, namely the embodiment adopts a double decryption mode to obtain the subtitle plaintext, so that the safety of subtitle transmission can be ensured.
Fig. 2 is a flowchart of another subtitle decryption method according to an exemplary embodiment of the present disclosure, as shown in fig. 2, the subtitle decryption method including:
in step S200, a subtitle ciphertext of a resource to be played is obtained.
In step S201, the subtitle ciphertext is parsed to obtain a first version number of a first key for decrypting the subtitle ciphertext.
In step S202, it is determined whether or not the first key ciphertext corresponding to the first version number is locally stored, if the first key ciphertext corresponding to the first version number is not stored, step S203 is executed, and if the first key ciphertext corresponding to the first version number is stored, step S206 is executed.
In step S203, a first request is sent to the server, where the first request is for requesting to obtain a first key ciphertext list from the server, where the first key ciphertext list includes at least a first key ciphertext corresponding to the first version number.
In step S204, the first key ciphertext list and all the first key ciphers therein are acquired from the server, and the first key ciphertext list is stored.
In step S205, all the first key ciphertexts in the acquired first key ciphertexts list are decrypted sequentially by using the second key, and the decrypted first key ciphertexts are stored.
In step S206, the currently stored first key ciphertext is decrypted using the locally pre-stored second key.
Optionally, if the first key with the first version number is revealed, a first key ciphertext list generated by the server after detecting that the first key is revealed may be received, where the first key ciphertext list includes at least a first key ciphertext with the second version number generated by the server after detecting that the first key is revealed, and the locally pre-stored second key is used to decrypt the first key ciphertext corresponding to the second version number.
In step S207, it is determined whether decryption is successful, if decryption is failed, step S208 is executed, if decryption is successful, a first key is obtained, and step 211 is executed.
In step S208, the locally stored first key ciphertext is deleted, and a second request is sent to the server, where the second request is used to request that the first key ciphertext list is obtained from the server, and the first key ciphertext list includes at least the first key ciphertext corresponding to the first version number.
In this embodiment, if decryption fails, it indicates that the second key has been updated, at which point the saved first key ciphertext is deleted and the first key ciphertext list is re-requested from the server.
In step S209, all the first key ciphers in the first key ciphertext list acquired from the server are sequentially decrypted using the second key.
In step S210, the first key ciphertext successfully decrypted is stored, and the process proceeds to step S206.
In step S211, the caption ciphertext is decrypted using the first key obtained by decrypting the first key ciphertext corresponding to the first version number, to obtain the caption plaintext.
According to the embodiment, when the first key ciphertext for decrypting the caption ciphertext is not locally stored, a new first key ciphertext list is obtained from the server, when the decrypting failure of the first key ciphertext stored currently is carried out by using the locally pre-stored second key, the new first key ciphertext list is obtained from the server, then the decrypting of the first key ciphertext stored currently is carried out by using the locally pre-stored second key, the first key is obtained, and finally the decrypting of the caption ciphertext is carried out by using the first key.
Fig. 3 is a flowchart of a subtitle storing method, which is described from a server side, according to an exemplary embodiment of the present disclosure, and as shown in fig. 3, the subtitle storing method includes:
in step S301, subtitles of a resource to be played are generated.
The resources to be played may include, but are not limited to, video, audio, and other resources.
In step S302, the subtitle is encrypted using a first key having a first version number, and the encrypted subtitle ciphertext is stored on the CDN.
The server can generate a subtitle aiming at the current resource to be played, encrypt the subtitle by using an advanced encryption standard (Advanced Encryption Standard, abbreviated as AES) or an encryption block chain (Cipher Block Chaining, abbreviated as CBC) and other encryption algorithms based on the latest first key, and store the encrypted subtitle ciphertext onto the CDN.
In step S303, the first key having the first version number is encrypted using the latest second key, resulting in a first key ciphertext list.
Optionally, the method may further include: if a first request or a second request sent by a client is received, the first request or the second request is used for requesting to acquire a first key ciphertext list, acquiring a current latest first key ciphertext list according to the corresponding request, and sending the current latest first key ciphertext list to the client, wherein the first key ciphertext list at least comprises first key ciphers corresponding to a first version number.
In this embodiment, the first key is transmitted in an encrypted manner, so as to prevent malicious software from crawling the caption ciphertext from the CDN, and then the first key is intercepted through the network, thereby achieving the purpose of decrypting and obtaining the caption plaintext.
According to the embodiment, the latest first key is used for encrypting the subtitles, and the first key is encrypted, so that the subtitles can be prevented from being crawled in the transmission process, and the safety of subtitle transmission is ensured.
Fig. 4 is a flowchart of another subtitle storing method according to an exemplary embodiment of the present disclosure, as shown in fig. 4, after step S303, the subtitle storing method may further include:
in step S401, if the first key leakage is detected, a first key with a second version number is generated, and the subtitle of the new resource to be played is encrypted using the first key with the second version number.
The first key disclosure may be detected in various manners, for example, if the amount of data crawled is greater than a preset amount of data, the first key disclosure is detected.
Because the timeliness of the video resource is strong, if a new first key, namely the first key with the second version number is generated, the generated subtitle, namely the old subtitle, is not updated, namely the old subtitle is leaked, and the privacy of the user can be protected in a mode of off-line old subtitle.
In step S402, the encrypted new subtitle ciphertext is stored on the CDN.
In step S403, the first key with the second version number and the first key with the first version number are encrypted with the latest second key, respectively, to obtain a first key ciphertext list.
Optionally, the method may further include: if a first request or a second request sent by a client is received, the first request or the second request is used for requesting to acquire a first key ciphertext list, acquiring a current latest first key ciphertext list according to the corresponding request, and sending the current latest first key ciphertext list to the client, wherein the first key ciphertext list at least comprises a second key ciphertext corresponding to a first version number.
In this embodiment, by sending the first key with the second version number (i.e., the first key of the new version) and the first key with the first version number (i.e., the first key of the old version) to the client, the old version client will not be unable to play the new version subtitle.
In the above embodiment, after the first key with the first version number is revealed, the first key with the second version number may be generated, and the subtitle of the new resource to be played is encrypted by using the first key with the second version number, so as to solve the problem of unsafe transmission caused by the revealing of the first key.
Fig. 5A is a block diagram of a subtitle decryption apparatus according to an exemplary embodiment of the present disclosure. Referring to fig. 5A, the apparatus includes: an acquisition module 51, a first decryption module 52 and a second decryption module 53.
The acquisition module 51 is configured to acquire subtitle ciphertext of a resource to be played.
The first decryption module 52 is configured to decrypt the currently stored first key ciphertext using the locally pre-stored second key to obtain the first key if it is determined that the locally stored first key ciphertext for decrypting the subtitle ciphertext acquired by the acquisition module 51 is stored.
The second decryption module 53 is configured to decrypt the subtitle ciphertext using the first key obtained by the first decryption module 52, to obtain subtitle plaintext.
According to the embodiment, the first key ciphertext is decrypted by using the locally pre-stored second key to obtain the first key, and the subtitle ciphertext is decrypted by using the first key to obtain the subtitle plaintext, namely the embodiment adopts a double decryption mode to obtain the subtitle plaintext, so that the safety of subtitle transmission can be ensured.
Fig. 5B is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure, and as shown in fig. 5B, the first decryption module 52 may include:
The parsing sub-module 521 is configured to parse the subtitle ciphertext to obtain a first version number of a first key for decrypting the subtitle ciphertext.
The determining submodule 522 is configured to determine that the first key ciphertext for decrypting the subtitle ciphertext is stored locally if it is determined that the first key ciphertext corresponding to the first version number obtained by the parsing submodule 521 is stored locally.
Fig. 5C is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure, as shown in fig. 5C, the apparatus may further include, on the basis of the embodiment shown in fig. 5A:
the first sending module 54 is configured to send a first request to the server if it is determined that the first key ciphertext corresponding to the first version number is not stored locally, where the first request is used to request to obtain a first key ciphertext list from the server, and the first key ciphertext list includes at least the first key ciphertext corresponding to the first version number.
The first acquisition and storage module 55 is configured to acquire the first key ciphertext list and all the first key ciphers therein from the server according to the first request sent by the first sending module 54, and store the first key ciphertext list and all the first key ciphers therein.
The third decryption module 56 is configured to sequentially decrypt all the first key ciphers in the first key ciphertext list stored based on the first acquisition storage module 55, using the second key.
The second decryption module 53 is configured to decrypt the subtitle ciphertext to obtain the subtitle plaintext, using a first key obtained by decrypting a first key ciphertext corresponding to the first version number.
Fig. 5D is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure, as shown in fig. 5D, the apparatus may further include, on the basis of the embodiment shown in fig. 5A:
the deletion transmitting module 57 is configured to delete the locally stored first key ciphertext if the first key ciphertext fails to decrypt after the first decrypting module 52 decrypts the currently stored first key ciphertext using the locally stored second key, and to transmit a second request to the server, the second request being for requesting to obtain a first key ciphertext list from the server, the first key ciphertext list including at least the first key ciphertext corresponding to the first version number.
The second acquisition and storage module 58 is configured to acquire the first key ciphertext list and all the first key ciphertexts therein from the server according to the second request sent by the deletion sending module 57, and store the first key ciphertext list and all the first key ciphertexts therein.
Wherein the second decryption module 53 is configured to: and decrypting the caption ciphertext by using a first key obtained by decrypting the first key ciphertext corresponding to the first version number to obtain a caption plaintext.
Fig. 5E is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure, as shown in fig. 5E, the apparatus may further include, on the basis of the embodiment shown in fig. 5A:
the buffer statistics module 600 is configured to buffer the caption text after the second decryption module 53 obtains the caption text, and to count the buffer time.
The calling module 601 is configured to recall the operation of the obtaining module to obtain the subtitle ciphertext of the resource to be played from the CDN if the buffering time period counted by the buffering statistics module 600 is longer than a preset time period.
Fig. 5F is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure, as shown in fig. 5F, the second key may be pre-stored locally in encrypted form on the basis of the embodiment shown in fig. 5A, and the first decryption module 52 may include:
the first decryption sub-module 523 is configured to decrypt the second key pre-stored in encrypted form to obtain the second key.
The second decryption sub-module 524 is configured to decrypt the first key ciphertext using the second key obtained by the first decryption sub-module 523.
Fig. 6 is a block diagram of another subtitle decryption apparatus according to an exemplary embodiment of the present disclosure, as shown in fig. 6, the apparatus may further include, on the basis of the embodiment shown in fig. 5B:
the receiving module 602 is configured to receive a first key ciphertext list generated by the server after detecting the first key leakage obtained by the parsing sub-module 521, where the first key ciphertext list at least includes a first key ciphertext having a second version number generated by the server after detecting the first key leakage.
The fifth decryption module 603 is configured to decrypt the first key ciphertext corresponding to the second version number included in the first key ciphertext list received by the reception module 602, using the second key.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Fig. 7 is a block diagram of a device in which a client is located, according to an exemplary embodiment of the present disclosure. As shown in fig. 7, the service server includes a processor 710, a memory 720 for storing instructions executable by the processor 710; wherein the processor is configured to execute the above instructions to implement the above subtitle decryption method. In addition to the processor 710 and the memory 720 shown in fig. 7, the server may further include other hardware according to the actual function of subtitle decryption, which will not be described in detail.
In an exemplary embodiment, a storage medium is also provided, such as a memory 720 including instructions executable by the processor 710 to perform the above-described subtitle decryption method or subtitle storage method. Alternatively, the storage medium may be a non-transitory computer readable storage medium, for example, a ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, and the like.
In an exemplary embodiment, a computer program product is also provided, which, when run on an electronic device, causes the electronic device to perform the above-described subtitle decryption method.
Fig. 8 is a block diagram of an apparatus suitable for a subtitle decryption method according to an exemplary embodiment of the present disclosure, and as shown in fig. 8, an embodiment of the present disclosure provides an apparatus 800 suitable for a subtitle decryption method, including: radio Frequency (RF) circuitry 810, a power supply 820, a processor 830, a memory 840, an input unit 850, a display unit 860, a camera 870, a communication interface 880, a wireless fidelity (Wireless Fidelity, wi-Fi) module 890, and the like. It will be appreciated by those skilled in the art that the structure of the apparatus shown in fig. 8 does not constitute a limitation of the apparatus, and that the apparatus provided by the embodiments of the present disclosure may include more or less components than illustrated, or may combine certain components, or may be arranged in different components.
The various constituent elements of the apparatus 800 are described in detail below in conjunction with FIG. 8:
the RF circuitry 810 may be used for receiving and transmitting data during a communication or session. Specifically, the RF circuit 810 receives downlink data of the base station and then sends the downlink data to the processor 830 for processing; in addition, uplink data to be transmitted is transmitted to the base station. Typically, the RF circuitry 810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), a duplexer, and the like.
In addition, the RF circuitry 810 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol including, but not limited to, global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division multiple access (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), email, short message service (Short Messaging Service, SMS), and the like.
Wi-Fi technology belongs to short-range wireless transmission technology, and the device 800 can be connected with an Access Point (AP) through a Wi-Fi module 890, so as to realize Access to a data network. Wi-Fi module 890 may be used to receive and transmit data during communication.
Since in the embodiment of the present disclosure, the device 800 is capable of implementing a communication service and transmitting information to other contacts, the device 800 needs to have a data transmission function, that is, the device 800 needs to include a communication module inside. Although fig. 8 shows communication modules such as RF circuitry 810, wi-Fi module 890, and communication interface 880, it is to be understood that at least one of the above components or other communication modules (e.g., bluetooth modules) for enabling communication are present in device 800 for data transmission.
For example, when the device 800 is a cell phone, the device 800 may contain RF circuitry 810 and may also contain a Wi-Fi module 890; when device 800 is a computer, device 800 may include a communication interface 880 and may also include a Wi-Fi module 890; when the device 800 is a tablet, the device 800 may contain a Wi-Fi module.
Alternatively, the memory 840 may mainly include a storage program area and a storage data area. The storage program area can store an operating system, various application programs (such as communication application), a face recognition module and the like; the storage data area may store data created according to the use of the device (such as various pictures, multimedia files such as video files, and face information templates), and the like.
In addition, memory 840 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The input unit 850 may be used to receive numeric or character information input by a user and to generate key signal inputs related to user settings and function control of the device 800.
Alternatively, the input unit 850 may include a touch panel 851 and other input devices 852.
The touch panel 851, also referred to as a touch screen, may collect touch operations thereon or nearby by a user (such as operations of the user on the touch panel 851 or nearby the touch panel 851 using any suitable object or accessory such as a finger, a stylus, etc.), and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 851 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device and converts it into touch point coordinates, which are then sent to the processor 830, and can receive commands from the processor 830 and execute them. In addition, the touch panel 851 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave.
Alternatively, other input devices 852 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc.
The display unit 860 may be used to display information input by a user or provided to the user as well as various menus of the apparatus 800. The display unit 860 is a display system of the device 800, and is used for presenting an interface to implement man-machine interaction.
The display unit 860 may include a display panel 861. Alternatively, the display panel 861 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
Further, the touch panel 851 may cover the display panel 861, and when the touch panel 851 detects a touch operation thereon or thereabout, the touch panel is transferred to the processor 830 to determine the type of touch event, and then the processor 830 provides a corresponding visual output on the display panel 861 according to the type of touch event.
Although in fig. 8, the touch panel 851 and the display panel 861 are implemented as two separate components for the input and input functions of the device 800, in some embodiments, the touch panel 851 may be integrated with the display panel 861 to implement the input and output functions of the device 800.
In the alternative, processor 830 may include one or more processing units. Alternatively, processor 830 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 830.
A camera 870 for performing a photographing function of the device 800, taking pictures or videos. The camera 870 may also be used to perform a scanning function of the device 800 to scan a scanned object (two-dimensional code/bar code).
The device 800 also includes a power source 820 (such as a battery) for powering the various components. Alternatively, the power supply 820 may be logically connected to the processor 830 through a power management system, so as to perform functions of managing charging, discharging, and power consumption through the power management system.
It should be noted that, in the embodiment of the present disclosure, the processor 830 may perform the functions of the processor 710 in fig. 7, and the memory 840 stores the contents of the processor 710.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital Signal Processors (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic elements for performing the caption decryption method described above.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (12)
1. A subtitle decrypting method, applied to a client, comprising:
acquiring subtitle ciphertext of a resource to be played;
analyzing the caption ciphertext to obtain a first version number of a first key for decrypting the caption ciphertext;
if the first key ciphertext corresponding to the first version number is determined to be stored locally, the first key ciphertext used for decrypting the subtitle ciphertext is determined to be stored locally, and the locally stored first key ciphertext is decrypted locally by using a locally pre-stored second key to obtain a first key;
if it is determined that the first key ciphertext corresponding to the first version number is not stored locally, a first request is sent to a server, wherein the first request is used for requesting to acquire a first key ciphertext list from the server, and the first key ciphertext list at least comprises first key ciphertext corresponding to the first version number;
the first key ciphertext list and all the first key ciphers in the first key ciphertext list are obtained from the server and stored;
sequentially decrypting all the first key ciphers in the acquired first key ciphertext list by using the second key;
Decrypting the caption ciphertext by using the first key to obtain caption plaintext, including:
decrypting the caption ciphertext by using a first key obtained by decrypting a first key ciphertext corresponding to the first version number to obtain caption plaintext, wherein the caption plaintext is used for being displayed in the client;
receiving a first key ciphertext list generated by a server after detecting first key leakage, wherein the first key ciphertext list at least comprises first key ciphertext with a second version number generated by the server after detecting the first key leakage;
and decrypting the first key ciphertext corresponding to the second version number by using the second key.
2. The subtitle decrypting method according to claim 1, wherein after said locally stored first key ciphertext is decrypted locally using a locally pre-stored second key, the method further comprises:
if the decryption of the first key ciphertext fails, deleting the first key ciphertext stored locally, and sending a second request to a server, wherein the second request is used for requesting to acquire a first key ciphertext list from the server, and the first key ciphertext list at least comprises a first key ciphertext corresponding to the first version number;
The first key ciphertext list and all the first key ciphers in the first key ciphertext list are obtained from the server and stored;
sequentially decrypting all the first key ciphers in the acquired first key ciphertext list by using the second key;
the step of decrypting the caption ciphertext by using the first key to obtain caption plaintext comprises the following steps:
and decrypting the caption ciphertext by using a first key obtained by decrypting the first key ciphertext corresponding to the first version number to obtain a caption plaintext.
3. The subtitle decrypting method according to claim 1, wherein after said obtaining subtitle plaintext, the method further comprises:
caching the caption plaintext and counting the caching time;
and if the caching time is longer than the preset time, re-executing the step of acquiring the subtitle ciphertext of the resource to be played.
4. The subtitle decrypting method according to claim 1, wherein the second key is pre-stored locally in encrypted form;
the decrypting the first key ciphertext using a locally pre-stored second key includes:
decrypting a second key pre-stored in an encrypted form to obtain the second key;
Decrypting the first key ciphertext using the second key.
5. The subtitle decrypting method according to claim 4, wherein the encrypted form includes a picture form, an audio form, or a video form.
6. A subtitle decrypting apparatus, applied to a client, comprising:
the acquisition module is configured to acquire subtitle ciphertext of the resource to be played;
the first decryption module is configured to parse the caption ciphertext to obtain a first version number of a first key for decrypting the caption ciphertext; if the first key ciphertext corresponding to the first version number is determined to be stored locally, the first key ciphertext used for decrypting the subtitle ciphertext is determined to be stored locally, and the locally stored first key ciphertext is decrypted locally by using a locally pre-stored second key to obtain a first key;
the first sending module is configured to send a first request to a server if it is determined that a first key ciphertext corresponding to the first version number is not stored locally, where the first request is used to request that a first key ciphertext list is obtained from the server, and the first key ciphertext list at least includes a first key ciphertext corresponding to the first version number;
The first acquisition and storage module is configured to acquire the first key ciphertext list and all first key ciphertexts in the first key ciphertext list from the server according to the first request sent by the first sending module and store the first key ciphertext list and all first key ciphertexts in the first key ciphertext list;
a third decryption module configured to sequentially decrypt all first key ciphers in the first key ciphertext list stored based on the first acquisition storage module using the second key;
the second decryption module is configured to decrypt the caption ciphertext by using the first key obtained by the first decryption module to obtain caption plaintext, and comprises the following steps: decrypting the caption ciphertext by using a first key obtained by decrypting a first key ciphertext corresponding to the first version number to obtain caption plaintext, wherein the caption plaintext is used for being displayed in the client;
the receiving module is configured to receive a first key ciphertext list generated by the server after detecting the first key leakage, wherein the first key ciphertext list at least comprises first key ciphertext with a second version number generated by the server after detecting the first key leakage;
and a fifth decryption module configured to decrypt, using the second key, a first key ciphertext corresponding to the second version number included in the first key ciphertext list received by the reception module.
7. The subtitle decrypting apparatus according to claim 6, wherein the apparatus further comprises:
the deleting and transmitting module is configured to delete the first key ciphertext locally stored after the first decrypting module locally decrypts the first key ciphertext stored by using a locally pre-stored second key, if the first key ciphertext is not decrypted, and transmit a second request to a server, where the second request is used to request to acquire a first key ciphertext list from the server, and the first key ciphertext list at least includes a first key ciphertext corresponding to the first version number;
the second acquisition and storage module is configured to acquire the first key ciphertext list and all the first key ciphertexts from the server according to the second request sent by the deletion and transmission module and store the first key ciphertext list and all the first key ciphertexts;
a fourth decryption module configured to sequentially decrypt all the first key ciphers in the first key ciphertext list stored by the second acquisition storage module using the second key;
wherein the second decryption module is configured to: and decrypting the caption ciphertext by using a first key obtained by decrypting the first key ciphertext corresponding to the first version number to obtain a caption plaintext.
8. The subtitle decrypting apparatus according to claim 6, wherein the apparatus further comprises:
the buffer statistics module is configured to buffer the caption plaintext after the second decryption module obtains the caption plaintext, and to count the buffer duration;
and the calling module is configured to recall the step of acquiring the subtitle ciphertext of the resource to be played if the cache time period counted by the cache counting module is longer than a preset time period.
9. The subtitle decrypting apparatus according to claim 6, wherein the second key is pre-stored locally in encrypted form;
the first decryption module includes:
the first decryption sub-module is configured to decrypt a second key pre-stored in an encrypted form to obtain the second key;
and the second decryption sub-module is configured to decrypt the first key ciphertext by using the second key obtained by the first decryption sub-module.
10. The subtitle decrypting apparatus according to claim 9, wherein the encrypted form includes a picture form, an audio form, or a video form.
11. A client, comprising:
A processor;
a memory for storing the processor-executable instructions;
wherein the processor is configured to execute the instructions to implement the subtitle decryption method according to any one of claims 1 to 5.
12. A storage medium, which when executed by a processor of a client, enables the client to perform the subtitle decryption method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910969381.7A CN110769306B (en) | 2019-10-12 | 2019-10-12 | Subtitle decryption method and device, client and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910969381.7A CN110769306B (en) | 2019-10-12 | 2019-10-12 | Subtitle decryption method and device, client and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110769306A CN110769306A (en) | 2020-02-07 |
CN110769306B true CN110769306B (en) | 2023-05-09 |
Family
ID=69331942
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910969381.7A Active CN110769306B (en) | 2019-10-12 | 2019-10-12 | Subtitle decryption method and device, client and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110769306B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789014A (en) * | 2016-12-22 | 2017-05-31 | 上海上讯信息技术股份有限公司 | It is a kind of to generate and use the method and apparatus of user terminal key |
CN108769027A (en) * | 2018-05-31 | 2018-11-06 | 深圳壹账通智能科技有限公司 | Safety communicating method, device, mobile terminal and storage medium |
CN108900533A (en) * | 2018-08-01 | 2018-11-27 | 南京荣链科技有限公司 | A kind of shared data method for secret protection, system, terminal and medium |
CN110138749A (en) * | 2019-04-23 | 2019-08-16 | 华为技术有限公司 | Data security protection method and related equipment |
-
2019
- 2019-10-12 CN CN201910969381.7A patent/CN110769306B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789014A (en) * | 2016-12-22 | 2017-05-31 | 上海上讯信息技术股份有限公司 | It is a kind of to generate and use the method and apparatus of user terminal key |
CN108769027A (en) * | 2018-05-31 | 2018-11-06 | 深圳壹账通智能科技有限公司 | Safety communicating method, device, mobile terminal and storage medium |
CN108900533A (en) * | 2018-08-01 | 2018-11-27 | 南京荣链科技有限公司 | A kind of shared data method for secret protection, system, terminal and medium |
CN110138749A (en) * | 2019-04-23 | 2019-08-16 | 华为技术有限公司 | Data security protection method and related equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110769306A (en) | 2020-02-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111193695B (en) | Encryption method and device for third party account login and storage medium | |
EP3605989B1 (en) | Information sending method, information receiving method, apparatus, and system | |
WO2018014723A1 (en) | Key management method, apparatus, device and system | |
CN110266480B (en) | Data transmission method, device and storage medium | |
CN108989848B (en) | Video resource file acquisition method and management system | |
CN110417543B (en) | Data encryption method, device and storage medium | |
CN111064713B (en) | Node control method and related device in distributed system | |
WO2019223441A1 (en) | File sharing method, apparatus, readable storage medium, and mobile terminal | |
CN111563251B (en) | Encryption method and related device for private information in terminal equipment | |
US10454905B2 (en) | Method and apparatus for encrypting and decrypting picture, and device | |
CN107154935B (en) | Service request method and device | |
US20220182825A1 (en) | Identity Authentication Method and Apparatus | |
CN108763876B (en) | Resource copyright checking method, device and equipment | |
US20220272511A1 (en) | Subscription data management method and apparatus | |
CN112087362B (en) | Message forwarding method and device between clients and terminal | |
CN114553612B (en) | Data encryption and decryption method and device, storage medium and electronic equipment | |
CN115277117A (en) | File viewing method and device, electronic equipment and storage medium | |
CN110769306B (en) | Subtitle decryption method and device, client and storage medium | |
CN108737341B (en) | Service processing method, terminal and server | |
US20190037612A1 (en) | Connecting method to an information capture device | |
CN114268492B (en) | Distribution method, distribution device, robot, equipment, medium and distribution system | |
CN114430343B (en) | Data synchronization method and device, electronic equipment and readable storage medium | |
KR101210193B1 (en) | Method and system for managing security of mobile device | |
WO2022237833A1 (en) | Information processing method and apparatus, terminal, and network side device | |
CN110022285B (en) | Method and device for detecting user information and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |