CN111314781A - Local file encryption method, device, equipment and storage medium - Google Patents

Local file encryption method, device, equipment and storage medium Download PDF

Info

Publication number
CN111314781A
CN111314781A CN201811511846.6A CN201811511846A CN111314781A CN 111314781 A CN111314781 A CN 111314781A CN 201811511846 A CN201811511846 A CN 201811511846A CN 111314781 A CN111314781 A CN 111314781A
Authority
CN
China
Prior art keywords
local file
attribute information
user
local
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811511846.6A
Other languages
Chinese (zh)
Other versions
CN111314781B (en
Inventor
祝晓庆
马鑫
王中振
李阳光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Multimedia Co Ltd
Original Assignee
Qingdao Haier Multimedia Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Multimedia Co Ltd filed Critical Qingdao Haier Multimedia Co Ltd
Priority to CN201811511846.6A priority Critical patent/CN111314781B/en
Publication of CN111314781A publication Critical patent/CN111314781A/en
Application granted granted Critical
Publication of CN111314781B publication Critical patent/CN111314781B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/232Content retrieval operation locally within server, e.g. reading video streams from disk arrays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/431Generation of visual interfaces for content selection or interaction; Content or additional data rendering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/4508Management of client data or end-user data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8126Monomedia components thereof involving additional data, e.g. news, sports, stocks, weather forecasts
    • H04N21/8133Monomedia components thereof involving additional data, e.g. news, sports, stocks, weather forecasts specifically related to the content, e.g. biography of the actors in a movie, detailed information about an article seen in a video program

Abstract

The invention discloses a method, a device, equipment and a storage medium for encrypting a local file, and belongs to the technical field of file encryption. The encryption method comprises the following steps: receiving a starting request of a local file; identifying user attribute information of a local file; when the user attribute information is a member, allowing the local file to be started; and when the user attribute information is non-member, encrypting the local file. An encryption device, equipment and storage medium of the local file are also provided. The invention has the beneficial effects that: for the paid resources downloaded to the local, after receiving the start request of the local file, the user attribute information of the local file is verified to realize the playing of the local file, so that the copyright of the resource party can be ensured.

Description

Local file encryption method, device, equipment and storage medium
Technical Field
The invention relates to the technical field of file encryption, in particular to an encryption method, device, equipment and storage medium of a local file.
Background
The intelligent television product has a plurality of high-quality resources, namely member payment resources and free resources. For the member payment resource, the member can watch on line or locally, but the non-member can not watch the browse. After the member expires, some paid resources can still be played after being downloaded to the local, so that the copyright of the resource side cannot be guaranteed.
Disclosure of Invention
The embodiment of the invention provides an encryption method, device, equipment and storage medium of a local file, and aims to solve the technical problems that after members expire, some paid resources can still be played after being downloaded to the local, and the copyright of a resource party cannot be guaranteed. The following presents a simplified summary in order to provide a basic understanding of some aspects of the disclosed embodiments. This summary is not an extensive overview and is intended to neither identify key/critical elements nor delineate the scope of such embodiments. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
According to the embodiment of the invention, the invention provides an encryption method, an encryption device and a storage medium for a local file.
According to a first aspect of the embodiments of the present invention, there is provided a method for encrypting a local file, including:
receiving a starting request of a local file;
identifying user attribute information of a local file;
when the user attribute information is a member, allowing the local file to be started;
and when the user attribute information is non-member, encrypting the local file.
In some optional technical solutions, after receiving a start request of a local file, before identifying user attribute information of the local file, the encryption method further includes:
identifying download source attribute information of a local file;
when the downloading source attribute information of the local file is a non-member resource, allowing the local file to be started;
and when the downloading source attribute information of the local file is the member resource, identifying the user attribute information of the local file.
In some optional technical solutions, when the user attribute information is a non-member, after encrypting the local file, the encryption method further includes:
acquiring operation information of a user;
and when the operation information of the user is to change the user attribute information into a member, or when the operation information of the user is to purchase the playing right of the local file, decrypting the local file.
In some optional technical solutions, the encryption method further includes:
when the operation information of the user is not acquired within the set time, acquiring the basic information of the local file;
acquiring similar files of the local files according to the basic information of the local files;
and acquiring and displaying basic information of similar files.
According to a second aspect of the embodiments of the present invention, there is provided an apparatus for encrypting a local file, including:
the device comprises a first unit, a second unit and a third unit, wherein the first unit is used for receiving a starting request of a local file;
a second unit for identifying user attribute information of the local file;
a third unit for allowing the local file to be started when the user attribute information is a member; and when the user attribute information is non-member, encrypting the local file.
In some optional technical solutions, the encryption apparatus further includes a fourth unit, configured to:
identifying download source attribute information of a local file;
when the downloading source attribute information of the local file is a non-member resource, allowing the local file to be started;
and when the downloading source attribute information of the local file is the member resource, identifying the user attribute information of the local file.
In some optional technical solutions, the encryption apparatus further includes a fifth unit, configured to:
acquiring operation information of a user;
and when the operation information of the user is to change the user attribute information into a member, or when the operation information of the user is to purchase the playing right of the local file, decrypting the local file.
In some optional technical solutions, the encryption apparatus further includes a sixth unit, configured to:
when the operation information of the user is not acquired within the set time, acquiring the basic information of the local file;
acquiring similar files of the local files according to the basic information of the local files;
and acquiring and displaying basic information of similar files.
According to a third aspect of the embodiments of the present invention, there is provided an apparatus including the local file encryption device according to the second aspect of the embodiments of the present invention.
According to a fourth aspect of embodiments of the present invention, there is provided a storage medium having stored thereon a computer program which, when executed by a processor, implements the method of encrypting a local file according to the first aspect of embodiments of the present invention.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
and after receiving a starting request of the local file, identifying the user attribute information of the local file, and encrypting the local file to prohibit the starting operation of the local file when the user attribute information is a non-member so as to ensure the copyright of a resource party.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a flow diagram illustrating a method for encrypting a local file in accordance with an exemplary embodiment;
FIG. 2 is a flowchart illustrating a method for encrypting a local file according to yet another exemplary embodiment;
FIG. 3 is a flowchart illustrating a method for encrypting a local file in accordance with yet another exemplary embodiment;
FIG. 4 is a block diagram illustrating an apparatus for encrypting a local file according to an exemplary embodiment;
fig. 5 is a schematic structural diagram illustrating an encryption apparatus for a local file according to yet another exemplary embodiment;
fig. 6 is a schematic structural diagram illustrating an encryption apparatus for a local file according to yet another exemplary embodiment.
Description of reference numerals:
1-a first unit; 2-a second unit; 3-a third unit; 4-a fourth unit; 5-a fifth unit; 6-sixth unit.
Detailed Description
The following description and the drawings sufficiently illustrate specific embodiments of the invention to enable those skilled in the art to practice them. The embodiments are merely representative of possible variations, individual components and functions are optional unless explicitly required, and the sequence of operations may vary. Portions and features of some embodiments may be included in or substituted for those of others. The scope of embodiments of the invention encompasses the full ambit of the claims, as well as all available equivalents of the claims. Embodiments may be referred to herein, individually or collectively, by the term "invention" merely for convenience and without intending to voluntarily limit the scope of this application to any single invention or inventive concept if more than one is in fact disclosed. Herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without requiring or implying any actual such relationship or order between such entities or actions.
It should be noted that all the directional indicators (such as up, down, left, right, front, and rear … …) in the embodiment of the present invention are only used to explain the relative position relationship between the components, the movement situation, etc. in a specific posture (as shown in the drawing), and if the specific posture is changed, the directional indicator is changed accordingly. In addition, the descriptions related to "first", "second", etc. in the present invention are only for descriptive purposes and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature.
In the description of the present invention, it should be noted that unless otherwise explicitly stated or limited, the terms "mounted" and "connected" are to be interpreted broadly, e.g., as a fixed connection, a detachable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
1-3 are flow diagrams illustrating a method for encrypting a local file according to an exemplary embodiment; fig. 4 to 6 are schematic structural diagrams illustrating an encryption apparatus for a local file according to an exemplary embodiment.
The local file in the text is a multimedia file comprising text, graphics, images, sound, animation, video and the like; the device in this document is an electronic device that can start playing a local file, and includes, but is not limited to, a smart television, a mobile phone, a tablet computer, a wearable terminal, and the like.
In some optional embodiments, as shown in fig. 1, a method for encrypting a local file is provided, which specifically includes the following steps:
s101: a start request for a local file is received.
The start request of the local file comprises one or more of voice instructions, action instructions and input instructions of a user. Here, taking the start request of the local file as a voice instruction as an example, the keyword information in the user voice instruction is identified, and when the acquired keyword information matches with the pre-stored keyword information, the start request of the local file is received. For example, the pre-stored keyword information is "open", "video" and "party building major industry", when the user voice instruction is "please open the video party building major industry", the keyword information in the user voice instruction is determined to be "please", "open", "video" and "party building major industry", and is matched with the pre-stored keyword information, and the user thinks that the start request of the local file is received.
S102: user attribute information of the local file is identified.
When downloading the local file, the user acquires the user information of the local file, and associates the user information of the local file with the storage position information of the local file. The user information of the local file may be a user account or a user account address. In this way, the corresponding user information can be acquired by acquiring the storage location information of the local file. Here, the user information of the local file is taken as the user account as an example. After the corresponding user account is obtained through the storage position of the local file, the user account is sent to a download website of the local file or a user attribute information query center of a download system, and the attribute information of the user account is queried to determine the user attribute information of the local file.
S103: when the user attribute information is a member, allowing the local file to be started; and when the user attribute information is non-member, encrypting the local file.
When the user attribute information of the local file is a member, responding to the starting request of the local file, and allowing the local file to be started; and when the user attribute information of the local file is a non-member, not responding to the starting request of the local file, and encrypting the local file.
Thus, in this optional embodiment, for the local file downloaded to the local, after receiving the start request of the local file, the user attribute information of the local file is verified, when the user attribute information of the local file conforms to the corresponding right, the start request of the local file is responded, the start operation of the local file is allowed, when the user attribute information of the local file conforms to the non-corresponding right, the local file is encrypted, the start operation of the local file is rejected, and the copyright of the resource party can be guaranteed.
In some optional embodiments, as shown in fig. 2, a method for encrypting a local file is provided, which specifically includes the following steps:
s201: a start request for a local file is received.
S202: download source attribute information for the local file is identified.
When downloading the local file, the user acquires the downloading source information of the local file and associates the downloading source information of the local file with the storage position information of the local file. In this way, the corresponding download source information can be acquired by acquiring the storage location information of the local file. After the corresponding downloading source information is acquired through the storage position of the local file, the downloading source information is sent to a downloading website of the local file or a downloading source attribute information query center of a downloading system, and the attribute information of the downloading source information is queried to determine the downloading source attribute information of the local file.
S203: when the downloading source attribute information of the local file is a non-member resource, allowing the local file to be started; and when the downloading source attribute information of the local file is the member resource, identifying the user attribute information of the local file.
When the downloading source attribute information of the local file is a non-member resource, responding to the starting request of the local file and allowing the local file to be started; and when the downloading source attribute information of the local file is the member resource, identifying the user attribute information of the local file.
Optionally, when the download source attribute information of the local file is a non-member resource, identifying the download source attribute information of the local file in the playing process of the local file; and when the downloading source attribute information of the local file is the member resource, identifying the user attribute information of the local file. Therefore, in the playing process of the local file, if the downloading source attribute information of the local file is changed from the non-member resource to the member resource, the playing of the local file can be continued according to the verification result of the user attribute information of the local file, and the copyright of the resource side is guaranteed.
S204: when the user attribute information is a member, allowing the local file to be started; and when the user attribute information is non-member, encrypting the local file.
Thus, in this optional embodiment, after receiving the start request of the local file, if the download source attribute information of the local file is a non-member resource, the start operation of the local file is allowed in response to the start request of the local file, and if the download source attribute information of the local file is a member resource, the user attribute information of the local file is verified. On one hand, because the member resources and the non-member resources are updated and changed continuously, for example, the member resources are used when some local files are downloaded, and are changed into the non-member resources when playing for a period of time, while the non-member resources are used when some local files are downloaded, and are changed into the member resources when playing for a period of time, before the user attribute information verification operation of the local files, the verification operation of the downloading sources of the local files is carried out, and the benefits of both the user and the resource party are ensured; on the other hand, when the download source attribute information of the local file is the non-member resource, the starting operation of the local file is directly allowed, the verification operation of the user attribute information of the local file is omitted, and the starting fluency of the local file is improved.
In some optional embodiments, as shown in fig. 3, a method for encrypting a local file is provided, which specifically includes the following steps:
s301: a start request for a local file is received.
S302: user attribute information of the local file is identified.
S303: when the user attribute information is a member, allowing the local file to be started; and when the user attribute information is non-member, encrypting the local file.
S304: and acquiring the operation information of the user.
Here, when the user attribute information is a non-member, the local file is encrypted, the user is prompted to perform a related operation, and the operation information of the user is captured. For example, when the user attribute information is a non-member, a prompt message of "non-member cannot play member resources" is displayed, the user is guided to perform an operation of changing the user attribute information to a member or an operation of purchasing the play right of the local file, and the actual operation information of the user is monitored and captured.
S305: and when the operation information of the user is to change the user attribute information into a member, or when the operation information of the user is to purchase the playing right of the local file, decrypting the local file.
Optionally, changing the user attribute information to be a member specifically includes: the user attribute information is changed to the member by purchasing the member, or the user attribute information is changed to the member by participating in the member presenting activity.
Therefore, after the user obtains the playing authority of the local file, the local file is decrypted, the starting operation of the local file is allowed in response to the starting request of the local file, and the user can browse the local file conveniently.
S306: and when the operation information of the user is not acquired within the set time, acquiring the basic information of the local file.
Here, the basic information of the local file includes a file type and a content profile of the local file. When downloading the local file, the user acquires the basic information of the local file and associates the basic information of the local file with the storage position information of the local file. In this way, the corresponding basic information can be acquired by acquiring the storage location information of the local file.
S307: and acquiring similar files of the local file according to the basic information of the local file.
Here, the basic information of the similar file is similar to that of the local file. Specifically, the file type of the similar file is the same as the file type of the local file, and the keywords in the content profile of the similar file are the same as or partially the same as the keywords in the content profile of the local file. For example, the format of the file type of the local file is "rm" (a video format), the keywords in the content introduction are "china", "reform" and "open", the format of the file type of the similar file is "rm", and the keywords in the content introduction are "china", "reform" and "open", or "china", "reform", or "china".
Optionally, the network file with the highest matching degree between the keywords in the content profiles of the network files and the keywords in the content profiles of the local files is obtained as the similar file of the local files.
S308: and acquiring and displaying basic information of similar files.
Here, after obtaining the similar file of the local file, the file type and the content profile of the similar file are obtained and displayed to the user, so that the user decides whether to browse the similar file based on the basic information such as the file type and the content profile of the similar file.
Thus, in this optional embodiment, when the user attribute information is a non-member, the local file is encrypted, and when the user obtains the play right of the local file, the local file is decrypted, so that the user can conveniently browse the local file, and when the user does not obtain the play right of the local file, the similar file whose download source attribute information is a non-member resource is obtained according to the basic information of the local file, and the user can determine whether to use the similar file as a substitute file of the local file according to the basic information of the similar file, so that the user can still obtain information equivalent to the local file by browsing the similar file without changing the user attribute information as a member or purchasing the play right of the local file, and the user experience is improved without infringing the copyright of the resource party.
In some optional embodiments, encrypting the local file specifically includes: performing primary encryption on the data of the local file; and carrying out secondary encryption on the key for encrypting the data of the local file. Correspondingly, decrypting the local file specifically includes: performing secondary decryption on the key for encrypting the data of the local file; and carrying out primary decryption on the data of the local file.
Therefore, the encryption key is encrypted and packaged, so that the data of the local file can be prevented from being easily cracked due to key leakage, the encryption safety of the local file is improved, and the two-stage encryption operation is respectively positioned at different application levels without influencing functions. In addition, the decryption operation and the encryption operation adopt a symmetrical mode, and the complexity and the workload of the decryption operation are reduced.
In some optional embodiments, as shown in fig. 4, there is provided an encryption apparatus for a local file, including a first unit 1, a second unit 2, and a third unit 3, wherein the first unit 1 is configured to receive a start request of the local file, the second unit 2 is configured to identify user attribute information of the local file, the third unit 3 is configured to allow the local file to be started when the user attribute information is a member, and encrypt the local file when the user attribute information is a non-member.
In some specific implementation manners, the encrypting the local file by the third unit 3 specifically includes: performing primary encryption on the data of the local file; and carrying out secondary encryption on the key for encrypting the data of the local file.
In some optional embodiments, as shown in fig. 5, the encryption apparatus further includes a fourth unit 4, configured to identify download source attribute information of the local file, allow the local file to be started when the download source attribute information of the local file is a non-member resource, and identify user attribute information of the local file when the download source attribute information of the local file is a member resource.
Optionally, the fourth unit 4 is further configured to identify, when the download source attribute information of the local file is a non-member resource, the download source attribute information of the local file in the playing process of the local file, and identify, when the download source attribute information of the local file is a member resource, the user attribute information of the local file.
In some optional embodiments, as shown in fig. 6, the encryption apparatus further includes a fifth unit 5, configured to acquire operation information of the user, and decrypt the local file when the operation information of the user is to change the user attribute information to be a member, or when the operation information of the user is to purchase the playing right of the local file.
In some specific implementation manners, the decrypting, by the fifth unit 5, the local file specifically includes: performing secondary decryption on the key for encrypting the data of the local file; and carrying out primary decryption on the data of the local file.
In some optional embodiments, as shown in fig. 6, the encryption apparatus further includes a sixth unit 6, configured to, when the operation information of the user is not obtained within a set time, obtain the basic information of the local file, obtain a similar file of the local file according to the basic information of the local file, and obtain and display the basic information of the similar file.
Here, the basic information of the local file includes a file type and a content profile of the local file.
The sixth unit 6 is specifically configured to acquire, as a similar file of the local file, a network file in which a keyword in the content profile of the network file matches a keyword in the content profile of the local file to the highest degree.
In some alternative embodiments, there is provided an apparatus comprising the local file encryption apparatus as described above.
In some exemplary embodiments, a non-transitory computer readable storage medium comprising instructions, such as a memory comprising instructions, executable by a processor to perform the method described above is also provided. The non-transitory computer readable storage medium may be a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic tape, an optical storage device, and the like.
Those of skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments disclosed herein, it should be understood that the disclosed methods, articles of manufacture (including but not limited to devices, apparatuses, etc.) may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment. In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
It should be understood that the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. The present invention is not limited to the procedures and structures that have been described above and shown in the drawings, and various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. A method for encrypting a local file, comprising:
receiving a starting request of a local file;
identifying user attribute information of the local file;
when the user attribute information is a member, allowing the local file to be started;
and when the user attribute information is a non-member, encrypting the local file.
2. The encryption method according to claim 1, wherein, after receiving a start-up request of a local file, before identifying user attribute information of the local file, the encryption method further comprises:
identifying download source attribute information of the local file;
when the downloading source attribute information of the local file is a non-member resource, allowing the local file to be started;
and when the downloading source attribute information of the local file is a member resource, identifying the user attribute information of the local file.
3. The encryption method according to claim 1, wherein when the user attribute information is a non-member, after encrypting a local file, the encryption method further comprises:
acquiring operation information of a user;
and when the operation information of the user is to change the user attribute information to be a member, or when the operation information of the user is to purchase the playing right of the local file, decrypting the local file.
4. The encryption method according to claim 3, further comprising:
when the operation information of the user is not acquired within the set time, acquiring the basic information of the local file;
acquiring similar files of the local files according to the basic information of the local files;
and acquiring and displaying the basic information of the similar files.
5. An apparatus for encrypting a local file, comprising:
the device comprises a first unit, a second unit and a third unit, wherein the first unit is used for receiving a starting request of a local file;
a second unit configured to identify user attribute information of the local file;
a third unit, configured to allow the local file to be started when the user attribute information is a member; and when the user attribute information is a non-member, encrypting the local file.
6. The encryption device according to claim 5, further comprising a fourth unit configured to:
identifying download source attribute information of the local file;
when the downloading source attribute information of the local file is a non-member resource, allowing the local file to be started;
and when the downloading source attribute information of the local file is a member resource, identifying the user attribute information of the local file.
7. The encryption device according to claim 5, further comprising a fifth unit configured to:
acquiring operation information of a user;
and when the operation information of the user is to change the user attribute information to be a member, or when the operation information of the user is to purchase the playing right of the local file, decrypting the local file.
8. The encryption device according to claim 7, further comprising a sixth unit configured to:
when the operation information of the user is not acquired within the set time, acquiring the basic information of the local file;
acquiring similar files of the local files according to the basic information of the local files;
and acquiring and displaying the basic information of the similar files.
9. An apparatus, characterized in that it comprises means for encrypting a local file according to any one of claims 6 to 8.
10. A storage medium on which a computer program is stored, characterized in that the computer program, when executed by a processor, implements the method of encrypting a local file according to any one of claims 1 to 4.
CN201811511846.6A 2018-12-11 2018-12-11 Local file encryption method, device, equipment and storage medium Active CN111314781B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811511846.6A CN111314781B (en) 2018-12-11 2018-12-11 Local file encryption method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811511846.6A CN111314781B (en) 2018-12-11 2018-12-11 Local file encryption method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111314781A true CN111314781A (en) 2020-06-19
CN111314781B CN111314781B (en) 2022-07-01

Family

ID=71159624

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811511846.6A Active CN111314781B (en) 2018-12-11 2018-12-11 Local file encryption method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111314781B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115767138A (en) * 2023-01-06 2023-03-07 杭州海康威视数字技术股份有限公司 Video data processing method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006006781A1 (en) * 2004-07-12 2006-01-19 Samsung Electronics Co., Ltd. Method and apparatus for searching rights objects stored in portable storage device using object location data
CN105516056A (en) * 2014-09-24 2016-04-20 腾泰科技股份有限公司 Encrypted file protection system and protection method thereof
CN105592355A (en) * 2014-10-24 2016-05-18 中兴通讯股份有限公司 Method for realizing encrypted video processing, and mobile terminal
CN106845161A (en) * 2017-01-10 2017-06-13 合网络技术(北京)有限公司 The method and apparatus that broadcasting to multimedia file is encrypted
CN106899865A (en) * 2017-03-21 2017-06-27 万维云视(上海)数码科技有限公司 A kind of encryption method and device, decryption method and device and security system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006006781A1 (en) * 2004-07-12 2006-01-19 Samsung Electronics Co., Ltd. Method and apparatus for searching rights objects stored in portable storage device using object location data
CN105516056A (en) * 2014-09-24 2016-04-20 腾泰科技股份有限公司 Encrypted file protection system and protection method thereof
CN105592355A (en) * 2014-10-24 2016-05-18 中兴通讯股份有限公司 Method for realizing encrypted video processing, and mobile terminal
CN106845161A (en) * 2017-01-10 2017-06-13 合网络技术(北京)有限公司 The method and apparatus that broadcasting to multimedia file is encrypted
CN106899865A (en) * 2017-03-21 2017-06-27 万维云视(上海)数码科技有限公司 A kind of encryption method and device, decryption method and device and security system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115767138A (en) * 2023-01-06 2023-03-07 杭州海康威视数字技术股份有限公司 Video data processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111314781B (en) 2022-07-01

Similar Documents

Publication Publication Date Title
JP6293269B2 (en) Content viewing confirmation apparatus and method
WO2020151599A1 (en) Method and apparatus for publishing video synchronously, electronic device, and readable storage medium
CN112532629B (en) Data transmission method, device, equipment and medium
JP2018502524A (en) Encryption control for information, information analysis method, system and terminal
CN110025955B (en) Information processing method, terminal, computer-readable storage medium, and computer device
CN104966525B (en) File encryption, decryption method and device
CN111935197A (en) Bidding document encryption and decryption method and device
CN111698537B (en) Multimedia data processing method, device, equipment and storage medium
CN111030827A (en) Information interaction method and device, electronic equipment and storage medium
CN111314781B (en) Local file encryption method, device, equipment and storage medium
CN110290097B (en) Data processing method and device, storage medium and electronic device
CN106130951B (en) Application store service management method and device
CN110598427B (en) Data processing method, system and storage medium
CN110083768B (en) Information sharing method, device, equipment and medium
CN109600631B (en) Video file encryption and publishing method and device
CN103491087B (en) Multimedia message processing method and device
CN107172165B (en) Data synchronization method and device
CN112995322B (en) Information transmission channel establishment method, device, storage medium and terminal
CN115567297A (en) Cross-site request data processing method and device
CN111131227B (en) Data processing method and device
CN115688059A (en) Image data processing method and device, electronic equipment and storage medium
CN110022483B (en) Hidden gift information processing method, electronic equipment and readable storage medium
CN107085689B (en) Method and device for carrying out encryption protection on picture resources in Flash
CN113138739B (en) Screen projection method, system, device, electronic equipment and storage medium
CN111475749A (en) Information display target optimization method and device, electronic equipment and readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant