CN112995717A - Video transmission control method and device, electronic equipment and intelligent glasses - Google Patents
Video transmission control method and device, electronic equipment and intelligent glasses Download PDFInfo
- Publication number
- CN112995717A CN112995717A CN201911286253.9A CN201911286253A CN112995717A CN 112995717 A CN112995717 A CN 112995717A CN 201911286253 A CN201911286253 A CN 201911286253A CN 112995717 A CN112995717 A CN 112995717A
- Authority
- CN
- China
- Prior art keywords
- video
- characteristic parameter
- user
- target video
- physiological characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 230000005540 biological transmission Effects 0.000 title claims abstract description 51
- 239000011521 glass Substances 0.000 title description 9
- 239000004984 smart glass Substances 0.000 claims abstract description 18
- 210000001525 retina Anatomy 0.000 claims description 43
- 238000012795 verification Methods 0.000 claims description 11
- 230000004270 retinal projection Effects 0.000 claims 1
- 238000013475 authorization Methods 0.000 description 18
- 230000008569 process Effects 0.000 description 15
- 238000010586 diagram Methods 0.000 description 8
- 238000012545 processing Methods 0.000 description 8
- 230000002207 retinal effect Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006978 adaptation Effects 0.000 description 1
- 230000032683 aging Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000036760 body temperature Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000007711 solidification Methods 0.000 description 1
- 230000008023 solidification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25875—Management of end-user data involving end-user authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Abstract
The disclosure provides a video transmission control method and smart glasses. The video transmission control method comprises the following steps: receiving a first physiological characteristic parameter of a user acquired by first equipment, and establishing a user account for the user on a block chain network according to the first physiological characteristic parameter; responding to a video acquisition request from the user account, and verifying whether the video acquisition request comprises decryption information of a target video; when the video acquisition request comprises decryption information of a target video, circularly acquiring a second physiological characteristic parameter of the user through the first equipment; and when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is less than or equal to a preset value, transmitting the target video to the user account so that the first equipment can acquire and play the target video. The video transmission control method can improve the safety of the video file in the transmission process.
Description
Technical Field
The disclosure relates to the technical field of block chains, in particular to a video transmission control method and device, electronic equipment and intelligent glasses.
Background
With the increase of network speed, digital videos, digital movies and short videos are sought after by people, but the copyright authorization problem of digital videos is also seriously challenged, especially the digital movies authorized alone can be recorded and played to other unauthorized platforms of the network in a stolen way, the existing mode is only to encrypt the videos to prevent a chain of theft, the problem of illegal recording is solved, and how to solve the problems of illegal recording and authorization becomes urgent for researching the video transmission safety.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
An object of the present disclosure is to provide a video transmission control method and a video transmission control apparatus, which are used to overcome, at least to some extent, the problem that a video file is stolen or recorded during transmission due to the limitations and disadvantages of the related art.
According to an aspect of the present disclosure, there is provided a video transmission control method including: receiving a first physiological characteristic parameter acquired by first equipment, and establishing a user account for the first equipment on a block chain network according to the first physiological characteristic parameter; responding to a video acquisition request from the user account, and verifying whether the video acquisition request comprises decryption information of a target video; when the video acquisition request comprises decryption information of a target video, circularly acquiring a second physiological characteristic parameter of the user through the first equipment; and when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is less than or equal to a preset value, transmitting the target video to the user account so that the first equipment can acquire and play the target video.
In an exemplary embodiment of the present disclosure, further comprising: and when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is larger than a preset value, stopping transmitting the target video to the user account.
In an exemplary embodiment of the present disclosure, the first device is a pair of smart glasses, and the smart glasses play the target video by a retina projection method.
In an exemplary embodiment of the present disclosure, the first physiological characteristic parameter and the second physiological characteristic parameter are retina characteristic parameters.
In an exemplary embodiment of the present disclosure, before responding to the video acquisition request from the user account, the method further includes: receiving the target video and an encryption public key uploaded by second equipment, and encrypting the target video according to the encryption public key; and storing the encrypted target video on a blockchain network.
In an exemplary embodiment of the present disclosure, the verifying whether the video acquisition request includes decryption information of the target video includes: and when the video acquisition request comprises the authorized private key of the target video, judging that the video acquisition request comprises the decryption information of the target video.
According to an aspect of the present disclosure, there is provided smart glasses including: the micro projector is used for receiving and playing the video file; a prism coupled to the pico projector for projecting the video file onto a retina of a user; the retina characteristic acquisition module is used for acquiring retina characteristic parameters of a user; the controller is coupled with the retina characteristic acquisition module and the miniature projector, is connected with the server through a wireless network, and is set to execute the following instructions: after a first retina characteristic parameter of a user is acquired through the retina characteristic acquisition module, the first retina characteristic parameter is sent to the server; responding to a preset instruction and sending a video acquisition request to the server, wherein the video acquisition request comprises decryption information of a target video; circularly acquiring a second retina characteristic parameter of the user according to a retina characteristic verification instruction from the server and sending the second retina characteristic parameter to the server so that the server can verify whether the difference value between the second retina characteristic parameter and the first retina characteristic parameter meets a preset value; and receiving the target video transmitted by the server when the difference value meets the preset value, and playing the target video through the micro projector.
In an exemplary embodiment of the present disclosure, includes: the account establishing module is used for receiving a first physiological characteristic parameter of a user acquired by first equipment and establishing a user account for the user on a block chain network according to the first physiological characteristic parameter; the video decryption module is configured to respond to a video acquisition request from the user account and verify whether the video acquisition request includes decryption information of a target video; the real-time checking module is set to circularly acquire a second physiological characteristic parameter of the user through the first equipment when the video acquisition request comprises decryption information of a target video; and the video transmission module is configured to transmit the target video to the user account when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is less than or equal to a preset value, so that the first device acquires and plays the target video.
According to an aspect of the present disclosure, there is provided an electronic device including: a memory; and
a processor coupled to the memory, the processor configured to execute the video transmission control method of any of the above, based on instructions stored in the memory.
According to a fourth aspect of the present disclosure, there is provided a computer-readable storage medium having stored thereon a program which, when executed by a processor, implements a video transmission control method as recited in any one of the above.
According to the embodiment of the disclosure, the video file is encrypted and then stored on the block chain network, the decryption information is verified in the video file acquisition process, and the transmission object is verified in real time in the video file transmission process, so that the video file can be effectively prevented from being stolen in the storage process and stolen and recorded in the transmission process, and the security of the video file is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 is a flowchart of a video transmission control method in an exemplary embodiment of the present disclosure.
Fig. 2 is a functional block diagram of smart glasses in an exemplary embodiment of the present disclosure.
Fig. 3 is an interaction diagram of a video transmission control process in an exemplary embodiment of the present disclosure.
Fig. 4 is a block diagram of a video transmission control apparatus in an exemplary embodiment of the present disclosure.
Fig. 5 is a block diagram of an electronic device in an exemplary embodiment of the disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Further, the drawings are merely schematic illustrations of the present disclosure, in which the same reference numerals denote the same or similar parts, and thus, a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The following detailed description of exemplary embodiments of the disclosure refers to the accompanying drawings.
Fig. 1 schematically shows a flow chart of a video transmission control method in an exemplary embodiment of the present disclosure. Referring to fig. 1, the video transmission control method 100 may include:
step S102, receiving a first physiological characteristic parameter of a user acquired by first equipment, and establishing a user account for the user on a block chain network according to the first physiological characteristic parameter;
step S104, responding to a video acquisition request from the user account, and verifying whether the video acquisition request comprises decryption information of a target video;
step S106, circularly acquiring a second physiological characteristic parameter of the user through the first equipment when the video acquisition request comprises decryption information of a target video;
step S108, when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is smaller than or equal to a preset value, transmitting the target video to the user account so that the first device can acquire and play the target video.
According to the embodiment of the disclosure, the video file is encrypted and then stored on the block chain network, the decryption information is verified in the video file acquisition process, and the transmission object is verified in real time in the video file transmission process, so that the video file can be effectively prevented from being stolen in the storage process and stolen and recorded in the transmission process, and the security of the video file is improved.
The steps of the method 100 are described in detail below.
In step S102, a first physiological characteristic parameter of a user acquired by a first device is received, and a user account is established for the user on a block chain network according to the first physiological characteristic parameter.
In the embodiment of the disclosure, the server establishes a user account corresponding to the user on the blockchain network according to the retina characteristic parameter of the user, so as to be used for subsequent transmission of the video file. The user account may be, for example, an intelligent contract account, and the intelligent contract account may be used as a node of the blockchain network and is correspondingly recorded in the first device, that is, the user account is bound with the first device, so that the first device transfers a file with the server and the blockchain network through the intelligent contract account. The registration of the user account on the blockchain network can improve the security of the user account, and prevent the video file from being stolen or inverted as much as possible, which is the first key for protecting the security of the video file in the technical scheme of the disclosure.
When a user with a registered user account uses other equipment to obtain a video, the first physiological characteristic parameter obtained by the other equipment can be compared with the first physiological characteristic parameter corresponding to the existing user account, so that the user account corresponding to the user is accurately located, and the user account and the other equipment are bound. In addition, this approach also allows different users to set up different user accounts using the first device, providing conditions for the shared security of the first device.
The first physiological characteristic parameter may include, for example, a retina characteristic parameter, a fingerprint characteristic parameter, a body temperature infrared parameter, an iris characteristic parameter, or other parameters of the user, as long as a unique characteristic of one user can be marked. In the embodiment of the present disclosure, the first device is preferably smart glasses, and the first physiological characteristic parameter is preferably a retina characteristic parameter of the user.
In step S104, in response to the video acquisition request from the user account, it is verified whether the video acquisition request includes decryption information of the target video.
In the embodiment of the disclosure, the user account and the server are both intelligent contract nodes. After each video is uploaded to the server, the video is stored in a plurality of intelligent contract nodes through the server, and an intelligent contract is established. Each intelligent contract is provided with an authorization range, namely the authorization range set when the video is uploaded, the server can encrypt the video by using the public key of the intelligent contract node in the authorization range, and when one intelligent contract node requests to acquire a target video, the server verifies whether the video acquisition request sent by the intelligent contract node has the public key of the intelligent contract node in the authorization range according to the intelligent contract corresponding to the target video, if so, the server transmits the video to the intelligent contract node sending the video acquisition request, otherwise, the server rejects the video acquisition request.
The user account can acquire the video information by updating the node information in the block chain and is displayed to the user through the first device. The first device can respond to an instruction input by a user in various ways to determine a target video which the user wants to acquire, so that a video acquisition request is sent to the server by using a wireless network through a bound user account corresponding to the user.
In the embodiment of the disclosure, whether the user account has the authority to acquire the target video may be determined by verifying whether the video acquisition request includes decryption information of the target video. In this embodiment of the disclosure, the decryption information may include a private key of an authorized intelligent contract node, that is, it may be determined whether the intelligent contract node (i.e., the user account sending the video acquisition request) has the acquisition right of the target video by verifying whether the private key of the intelligent contract node is within the authorized range of the target video.
In addition, the decryption information may also include other information. For example, the decryption information may further include a decryption password of the video, the server may decrypt the target video through the password, and if the decryption is successful and the private key of the user account is within the authorized range, it is determined that the target video may be transmitted to the user account.
The verification of the decryption information is used as a second key for protecting the security of the video file in the technical scheme disclosed by the invention, so that the video file can be further prevented from being stolen.
In step S106, when the video obtaining request includes decryption information of a target video, a second physiological characteristic parameter of the user is obtained by the first device in a loop.
In the embodiment of the disclosure, in order to prevent the video from being illegally recorded, a link of circularly verifying the user characteristics in the video transmission/playing process is provided. When the first device is smart glasses, the video may be projected directly onto the retina of the user. In the playing process, the first device is controlled to circularly obtain the retina characteristic parameters (second physiological characteristic parameters) of the user and upload the retina characteristic parameters (second physiological characteristic parameters) to the server through the user account, so that the server verifies whether the retina characteristic parameters (second physiological characteristic parameters) are consistent with the corresponding retina characteristic parameters (first physiological characteristic parameters) when the user account is registered.
Step S108, when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is smaller than or equal to a preset value, transmitting the target video to the user account so that the first device can acquire and play the target video.
If the difference value of the two is within the preset range, the target video is watched by the user by using the intelligent glasses (first equipment), and the target video can be continuously transmitted to the user account; if the difference between the two exceeds the preset range, the video played by the intelligent glasses is possibly stolen and recorded, or the user account is used by other people, and the target video can be stopped from being transmitted at the moment in order to be protected and only played to the target user.
It should be noted that, in the embodiment of the present disclosure, instead of transmitting a complete video file to the first device for the first device to download to the local device for playing, the server provides an online video transmission service for playing, and the first device can only obtain each frame of image in the target video according to the playing speed, or perform a small amount of caching, so as to prevent an illegal user from copying the video file downloaded to the local device to another storage device through the first device.
Through real-time playing and real-time verification, the video can be prevented from being stolen and recorded in the playing process, or the video is prevented from being illegally stolen or used after being downloaded to the local by a user, and the method is a third key for protecting the safety of the video file.
In the embodiment of the disclosure, the smart glasses play the target video by a retina projection method.
Fig. 2 is a functional block diagram of smart glasses in an exemplary embodiment of the present disclosure.
Referring to fig. 2, the smart glasses 2 may mainly include:
a micro projector 21 for receiving and playing a video file;
a prism 22 coupled to the micro-projector 21 for projecting the video file onto the retina of the user;
a retina characteristic collection module 23, configured to collect retina characteristic parameters of a user;
and the controller 24 is coupled to the retinal feature acquisition module 23 and the micro projector 21 and is connected with the server 1 through a wireless network.
The controller 24 receives the video image transmitted by the server 1 through the wireless network, and then plays the video image through the micro projector 21, and the micro projector 21 projects the video image on the prism 22, so that the prism 22 directly projects the video image on the retina of the user. The video image is directly projected on the retina of the user, so that the video can be effectively prevented from being stolen and recorded in the video playing process, and the safety of the video file is improved.
In addition, the controller 24 acquires the retinal feature parameters of the user through the retinal feature acquisition module 23, and sends the retinal feature parameters to the server 1 through the wireless network, so that the server 1 establishes a user account (the attribute of the user account is, for example, an intelligent contract node) for the user on the blockchain network according to a first retinal feature parameter corresponding to the user, and compares a plurality of second retinal feature parameters acquired subsequently with the first retinal feature parameter, and if the difference value between the two retinal feature parameters is within a preset range, the server 1 continuously transmits the video image of the target video to the controller 24; if the difference between the two exceeds the preset range, the server 1 stops transmitting the video image to the controller 24.
In some embodiments, the server 1 may obtain the playing progress of the controller 24 for the video according to the communication with the controller 24, and further send the video image to the controller 24 according to the playing progress, so that the controller 24 can buffer a small amount of video image for the micro projector 21 to play.
Fig. 3 is an interaction diagram of a video transmission control process in an exemplary embodiment of the present disclosure.
The method provided by the embodiment of the disclosure can be applied to a video playing mode of 'person-to-person authorization', for example.
Referring to fig. 3, the server 1 communicates with the smart glasses 2 and the second device 3 through a wireless network. The second device 3 is, for example, an intelligent terminal such as a mobile phone and a tablet computer, and the disclosure does not particularly limit this.
The second device 3 may send a request to the server 1 to register an account on the blockchain network in the form of an intelligent contract node, thereby uploading local video to the server 1 through the account. The video uploaded together with the video may also have authorization information of the video, such as a password (encryption public key), an authorization range, authorization time, and the like, so that the server 1 encrypts the video according to the authorization information and stores the encrypted video on the blockchain network. For example, a function named sendtransmission may be packaged in the mobile application, and the input parameters of the function are information of the packaged encrypted video file, the authorized aging, the authorized account, and the video publishing user. The server stores the function in the Transaction content by using the public key signature authorization information parameter of the authorized person, and then the function is issued to the block chain network, the solidification of the block can adopt a DPOS (trusted Proof of trust) consensus mechanism, the solidified contract has a unique identifier of the contract, and the intelligent contract node in the block chain network can store all contract information to the local after being updated.
The smart glasses 2 register a user account in the form of a smart contract node on the blockchain network, and the smart contract node can acquire the latest data (e.g., video name/cover picture, etc.) in response to the node update information of the blockchain network and store the latest data in the local memory of the smart glasses.
The smart glasses 2 read the local data, and verify the integrity of the local data according to the hash value (signature) of the local data. The local data may include, for example, a video title/cover picture, etc. The intelligent contract network data comprises numerous intelligent contract nodes, each intelligent contract node needs to create an intelligent contract every time when issuing an authorized video, each intelligent contract node can check which contracts the intelligent contract node joins according to a private key of the intelligent contract node, and the video data of the contracts are read according to selection.
After the data integrity is verified, the intelligent glasses 2 (i.e. an intelligent contract node) can respond to a selection request of a user for a target video, send a video acquisition request corresponding to the target video to all intelligent contract nodes according to a private key of the intelligent contract node (actually, due to an election mechanism of a block chain network, a server is often elected as an intelligent contract node for decision making, the video acquisition request is actually sent to a server in charge of decision making), the intelligent contract node receiving the video acquisition request performs authorization verification according to a contract, and after the verification is successful, a file is sent to the intelligent glasses 2. The node for authorization verification is elected in a plurality of intelligent contract nodes by adopting a DPOS (distributed data processing system) consensus mechanism in a block chain network (intelligent contract network), the elected intelligent contract node for authorization verification is a server 1, namely the server 1 verifies a decryption application, and after verification is successful, a video file is sent to the intelligent glasses 2.
Through the process, the point-to-point authorized transmission of the user of the intelligent glasses 2 by the user of the second device can be realized, the video file is effectively prevented from being copied or stolen and recorded in the transmission process, and the communication safety is effectively improved.
In other embodiments of the present disclosure, the authorized range of the video may also be expanded by other methods. For example, the authorized range may be set by the server that receives the video. The server can set the authorization scope to be certain regions (the IP address conforms to the preset rule) and the intelligent contract node can access the video, and can also set the user account (the intelligent contract node) with certain authority to access the video, wherein the authority can be, for example, a VIP user, a paying user, a user who has purchased the video and the like. In addition, the server may also adjust the authorization range of the video in real time according to the latest user payment information and the user account property, which is not limited in this disclosure.
In summary, the embodiment of the present disclosure establishes the user account on the block chain according to the physiological characteristic parameter, verifies the decryption information to determine the authorization range, and controls the continuation and termination of the transmission process of the video file according to the cyclic verification result of the physiological characteristic parameter, so that the security of the video file in the transmission process can be effectively ensured, the video file is prevented from being illegally copied, stolen and recorded, and the transmission security is effectively improved.
Corresponding to the above method embodiment, the present disclosure also provides a video transmission control apparatus, which may be used to execute the above method embodiment.
Fig. 4 schematically shows a block diagram of a video transmission control apparatus in an exemplary embodiment of the present disclosure.
Referring to fig. 4, the video transmission control apparatus 400 may include:
an account establishing module 402, configured to receive a first physiological characteristic parameter of a user acquired by a first device, and establish a user account for the user on a blockchain network according to the first physiological characteristic parameter;
a video decryption module 404 configured to respond to a video acquisition request from the user account and verify whether the video acquisition request includes decryption information of a target video;
a real-time verification module 406, configured to cyclically obtain a second physiological characteristic parameter of the user through the first device when the video obtaining request includes decryption information of a target video;
the video transmission module 408 is configured to transmit the target video to the user account when the difference between the second physiological characteristic parameter and the first physiological characteristic parameter is less than or equal to a preset value, so that the first device acquires and plays the target video.
In an exemplary embodiment of the disclosure, the video transmission module 408 is further configured to: and when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is larger than a preset value, stopping transmitting the target video to the user account.
In an exemplary embodiment of the present disclosure, the first device is a pair of smart glasses, and the smart glasses play the target video by a retina projection method.
In an exemplary embodiment of the present disclosure, the first physiological characteristic parameter and the second physiological characteristic parameter are retina characteristic parameters.
In an exemplary embodiment of the present disclosure, the video transmission control apparatus 400 further includes:
the video encryption module 410 is configured to receive the target video and an encrypted public key uploaded by the second device, and encrypt the target video according to the encrypted public key; and storing the encrypted target video on a blockchain network.
In an exemplary embodiment of the disclosure, the video decryption module 404 is configured to: and when the video acquisition request comprises the authorized private key of the target video, judging that the video acquisition request comprises the decryption information of the target video.
Since the functions of the apparatus 400 have been described in detail in the corresponding method embodiments, the disclosure is not repeated herein.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
In an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 500 according to this embodiment of the invention is described below with reference to fig. 5. The electronic device 500 shown in fig. 5 is only an example and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 5, the electronic device 500 is embodied in the form of a general purpose computing device. The components of the electronic device 500 may include, but are not limited to: the at least one processing unit 510, the at least one memory unit 520, and a bus 530 that couples various system components including the memory unit 520 and the processing unit 510.
Wherein the storage unit stores program code that is executable by the processing unit 510 to cause the processing unit 510 to perform steps according to various exemplary embodiments of the present invention as described in the above section "exemplary methods" of the present specification. For example, the processing unit 510 may execute step S102 as shown in fig. 1: receiving a first physiological characteristic parameter of a user acquired by first equipment, and establishing a user account for the user on a block chain network according to the first physiological characteristic parameter; step S104: responding to a video acquisition request from the user account, and verifying whether the video acquisition request comprises decryption information of a target video; step S106: when the video acquisition request comprises decryption information of a target video, circularly acquiring a second physiological characteristic parameter of the user through the first equipment; step S108: and when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is less than or equal to a preset value, transmitting the target video to the user account so that the first equipment can acquire and play the target video.
The memory unit 520 may include a readable medium in the form of a volatile memory unit, such as a random access memory unit (RAM)5201 and/or a cache memory unit 5202, and may further include a read only memory unit (ROM) 5203.
The electronic device 500 may also communicate with one or more external devices 600 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 500, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 500 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 550. Also, the electronic device 500 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 560. As shown, the network adapter 560 communicates with the other modules of the electronic device 500 over the bus 530. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 500, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above section "exemplary methods" of the present description, when said program product is run on the terminal device.
There is also provided, in accordance with an embodiment of the present invention, a program product for implementing the above method, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Furthermore, the above-described figures are merely schematic illustrations of processes involved in methods according to exemplary embodiments of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
Claims (10)
1. A video transmission control method, comprising:
receiving a first physiological characteristic parameter of a user acquired by first equipment, and establishing a user account for the user on a block chain network according to the first physiological characteristic parameter;
responding to a video acquisition request from the user account, and verifying whether the video acquisition request comprises decryption information of a target video;
when the video acquisition request comprises decryption information of a target video, circularly acquiring a second physiological characteristic parameter of the user through the first equipment;
and when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is less than or equal to a preset value, transmitting the target video to the user account so that the first equipment can acquire and play the target video.
2. The video transmission control method of claim 1, further comprising:
and when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is larger than a preset value, stopping transmitting the target video to the user account.
3. The video transmission control method according to claim 1 or 2, wherein the first device is a smart glasses, and the smart glasses play the target video by a retinal projection method.
4. The video transmission control method according to claim 1 or 2, wherein the first physiological characteristic parameter and the second physiological characteristic parameter are retina characteristic parameters.
5. The video transmission control method according to claim 1, further comprising, before responding to a video acquisition request from the user account:
receiving the target video and an encryption public key uploaded by second equipment, and encrypting the target video according to the encryption public key;
and storing the encrypted target video on a blockchain network.
6. The video transmission control method according to claim 5, wherein the verifying whether the video acquisition request includes decryption information of the target video comprises:
and when the video acquisition request comprises the authorized private key of the target video, judging that the video acquisition request comprises the decryption information of the target video.
7. A smart eyewear, comprising:
the micro projector is used for receiving and playing the video file;
a prism coupled to the pico projector for projecting the video file onto a retina of a user;
the retina characteristic acquisition module is used for acquiring retina characteristic parameters of a user;
the controller is coupled with the retina characteristic acquisition module and the miniature projector, is connected with the server through a wireless network, and is set to execute the following instructions:
after a first retina characteristic parameter of a user is acquired through the retina characteristic acquisition module, the first retina characteristic parameter is sent to the server;
responding to a preset instruction and sending a video acquisition request to the server, wherein the video acquisition request comprises decryption information of a target video;
circularly acquiring a second retina characteristic parameter of the user according to a retina characteristic verification instruction from the server and sending the second retina characteristic parameter to the server so that the server can verify whether the difference value between the second retina characteristic parameter and the first retina characteristic parameter meets a preset value;
and receiving the target video transmitted by the server when the difference value meets the preset value, and playing the target video through the micro projector.
8. A video transmission control apparatus, comprising:
the account establishing module is used for receiving a first physiological characteristic parameter of a user acquired by first equipment and establishing a user account for the user on a block chain network according to the first physiological characteristic parameter;
the video decryption module is configured to respond to a video acquisition request from the user account and verify whether the video acquisition request includes decryption information of a target video;
the real-time checking module is set to circularly acquire a second physiological characteristic parameter of the user through the first equipment when the video acquisition request comprises decryption information of a target video;
and the video transmission module is configured to transmit the target video to the user account when the difference value between the second physiological characteristic parameter and the first physiological characteristic parameter is less than or equal to a preset value, so that the first device acquires and plays the target video.
9. An electronic device, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the video transmission control method of any of claims 1-6 based on instructions stored in the memory.
10. A computer-readable storage medium on which a program is stored, the program, when executed by a processor, implementing the video transmission control method according to any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911286253.9A CN112995717A (en) | 2019-12-13 | 2019-12-13 | Video transmission control method and device, electronic equipment and intelligent glasses |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911286253.9A CN112995717A (en) | 2019-12-13 | 2019-12-13 | Video transmission control method and device, electronic equipment and intelligent glasses |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112995717A true CN112995717A (en) | 2021-06-18 |
Family
ID=76342395
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911286253.9A Pending CN112995717A (en) | 2019-12-13 | 2019-12-13 | Video transmission control method and device, electronic equipment and intelligent glasses |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112995717A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114884925A (en) * | 2022-04-18 | 2022-08-09 | 深圳市绿联科技股份有限公司 | Method, device and system for transmitting composite photo data and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102668503A (en) * | 2009-12-21 | 2012-09-12 | 国际商业机器公司 | Secure kerberized access of encrypted file system |
CN107505710A (en) * | 2017-08-22 | 2017-12-22 | 童迎伟 | It is a kind of that there is the wearing head for playing content protection function to show terminal and VR glasses |
CN109547462A (en) * | 2018-12-14 | 2019-03-29 | 深圳壹账通智能科技有限公司 | A kind of intelligent logging-on authentication method and relevant device based on block chain |
CN109640135A (en) * | 2018-12-07 | 2019-04-16 | 深圳市云歌人工智能技术有限公司 | It issues video and obtains the method, apparatus and storage medium of video |
CN110446075A (en) * | 2019-08-14 | 2019-11-12 | 杭州安恒信息技术股份有限公司 | Encryption method and device, decryption method and device, electronic equipment |
-
2019
- 2019-12-13 CN CN201911286253.9A patent/CN112995717A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102668503A (en) * | 2009-12-21 | 2012-09-12 | 国际商业机器公司 | Secure kerberized access of encrypted file system |
CN107505710A (en) * | 2017-08-22 | 2017-12-22 | 童迎伟 | It is a kind of that there is the wearing head for playing content protection function to show terminal and VR glasses |
CN109640135A (en) * | 2018-12-07 | 2019-04-16 | 深圳市云歌人工智能技术有限公司 | It issues video and obtains the method, apparatus and storage medium of video |
CN109547462A (en) * | 2018-12-14 | 2019-03-29 | 深圳壹账通智能科技有限公司 | A kind of intelligent logging-on authentication method and relevant device based on block chain |
CN110446075A (en) * | 2019-08-14 | 2019-11-12 | 杭州安恒信息技术股份有限公司 | Encryption method and device, decryption method and device, electronic equipment |
Non-Patent Citations (1)
Title |
---|
张燕翔等: "《虚拟现实与人工智能技术的综合应用》", vol. 978, 中国科学技术大学出版社, pages: 44 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114884925A (en) * | 2022-04-18 | 2022-08-09 | 深圳市绿联科技股份有限公司 | Method, device and system for transmitting composite photo data and electronic equipment |
CN114884925B (en) * | 2022-04-18 | 2023-04-18 | 深圳市绿联科技股份有限公司 | Method, device and system for transmitting composite photo data and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100605071B1 (en) | System and method for secure and convenient management of digital electronic content | |
CA2461805C (en) | Content delivery service providing apparatus and content delivery service terminal unit | |
US8438621B2 (en) | Method and apparatus for secure management of debugging processes within communication devices | |
US9805173B2 (en) | Information processing device, information storage device, server, information processing system, information processing method and medium for reproduction of encrypted content | |
US11956323B2 (en) | Provision of a lease for streaming content | |
BRPI0313404B1 (en) | "METHOD AND SYSTEM FOR MONITORING THE CUSTOMER'S USE OF DIGITAL CONTENT LOADED OR TRANSFERRED IN CONTINUOUS PROVIDED BY A CONTENT PROVIDER TO A CUSTOMER SYSTEM THROUGH A NETWORK" | |
WO2021218859A1 (en) | Access request response method and apparatus, and electronic device | |
CN109510802B (en) | Authentication method, device and system | |
KR20100022953A (en) | Binding content licenses to portable storage devices | |
JP2014029545A (en) | Method and device for partial encryption of digital content | |
CN111757152B (en) | Multimedia content projection method and device and electronic equipment | |
CN110324358B (en) | Video data management and control authentication method, module, equipment and platform | |
US20230132485A1 (en) | System for Thin Client Devices in Hybrid Edge Cloud Systems | |
KR102553145B1 (en) | A secure element for processing and authenticating a digital key and operation metho thereof | |
US11258601B1 (en) | Systems and methods for distributed digital rights management with decentralized key management | |
US11050560B2 (en) | Secure reusable access tokens | |
US8995821B2 (en) | System and method for transferring digital content | |
US20210344676A1 (en) | Method and system for securing communications between a lead device and a secondary device | |
KR20040028086A (en) | Contents copyright management system and the method in wireless terminal | |
CN112995717A (en) | Video transmission control method and device, electronic equipment and intelligent glasses | |
CN112632481A (en) | Method for authorizing software, terminal device and storage medium | |
TWI621964B (en) | License verification method executed via mobile device and associated computer program product | |
KR102193711B1 (en) | Terminal device and computer program | |
KR20150104949A (en) | Apparatus for protecting of digital cinema contents and method thereof | |
JP2017183930A (en) | Server management system, server device, server management method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |