CN113747243A - Video encryption method, video playing method and device - Google Patents

Video encryption method, video playing method and device Download PDF

Info

Publication number
CN113747243A
CN113747243A CN202110892904.XA CN202110892904A CN113747243A CN 113747243 A CN113747243 A CN 113747243A CN 202110892904 A CN202110892904 A CN 202110892904A CN 113747243 A CN113747243 A CN 113747243A
Authority
CN
China
Prior art keywords
video
target video
key
encryption
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110892904.XA
Other languages
Chinese (zh)
Inventor
胡建猛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Sports Culture Develop Beijing Co Ltd
Original Assignee
LeTV Sports Culture Develop Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Sports Culture Develop Beijing Co Ltd filed Critical LeTV Sports Culture Develop Beijing Co Ltd
Priority to CN202110892904.XA priority Critical patent/CN113747243A/en
Publication of CN113747243A publication Critical patent/CN113747243A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

Embodiments of the present disclosure provide a video encryption method, a video playing method, an apparatus, a device and a computer readable storage medium. The method comprises the following steps. In this way, the personalized key for the target video can be used for encrypting and decrypting the video instead of using a simple agreed universal password of both transmission parties, so that each video transmitted between a sender and a receiver has different encryption keys, the uncertainty of the keys is enhanced, the potential safety hazard of the target video can be further reduced, and the transmission and playing safety of the target video is improved.

Description

Video encryption method, video playing method and device
Technical Field
Embodiments of the present disclosure relate generally to the field of video processing, and more particularly, to a video encryption method, a video playback method, an apparatus, a device, and a computer-readable storage medium.
Background
At present, in the process of transmitting a video and playing the video, various devices such as a terminal and the like usually transmit the video in a plaintext manner for convenience, so that decryption is not needed during playing, and the playing operation can be performed quickly, but the manner causes great potential safety hazards in the transmission and playing of the video;
in order to improve the security of video transmission and playing, two transmitting parties, namely a sender and a receiver, can agree a simple password, so that various videos transmitted between the two parties can be encrypted and decrypted by using the password, once the password is leaked, all videos transmitted by the two parties have potential safety hazards due to the universality of the password, so that the safety problems of video leakage and the like can be caused, and great inconvenience is brought to users.
Disclosure of Invention
According to an embodiment of the present disclosure, a video encryption scheme and a video playback scheme are provided.
In a first aspect of the disclosure, a video encryption method is provided. The method comprises the following steps:
acquiring a target video acquisition request sent by a receiver;
generating a first key for the target video;
and encrypting the target video according to the first key, and then sending the encrypted target video to a receiver so that the receiver can play the target video after decrypting the target video by using a second key.
The above aspect and any possible implementation further provide an implementation that the generating a first key for the target video includes:
acquiring video encryption parameters;
generating the first key according to the video encryption parameters, wherein the video encryption parameters include at least one of:
presetting video stream characteristics, characteristics of a trusted player and encryption parameters.
The above-described aspect and any possible implementation further provide an implementation, where the preset video stream feature includes at least one of:
the transmission protocol of the TS stream of the target video, the storage address of the TS stream of the target video and the characteristics of the video frame of the TS stream in the target video;
the characteristics of the trusted player include at least one of:
the system comprises the position of playing equipment where the trusted player is located, the version of the trusted player and login user information of the trusted player.
The above aspect and any possible implementation manner further provide an implementation manner, where encrypting the target video according to the first key and then sending the encrypted target video to the receiving party, including:
acquiring a video encryption block in the target video, wherein the video encryption block is used for indicating a video block needing to be encrypted in the target video;
and encrypting the video encryption block by using the first key, and then sending the encrypted target video to the receiver.
In a second aspect of the present disclosure, a video playing method is provided. The method comprises the following steps:
sending a target video acquisition request to a sender;
receiving an encrypted target video sent by the sender, wherein the encrypted target video is a video obtained by encrypting the target video by the sender according to a first secret key;
and after the target video is decrypted by using the second key, the target video is played.
The above aspect and any possible implementation further provide an implementation in which the first key is a key generated by the sender according to video encryption parameters, where the video encryption parameters include at least one of:
presetting video stream characteristics, characteristics of a trusted player and encryption parameters;
the second key is the same as the first key; or
The second secret key and the first secret key are public and private keys.
The above-mentioned aspect and any possible implementation manner further provide an implementation manner, where the encrypted target video is a video obtained by the sender encrypting a video encryption block in the target video according to the first key, where the video encryption block is used to indicate a video block in the target video that needs to be encrypted.
In a third aspect of the present disclosure, a video encryption apparatus is provided. The device includes:
the acquisition module is used for acquiring a target video acquisition request sent by a receiver;
a generating module for generating a first key for the target video;
and the encryption module is used for encrypting the target video according to the first secret key and then sending the encrypted target video to a receiver so that the receiver can play the target video after decrypting the target video by using a second secret key.
In a fourth aspect of the present disclosure, a video playback device is provided. The device includes:
the sending module is used for sending a target video obtaining request to a sender;
the receiving module is used for receiving the encrypted target video sent by the sender, and the encrypted target video is a video obtained by encrypting the target video by the sender according to a first secret key;
and the decryption module is used for playing the target video after decrypting the target video by using the second key.
In a fifth aspect of the present disclosure, an electronic device is provided. The electronic device includes: a memory having a computer program stored thereon and a processor implementing the method as described above when executing the program.
In a sixth aspect of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, carries out the method as according to the first and/or second aspect of the present disclosure.
The technical scheme of the present disclosure can achieve the following technical effects:
the security of the target video can be improved by means of encryption and transmission, and because the personalized key for the target video can be generated instead of the simple agreed general password of the two transmission parties, each video transmitted between the sender and the receiver has different encryption keys, the uncertainty of the key is enhanced, the potential safety hazard of the target video can be further reduced, and the security of transmission and playing of the target video is improved.
It should be understood that the statements herein reciting aspects are not intended to limit the critical or essential features of the embodiments of the present disclosure, nor are they intended to limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. In the drawings, like or similar reference characters designate like or similar elements, and wherein:
fig. 1 shows a flow diagram of a video encryption method according to an embodiment of the present disclosure;
fig. 2 shows a flow diagram of a video playback method according to an embodiment of the present disclosure;
fig. 3 shows a block diagram of a video encryption apparatus according to an embodiment of the present disclosure;
FIG. 4 shows a block diagram of a video playback device according to an embodiment of the present disclosure;
FIG. 5 illustrates a block diagram of an exemplary electronic device capable of implementing embodiments of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are some, but not all embodiments of the present disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
According to the method and the device, the security of the target video can be improved by means of encryption and transmission, and due to the fact that the personalized key for the target video can be generated instead of the simple agreed universal password of the two transmission parties, each video transmitted between the sender and the receiver can have different encryption keys, the uncertainty of the keys is enhanced, the potential safety hazard of the target video can be further reduced, and the transmission and playing security of the target video is improved.
Fig. 1 shows a flow diagram of a video encryption method 100 according to an embodiment of the present disclosure. The method 100 may include:
step 110, acquiring a target video acquisition request sent by a receiver;
step 120, generating a first key for the target video; the target video may be one or more videos, and accordingly, the first key refers to: personalized keys corresponding to each video.
Step 130, encrypting the target video according to the first key, and then sending the encrypted target video to a receiving party, so that the receiving party plays the target video after decrypting the target video by using a second key.
After a target video acquisition request sent by a receiver is obtained, an individualized first secret key for the target video can be automatically generated, and then the target video is encrypted by using the first secret key and then sent to the receiver, so that the receiver can decrypt the target video by using a second secret key and then play the video.
In one embodiment, the generating a first key for the target video comprises:
acquiring video encryption parameters;
generating the first key according to the video encryption parameters, wherein the video encryption parameters include at least one of:
presetting video stream characteristics, characteristics of a trusted player and encryption parameters.
When the first key is generated, the first key may be automatically generated according to one or more of the preset video stream characteristics, the characteristics of the trusted player, and the preset encryption parameters, of course, the more the video encryption parameters are, the higher the security level of the first key is, and accordingly, the higher the security of the target video is.
In addition, it is to be emphasized that:
if the characteristics of the trusted player are adopted, the relevance between the first secret key and the trusted player is stronger, and the illegal receiver does not have the details of the trusted player and does not know the trusted player, so that the illegal receiver does not know the specific generation basis of the first secret key and cannot know the correct second secret key.
Similarly, if the preset video stream feature is adopted, the relevance between the first key and the video stream of the target video is stronger, and since the illegal receiver does not know what the target video is, the specific what the preset video stream feature is less clear, so that the illegal receiver does not know the specific generation basis of the first key, and does not know the correct second key, thus the possibility that the illegal receiver cracks the encrypted target video is greatly reduced, and the security of the target video is greatly improved.
The preset encryption parameters can be any designated numbers, upper and lower case letters, punctuation marks, combinations thereof and the like.
In one embodiment, the preset video stream characteristics include at least one of:
a transport protocol of a TS (transport stream) stream of the target video, a storage address of the TS stream of the target video, and characteristics of a video frame of the TS stream in the target video; there may be multiple TS streams in the target video.
The characteristics of the trusted player include at least one of:
the position (IP address, MAC address, GPS location, etc.) of the playing device where the trusted player is located, the version of the trusted player, and login user information (such as account number + password, or mobile phone number + verification code, etc.) of the trusted player.
The transmission Protocol may be an http (Hyper Text Transfer Protocol), and the storage address may be specific to a certain lowest layer folder under a certain system of a certain device.
The characteristics of the video frames of the TS stream in the target video may be characteristics of each video frame in the TS stream, such as an average value of pixel values of pixels in a video region at an upper left corner x × y of each video frame, so that each video frame may be encrypted respectively, and certainly, the encryption workload is large; alternatively, the first and second electrodes may be,
the features of the video frames of the TS streams in the target video may be features of the xth video frame in each TS stream; alternatively, the first and second electrodes may be,
the feature of the video frame of the TS stream in the target video may be a feature of a plurality of video frames in a specified order in each TS stream. And the features of the video frame may be pixel values, luminance values, gray values, saturation, etc.
In one embodiment, the encrypting the target video according to the first key and then sending the encrypted target video to the receiving party includes:
acquiring a video encryption block in the target video, wherein the video encryption block is used for indicating a video block needing to be encrypted in the target video;
and encrypting the video encryption block by using the first key, and then sending the encrypted target video to the receiver.
In the disclosure, in addition to the whole target video can be encrypted by using the first key, the target video can be partially encrypted according to actual requirements, that is, the video encryption block to be encrypted is determined first, and then the video encryption block is automatically encrypted by using the first key, so that the security of the video can be ensured, and the encryption workload can be reduced.
Fig. 2 shows a flow diagram of a video playback method 200 according to an embodiment of the present disclosure. The method 200 may include:
step 210, sending a target video acquisition request to a sender;
step 220, receiving an encrypted target video sent by the sender, wherein the encrypted target video is a video obtained by encrypting the target video by the sender according to a first key;
and step 230, playing the target video after decrypting the target video by using the second key.
After receiving the encrypted target video sent by the sender, the receiver can successfully decrypt the target video only by using the correct second key, and further complete the automatic playing of the target video, so that only a legal receiver can complete the playing of the video, and an illegal receiver does not know how to decrypt the video because the encryption mode of the target video is not clear, and thus the target video can be safely played.
In addition, the sender firstly encrypts and then transmits the target video, so that the transmission safety of the target video can be improved, and the first secret key is an individualized secret key for the target video instead of a simple agreed universal password of the two transmission parties, so that each video transmitted between the sender and the receiver can have different encryption secret keys, the uncertainty of the secret keys is enhanced, the potential safety hazard of the target video can be further reduced, and the transmission and playing safety of the target video is improved.
In one embodiment, the first key is a key generated by the sender from video encryption parameters, wherein the video encryption parameters include at least one of:
presetting video stream characteristics, characteristics of a trusted player and encryption parameters;
the second key is the same as the first key; or
The second secret key and the first secret key are public and private keys.
The first secret key and the second secret key can be completely the same and can also be a public key and a private key, so that the encryption and decryption mode of the target video is more flexible.
In one embodiment, the encrypted target video is a video obtained by the sender encrypting a video encryption block in the target video according to the first key, wherein the video encryption block is used for indicating a video block which needs to be encrypted in the target video.
In the disclosure, in addition to using the first key to encrypt the whole target video, the sender in the disclosure can also partially encrypt the target video according to actual requirements, that is, determine the video encryption block to be encrypted first, and then automatically encrypt the video encryption block by using the first key, so that the security of the video can be ensured, and the encryption workload can be reduced.
In one embodiment, the method further comprises:
receiving a preset mark added for the target video by the sender;
the preset mark may be a watermark added to a video frame of the target video, or an identifier added to a header file of the target video.
After the target video is decrypted, extracting the mark in the target video, and judging whether the mark is matched with the preset mark;
and if so, judging that the target video is not tampered.
After the preset mark is received and stored, the current mark in the target video can be extracted after the target video is decrypted, and then whether the current mark is matched with the preset mark added by the sender or not is judged, specifically, if the similarity is higher than the preset similarity, the matching is performed, the target video can be further confirmed to be not tampered, and still be the original target video sent by the sender, and if the similarity is not matched, the target video is illegally intercepted and tampered.
In one embodiment, the method further comprises:
receiving and storing a first hash value generated based on the preset video stream characteristics of the target video and sent by the sender;
after the target video is decrypted, generating a second hash value of the target video according to the current video stream characteristic of the target video;
and judging whether the target video is tampered or not according to whether the first hash value is matched with the second hash value or not.
By receiving a first hash value generated by a sender based on preset video stream characteristics of a target video, after the target video is decrypted, a second hash value of the target video is generated by using current video stream characteristics of the target video, and then whether the target video is tampered or not is automatically judged according to whether the first hash value is matched with the second hash value or not, specifically, if the first hash value is matched with the second hash value, the target video is not tampered, otherwise, the target video is tampered, so that the safety of the target video is further improved.
In addition, if the target video is judged to be tampered, a tampering signal can be sent to the sender so that the sender can adjust the first secret key in time, and correspondingly, the receiver can adjust the second secret key in time in an adaptive mode, and therefore safe transmission and playing of the video are guaranteed.
It is noted that while for simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present disclosure is not limited by the order of acts, as some steps may, in accordance with the present disclosure, occur in other orders and concurrently. Further, those skilled in the art should also appreciate that the embodiments described in the specification are exemplary embodiments and that acts and modules referred to are not necessarily required by the disclosure.
The above is a description of embodiments of the method, and the embodiments of the apparatus are further described below.
Fig. 3 shows a block diagram of a video encryption apparatus 300 according to an embodiment of the present disclosure. As shown in fig. 3, the apparatus 300 includes:
an obtaining module 310, configured to obtain a target video obtaining request sent by a receiving party;
a generating module 320 for generating a first key for the target video;
the encryption module 330 is configured to encrypt the target video according to the first key, and then send the encrypted target video to a receiving party, so that the receiving party plays the target video after decrypting the target video by using a second key.
Fig. 4 shows a block diagram of a video playback device 400 according to an embodiment of the present disclosure. As shown in fig. 4, the apparatus 400 includes:
a sending module 410, configured to send a target video acquisition request to a sender;
a receiving module 420, configured to receive an encrypted target video sent by the sender, where the encrypted target video is a video obtained by encrypting the target video by the sender according to a first key;
and the decryption module 430 is configured to play the target video after decrypting the target video by using the second key.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the described module may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
FIG. 5 shows a schematic block diagram of an electronic device 500 that may be used to implement embodiments of the present disclosure. The apparatus 500 may be used to implement at least one of the video encryption device 300 of fig. 3 and the video playback device 400 of fig. 4. As shown in fig. 5, device 500 includes a CPU501 that may perform various appropriate actions and processes according to computer program instructions stored in a ROM502 or loaded from a storage unit 508 into a RAM 503. In the RAM503, various programs and data required for the operation of the device 500 can also be stored. The CPU501, ROM502, and RAM503 are connected to each other via a bus 504. An I/O interface 505 is also connected to bus 504.
A number of components in the device 500 are connected to the I/O interface 505, including: an input unit 506 such as a keyboard, a mouse, or the like; an output unit 507 such as various types of displays, speakers, and the like; a storage unit 508, such as a magnetic disk, optical disk, or the like; and a communication unit 509 such as a network card, modem, wireless communication transceiver, etc. The communication unit 509 allows the device 500 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The CPU501 executes the various methods and processes described above, such as the methods 100, 200. For example, in some embodiments, the methods 100, 200 may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as the storage unit 508. In some embodiments, part or all of the computer program may be loaded and/or installed onto the device 500 via the ROM502 and/or the communication unit 509. When the computer program is loaded into the RAM503 and executed by the CPU501, one or more steps of the methods 100, 200 described above may be performed. Alternatively, in other embodiments, the CPU501 may be configured to perform the methods 100, 200 by any other suitable means (e.g., by way of firmware).
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a RAM, a ROM, an EPROM, an optical fiber, a CD-ROM, an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Further, while operations are depicted in a particular order, this should be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation can also be implemented in multiple implementations separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (10)

1. A video encryption method for a sender, comprising:
acquiring a target video acquisition request sent by a receiver;
generating a first key for the target video;
and encrypting the target video according to the first key, and then sending the encrypted target video to a receiver so that the receiver can play the target video after decrypting the target video by using a second key.
2. The method of claim 1,
the generating a first key for the target video comprises:
acquiring video encryption parameters;
generating the first key according to the video encryption parameters, wherein the video encryption parameters include at least one of:
presetting video stream characteristics, characteristics of a trusted player and encryption parameters;
the preset video stream characteristics include at least one of:
the transmission protocol of the TS stream of the target video, the storage address of the TS stream of the target video and the characteristics of the video frame of the TS stream in the target video;
the characteristics of the trusted player include at least one of:
the system comprises the position of playing equipment where the trusted player is located, the version of the trusted player and login user information of the trusted player.
3. The method according to claim 1 or 2,
the encrypting the target video according to the first key and then sending the encrypted target video to the receiver includes:
acquiring a video encryption block in the target video, wherein the video encryption block is used for indicating a video block needing to be encrypted in the target video;
and encrypting the video encryption block by using the first key, and then sending the encrypted target video to the receiver.
4. A video playing method for a receiving side, comprising:
sending a target video acquisition request to a sender;
receiving an encrypted target video sent by the sender, wherein the encrypted target video is a video obtained by encrypting the target video by the sender according to a first secret key;
and after the target video is decrypted by using the second key, the target video is played.
5. The method of claim 4,
the first key is a key generated by the sender according to video encryption parameters, wherein the video encryption parameters include at least one of:
presetting video stream characteristics, characteristics of a trusted player and encryption parameters;
the second key is the same as the first key; or
The second secret key and the first secret key are public and private keys.
6. The method according to claim 4 or 5,
and the encrypted target video is obtained by encrypting a video encryption block in the target video by the sender according to the first key, wherein the video encryption block is used for indicating a video block which needs to be encrypted in the target video.
7. A video encryption apparatus for a sender, comprising:
the acquisition module is used for acquiring a target video acquisition request sent by a receiver;
a generating module for generating a first key for the target video;
and the encryption module is used for encrypting the target video according to the first secret key and then sending the encrypted target video to a receiver so that the receiver can play the target video after decrypting the target video by using a second secret key.
8. A video playback apparatus for a receiving side, comprising:
the sending module is used for sending a target video obtaining request to a sender;
the receiving module is used for receiving the encrypted target video sent by the sender, and the encrypted target video is a video obtained by encrypting the target video by the sender according to a first secret key;
and the decryption module is used for playing the target video after decrypting the target video by using the second key.
9. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program, wherein the processor, when executing the program, implements the method of any of claims 1-6.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method of any one of claims 1 to 6.
CN202110892904.XA 2021-08-04 2021-08-04 Video encryption method, video playing method and device Pending CN113747243A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110892904.XA CN113747243A (en) 2021-08-04 2021-08-04 Video encryption method, video playing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110892904.XA CN113747243A (en) 2021-08-04 2021-08-04 Video encryption method, video playing method and device

Publications (1)

Publication Number Publication Date
CN113747243A true CN113747243A (en) 2021-12-03

Family

ID=78730055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110892904.XA Pending CN113747243A (en) 2021-08-04 2021-08-04 Video encryption method, video playing method and device

Country Status (1)

Country Link
CN (1) CN113747243A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335875A (en) * 2007-06-29 2008-12-31 株式会社东芝 Information processing device and video and audio frequency information protection method
US20130142331A1 (en) * 2011-12-02 2013-06-06 Adobe Systems Incorporated Binding of protected video content to video player with encryption key
CN110602570A (en) * 2019-11-12 2019-12-20 成都索贝数码科技股份有限公司 Video and audio credible playing method based on asymmetric encryption
CN112165596A (en) * 2020-09-03 2021-01-01 视联动力信息技术股份有限公司 Monitoring video data transmission method and device, terminal equipment and storage medium
CN112954388A (en) * 2021-02-02 2021-06-11 视联动力信息技术股份有限公司 Data file acquisition method and device, terminal equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101335875A (en) * 2007-06-29 2008-12-31 株式会社东芝 Information processing device and video and audio frequency information protection method
US20130142331A1 (en) * 2011-12-02 2013-06-06 Adobe Systems Incorporated Binding of protected video content to video player with encryption key
CN110602570A (en) * 2019-11-12 2019-12-20 成都索贝数码科技股份有限公司 Video and audio credible playing method based on asymmetric encryption
CN112165596A (en) * 2020-09-03 2021-01-01 视联动力信息技术股份有限公司 Monitoring video data transmission method and device, terminal equipment and storage medium
CN112954388A (en) * 2021-02-02 2021-06-11 视联动力信息技术股份有限公司 Data file acquisition method and device, terminal equipment and storage medium

Similar Documents

Publication Publication Date Title
US10659220B2 (en) Method and system for encrypting and decrypting two-dimensional code mask
CN107294937B (en) Data transmission method based on network communication, client and server
CN109218825B (en) Video encryption system
EP3220573B1 (en) Method and system for controlling encryption of information and analyzing information as well as terminal
CN107317677B (en) Secret key storage and equipment identity authentication method and device
US20180219688A1 (en) Information Transmission Method and Mobile Device
CN109151508B (en) Video encryption method
CN107579903B (en) Picture message secure transmission method and system based on mobile device
CN106778285B (en) Method and device for upgrading equipment
KR20150079489A (en) Instant messaging method and system
CN105491073B (en) Data downloading method, device and system
CN112597523B (en) File processing method, file conversion encryption machine, terminal, server and medium
CN113114668A (en) Information transmission method, mobile terminal, storage medium and electronic equipment
CN114500064A (en) Communication security verification method and device, storage medium and electronic equipment
CN116709325B (en) Mobile equipment security authentication method based on high-speed encryption algorithm
CN111818466B (en) Information sending and receiving method and device, electronic equipment and readable storage medium
CN113141333B (en) Communication method, device, server, system and storage medium of network access device
CN108513272B (en) Short message processing method and device
CN111382451A (en) Security level identification method and device, electronic equipment and storage medium
CN113747243A (en) Video encryption method, video playing method and device
CN114944921A (en) Login authentication method and device, electronic equipment and storage medium
CN113079506B (en) Network security authentication method, device and equipment
CN111431846B (en) Data transmission method, device and system
CN112769783A (en) Data transmission method, cloud server, receiving end and sending end
CN112929871A (en) OTA upgrade package acquisition method, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 1-103, Commercial Room 1, Floor 1, Building 3, No. 105, Yaojiayuan Road, Chaoyang District, Beijing 100025

Applicant after: LETV new generation (Beijing) Cultural Media Co.,Ltd.

Address before: 100025 1502, 12 / F, building 3, 105 yaojiayuan Road, Chaoyang District, Beijing

Applicant before: LETV new generation (Beijing) Cultural Media Co.,Ltd.

CB02 Change of applicant information