CN115065843B - Video encryption and decryption processing method and system under security authentication - Google Patents
Video encryption and decryption processing method and system under security authentication Download PDFInfo
- Publication number
- CN115065843B CN115065843B CN202210860960.XA CN202210860960A CN115065843B CN 115065843 B CN115065843 B CN 115065843B CN 202210860960 A CN202210860960 A CN 202210860960A CN 115065843 B CN115065843 B CN 115065843B
- Authority
- CN
- China
- Prior art keywords
- video
- video stream
- playing
- terminal
- equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 21
- 238000000034 method Methods 0.000 claims abstract description 42
- 238000012545 processing Methods 0.000 claims abstract description 25
- 238000004422 calculation algorithm Methods 0.000 claims description 19
- 230000002159 abnormal effect Effects 0.000 claims description 16
- 238000012795 verification Methods 0.000 claims description 10
- 238000004364 calculation method Methods 0.000 claims description 7
- 238000006243 chemical reaction Methods 0.000 claims description 5
- 238000013475 authorization Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the invention discloses a video encryption and decryption processing method and a system under security authentication, wherein the method comprises the following steps: the video playing terminal sends a playing request to the server; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to a video sending terminal; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. According to the scheme, the overall safety and flexible power consumption control of video stream data processing are improved, the information safety is improved, and the situation that only equipment which can be authenticated can play the video stream data in a single mode after the same video stream is issued is guaranteed.
Description
Technical Field
The embodiment of the application relates to the technical field of video stream processing, in particular to a video encryption and decryption processing method and system under security authentication.
Background
In the process of video stream transmission, it is a common secure transmission method for a sending end to encrypt a video stream to prevent information leakage.
In the related art, patent document publication No. CN202190362U discloses a video transmission system with a real-time encryption function for video stream data. The scheme comprises a digital video coding encryption module arranged at the front end of the acquisition and a digital video decoding and decryption module arranged at the monitoring center, wherein the digital video coding encryption module comprises an analog video input interface module, a digital video coding module, an encryption calculation module and a network interface module which are sequentially connected, the digital video decoding and decryption module comprises a network interface module, a decryption calculation module, a digital video decoding module and a digital video output interface which are sequentially connected, and the encryption calculation module and the decryption calculation module are calculation modules for calling an AES algorithm to perform corresponding encryption or decryption operation. The scheme overcomes the defect that sensitive information is easy to leak in the prior art, effectively prevents the risk that the sensitive video image information is leaked or stolen when being transmitted through a network, and improves the safety of the video image information. However, it lacks further precise control over the security of multi-endpoint peer-to-peer transmission, and the power consumption required for the encryption and decryption process is high.
Disclosure of Invention
The embodiment of the invention provides a video encryption and decryption processing method and system under security authentication, which solve the problem that the security of multi-endpoint point-to-point transmission in the related technology is lack of further accurate control, meanwhile, the power consumption required in the encryption and decryption process is higher, the overall security and flexible power consumption control of video stream data processing are improved, the information security is improved, and the problem that only authenticated equipment can play unicity after the same video stream is issued is ensured.
In a first aspect, an embodiment of the present invention provides a video encryption and decryption processing method under security authentication, where the method includes:
the video playing terminal sends a playing request to the server to verify the credit granting equipment;
under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals;
the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal;
and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
In a possible embodiment, the playing request is integrated with the device identifier, and after the video playing terminal sends the playing request to the server, the method further includes:
and the server verifies whether the video playing terminal meets the credit granting equipment or not based on the equipment identification, wherein the verification comprises the step of determining a historical playing record corresponding to the equipment identification, and if the historical playing record is not abnormal, the video playing terminal is determined as the credit granting equipment.
In a possible embodiment, the generating key information based on the device identifier of the video playback terminal, and sending the key information to the video sending terminal includes:
and converting the equipment identifier into corresponding character string data with a preset length, and sending the character string data serving as an encryption key to a video sending terminal.
In a possible embodiment, after sending the character string data as an encryption key to the video sending terminal, the method further includes:
and the video playing terminal converts the equipment identifier into corresponding character string data with preset length based on the same conversion method, and stores the character string data as a decryption key.
In one possible embodiment, the video sending terminal performs encryption on the video stream based on the key information to obtain an encrypted video stream, including:
and the video sending terminal determines a corresponding encryption algorithm according to the equipment identification, and encrypts the video stream by using the key information through the encryption algorithm to obtain an encrypted video stream, wherein different types of equipment identifications correspond to encryption algorithms with different security levels and computational complexity.
In one possible embodiment, the decrypting the encrypted video stream based on the stored device identifier to obtain a decrypted video stream, and playing the decrypted video stream includes:
and acquiring the stored decryption key obtained based on the equipment identifier, decrypting the encrypted video stream through the decryption key to obtain a decrypted video stream, and playing the decrypted video stream.
In a possible embodiment, after the decrypting the encrypted video stream by the decryption key to obtain a decrypted video stream and playing the decrypted video stream, the method further includes:
if the server detects that the video playing end is abnormal, recording abnormal information;
and determining whether the video playing end is a credit granting device according to the abnormal information, and updating the record of the credit granting device.
In a second aspect, an embodiment of the present invention further provides a system for processing video encryption and decryption under security authentication, where the system includes:
the video playing terminal is configured to send a playing request to the server so as to carry out credit authorization equipment verification;
the server is configured to verify that the video playing terminal meets the conditions of credit granting equipment, generate key information based on the equipment identification of the video playing terminal, and send the key information to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals;
the video sending terminal is configured to encrypt a video stream based on the key information to obtain an encrypted video stream, and send the encrypted video stream to the video playing terminal;
and the video playing terminal is configured to receive the encrypted video stream, decrypt the encrypted video stream based on the stored equipment identifier to obtain a decrypted video stream, and play the decrypted video stream.
In a third aspect, an embodiment of the present invention further provides a video encryption and decryption processing device under security authentication, where the device includes:
one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the video encryption and decryption processing method under the security authentication according to the embodiment of the present invention.
In a fourth aspect, the embodiment of the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the video encryption and decryption processing method under security authentication according to the embodiment of the present invention.
In a fifth aspect, the present application further provides a computer program product, where the computer program product includes a computer program, where the computer program is stored in a computer-readable storage medium, and at least one processor of the device reads and executes the computer program from the computer-readable storage medium, so that the device executes the video encryption and decryption processing method under security authentication according to the present application.
In the embodiment of the invention, a video playing terminal sends a playing request to a server to verify credit granting equipment; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The method solves the problem that the security of multi-endpoint point-to-point transmission in the related technology is lack of further accurate control, meanwhile, the power consumption required in the encryption and decryption process is higher, the overall security of video stream data processing and flexible power consumption control are improved, the information security is improved, and the problem that only authenticated equipment can play unicity after the same video stream is issued is guaranteed.
Drawings
Fig. 1 is a flowchart of a video encryption and decryption processing method under security authentication according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for generating key information based on a device identifier of a video playback terminal according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for encrypting a video stream based on the key information to obtain an encrypted video stream according to an embodiment of the present invention;
fig. 4 is a block diagram of a video encryption and decryption processing system under security authentication according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a video encryption and decryption processing device under security authentication according to an embodiment of the present invention.
Detailed Description
The embodiments of the present invention will be described in further detail with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad invention. It should be further noted that, for convenience of description, only some structures, not all structures, relating to the embodiments of the present invention are shown in the drawings.
Fig. 1 is a flowchart of a video encryption and decryption processing method under security authentication according to an embodiment of the present invention, and a solution in an embodiment of the present application specifically includes the following steps:
and S101, the video playing terminal sends a playing request to the server to verify the credit granting equipment.
The video playing terminal is a device for playing video streams. In one embodiment, when the video playback terminal is ready to play a video stream, verification is first performed to obtain the video stream, that is, the video playback terminal sends a playback request to the server to perform verification of the credit granting device. And the credit granting equipment verifies to determine whether the video playing terminal is the credit granting equipment.
Step S102, under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals.
The server is used for responding to the playing request to verify whether the video playing terminal meets the condition of the credit granting device, if yes, the video playing terminal is confirmed to be the credit granting device, and if not, the video playing terminal is the non-credit granting device. And under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, generating key information based on the equipment identifier of the video playing terminal, and sending the key information to the video sending terminal, namely the key information is generated based on the equipment identifier, and different video playing terminals have different equipment identifiers.
Optionally, the server performs, based on the device identifier, verification on whether the video playing terminal meets the requirement of the credit granting device, where the verification includes determining a history playing record of a record corresponding to the device identifier, and if the history playing record is not abnormal, determining the video playing terminal as the credit granting device.
And S103, the video sending terminal encrypts the video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal.
In one embodiment, after receiving the key information sent by the server, the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal, so that the video playing terminal can play the encrypted video stream after decrypting the encrypted video stream.
And step S104, the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
In one embodiment, after receiving the encrypted video stream, the video playing terminal decrypts the encrypted video stream by using the device identifier stored in the video playing terminal to obtain a decrypted video stream, and plays the decrypted video stream. Optionally, the method includes obtaining a decryption key based on the device identifier stored in the device, and decrypting the encrypted video stream with the decryption key to obtain a decrypted video stream.
According to the method, the video playing terminal sends a playing request to the server so as to verify the credit granting equipment; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, generating key information based on the equipment identification of the video playing terminal, and sending the key information to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The method solves the problem that the security of multi-endpoint point-to-point transmission in the related technology is lack of further accurate control, meanwhile, the power consumption required in the encryption and decryption process is higher, the overall security of video stream data processing and flexible power consumption control are improved, the information security is improved, and the problem that only authenticated equipment can play unicity after the same video stream is issued is guaranteed.
Fig. 2 is a flowchart of a method for generating key information based on a device identifier of a video playback terminal according to an embodiment of the present invention. On the basis of the above technical solution, a specific method for generating key information based on the device identifier of the video playback terminal is provided, as shown in fig. 2, and specifically includes:
step S201, the video playing terminal sends a playing request to the server to verify the credit granting device.
Step S202, under the condition that the server verifies that the video playing terminal meets the conditions of credit granting equipment, the equipment identification is converted into corresponding character string data with preset length, the character string data is used as an encryption key and sent to a video sending terminal, and the key information is sent to the video sending terminal.
In an embodiment, the device identifier may be character information of any length, and at this time, the device identifier is converted into corresponding character string data of a preset length, a specific conversion method is not limited, and the size of the preset length may be set, such as 32 bits, 64 bits, or 128 bits. And sending the character string data serving as an encryption key to a video sending terminal to serve as the encryption key for encrypting the video stream.
Correspondingly, after the character string data is sent to the video sending terminal as the encryption key, the method further comprises the following steps: and the video playing terminal converts the equipment identifier into corresponding character string data with preset length based on the same conversion method, and stores the character string data as a decryption key.
Step S203, the video sending terminal encrypts the video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal.
And step S204, the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
Therefore, the video playing terminal sends a playing request to the server; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, generating key information based on the equipment identification of the video playing terminal, and sending the key information to a video sending terminal; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The scheme improves the overall safety and flexible power consumption control of video stream data processing, improves the information safety, and ensures that only authenticated equipment can play the video stream in a single way after the same video stream is issued.
Fig. 3 is a flowchart of a method for encrypting a video stream based on the key information to obtain an encrypted video stream according to an embodiment of the present invention. On the basis of the above technical solution, a specific method for obtaining an encrypted video stream by encrypting a video stream based on the key information is provided, as shown in fig. 3, which specifically includes:
step S301, the video playing terminal sends a playing request to the server to verify the credit granting device.
Step S302, under the condition that the server verifies that the video playing terminal meets the credit granting device condition, key information is generated based on the device identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of device identifications based on different computing power conditions of the different video playing terminals.
Step S303, the video sending terminal determines a corresponding encryption algorithm according to the device identifier, encrypts a video stream by using the key information through the encryption algorithm to obtain an encrypted video stream, wherein different types of device identifiers correspond to encryption algorithms with different security levels and computational complexity, and sends the encrypted video stream to the video playing terminal.
In one embodiment, different device identifications correspond to different encryption algorithms. Illustratively, the device identifier includes a model of the device or a hardware processing parameter capable of characterizing the device, the video sending end may determine an encryption algorithm under a corresponding processing calculation power according to the received device identifier, and encrypt the video stream by using the key information through the encryption algorithm to obtain an encrypted video stream.
And step S304, the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
Therefore, the video playing terminal sends a playing request to the server; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to a video sending terminal; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The scheme improves the overall safety and flexible power consumption control of video stream data processing, improves the information safety, and ensures that only authenticated equipment can play the video stream in a single way after the same video stream is issued.
On the basis of the above technical solution, after decrypting the encrypted video stream by the decryption key to obtain a decrypted video stream and playing the decrypted video stream, the method further includes: if the server detects that the video playing end is abnormal, recording abnormal information; and determining whether the video playing end is a credit granting device according to the abnormal information, and updating the record of the credit granting device.
Fig. 4 is a block diagram of a video encryption and decryption processing system under security authentication according to an embodiment of the present invention, where the system is configured to execute a video encryption and decryption processing method under security authentication according to an embodiment of the data receiving end, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 4, the apparatus specifically includes: a video playback terminal 101, a server 102, and a video transmission terminal 103, wherein,
the video playing terminal 101 is configured to send a playing request to the server so as to perform credit authorization equipment verification;
the server 102 is configured to verify that the video playing terminal meets the conditions of the credit granting device, generate key information based on the device identifier of the video playing terminal, and send the key information to the video sending terminal, wherein different video playing terminals correspond to different types of device identifiers based on different computing power conditions of the different video playing terminals;
the video sending terminal 103 is configured to encrypt a video stream based on the key information to obtain an encrypted video stream, and send the encrypted video stream to the video playing terminal;
the video playing terminal 101 is configured to receive the encrypted video stream, decrypt the encrypted video stream based on the stored device identifier to obtain a decrypted video stream, and play the decrypted video stream.
According to the scheme, the video playing terminal sends a playing request to the server; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to a video sending terminal; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The scheme improves the overall safety and flexible power consumption control of video stream data processing, improves the information safety, and ensures that only authenticated equipment can play the video stream in a single way after the same video stream is issued. Correspondingly, the functions executed by the modules are respectively as follows:
in a possible embodiment, the playing request is integrated with the device identifier, and after the video playing terminal sends the playing request to the server, the method further includes:
and the server verifies whether the video playing terminal meets the credit granting equipment or not based on the equipment identification, wherein the verification comprises the step of determining a historical playing record of a record corresponding to the equipment identification, and if the historical playing record is not abnormal, the video playing terminal is determined as the credit granting equipment.
In a possible embodiment, the generating key information based on the device identifier of the video playback terminal, and sending the key information to the video sending terminal includes:
and converting the equipment identifier into corresponding character string data with a preset length, and sending the character string data serving as an encryption key to a video sending terminal.
In a possible embodiment, after sending the character string data as an encryption key to the video sending terminal, the method further includes:
and the video playing terminal converts the equipment identifier into corresponding character string data with preset length based on the same conversion method, and stores the character string data as a decryption key.
In one possible embodiment, the video sending terminal performs encryption on the video stream based on the key information to obtain an encrypted video stream, including:
and the video sending terminal determines a corresponding encryption algorithm according to the equipment identification, and encrypts the video stream by using the key information through the encryption algorithm to obtain an encrypted video stream, wherein different types of equipment identifications correspond to encryption algorithms with different security levels and computational complexity.
In one possible embodiment, the decrypting the encrypted video stream based on the stored device identifier to obtain a decrypted video stream, and playing the decrypted video stream includes:
and acquiring the stored decryption key obtained based on the equipment identifier, decrypting the encrypted video stream through the decryption key to obtain a decrypted video stream, and playing the decrypted video stream.
In a possible embodiment, after the decrypting the encrypted video stream by the decryption key to obtain a decrypted video stream and playing the decrypted video stream, the method further includes:
if the server detects that the video playing end is abnormal, recording abnormal information;
and determining whether the video playing end is a credit granting device according to the abnormal information, and updating the record of the credit granting device.
Fig. 5 is a schematic structural diagram of a video encryption and decryption processing apparatus under security authentication according to an embodiment of the present invention, as shown in fig. 5, the apparatus includes a processor 201, a memory 202, an input device 203, and an output device 204; the number of the processors 201 in the device may be one or more, and one processor 201 is taken as an example in fig. 5; the processor 201, the memory 202, the input means 203 and the output means 204 in the device may be connected by a bus or other means, as exemplified by a bus connection in fig. 5. The memory 202 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the video encryption and decryption processing method under security authentication in the embodiment of the present invention. The processor 201 executes various functional applications and data processing of the device by running software programs, instructions and modules stored in the memory 202, that is, implements the video encryption and decryption processing method under the security authentication. The input device 203 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function controls of the apparatus. The output device 204 may include a display device such as a display screen.
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a method for processing video encryption and decryption under security authentication, where the method includes:
the video playing terminal sends a playing request to the server to verify the credit granting equipment;
under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, generating key information based on the equipment identification of the video playing terminal, and sending the key information to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals;
the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal;
and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
From the above description of the embodiments, it is obvious for those skilled in the art that the embodiments of the present invention can be implemented by software and necessary general hardware, and certainly can be implemented by hardware, but the former is a better implementation in many cases. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions to make a computer device (which may be a personal computer, a service, or a network device) perform the methods described in the embodiments of the present invention.
It should be noted that, in the embodiment of the video encryption and decryption processing system under the security authentication, the included units and modules are only divided according to the functional logic, but are not limited to the above division, as long as the corresponding functions can be realized; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the embodiment of the invention.
In some possible embodiments, the aspects of the method provided by the present application may also be implemented in a form of a program product, which includes program code for causing a computer device to execute the steps in the method according to the various exemplary embodiments of the present application described above in this specification when the program product runs on the computer device, for example, the computer device may execute the video encryption and decryption processing method under security authentication described in the embodiments of the present application. The program product may be implemented using any combination of one or more readable media.
It should be noted that the foregoing is only a preferred embodiment of the present invention and the technical principles applied. Those skilled in the art will appreciate that the embodiments of the present invention are not limited to the specific embodiments described herein, and that various obvious changes, rearrangements and substitutions can be made by those skilled in the art without departing from the scope of the embodiments of the invention. Therefore, although the embodiments of the present invention have been described in more detail through the above embodiments, the embodiments of the present invention are not limited to the above embodiments, and many other equivalent embodiments may be included without departing from the concept of the embodiments of the present invention, and the scope of the embodiments of the present invention is determined by the scope of the appended claims.
Claims (9)
1. The video encryption and decryption processing method under the security authentication is characterized by comprising the following steps:
the video playing terminal sends a playing request to the server to verify the credit granting equipment;
under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals, and the equipment identifications comprise the models of the equipment or hardware processing parameters capable of representing the equipment;
the video sending terminal encrypts the video stream based on the key information to obtain an encrypted video stream, wherein the video sending terminal determines a corresponding encryption algorithm according to the equipment identifier, encrypts the video stream by using the key information through the encryption algorithm to obtain the encrypted video stream, the equipment identifiers of different types correspond to the encryption algorithms of different security levels and calculation complexity, and sends the encrypted video stream to the video playing terminal;
and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
2. The method for processing video encryption and decryption under security authentication according to claim 1, wherein the device identifier is integrated into the play request, and after the video play terminal sends the play request to the server, the method further comprises:
and the server verifies whether the video playing terminal meets the credit granting equipment or not based on the equipment identification, wherein the verification comprises the step of determining a historical playing record of a record corresponding to the equipment identification, and if the historical playing record is not abnormal, the video playing terminal is determined as the credit granting equipment.
3. The video encryption and decryption processing method under the security authentication according to claim 1, wherein the generating key information based on the device identifier of the video playback terminal and sending the key information to a video sending terminal includes:
and converting the equipment identifier into corresponding character string data with a preset length, and sending the character string data serving as an encryption key to a video sending terminal.
4. The video encryption and decryption processing method under the security authentication according to claim 3, wherein after sending the character string data as an encryption key to a video sending terminal, the method further comprises:
and the video playing terminal converts the equipment identifier into corresponding character string data with preset length based on the same conversion method, and stores the character string data as a decryption key.
5. The video encryption and decryption processing method under the security authentication according to claim 3, wherein the decrypting the encrypted video stream based on the stored device identifier to obtain a decrypted video stream, and playing the decrypted video stream, comprises:
and acquiring a stored decryption key obtained based on the equipment identifier, decrypting the encrypted video stream through the decryption key to obtain a decrypted video stream, and playing the decrypted video stream.
6. The method for processing video encryption and decryption under security authentication according to claim 5, wherein after the decrypting the encrypted video stream with the decryption key to obtain a decrypted video stream and playing the decrypted video stream, the method further comprises:
if the server detects that the video playing end is abnormal, recording abnormal information;
and determining whether the video playing end is a credit granting device according to the abnormal information, and updating the record of the credit granting device.
7. The video encryption and decryption processing system under the security certification is characterized by comprising:
the video playing terminal is configured to send a playing request to the server so as to carry out credit authorization equipment verification;
the server is configured to generate key information based on the device identification of the video playing terminal and send the key information to the video sending terminal under the condition that the video playing terminal meets the credit granting device condition, wherein different video playing terminals correspond to different types of device identifications based on different computing power conditions of the different video playing terminals, and the device identifications comprise the models of the devices or hardware processing parameters capable of representing the devices;
the video sending terminal is configured to encrypt a video stream based on the key information to obtain an encrypted video stream, and is specifically configured to determine a corresponding encryption algorithm according to the device identifier, encrypt the video stream by using the key information through the encryption algorithm to obtain the encrypted video stream, wherein different types of device identifiers correspond to encryption algorithms with different security levels and computational complexity, and send the encrypted video stream to the video playing terminal;
and the video playing terminal is configured to receive the encrypted video stream, decrypt the encrypted video stream based on the stored equipment identifier to obtain a decrypted video stream, and play the decrypted video stream.
8. A video encryption and decryption processing apparatus under security authentication, the apparatus comprising: one or more processors; storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the video encryption/decryption processing method under security authentication according to any one of claims 1 to 6.
9. A storage medium containing computer-executable instructions for performing the video encryption decryption processing method under security authentication according to any one of claims 1 to 6 when executed by a computer processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210860960.XA CN115065843B (en) | 2022-07-22 | 2022-07-22 | Video encryption and decryption processing method and system under security authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210860960.XA CN115065843B (en) | 2022-07-22 | 2022-07-22 | Video encryption and decryption processing method and system under security authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115065843A CN115065843A (en) | 2022-09-16 |
CN115065843B true CN115065843B (en) | 2022-12-20 |
Family
ID=83206337
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210860960.XA Active CN115065843B (en) | 2022-07-22 | 2022-07-22 | Video encryption and decryption processing method and system under security authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115065843B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106899865A (en) * | 2017-03-21 | 2017-06-27 | 万维云视(上海)数码科技有限公司 | A kind of encryption method and device, decryption method and device and security system |
CN109788349A (en) * | 2019-01-16 | 2019-05-21 | 武汉斗鱼鱼乐网络科技有限公司 | A kind of method and relevant apparatus detecting computing capability |
CN109995751A (en) * | 2019-02-13 | 2019-07-09 | 平安科技(深圳)有限公司 | Equipment for surfing the net labeling method, device and storage medium, computer equipment |
CN111741268A (en) * | 2020-06-30 | 2020-10-02 | 中国建设银行股份有限公司 | Video transmission method, device, server, equipment and medium |
CN112165596A (en) * | 2020-09-03 | 2021-01-01 | 视联动力信息技术股份有限公司 | Monitoring video data transmission method and device, terminal equipment and storage medium |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5792263B2 (en) * | 2013-11-13 | 2015-10-07 | オリンパス株式会社 | Video display terminal, video transmission terminal, video communication system, video display method, video transmission method, and program |
CN105578208A (en) * | 2015-11-06 | 2016-05-11 | 北京腾锐视讯科技有限公司 | IPTV video encryption transmission system |
CN110493641A (en) * | 2019-08-06 | 2019-11-22 | 东软集团股份有限公司 | A kind of video file encryption and decryption method and device |
-
2022
- 2022-07-22 CN CN202210860960.XA patent/CN115065843B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106899865A (en) * | 2017-03-21 | 2017-06-27 | 万维云视(上海)数码科技有限公司 | A kind of encryption method and device, decryption method and device and security system |
CN109788349A (en) * | 2019-01-16 | 2019-05-21 | 武汉斗鱼鱼乐网络科技有限公司 | A kind of method and relevant apparatus detecting computing capability |
CN109995751A (en) * | 2019-02-13 | 2019-07-09 | 平安科技(深圳)有限公司 | Equipment for surfing the net labeling method, device and storage medium, computer equipment |
CN111741268A (en) * | 2020-06-30 | 2020-10-02 | 中国建设银行股份有限公司 | Video transmission method, device, server, equipment and medium |
CN112165596A (en) * | 2020-09-03 | 2021-01-01 | 视联动力信息技术股份有限公司 | Monitoring video data transmission method and device, terminal equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN115065843A (en) | 2022-09-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11601409B2 (en) | Establishing a secure communication session with an external security processor | |
EP3324572B1 (en) | Information transmission method and mobile device | |
CN106571951B (en) | Audit log obtaining method, system and device | |
CN110149209B (en) | Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment | |
JP2005102163A (en) | Equipment authentication system, server, method and program, terminal and storage medium | |
CN110011950B (en) | Authentication method and device for video stream address | |
CN110598429B (en) | Data encryption storage and reading method, terminal equipment and storage medium | |
CN115065472B (en) | Security chip encryption and decryption method and device based on multi-key encryption and decryption | |
CN112003697B (en) | Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium | |
CN114793184B (en) | Security chip communication method and device based on third-party key management node | |
CN115208697A (en) | Adaptive data encryption method and device based on attack behavior | |
CN111654503A (en) | Remote control method, device, equipment and storage medium | |
CN109451504B (en) | Internet of things module authentication method and system | |
CN114139176A (en) | Industrial internet core data protection method and system based on state secret | |
CN101808100B (en) | Method and system for solving replay of remote update of information safety device | |
CN117240625A (en) | Tamper-resistant data processing method and device and electronic equipment | |
CN113268752A (en) | Data management method, device, equipment and storage medium | |
CN115065843B (en) | Video encryption and decryption processing method and system under security authentication | |
CN112448810A (en) | Authentication method and device | |
CN101159540A (en) | Method and process device of transmitting-receiving data flow | |
CN114500064A (en) | Communication security verification method and device, storage medium and electronic equipment | |
CN111431846B (en) | Data transmission method, device and system | |
CN113918992A (en) | Log data processing method and device, storage medium and electronic equipment | |
CN112887983A (en) | Equipment identity authentication method, device, equipment and medium | |
CN114223176A (en) | Certificate management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |