CN115065843B - Video encryption and decryption processing method and system under security authentication - Google Patents

Video encryption and decryption processing method and system under security authentication Download PDF

Info

Publication number
CN115065843B
CN115065843B CN202210860960.XA CN202210860960A CN115065843B CN 115065843 B CN115065843 B CN 115065843B CN 202210860960 A CN202210860960 A CN 202210860960A CN 115065843 B CN115065843 B CN 115065843B
Authority
CN
China
Prior art keywords
video
video stream
playing
terminal
equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210860960.XA
Other languages
Chinese (zh)
Other versions
CN115065843A (en
Inventor
张奇惠
刘家明
邱达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Wise Security Technology Co Ltd
Original Assignee
Guangzhou Wise Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Wise Security Technology Co Ltd filed Critical Guangzhou Wise Security Technology Co Ltd
Priority to CN202210860960.XA priority Critical patent/CN115065843B/en
Publication of CN115065843A publication Critical patent/CN115065843A/en
Application granted granted Critical
Publication of CN115065843B publication Critical patent/CN115065843B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a video encryption and decryption processing method and a system under security authentication, wherein the method comprises the following steps: the video playing terminal sends a playing request to the server; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to a video sending terminal; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. According to the scheme, the overall safety and flexible power consumption control of video stream data processing are improved, the information safety is improved, and the situation that only equipment which can be authenticated can play the video stream data in a single mode after the same video stream is issued is guaranteed.

Description

Video encryption and decryption processing method and system under security authentication
Technical Field
The embodiment of the application relates to the technical field of video stream processing, in particular to a video encryption and decryption processing method and system under security authentication.
Background
In the process of video stream transmission, it is a common secure transmission method for a sending end to encrypt a video stream to prevent information leakage.
In the related art, patent document publication No. CN202190362U discloses a video transmission system with a real-time encryption function for video stream data. The scheme comprises a digital video coding encryption module arranged at the front end of the acquisition and a digital video decoding and decryption module arranged at the monitoring center, wherein the digital video coding encryption module comprises an analog video input interface module, a digital video coding module, an encryption calculation module and a network interface module which are sequentially connected, the digital video decoding and decryption module comprises a network interface module, a decryption calculation module, a digital video decoding module and a digital video output interface which are sequentially connected, and the encryption calculation module and the decryption calculation module are calculation modules for calling an AES algorithm to perform corresponding encryption or decryption operation. The scheme overcomes the defect that sensitive information is easy to leak in the prior art, effectively prevents the risk that the sensitive video image information is leaked or stolen when being transmitted through a network, and improves the safety of the video image information. However, it lacks further precise control over the security of multi-endpoint peer-to-peer transmission, and the power consumption required for the encryption and decryption process is high.
Disclosure of Invention
The embodiment of the invention provides a video encryption and decryption processing method and system under security authentication, which solve the problem that the security of multi-endpoint point-to-point transmission in the related technology is lack of further accurate control, meanwhile, the power consumption required in the encryption and decryption process is higher, the overall security and flexible power consumption control of video stream data processing are improved, the information security is improved, and the problem that only authenticated equipment can play unicity after the same video stream is issued is ensured.
In a first aspect, an embodiment of the present invention provides a video encryption and decryption processing method under security authentication, where the method includes:
the video playing terminal sends a playing request to the server to verify the credit granting equipment;
under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals;
the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal;
and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
In a possible embodiment, the playing request is integrated with the device identifier, and after the video playing terminal sends the playing request to the server, the method further includes:
and the server verifies whether the video playing terminal meets the credit granting equipment or not based on the equipment identification, wherein the verification comprises the step of determining a historical playing record corresponding to the equipment identification, and if the historical playing record is not abnormal, the video playing terminal is determined as the credit granting equipment.
In a possible embodiment, the generating key information based on the device identifier of the video playback terminal, and sending the key information to the video sending terminal includes:
and converting the equipment identifier into corresponding character string data with a preset length, and sending the character string data serving as an encryption key to a video sending terminal.
In a possible embodiment, after sending the character string data as an encryption key to the video sending terminal, the method further includes:
and the video playing terminal converts the equipment identifier into corresponding character string data with preset length based on the same conversion method, and stores the character string data as a decryption key.
In one possible embodiment, the video sending terminal performs encryption on the video stream based on the key information to obtain an encrypted video stream, including:
and the video sending terminal determines a corresponding encryption algorithm according to the equipment identification, and encrypts the video stream by using the key information through the encryption algorithm to obtain an encrypted video stream, wherein different types of equipment identifications correspond to encryption algorithms with different security levels and computational complexity.
In one possible embodiment, the decrypting the encrypted video stream based on the stored device identifier to obtain a decrypted video stream, and playing the decrypted video stream includes:
and acquiring the stored decryption key obtained based on the equipment identifier, decrypting the encrypted video stream through the decryption key to obtain a decrypted video stream, and playing the decrypted video stream.
In a possible embodiment, after the decrypting the encrypted video stream by the decryption key to obtain a decrypted video stream and playing the decrypted video stream, the method further includes:
if the server detects that the video playing end is abnormal, recording abnormal information;
and determining whether the video playing end is a credit granting device according to the abnormal information, and updating the record of the credit granting device.
In a second aspect, an embodiment of the present invention further provides a system for processing video encryption and decryption under security authentication, where the system includes:
the video playing terminal is configured to send a playing request to the server so as to carry out credit authorization equipment verification;
the server is configured to verify that the video playing terminal meets the conditions of credit granting equipment, generate key information based on the equipment identification of the video playing terminal, and send the key information to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals;
the video sending terminal is configured to encrypt a video stream based on the key information to obtain an encrypted video stream, and send the encrypted video stream to the video playing terminal;
and the video playing terminal is configured to receive the encrypted video stream, decrypt the encrypted video stream based on the stored equipment identifier to obtain a decrypted video stream, and play the decrypted video stream.
In a third aspect, an embodiment of the present invention further provides a video encryption and decryption processing device under security authentication, where the device includes:
one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the video encryption and decryption processing method under the security authentication according to the embodiment of the present invention.
In a fourth aspect, the embodiment of the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform the video encryption and decryption processing method under security authentication according to the embodiment of the present invention.
In a fifth aspect, the present application further provides a computer program product, where the computer program product includes a computer program, where the computer program is stored in a computer-readable storage medium, and at least one processor of the device reads and executes the computer program from the computer-readable storage medium, so that the device executes the video encryption and decryption processing method under security authentication according to the present application.
In the embodiment of the invention, a video playing terminal sends a playing request to a server to verify credit granting equipment; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The method solves the problem that the security of multi-endpoint point-to-point transmission in the related technology is lack of further accurate control, meanwhile, the power consumption required in the encryption and decryption process is higher, the overall security of video stream data processing and flexible power consumption control are improved, the information security is improved, and the problem that only authenticated equipment can play unicity after the same video stream is issued is guaranteed.
Drawings
Fig. 1 is a flowchart of a video encryption and decryption processing method under security authentication according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for generating key information based on a device identifier of a video playback terminal according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for encrypting a video stream based on the key information to obtain an encrypted video stream according to an embodiment of the present invention;
fig. 4 is a block diagram of a video encryption and decryption processing system under security authentication according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a video encryption and decryption processing device under security authentication according to an embodiment of the present invention.
Detailed Description
The embodiments of the present invention will be described in further detail with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad invention. It should be further noted that, for convenience of description, only some structures, not all structures, relating to the embodiments of the present invention are shown in the drawings.
Fig. 1 is a flowchart of a video encryption and decryption processing method under security authentication according to an embodiment of the present invention, and a solution in an embodiment of the present application specifically includes the following steps:
and S101, the video playing terminal sends a playing request to the server to verify the credit granting equipment.
The video playing terminal is a device for playing video streams. In one embodiment, when the video playback terminal is ready to play a video stream, verification is first performed to obtain the video stream, that is, the video playback terminal sends a playback request to the server to perform verification of the credit granting device. And the credit granting equipment verifies to determine whether the video playing terminal is the credit granting equipment.
Step S102, under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals.
The server is used for responding to the playing request to verify whether the video playing terminal meets the condition of the credit granting device, if yes, the video playing terminal is confirmed to be the credit granting device, and if not, the video playing terminal is the non-credit granting device. And under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, generating key information based on the equipment identifier of the video playing terminal, and sending the key information to the video sending terminal, namely the key information is generated based on the equipment identifier, and different video playing terminals have different equipment identifiers.
Optionally, the server performs, based on the device identifier, verification on whether the video playing terminal meets the requirement of the credit granting device, where the verification includes determining a history playing record of a record corresponding to the device identifier, and if the history playing record is not abnormal, determining the video playing terminal as the credit granting device.
And S103, the video sending terminal encrypts the video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal.
In one embodiment, after receiving the key information sent by the server, the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal, so that the video playing terminal can play the encrypted video stream after decrypting the encrypted video stream.
And step S104, the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
In one embodiment, after receiving the encrypted video stream, the video playing terminal decrypts the encrypted video stream by using the device identifier stored in the video playing terminal to obtain a decrypted video stream, and plays the decrypted video stream. Optionally, the method includes obtaining a decryption key based on the device identifier stored in the device, and decrypting the encrypted video stream with the decryption key to obtain a decrypted video stream.
According to the method, the video playing terminal sends a playing request to the server so as to verify the credit granting equipment; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, generating key information based on the equipment identification of the video playing terminal, and sending the key information to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The method solves the problem that the security of multi-endpoint point-to-point transmission in the related technology is lack of further accurate control, meanwhile, the power consumption required in the encryption and decryption process is higher, the overall security of video stream data processing and flexible power consumption control are improved, the information security is improved, and the problem that only authenticated equipment can play unicity after the same video stream is issued is guaranteed.
Fig. 2 is a flowchart of a method for generating key information based on a device identifier of a video playback terminal according to an embodiment of the present invention. On the basis of the above technical solution, a specific method for generating key information based on the device identifier of the video playback terminal is provided, as shown in fig. 2, and specifically includes:
step S201, the video playing terminal sends a playing request to the server to verify the credit granting device.
Step S202, under the condition that the server verifies that the video playing terminal meets the conditions of credit granting equipment, the equipment identification is converted into corresponding character string data with preset length, the character string data is used as an encryption key and sent to a video sending terminal, and the key information is sent to the video sending terminal.
In an embodiment, the device identifier may be character information of any length, and at this time, the device identifier is converted into corresponding character string data of a preset length, a specific conversion method is not limited, and the size of the preset length may be set, such as 32 bits, 64 bits, or 128 bits. And sending the character string data serving as an encryption key to a video sending terminal to serve as the encryption key for encrypting the video stream.
Correspondingly, after the character string data is sent to the video sending terminal as the encryption key, the method further comprises the following steps: and the video playing terminal converts the equipment identifier into corresponding character string data with preset length based on the same conversion method, and stores the character string data as a decryption key.
Step S203, the video sending terminal encrypts the video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal.
And step S204, the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
Therefore, the video playing terminal sends a playing request to the server; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, generating key information based on the equipment identification of the video playing terminal, and sending the key information to a video sending terminal; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The scheme improves the overall safety and flexible power consumption control of video stream data processing, improves the information safety, and ensures that only authenticated equipment can play the video stream in a single way after the same video stream is issued.
Fig. 3 is a flowchart of a method for encrypting a video stream based on the key information to obtain an encrypted video stream according to an embodiment of the present invention. On the basis of the above technical solution, a specific method for obtaining an encrypted video stream by encrypting a video stream based on the key information is provided, as shown in fig. 3, which specifically includes:
step S301, the video playing terminal sends a playing request to the server to verify the credit granting device.
Step S302, under the condition that the server verifies that the video playing terminal meets the credit granting device condition, key information is generated based on the device identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of device identifications based on different computing power conditions of the different video playing terminals.
Step S303, the video sending terminal determines a corresponding encryption algorithm according to the device identifier, encrypts a video stream by using the key information through the encryption algorithm to obtain an encrypted video stream, wherein different types of device identifiers correspond to encryption algorithms with different security levels and computational complexity, and sends the encrypted video stream to the video playing terminal.
In one embodiment, different device identifications correspond to different encryption algorithms. Illustratively, the device identifier includes a model of the device or a hardware processing parameter capable of characterizing the device, the video sending end may determine an encryption algorithm under a corresponding processing calculation power according to the received device identifier, and encrypt the video stream by using the key information through the encryption algorithm to obtain an encrypted video stream.
And step S304, the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
Therefore, the video playing terminal sends a playing request to the server; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to a video sending terminal; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The scheme improves the overall safety and flexible power consumption control of video stream data processing, improves the information safety, and ensures that only authenticated equipment can play the video stream in a single way after the same video stream is issued.
On the basis of the above technical solution, after decrypting the encrypted video stream by the decryption key to obtain a decrypted video stream and playing the decrypted video stream, the method further includes: if the server detects that the video playing end is abnormal, recording abnormal information; and determining whether the video playing end is a credit granting device according to the abnormal information, and updating the record of the credit granting device.
Fig. 4 is a block diagram of a video encryption and decryption processing system under security authentication according to an embodiment of the present invention, where the system is configured to execute a video encryption and decryption processing method under security authentication according to an embodiment of the data receiving end, and has functional modules and beneficial effects corresponding to the execution method. As shown in fig. 4, the apparatus specifically includes: a video playback terminal 101, a server 102, and a video transmission terminal 103, wherein,
the video playing terminal 101 is configured to send a playing request to the server so as to perform credit authorization equipment verification;
the server 102 is configured to verify that the video playing terminal meets the conditions of the credit granting device, generate key information based on the device identifier of the video playing terminal, and send the key information to the video sending terminal, wherein different video playing terminals correspond to different types of device identifiers based on different computing power conditions of the different video playing terminals;
the video sending terminal 103 is configured to encrypt a video stream based on the key information to obtain an encrypted video stream, and send the encrypted video stream to the video playing terminal;
the video playing terminal 101 is configured to receive the encrypted video stream, decrypt the encrypted video stream based on the stored device identifier to obtain a decrypted video stream, and play the decrypted video stream.
According to the scheme, the video playing terminal sends a playing request to the server; under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to a video sending terminal; the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal; and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream. The scheme improves the overall safety and flexible power consumption control of video stream data processing, improves the information safety, and ensures that only authenticated equipment can play the video stream in a single way after the same video stream is issued. Correspondingly, the functions executed by the modules are respectively as follows:
in a possible embodiment, the playing request is integrated with the device identifier, and after the video playing terminal sends the playing request to the server, the method further includes:
and the server verifies whether the video playing terminal meets the credit granting equipment or not based on the equipment identification, wherein the verification comprises the step of determining a historical playing record of a record corresponding to the equipment identification, and if the historical playing record is not abnormal, the video playing terminal is determined as the credit granting equipment.
In a possible embodiment, the generating key information based on the device identifier of the video playback terminal, and sending the key information to the video sending terminal includes:
and converting the equipment identifier into corresponding character string data with a preset length, and sending the character string data serving as an encryption key to a video sending terminal.
In a possible embodiment, after sending the character string data as an encryption key to the video sending terminal, the method further includes:
and the video playing terminal converts the equipment identifier into corresponding character string data with preset length based on the same conversion method, and stores the character string data as a decryption key.
In one possible embodiment, the video sending terminal performs encryption on the video stream based on the key information to obtain an encrypted video stream, including:
and the video sending terminal determines a corresponding encryption algorithm according to the equipment identification, and encrypts the video stream by using the key information through the encryption algorithm to obtain an encrypted video stream, wherein different types of equipment identifications correspond to encryption algorithms with different security levels and computational complexity.
In one possible embodiment, the decrypting the encrypted video stream based on the stored device identifier to obtain a decrypted video stream, and playing the decrypted video stream includes:
and acquiring the stored decryption key obtained based on the equipment identifier, decrypting the encrypted video stream through the decryption key to obtain a decrypted video stream, and playing the decrypted video stream.
In a possible embodiment, after the decrypting the encrypted video stream by the decryption key to obtain a decrypted video stream and playing the decrypted video stream, the method further includes:
if the server detects that the video playing end is abnormal, recording abnormal information;
and determining whether the video playing end is a credit granting device according to the abnormal information, and updating the record of the credit granting device.
Fig. 5 is a schematic structural diagram of a video encryption and decryption processing apparatus under security authentication according to an embodiment of the present invention, as shown in fig. 5, the apparatus includes a processor 201, a memory 202, an input device 203, and an output device 204; the number of the processors 201 in the device may be one or more, and one processor 201 is taken as an example in fig. 5; the processor 201, the memory 202, the input means 203 and the output means 204 in the device may be connected by a bus or other means, as exemplified by a bus connection in fig. 5. The memory 202 is a computer-readable storage medium, and can be used for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the video encryption and decryption processing method under security authentication in the embodiment of the present invention. The processor 201 executes various functional applications and data processing of the device by running software programs, instructions and modules stored in the memory 202, that is, implements the video encryption and decryption processing method under the security authentication. The input device 203 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function controls of the apparatus. The output device 204 may include a display device such as a display screen.
An embodiment of the present invention further provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a method for processing video encryption and decryption under security authentication, where the method includes:
the video playing terminal sends a playing request to the server to verify the credit granting equipment;
under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, generating key information based on the equipment identification of the video playing terminal, and sending the key information to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals;
the video sending terminal encrypts a video stream based on the key information to obtain an encrypted video stream, and sends the encrypted video stream to the video playing terminal;
and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
From the above description of the embodiments, it is obvious for those skilled in the art that the embodiments of the present invention can be implemented by software and necessary general hardware, and certainly can be implemented by hardware, but the former is a better implementation in many cases. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions to make a computer device (which may be a personal computer, a service, or a network device) perform the methods described in the embodiments of the present invention.
It should be noted that, in the embodiment of the video encryption and decryption processing system under the security authentication, the included units and modules are only divided according to the functional logic, but are not limited to the above division, as long as the corresponding functions can be realized; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the embodiment of the invention.
In some possible embodiments, the aspects of the method provided by the present application may also be implemented in a form of a program product, which includes program code for causing a computer device to execute the steps in the method according to the various exemplary embodiments of the present application described above in this specification when the program product runs on the computer device, for example, the computer device may execute the video encryption and decryption processing method under security authentication described in the embodiments of the present application. The program product may be implemented using any combination of one or more readable media.
It should be noted that the foregoing is only a preferred embodiment of the present invention and the technical principles applied. Those skilled in the art will appreciate that the embodiments of the present invention are not limited to the specific embodiments described herein, and that various obvious changes, rearrangements and substitutions can be made by those skilled in the art without departing from the scope of the embodiments of the invention. Therefore, although the embodiments of the present invention have been described in more detail through the above embodiments, the embodiments of the present invention are not limited to the above embodiments, and many other equivalent embodiments may be included without departing from the concept of the embodiments of the present invention, and the scope of the embodiments of the present invention is determined by the scope of the appended claims.

Claims (9)

1. The video encryption and decryption processing method under the security authentication is characterized by comprising the following steps:
the video playing terminal sends a playing request to the server to verify the credit granting equipment;
under the condition that the server verifies that the video playing terminal meets the credit granting equipment condition, key information is generated based on the equipment identification of the video playing terminal, and the key information is sent to the video sending terminal, wherein different video playing terminals correspond to different types of equipment identifications based on different computing power conditions of the different video playing terminals, and the equipment identifications comprise the models of the equipment or hardware processing parameters capable of representing the equipment;
the video sending terminal encrypts the video stream based on the key information to obtain an encrypted video stream, wherein the video sending terminal determines a corresponding encryption algorithm according to the equipment identifier, encrypts the video stream by using the key information through the encryption algorithm to obtain the encrypted video stream, the equipment identifiers of different types correspond to the encryption algorithms of different security levels and calculation complexity, and sends the encrypted video stream to the video playing terminal;
and the video playing terminal receives the encrypted video stream, decrypts the encrypted video stream based on the stored equipment identification to obtain a decrypted video stream, and plays the decrypted video stream.
2. The method for processing video encryption and decryption under security authentication according to claim 1, wherein the device identifier is integrated into the play request, and after the video play terminal sends the play request to the server, the method further comprises:
and the server verifies whether the video playing terminal meets the credit granting equipment or not based on the equipment identification, wherein the verification comprises the step of determining a historical playing record of a record corresponding to the equipment identification, and if the historical playing record is not abnormal, the video playing terminal is determined as the credit granting equipment.
3. The video encryption and decryption processing method under the security authentication according to claim 1, wherein the generating key information based on the device identifier of the video playback terminal and sending the key information to a video sending terminal includes:
and converting the equipment identifier into corresponding character string data with a preset length, and sending the character string data serving as an encryption key to a video sending terminal.
4. The video encryption and decryption processing method under the security authentication according to claim 3, wherein after sending the character string data as an encryption key to a video sending terminal, the method further comprises:
and the video playing terminal converts the equipment identifier into corresponding character string data with preset length based on the same conversion method, and stores the character string data as a decryption key.
5. The video encryption and decryption processing method under the security authentication according to claim 3, wherein the decrypting the encrypted video stream based on the stored device identifier to obtain a decrypted video stream, and playing the decrypted video stream, comprises:
and acquiring a stored decryption key obtained based on the equipment identifier, decrypting the encrypted video stream through the decryption key to obtain a decrypted video stream, and playing the decrypted video stream.
6. The method for processing video encryption and decryption under security authentication according to claim 5, wherein after the decrypting the encrypted video stream with the decryption key to obtain a decrypted video stream and playing the decrypted video stream, the method further comprises:
if the server detects that the video playing end is abnormal, recording abnormal information;
and determining whether the video playing end is a credit granting device according to the abnormal information, and updating the record of the credit granting device.
7. The video encryption and decryption processing system under the security certification is characterized by comprising:
the video playing terminal is configured to send a playing request to the server so as to carry out credit authorization equipment verification;
the server is configured to generate key information based on the device identification of the video playing terminal and send the key information to the video sending terminal under the condition that the video playing terminal meets the credit granting device condition, wherein different video playing terminals correspond to different types of device identifications based on different computing power conditions of the different video playing terminals, and the device identifications comprise the models of the devices or hardware processing parameters capable of representing the devices;
the video sending terminal is configured to encrypt a video stream based on the key information to obtain an encrypted video stream, and is specifically configured to determine a corresponding encryption algorithm according to the device identifier, encrypt the video stream by using the key information through the encryption algorithm to obtain the encrypted video stream, wherein different types of device identifiers correspond to encryption algorithms with different security levels and computational complexity, and send the encrypted video stream to the video playing terminal;
and the video playing terminal is configured to receive the encrypted video stream, decrypt the encrypted video stream based on the stored equipment identifier to obtain a decrypted video stream, and play the decrypted video stream.
8. A video encryption and decryption processing apparatus under security authentication, the apparatus comprising: one or more processors; storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the video encryption/decryption processing method under security authentication according to any one of claims 1 to 6.
9. A storage medium containing computer-executable instructions for performing the video encryption decryption processing method under security authentication according to any one of claims 1 to 6 when executed by a computer processor.
CN202210860960.XA 2022-07-22 2022-07-22 Video encryption and decryption processing method and system under security authentication Active CN115065843B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210860960.XA CN115065843B (en) 2022-07-22 2022-07-22 Video encryption and decryption processing method and system under security authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210860960.XA CN115065843B (en) 2022-07-22 2022-07-22 Video encryption and decryption processing method and system under security authentication

Publications (2)

Publication Number Publication Date
CN115065843A CN115065843A (en) 2022-09-16
CN115065843B true CN115065843B (en) 2022-12-20

Family

ID=83206337

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210860960.XA Active CN115065843B (en) 2022-07-22 2022-07-22 Video encryption and decryption processing method and system under security authentication

Country Status (1)

Country Link
CN (1) CN115065843B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899865A (en) * 2017-03-21 2017-06-27 万维云视(上海)数码科技有限公司 A kind of encryption method and device, decryption method and device and security system
CN109788349A (en) * 2019-01-16 2019-05-21 武汉斗鱼鱼乐网络科技有限公司 A kind of method and relevant apparatus detecting computing capability
CN109995751A (en) * 2019-02-13 2019-07-09 平安科技(深圳)有限公司 Equipment for surfing the net labeling method, device and storage medium, computer equipment
CN111741268A (en) * 2020-06-30 2020-10-02 中国建设银行股份有限公司 Video transmission method, device, server, equipment and medium
CN112165596A (en) * 2020-09-03 2021-01-01 视联动力信息技术股份有限公司 Monitoring video data transmission method and device, terminal equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5792263B2 (en) * 2013-11-13 2015-10-07 オリンパス株式会社 Video display terminal, video transmission terminal, video communication system, video display method, video transmission method, and program
CN105578208A (en) * 2015-11-06 2016-05-11 北京腾锐视讯科技有限公司 IPTV video encryption transmission system
CN110493641A (en) * 2019-08-06 2019-11-22 东软集团股份有限公司 A kind of video file encryption and decryption method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899865A (en) * 2017-03-21 2017-06-27 万维云视(上海)数码科技有限公司 A kind of encryption method and device, decryption method and device and security system
CN109788349A (en) * 2019-01-16 2019-05-21 武汉斗鱼鱼乐网络科技有限公司 A kind of method and relevant apparatus detecting computing capability
CN109995751A (en) * 2019-02-13 2019-07-09 平安科技(深圳)有限公司 Equipment for surfing the net labeling method, device and storage medium, computer equipment
CN111741268A (en) * 2020-06-30 2020-10-02 中国建设银行股份有限公司 Video transmission method, device, server, equipment and medium
CN112165596A (en) * 2020-09-03 2021-01-01 视联动力信息技术股份有限公司 Monitoring video data transmission method and device, terminal equipment and storage medium

Also Published As

Publication number Publication date
CN115065843A (en) 2022-09-16

Similar Documents

Publication Publication Date Title
US11601409B2 (en) Establishing a secure communication session with an external security processor
EP3324572B1 (en) Information transmission method and mobile device
CN106571951B (en) Audit log obtaining method, system and device
CN110149209B (en) Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment
JP2005102163A (en) Equipment authentication system, server, method and program, terminal and storage medium
CN110011950B (en) Authentication method and device for video stream address
CN110598429B (en) Data encryption storage and reading method, terminal equipment and storage medium
CN115065472B (en) Security chip encryption and decryption method and device based on multi-key encryption and decryption
CN112003697B (en) Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium
CN114793184B (en) Security chip communication method and device based on third-party key management node
CN115208697A (en) Adaptive data encryption method and device based on attack behavior
CN111654503A (en) Remote control method, device, equipment and storage medium
CN109451504B (en) Internet of things module authentication method and system
CN114139176A (en) Industrial internet core data protection method and system based on state secret
CN101808100B (en) Method and system for solving replay of remote update of information safety device
CN117240625A (en) Tamper-resistant data processing method and device and electronic equipment
CN113268752A (en) Data management method, device, equipment and storage medium
CN115065843B (en) Video encryption and decryption processing method and system under security authentication
CN112448810A (en) Authentication method and device
CN101159540A (en) Method and process device of transmitting-receiving data flow
CN114500064A (en) Communication security verification method and device, storage medium and electronic equipment
CN111431846B (en) Data transmission method, device and system
CN113918992A (en) Log data processing method and device, storage medium and electronic equipment
CN112887983A (en) Equipment identity authentication method, device, equipment and medium
CN114223176A (en) Certificate management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant