CN115474078A - Data encryption method of live television service based on cloud computing - Google Patents

Data encryption method of live television service based on cloud computing Download PDF

Info

Publication number
CN115474078A
CN115474078A CN202211057889.8A CN202211057889A CN115474078A CN 115474078 A CN115474078 A CN 115474078A CN 202211057889 A CN202211057889 A CN 202211057889A CN 115474078 A CN115474078 A CN 115474078A
Authority
CN
China
Prior art keywords
encryption
transmission
stability
data
transmission speed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202211057889.8A
Other languages
Chinese (zh)
Inventor
郑训田
孙显武
房云
杨邵叶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Ningkun Technology Co ltd
Original Assignee
Jiangsu Ningkun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Ningkun Technology Co ltd filed Critical Jiangsu Ningkun Technology Co ltd
Priority to CN202211057889.8A priority Critical patent/CN115474078A/en
Publication of CN115474078A publication Critical patent/CN115474078A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N17/00Diagnosis, testing or measuring for television systems or their details
    • H04N17/004Diagnosis, testing or measuring for television systems or their details for digital television systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a data encryption method of a live television service based on cloud computing, belonging to the technical field of cloud computing; whether the transmission speed meets the transmission requirement is judged by matching and analyzing the transmission speed obtained by monitoring, an alarm prompt can be implemented under the condition that the transmission speed does not meet the transmission requirement until the transmission requirement is met, the transmission stability of the transmission speed is further monitored and evaluated under the condition that the transmission requirement is met, each item of data meeting the transmission requirement is subjected to simultaneous integration to obtain the state degree corresponding to the transmission speed in the reference encryption time period, and data support is provided for the analysis of the network state from the aspect of the transmission state through the state degree; the invention is used for implementing a dynamic encryption scheme which cannot be self-adaptively according to the overall state of a network, and reducing the influence on the stability of live television transmission from the aspect of encryption, thereby solving the technical problem of poor overall effect of data encryption in live television service.

Description

Data encryption method of live television service based on cloud computing
Technical Field
The invention relates to the technical field of cloud computing, in particular to a data encryption method of a live television service based on cloud computing.
Background
The core of the streaming media encryption technology lies in that a symmetric encryption algorithm is respectively used for each small video block, the small video block is encrypted at a server side and decrypted at a client side, and a user passing right verification can only take a key for decrypting the small video block.
When the existing data encryption scheme of the live television service is implemented, encryption is implemented only through fixed encryption duration or encryption size, dynamic encryption cannot be adaptively implemented according to the network speed and stability of network transmission, the influence on the stability of live television transmission cannot be reduced from the aspect of encryption, and the overall effect of data encryption in the live television service is poor.
Disclosure of Invention
The invention aims to provide a data encryption method of live television service based on cloud computing, which is used for solving the technical problem that the whole effect of data encryption in the live television service is poor because the influence on the stability of live television transmission is reduced from the encryption aspect because a dynamic encryption scheme cannot be adaptively implemented according to the whole state of a network in the existing scheme.
The purpose of the invention can be realized by the following technical scheme:
a data encryption method of a live television service based on cloud computing comprises the following steps:
acquiring a live broadcast type corresponding to a live broadcast television service and a type weight corresponding to the live broadcast type;
acquiring a real-time video stream generated in a live television service process, and monitoring and evaluating the transmission speed per hour in a network state through a preset monitoring time interval in a preset reference encryption time period to obtain transmission analysis data and a corresponding state degree thereof;
monitoring and evaluating the stability corresponding to the transmission speed per hour in the network state to obtain stability analysis data and the corresponding stability thereof;
and simultaneously integrating and analyzing the state degree and the stability to analyze and evaluate the network state of the direct television service and adaptively and dynamically adjust the encryption behavior.
Preferably, the step of monitoring and evaluating the transmission speed per hour in the network state comprises:
in a reference encryption time period, acquiring a real-time network transmission speed according to a preset monitoring time interval, and matching the real-time network transmission speed with a preset transmission speed threshold value to obtain a fast excellent signal, a fast positive signal and a fast different signal;
respectively adding one to the excellent total times, the first normal total times and the first abnormal total times of the transmission speed per hour in the reference encryption time period according to the fast excellent signal, the fast positive signal and the fast abnormal signal;
the excellent total times, the first normal total times and the first abnormal total times form transmission analysis data;
and acquiring the state degree corresponding to the transmission speed per hour according to the transmission analysis data.
Preferably, the step of acquiring the attitude comprises:
acquiring excellent total times YX, first normal total times YZ and first abnormal total times YY in transmission analysis data, extracting numerical values of all data, and simultaneously acquiring a state degree ZD corresponding to a transmission speed in a reference encryption time period through calculation; the calculation formula of the attitude ZD is as follows:
ZD = YX/(z 1 × YX + z2 × YZ + z3 × YY); in the formula, z1, z2 and z3 are preset proportionality coefficients, and z1 is more than 0 and less than z2 and less than z3.
Preferably, the step of monitoring and evaluating the stability corresponding to the transmission speed per hour in the network state comprises:
marking the adjacent network transmission speeds as a first transmission speed and a second transmission speed respectively;
acquiring an absolute value of a speed difference between the second transmission speed and the first transmission speed, and matching the absolute value of the speed difference with a preset speed threshold value to obtain a first speed signal and a second speed signal;
respectively adding one to a second normal total number and a second abnormal total number of network transmission stability evaluation according to the first speed signal and the second speed signal;
acquiring the total number of the speed difference monitored in the reference encryption period, and forming stable analysis data by the second normal total number and the second abnormal total number which are subjected to matching analysis;
and obtaining the stability corresponding to the transmission speed per hour according to the stability analysis data.
Preferably, the step of obtaining the stability comprises:
acquiring the total times SZ of speed difference, the second normal total times EZ and the second abnormal total times EY in the stability analysis data, extracting the numerical values of all data, and simultaneously calculating to acquire the stability WD corresponding to the transmission speed per hour in the reference encryption time period; the stability WD is calculated as:
WD = w1 × EZ/SZ + w2 × EY/SZ; in the formula, w1 and w2 are preset proportionality coefficients, and w1 is more than 0 and less than w2.
Preferably, the state and stability are simultaneously integrated and analyzed to analyze and evaluate the network state of the direct television service and adaptively and dynamically adjust the encryption behavior, including:
acquiring a state degree ZD corresponding to transmission analysis data and a stability degree WD corresponding to stability analysis data, and simultaneously acquiring a state estimation value ZG of a network state in a reference encryption time period through calculation; the calculation formula of the shape estimate ZG is:
ZG = LQ × (g 1 × ZD-g2 × WD); in the formula, g1 and g2 are preset proportionality coefficients, and g1 is more than 0 and less than g2; LQ is the type weight corresponding to the live broadcast type;
preferably, the state estimation value is matched and analyzed with a preset state estimation range to analyze and evaluate the network state of the broadcast television service, so as to obtain network analysis data including the first encrypted signal, the second encrypted signal and the third encrypted signal, and a corresponding encryption scheme is adaptively and dynamically implemented according to different encrypted signals in the network analysis data.
Preferably, the step of adaptively and dynamically implementing the corresponding encryption scheme comprises:
acquiring network analysis data and acquiring corresponding encrypted signals, and respectively implementing a first encryption scheme, a second encryption scheme and a third encryption scheme according to a first encrypted signal, a second encrypted signal and a third encrypted signal in the network analysis data;
the first encryption scheme, the second encryption scheme and the third encryption scheme implement dynamic encryption on the real-time video stream through a symmetric encryption algorithm and preset first encryption occupation, second encryption occupation and third encryption occupation.
Preferably, the first encryption scheme, the second encryption scheme and the third encryption scheme further implement dynamic encryption on the real-time video stream through a symmetric encryption algorithm and a preset first encryption duration, a preset second encryption duration and a preset third encryption duration.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one instruction; and
and the processor executes the instructions stored in the memory to realize the data encryption method of the live television service based on the cloud computing.
Compared with the prior art, the invention has the following beneficial effects:
the invention judges whether the transmission speed obtained by monitoring meets the transmission requirement by matching analysis, can implement alarm prompt under the condition that the transmission requirement is not met until the transmission requirement is met, further monitors and evaluates the transmission stability under the condition that the transmission requirement is met, integrates all data meeting the transmission requirement in a simultaneous manner to obtain the state degree corresponding to the transmission speed in the reference encryption period, and provides data support for network state analysis from the aspect of transmission state through the state degree.
According to the invention, on the premise that the transmission speed per hour meets the transmission requirement, the stability of the transmission speed per hour is monitored and statistically analyzed, and the statistical results are simultaneously integrated to obtain the stability, so that the stability of the transmission network speed in the reference encryption time period can be evaluated on the basis of the stability;
the invention integrates the state degree corresponding to the transmission speed per hour and the corresponding stability degree in the reference encryption time period, and integrally evaluates the network from the aspect of the transmission speed per hour and the corresponding stability degree, so as to adaptively and dynamically implement data encryption according to the evaluation result, and improve the integral effect of data encryption in the live television service.
Drawings
The invention will be further described with reference to the accompanying drawings.
Fig. 1 is a flow chart of a data encryption method for a live tv service based on cloud computing according to the present invention.
Fig. 2 is a schematic structural diagram of a computer device implementing an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
Modern mature encryption technologies include a symmetric encryption algorithm and a public key cryptographic algorithm (asymmetric encryption), and the reason why symmetric encryption is selected is that streaming media requires strong real-time performance and large data volume; the public key cryptographic algorithm is relatively complex in calculation, low in efficiency and suitable for encrypting a small amount of data; the symmetric encryption efficiency is relatively high, so the streaming media encryption is preferably symmetric encryption, and the embodiment of the invention also selects symmetric encryption;
however, when the existing data encryption scheme for live television service is implemented, encryption is implemented only by a fixed encryption duration or encryption size, and dynamic encryption cannot be adaptively implemented according to the network speed and stability of network transmission, so that the influence of data encryption on the stability of video transmission is reduced, and the overall effect of data encryption in live television service is improved.
As shown in fig. 1, the present invention is a data encryption method for a live tv service based on cloud computing, including:
acquiring a live broadcast type corresponding to a live broadcast television service and a type weight corresponding to the live broadcast type; the method comprises the steps of acquiring a live broadcast type corresponding to live broadcast television service, setting different live broadcast types to correspond to different type weights, and matching the acquired live broadcast type with all the live broadcast types to acquire the corresponding type weights;
different live broadcast types are set to correspond to different type weights, so that the digitalized and differentiated representation of the text live broadcast types can be realized, different types of live broadcast television services have different requirements, and the differentiated representation is implemented through the type weights, so that the differentiated processing of data encryption in the live broadcast television services is realized;
acquiring a real-time video stream generated in a live television service process, and monitoring and evaluating the transmission speed per hour in a network state through a preset monitoring time interval in a preset reference encryption time period to obtain transmission analysis data and a corresponding state degree thereof;
the preset reference encryption time period can be set according to the time period corresponding to the division of the existing video stream into continuous small blocks; the preset monitoring time interval can be manually defined, and can also be obtained by algorithm model training based on the big data of the existing transmission network, and the related time units are seconds;
the step of monitoring and evaluating the transmission speed per hour in the network state comprises the following steps:
in a reference encryption time period, acquiring a real-time network transmission speed according to a preset monitoring time interval, and matching the real-time network transmission speed with a preset transmission speed threshold value;
if the network transmission speed is greater than the transmission speed threshold value, judging that the corresponding transmission speed per hour is excellent and generating a speed excellent signal, and adding one to the total number of excellent times of the transmission speed per hour in the reference encryption time period;
if the network transmission speed is not greater than the transmission speed threshold and not less than k% of the transmission speed threshold, k belongs to (10,80), judging that the corresponding transmission speed per hour is normal and generating a speed correction signal, and adding one to the first normal total times of the transmission speed per hour in the reference encryption time period;
if the network transmission speed is less than k% of the transmission speed threshold value, judging that the corresponding transmission speed per hour is abnormal and generating a speed difference signal, and adding one to the total number of first abnormity of the transmission speed per hour in the reference encryption time period;
the excellent total times, the first normal total times and the first abnormal total times form transmission analysis data;
obtaining the state degree corresponding to the transmission speed per hour according to the transmission analysis data, comprising:
acquiring excellent total times YX, first normal total times YZ and first abnormal total times YY in transmission analysis data, extracting numerical values of all data, and simultaneously acquiring a state degree ZD corresponding to a transmission speed per hour in a reference encryption time period through calculation; the calculation formula of the attitude ZD is as follows:
ZD = YX/(z 1 × YX + z2 × YZ + z3 × YY); in the formula, z1, z2 and z3 are preset proportionality coefficients, z1 is more than 0 and z2 is more than z3, the preset proportionality coefficients and related preset threshold values in the formula are set by a person skilled in the art according to actual conditions or obtained through simulation of a large amount of data, wherein the proportionality coefficient z1 can be 0.396, z2 can be 1.413, and z3 can be 2.377;
in the embodiment of the invention, the data calculation, matching and analysis are realized based on cloud calculation, the transmission speed obtained by monitoring is subjected to matching analysis to judge whether the transmission requirement is met, the alarm prompt can be implemented under the condition that the transmission requirement is not met until the transmission requirement is met, and under the condition that the transmission requirement is met, the transmission stability of the data is further monitored and evaluated, and the data is dynamically adjusted in a self-adaptive manner according to the evaluation result.
Monitoring and evaluating the stability corresponding to the transmission speed per hour in the network state to obtain stability analysis data and the stability corresponding to the stability analysis data;
the step of monitoring and evaluating the stability corresponding to the transmission speed per hour in the network state comprises the following steps:
marking the adjacent network transmission speeds as a first transmission speed and a second transmission speed respectively;
acquiring an absolute value of a speed difference between the second transmission speed and the first transmission speed, and matching the absolute value of the speed difference with a preset speed threshold;
if the absolute value of the speed difference is smaller than the speed threshold, judging that the change of the absolute value of the speed difference belongs to a normal range, generating a first speed signal, and adding one to a second normal total number of network transmission stability evaluation according to the first speed signal;
if the absolute value of the speed difference is not smaller than the speed threshold, judging that the change of the absolute value of the speed difference does not belong to a normal range, generating a second speed signal, and adding one to the total number of second abnormity of network transmission stability evaluation according to the second speed signal;
acquiring the total number of the speed difference monitored in the reference encryption period, and forming stable analysis data by the second normal total number and the second abnormal total number which are subjected to matching analysis;
obtaining the stability corresponding to the transmission speed per hour according to the stability analysis data, comprising:
acquiring the total times SZ of speed difference, the second normal total times EZ and the second abnormal total times EY in the stability analysis data, extracting the numerical values of all data, and simultaneously calculating to acquire the stability WD corresponding to the transmission speed per hour in the reference encryption time period; the stability WD is calculated as:
WD = w1 × EZ/SZ + w2 × EY/SZ; in the formula, w1 and w2 are preset proportionality coefficients, w1 is more than 0 and less than w2, w1 can be 1.433, and w2 can be 2.597;
in the embodiment of the invention, on the premise that the transmission speed per hour meets the transmission requirement, the stability of the transmission speed per hour is monitored and statistically analyzed, and the statistical results are simultaneously integrated to obtain the stability, wherein the stability is a numerical value for integrally evaluating the network speed stability in a reference encryption time period; the stability of the transmission network speed in the reference encryption period can be evaluated from the whole based on the stability;
it is worth noting that the adaptive dynamic encryption implementation needs to combine the state degree corresponding to the transmission speed per hour and the corresponding stability degree in the reference encryption time period, and the network is integrally evaluated from the aspect of the transmission speed per hour and the corresponding stability, so that the dynamic encryption implementation is adaptive according to the evaluation result, and the one-sidedness existing in the single-side data analysis can be eliminated.
The method comprises the following steps of performing simultaneous integration analysis on the state degree and the stability to analyze and evaluate the network state of the live television service and adaptively and dynamically adjust the encryption behavior, wherein the method comprises the following specific steps:
acquiring a state degree ZD corresponding to transmission analysis data and a stability degree WD corresponding to stability analysis data, and simultaneously acquiring a state estimation value ZG of a network state in a reference encryption time period through calculation; the calculation formula of the shape estimate ZG is:
ZG = LQ × (g 1 × ZD-g2 × WD); in the formula, g1 and g2 are preset proportionality coefficients, g1 is more than 0 and less than g2, g1 can be 0.325, and g2 can be 0.675; LQ is the type weight corresponding to the live broadcast type;
performing matching analysis on the state estimation value and a preset state estimation range [ G1, G2] to analyze and evaluate the network state of the live television service;
if ZG is greater than G2, judging that the network state of the live television service is excellent and generating a first encryption signal;
if G1 is not less than ZG and not more than G2, judging that the network state of the live television service is normal and generating a second encryption signal;
if ZG is less than G1, judging that the network state of the live television service is not good and generating a third encryption signal;
the first encrypted signal, the second encrypted signal and the third encrypted signal form network analysis data of a network state, and a corresponding encryption scheme is adaptively and dynamically implemented according to different encrypted signals in the network analysis data;
the adaptive dynamic implementation of the corresponding encryption scheme includes:
acquiring network analysis data and acquiring corresponding encrypted signals, and respectively implementing a first encryption scheme, a second encryption scheme and a third encryption scheme according to a first encrypted signal, a second encrypted signal and a third encrypted signal in the network analysis data;
wherein, two modes are included herein;
one) first mode
The first encryption scheme, the second encryption scheme and the third encryption scheme implement dynamic encryption on the real-time video stream through a symmetric encryption algorithm and preset first encryption occupation, second encryption occupation and third encryption occupation;
the sizes of the real-time video streams corresponding to the first encryption occupation, the second encryption occupation and the third encryption occupation are reduced in sequence; the specific numerical value needs to be customized according to the actual application scene;
two) second mode
The first encryption scheme, the second encryption scheme and the third encryption scheme implement dynamic encryption on the real-time video stream through a symmetric encryption algorithm and preset first encryption time length, second encryption time length and third encryption time length;
the time lengths corresponding to the first encryption time length, the second encryption time length and the third encryption time length are sequentially reduced; the specific numerical value also needs to be customized according to the actual application scenario.
In the embodiment of the invention, the state estimation value is a numerical value used for integrating various data in the aspects of transmission speed and transmission stability in a reference encryption time interval so as to integrally evaluate the network state of the data; the network states are classified based on the state estimation values, and a corresponding encryption scheme is adaptively and dynamically implemented according to the classification results, so that the dynamic adjustment of data encryption is realized, and the overall effect of data encryption of the live television service is improved.
In addition, the above formulas are all calculated by removing dimensions and taking values thereof, and the formula is obtained by acquiring a large amount of data and performing software simulation to obtain the formula closest to the real situation.
Example two
Fig. 2 is a schematic structural diagram of a computer device for implementing a data encryption method for a cloud-computing-based live tv service according to an embodiment of the present invention.
The computer device may include a processor, a memory, and a bus, and may further include a computer program stored in the memory and executable on the processor, such as a data encryption program of a live television service based on cloud computing.
The memory includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, and the like. The memory may in some embodiments be an internal storage unit of the computer device, for example a removable hard disk of the computer device. The memory may also be an external storage device of the computer device in other embodiments, such as a plug-in removable hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the computer device. Further, the memory may also include both internal and external storage units of the computer device. The memory may be used not only to store application software installed in the computer device and various types of data, such as a code of a data encryption program of a cloud-based live tv service, etc., but also to temporarily store data that has been output or is to be output.
A processor may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor is a Control Unit (Control Unit) of the computer device, connects various components of the entire computer device by using various interfaces and lines, and executes various functions and processes data of the computer device by running or executing a program or a module (e.g., a data encryption program of a live tv service based on cloud computing, etc.) stored in the memory and calling the data stored in the memory.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connected communication between the memory and the at least one processor or the like.
Fig. 2 shows only a computer device with components, and those skilled in the art will appreciate that the configuration shown in fig. 2 does not constitute a limitation of the computer device, and may include fewer or more components than those shown, or some components may be combined, or a different arrangement of components.
For example, although not shown, the computer device may further include a power supply (such as a battery) for supplying power to the various components, and preferably, the power supply may be logically connected to the at least one processor through a power management device, so that functions such as charge management, discharge management, and power consumption management are implemented through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The computer device may further include various sensors, a bluetooth module, a Wi-Fi module, etc., which are not described herein again.
The computer device may also include a network interface, which may optionally include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), typically used to establish a communication connection between the computer device and other computer devices.
The computer device may further comprise an enterprise interface, which may be a Display (Display), an input unit, such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the computer device and for displaying a visual enterprise interface.
It is to be understood that the embodiments are illustrative only and that the scope of the appended claims is not limited to the details of construction set forth herein.
A memory in a computer device stores a data encryption program for a cloud-computing-based live television service that is a combination of a plurality of instructions.
The specific implementation method of the above instruction by the processor may refer to the description of the relevant steps in the embodiment corresponding to fig. 1, which is not described herein again.
The computer device integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. The computer readable storage medium may be volatile or nonvolatile. For example, the computer-readable medium may include: any entity or device capable of carrying computer program code, recording medium, U.S. disk, removable hard disk, magnetic diskette, optical disk, computer Memory, read-Only Memory (ROM).
The invention also provides a computer-readable storage medium having a computer program stored thereon, the computer program being executable by a processor of a computer device.
In the embodiments provided in the present invention, it should be understood that the disclosed method or system can be implemented in other ways. For example, the above-described embodiments of the invention are merely illustrative, and for example, a module may be divided into only one logic function, and another division may be implemented in practice.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A data encryption method of a live television service based on cloud computing is characterized by comprising the following steps:
acquiring a live broadcast type corresponding to a live broadcast television service and a type weight corresponding to the live broadcast type;
acquiring a real-time video stream generated in a live television service process, and monitoring and evaluating the transmission speed per hour in a network state through a preset monitoring time interval in a preset reference encryption time period to obtain transmission analysis data and a corresponding state degree thereof;
monitoring and evaluating the stability corresponding to the transmission speed per hour in the network state to obtain stability analysis data and the stability corresponding to the stability analysis data;
and simultaneously integrating and analyzing the state degree and the stability to analyze and evaluate the network state of the direct television service and adaptively and dynamically adjust the encryption behavior.
2. The data encryption method for the cloud-computing-based live television service according to claim 1, wherein the step of monitoring and evaluating the transmission speed per hour in the network state comprises:
in a reference encryption time period, acquiring a real-time network transmission speed according to a preset monitoring time interval, and matching the real-time network transmission speed with a preset transmission speed threshold value to obtain a fast excellent signal, a fast positive signal and a fast different signal;
respectively adding one to the excellent total times, the first normal total times and the first abnormal total times of the transmission speed per hour in the reference encryption time period according to the fast excellent signal, the fast positive signal and the fast abnormal signal;
the excellent total times, the first normal total times and the first abnormal total times form transmission analysis data;
and acquiring the state degree corresponding to the transmission speed per hour according to the transmission analysis data.
3. The data encryption method for the cloud-computing-based live television service according to claim 1, wherein the acquiring of the attitude comprises:
acquiring excellent total times YX, first normal total times YZ and first abnormal total times YY in transmission analysis data, extracting numerical values of all data, and simultaneously acquiring a state degree ZD corresponding to a transmission speed per hour in a reference encryption time period through calculation; the calculation formula of the attitude ZD is as follows:
ZD = YX/(z 1 × YX + z2 × YZ + z3 × YY); in the formula, z1, z2 and z3 are preset proportionality coefficients, and z1 is more than 0 and less than z2 and less than z3.
4. The data encryption method for the cloud-computing-based live television service according to claim 1, wherein the step of monitoring and evaluating the stability corresponding to the transmission speed per hour in the network state comprises:
marking the adjacent network transmission speeds as a first transmission speed and a second transmission speed respectively;
acquiring an absolute value of a speed difference between the second transmission speed and the first transmission speed, and matching the absolute value of the speed difference with a preset speed threshold value to obtain a first speed signal and a second speed signal;
respectively adding one to a second normal total number and a second abnormal total number of network transmission stability evaluation according to the first speed signal and the second speed signal;
acquiring the total number of the speed difference monitored in the reference encryption time period, and forming stable analysis data by the second normal total number and the second abnormal total number of the matching analysis;
and acquiring the stability corresponding to the transmission speed per hour according to the stability analysis data.
5. The data encryption method for the cloud-computing-based live television service according to claim 1, wherein the step of obtaining the stability comprises:
acquiring the total times SZ of speed difference, the second normal total times EZ and the second abnormal total times EY in the stability analysis data, extracting the numerical values of all data, and simultaneously calculating to acquire the stability WD corresponding to the transmission speed per hour in the reference encryption time period; the stability WD is calculated as:
WD = w1 × EZ/SZ + w2 × EY/SZ; in the formula, w1 and w2 are preset proportionality coefficients, and w1 is more than 0 and less than w2.
6. The data encryption method for the live television service based on the cloud computing according to claim 1, wherein the analyzing and evaluating the network status of the live television service and the dynamically adjusting the encryption behavior in a self-adaptive manner by performing the simultaneous integration analysis of the status and the stability comprise:
acquiring a state degree ZD corresponding to transmission analysis data and a stability degree WD corresponding to stability analysis data, and simultaneously acquiring a state estimation value ZG of a network state in a reference encryption time period through calculation; the calculation formula of the shape estimate ZG is:
ZG = LQ × (g 1 × ZD-g2 × WD); in the formula, g1 and g2 are preset proportionality coefficients, and g1 is more than 0 and less than g2; and LQ is the type weight corresponding to the live broadcast type.
7. The data encryption method for the live television service based on the cloud computing as claimed in claim 1, wherein the matching analysis is performed on the state estimation value and a preset state estimation range to analyze and evaluate the network state of the live television service, so as to obtain network analysis data including a first encryption signal, a second encryption signal and a third encryption signal, and a corresponding encryption scheme is adaptively and dynamically implemented according to different encryption signals in the network analysis data.
8. The data encryption method for the cloud-computing-based live television service according to claim 7, wherein the step of adaptively and dynamically implementing the corresponding encryption scheme comprises:
acquiring network analysis data and acquiring corresponding encrypted signals, and respectively implementing a first encryption scheme, a second encryption scheme and a third encryption scheme according to a first encrypted signal, a second encrypted signal and a third encrypted signal in the network analysis data;
the first encryption scheme, the second encryption scheme and the third encryption scheme implement dynamic encryption on the real-time video stream through a symmetric encryption algorithm and preset first encryption occupation, second encryption occupation and third encryption occupation.
9. The data encryption method for the cloud-computing-based live television service according to claim 8, wherein the first encryption scheme, the second encryption scheme, and the third encryption scheme further dynamically encrypt the real-time video stream through a symmetric encryption algorithm and a preset first encryption duration, a preset second encryption duration, and a preset third encryption duration.
10. An electronic device, characterized in that the electronic device comprises:
a memory storing at least one instruction; and
a processor executing instructions stored in the memory to implement a data encryption method for a cloud computing-based live television service according to any one of claims 1 to 9.
CN202211057889.8A 2022-08-30 2022-08-30 Data encryption method of live television service based on cloud computing Withdrawn CN115474078A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211057889.8A CN115474078A (en) 2022-08-30 2022-08-30 Data encryption method of live television service based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211057889.8A CN115474078A (en) 2022-08-30 2022-08-30 Data encryption method of live television service based on cloud computing

Publications (1)

Publication Number Publication Date
CN115474078A true CN115474078A (en) 2022-12-13

Family

ID=84368649

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211057889.8A Withdrawn CN115474078A (en) 2022-08-30 2022-08-30 Data encryption method of live television service based on cloud computing

Country Status (1)

Country Link
CN (1) CN115474078A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116381325A (en) * 2023-03-29 2023-07-04 四川辰鳗科技有限公司 Distributed energy metering method, system, electronic equipment and medium
CN117235760A (en) * 2023-09-19 2023-12-15 安徽诺中科技股份有限公司 Encryption storage method and device for enterprise data, computer equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116381325A (en) * 2023-03-29 2023-07-04 四川辰鳗科技有限公司 Distributed energy metering method, system, electronic equipment and medium
CN117235760A (en) * 2023-09-19 2023-12-15 安徽诺中科技股份有限公司 Encryption storage method and device for enterprise data, computer equipment and storage medium
CN117235760B (en) * 2023-09-19 2024-04-02 安徽诺中科技股份有限公司 Encryption storage method and device for enterprise data, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN115474078A (en) Data encryption method of live television service based on cloud computing
WO2021151279A1 (en) Method and apparatus for cloud monitoring based on edge computing, electronic device, and storage medium
WO2021189904A1 (en) Data anomaly detection method and apparatus, and electronic device and storage medium
CN110852374A (en) Data detection method and device, electronic equipment and storage medium
CN107766160B (en) queue message processing method and terminal equipment
CN111985504B (en) Copying detection method, device, equipment and medium based on artificial intelligence
CN111143165A (en) Monitoring method and device
CN111988198B (en) Online user number counting method and device, electronic equipment and computer medium
CN112084486A (en) User information verification method and device, electronic equipment and storage medium
CN108288025A (en) A kind of car video monitoring method, device and equipment
CN114124968A (en) Load balancing method, device, equipment and medium based on market data
CN115952544A (en) Intelligent storage system based on big data
CN112699400B (en) Image information security processing method and device
WO2016090641A1 (en) Graphics processing system and power gating method thereof
CN110569114B (en) Service processing method, device, equipment and storage medium
CN111522707A (en) Big data platform scheduling early warning method and device and computer readable storage medium
CN111277626A (en) Server upgrading method and device, electronic equipment and medium
CN105516793A (en) Method and apparatus of lapse monitoring
CN109889399A (en) RocketMQ client connection number monitoring method, device, electronic equipment and storage medium
CN114661555A (en) Equipment monitoring method, device, server and storage medium
CN112911390B (en) Video data playing method and terminal equipment
CN111901561B (en) Video data processing method, device and system in monitoring system and storage medium
CN110427092B (en) Battery switching method, device, terminal and computer readable storage medium
CN112135187B (en) Multimedia data generation method, intercepting method, device, equipment and storage medium
CN111193617A (en) Webpage tampering identification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20221213