WO2010072179A1 - Procédé et dispositif d'enregistrement crypté et d'affichage décrypté de conférence multimédia en réseau - Google Patents

Procédé et dispositif d'enregistrement crypté et d'affichage décrypté de conférence multimédia en réseau Download PDF

Info

Publication number
WO2010072179A1
WO2010072179A1 PCT/CN2009/076098 CN2009076098W WO2010072179A1 WO 2010072179 A1 WO2010072179 A1 WO 2010072179A1 CN 2009076098 W CN2009076098 W CN 2009076098W WO 2010072179 A1 WO2010072179 A1 WO 2010072179A1
Authority
WO
WIPO (PCT)
Prior art keywords
conference
recording
content
encrypted
key
Prior art date
Application number
PCT/CN2009/076098
Other languages
English (en)
Chinese (zh)
Inventor
汪红星
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2010072179A1 publication Critical patent/WO2010072179A1/fr

Links

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/0021Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
    • G11B20/00217Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
    • G11B20/00413Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is input by a user
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/10527Audio or video recording; Data buffering arrangements
    • G11B2020/10537Audio or video recording
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B2020/10935Digital recording or reproducing wherein a time constraint must be met
    • G11B2020/10944Real-time recording or reproducing, e.g. for ensuring seamless playback of AV data

Definitions

  • the present invention relates to the field of network multimedia, and in particular, to an encrypted recording method, apparatus, and decryption playing method and apparatus for a network multimedia conference.
  • the conference system consists of conference participants, conference controllers, and conference mixers.
  • the conference service operator concentrates on deploying the network multimedia system.
  • the conference participants only use the conference service, and hand over the equipment maintenance and operation of the conference system to the operator. This reduces the cost of using a network multimedia system.
  • the embodiment of the present invention adopts the following technical solutions:
  • an embodiment of the present invention provides an encrypted recording method for network multimedia.
  • An encrypted recording method for a network multimedia conference comprising:
  • an embodiment of the present invention provides a method for decrypting and playing a network multimedia conference.
  • a method for decrypting and playing a network multimedia conference comprising:
  • an embodiment of the present invention provides an encrypted recording device for a network multimedia conference.
  • An encrypted recording device for a network multimedia conference comprising:
  • a recording module configured to record network multimedia real-time content
  • An encryption module for encrypting the above-mentioned conference recording.
  • an embodiment of the present invention provides a decryption and playback device for a network multimedia conference.
  • a decryption and playback device for a network multimedia conference comprising:
  • a decryption module configured to decrypt the encrypted content after the encrypted recording
  • the playing module is configured to play the decrypted content.
  • the user before the start of the network multimedia real-time conference or during the conference, the user sets the recording of the conference content and sets the key, and encrypts the recorded content of the conference by using the key; After the end, the user can replay the recorded meeting content according to the set key.
  • the embodiment of the present invention encrypts the recorded content of the conference, and only knows according to the key. The content of the meeting, thereby solving the problem that the recorded content of the network multimedia real-time conference may be improperly used.
  • FIG. 1 is a flowchart of a method for encrypting and recording a network multimedia conference according to an embodiment of the present invention
  • FIG. 1 is a flowchart of a method for recording a network multimedia according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of a media file based on I SO according to an embodiment of the present invention
  • FIG. 5 is a flowchart of a method for decrypting and playing a network multimedia conference according to an embodiment of the present invention
  • FIG. 6 is a flowchart of a method for decrypting a conference content after encryption and recording according to an embodiment of the present invention
  • FIG. 7 is a flowchart of a method for playing a decrypted content after decryption according to an embodiment of the present invention
  • FIG. 8 is a block diagram of an encrypted recording device of a network multimedia conference according to an embodiment of the present invention.
  • FIG. 9 is a block diagram of a decryption and playback device for a network multimedia conference according to an embodiment of the present invention.
  • an embodiment of the present invention provides an encrypted recording method of network multimedia.
  • the encrypted recording method includes two steps of 101 and 102:
  • 101 Record the network multimedia meaning. As shown in FIG. 2, 101 specifically includes four steps of 1011, 1012, 1013, and 1014:
  • the controller creates a network resource required for the recording and requests the network mixer to allocate the network endpoint.
  • the conference controller is separated from the conference mixer, and the conference controller and the conference mixer are connected through the Mp interface, and the Mp interface is followed. H248 agreement.
  • the user logs in to the conference terminal or passes Web interface, ready for real-time network multimedia.
  • the application server notifies the conference controller to create the network resources required for the conference recording, and then the conference controller sends a command through the Mp interface to request the network mixer to allocate the network endpoint.
  • the right mixer allocates network endpoints.
  • the controller starts the conference recording.
  • the application server After the network endpoint is assigned, the application server notifies the controller to initiate recording of the content.
  • the right mixer records the meaning content into the file on the network endpoint.
  • the conference controller sends a Mod command of the H248 protocol to request the conference mixer to record the conference content to the file on the network endpoint just assigned, and store it in the plaintext form on the file server, and carry the notification in the Mod command of the H248 protocol.
  • Recorded signal, recording signal including recording duration, recording content
  • 102 Encrypt the above-mentioned recording content. As shown in FIG. 3, 102 specifically includes two steps of 1021 and 1022:
  • the conference controller sends a Mod command of the H248 protocol to request the conference mixer to record the conference content into the file on the assigned network endpoint, and store the recorded file in plaintext to the file server.
  • the Mod command only carries the signal for notification recording.
  • the H248 protocol is defined as follows:
  • the recorded signals are as follows:
  • End Input Key (eik, 0x0010) Record end button
  • the Mp interface protocol between the conference controller and the conference mixer is extended, and the conference controller carries the encryption algorithm and the key input by the user in the Mod command while issuing the recording signal.
  • the expanded recording signals are as follows:
  • De s c r i p t i on: indicates the type of encryption algorithm needed for recording
  • the key for completing the recording content encryption is specified in the recording signal sent by the conference controller. 1022: Encrypt the conference recording content by using the above key.
  • the recording of the conference can be encrypted according to the key specified in the recording signal.
  • the files generated after the conference recording include WAV files and files evolved based on the ISO base media file format (hereinafter referred to as ISO files).
  • Chunk WAV file includes data block (Data Chunk) and format block (Fmt Chunk), Data Chunk is used to store sampled audio data, and Fmt Chunk is used to store codec and sample. Rate and other information.
  • Data Chunk is used to store sampled audio data
  • Fmt Chunk is used to store codec and sample. Rate and other information.
  • the Data Chunk format is as follows:
  • ID chunk ID (number of the block);
  • Encrypting audio data is to encrypt Data Chunk's content domain waveform Data.
  • the encryption method can be selected in the following three ways:
  • Method 1 Encrypted recording is performed in real time according to each sampled data. For sampling according to frames (for example, G.729, sampling with 20ms), this encryption method can be used for real-time encryption because the number of samples per second is small.
  • frames for example, G.729, sampling with 20ms
  • Method 2 Perform encrypted recording in real time at regular intervals. For example, G.711 can encrypt each 20ms of sampled data (including 20 samples of data in 20ms when it is 8KHz). This method can be compared to mode 1 Effectively control the number of real-time encryption and control the overhead of the encryption algorithm to achieve real-time encryption and decryption.
  • Method 3 Encrypt the audio data in the entire waveform Data at the end of the recording.
  • files evolved based on the ISO base media file format such as 3GP, Qui ckTime, MPEG
  • the basic format is shown in Figure 4. It can be seen that the ISO file consists of a series of objects (BOX), which can also be called boxes. There are two most important BOX in the ISO file: Movie Box (moov) for storing media control information and Media Data Box (mdat) for storing media audio and video data.
  • Encrypting the audio and video data of the content is to encrypt the content of mda t.
  • the encryption method can be selected as follows:
  • Method 1 Encrypted recording is performed in real time according to each sampled data. When the number of samples per second is small, real-time encryption can be implemented by using this encryption method.
  • Method 2 Perform real-time encrypted recording according to the trunk mode.
  • the trunk mode is to encrypt multiple samples as a whole, and the whole is encrypted.
  • the decryption is also performed in a trunk unit. This method can effectively control the number of real-time encryption and control encryption. The overhead of the algorithm, thus realizing real-time encryption and decryption.
  • Method 3 After the recording is finished, the content in the entire mda t is encrypted.
  • the embodiment of the invention further provides a method for decrypting and playing a network multimedia.
  • the method for decrypting playback includes two steps of 501, 502:
  • 501 Decrypt the content of the conference after the encrypted recording. As shown in FIG. 6, 501 specifically includes two steps of 5011 and 5012.
  • the conference controller sends a Mod command to the right mixer through the Mp interface, and the Mod command only carries a signal for notifying the playback of the recorded content.
  • the H248 protocol is defined as follows:
  • the signals played are as follows:
  • the main parameters of the signal are as follows:
  • the playback signal is as follows:
  • De s c r i p t i on: indicates the type of decryption algorithm needed for playback
  • the recording of the conference can be decrypted according to the key specified in the playback signal. Since there are two ways to encrypt the recording of the conference, there are two ways to decrypt the recording of the conference:
  • the audio and video data of the conference recording content is only encrypted when encrypting, the recording file itself is not encrypted as a whole, and the control information of the media file is not encrypted. Then, the audio and video of the recording content of the conference are decrypted. Data decryption can be played.
  • the files generated after the conference recording include WAV files and ISO files.
  • Chunk WAV file includes data block (Data Chunk) and format block (Fmt Chunk), Data Chunk is used to store sampled audio data, and Fmt Chunk is used to store codec and sample. Rate and other information.
  • Data Chunk is used to store sampled audio data
  • Fmt Chunk is used to store codec and sample. Rate and other information.
  • the Data Chunk format is as follows:
  • ID chunk ID (number of the block);
  • Decrypting audio data is to decrypt Data Chunk's content domain waveform Data. There are 3 ways to encrypt. Correspondingly, the following three methods can be used for decryption:
  • Method 1 Encrypted recording is performed for each sampled data during encryption, and decrypted according to each sampled data.
  • Method 2 Encrypted recording at a fixed interval during encryption, and at a fixed interval during decryption Secret.
  • G.711 can encrypt the sampled data every 20ms (including 20 samples of data in 20ms when it is 8KHz), and decrypts the sampled data every 20ms as a whole when decrypting.
  • mode 1 the number of real-time decryption can be effectively controlled, and the overhead of the decryption algorithm can be controlled, thereby realizing real-time decryption.
  • Method 3 When encrypting, the audio data in the entire waveform data is encrypted after the end of the recording, so that the decryption also needs to decrypt all the encrypted audio data after the end of the recording.
  • Decrypting the audio and video data of the content is to decrypt the content of mda t.
  • Method 1 Encrypted recording is performed for each sampled data during encryption, and decrypted according to each sampled data.
  • Method 2 When encrypting, perform real-time encrypted recording according to the trunk mode.
  • the trunk mode is to encrypt multiple samples as a whole, and the decryption is also performed in a trunk unit, and multiple samples are decrypted as a whole.
  • the number of real-time decryptions can be effectively controlled, and the overhead of the decryption algorithm can be controlled, thereby realizing real-time decryption.
  • Mode 3 Encryption encrypts the content of the entire mdat after the end of the recording, so that when decrypting, all the encrypted audio and video data needs to be decrypted after the recording is finished.
  • 502 specifically includes two steps of 5021, 5022: 5021.
  • the conference controller creates a network resource required for playing the conference recording file and requests the conference mixer to allocate the network endpoint.
  • the user logs in to the conference terminal or through the web interface, prepares to replay the recorded conference content.
  • the application server notifies the conference controller to create the network resources required for playing the conference recording file, and then the controller sends a command request to the network mixer through the Mp interface.
  • the right mixer allocates network endpoints.
  • the conference controller starts playback of the conference recording file.
  • the application server After the network endpoint is assigned, the application server notifies the conference controller to initiate playback of the recorded file.
  • the right mixer plays the recorded content to the network endpoint.
  • the conference controller sends the Mod command of the H248 protocol through the Mp interface, and requests the conference mixer to play the decrypted recording content to the network endpoint just allocated.
  • the user before the start of the network multimedia real-time conference or during the conference, the user sets the recording of the conference content and sets the key, and encrypts the recorded content of the conference by using the key; After the end, the user can replay the recorded meeting content according to the set key.
  • the recorded content of the conference is encrypted, and only the key can be obtained according to the key, thereby solving the problem that the recorded content of the network multimedia real-time is improperly used.
  • the embodiment of the invention further provides an encrypted recording device for a network multimedia conference.
  • the device includes:
  • the recording module 801 is configured to record the real-time content of the network multimedia
  • the encryption module 802 is configured to encrypt the recorded content.
  • the user logs in to the terminal or through the web interface to prepare for network multimedia. Real-time meeting.
  • the application server notifies the conference controller to create the network resources required for the conference recording, and then
  • the controller sends a command through the Mp interface to request the conference mixer to allocate network endpoints.
  • the application server After the conference mixer assigns a network endpoint, the application server notifies the controller that the recording of the conference content is initiated, and the conference mixer records the content on the assigned network endpoint into the file.
  • the encryption module 802 includes:
  • the key unit 803 is configured to acquire a key set by a user.
  • the conference controller sends a Mod command of the H248 protocol, and requests the conference mixer to record the conference content into the file on the allocated network endpoint.
  • the Mod command carries the signal for notifying the recording, and the encryption algorithm and the user are specified in the recording signal. The key entered.
  • the encryption unit 804 is configured to encrypt the conference recording content according to the foregoing key.
  • the recording of the conference can be encrypted according to the key specified in the recording signal.
  • the encrypted recording of the content of the network multimedia real-time conference can be completed by the device.
  • the embodiment of the invention further provides a network multimedia decryption and playback device.
  • the device includes:
  • the decryption module 01 is configured to decrypt the encrypted content after the encrypted recording
  • the playing module 902 is configured to play the decrypted content.
  • the decryption module 901 includes: The key unit 903 is configured to acquire a key set by a user.
  • the conference controller sends a Mod command of the H248 protocol, and requests the conference mixer to record the conference content into the file on the allocated network endpoint.
  • the Mod command carries the signal for notification playback, and the decryption algorithm and the user are specified in the playback signal.
  • the decryption key entered.
  • the decryption unit 904 is configured to decrypt the encrypted conference recording content according to the above key.
  • the encrypted conference recording can be decrypted according to the key specified in the playback signal. Since there are two ways to encrypt the recording of the conference, there are two ways to decrypt the recording of the conference:
  • the audio and video data of the conference recording content is only encrypted when encrypting, the recording file itself is not encrypted as a whole, and the control information of the media file is not encrypted. Then, the audio and video of the recording content of the conference are decrypted. Data decryption can be played.
  • the user logs in to the conference terminal or through the web interface, prepares to replay the recorded conference content.
  • the application server notifies the conference controller to create the network resources required for playing the conference recording file, and then the controller sends a command through the Mp interface to request the network to allocate the network endpoint.
  • the application server notifies the conference controller to start the playback of the recorded file, and the conference controller sends a command through the Mp interface to request the conference mixer to play the decrypted recording to the network endpoint just assigned. on.
  • the user before the start of the network multimedia real-time conference or during the conference, the user sets the recording of the conference content and sets the key, and uses the key to add the recorded content of the conference.
  • the user can replay the recorded conference content according to the set key.
  • the embodiment of the invention encrypts the recorded content of the conference, and only the key content can be obtained according to the key, thereby solving the problem that the recorded content of the network multimedia real-time meaning is improperly used.

Abstract

Le mode de réalisation de la présente invention porte sur un procédé et un dispositif d'enregistrement crypté de conférence multimédia en réseau, et sur un procédé et un dispositif d'affichage décrypté de conférence multimédia en réseau. L'invention concerne le domaine des transmissions multimédia en réseau et a été conçue afin de résoudre le problème selon lequel le contenu d'enregistrement de la conférence en temps réel multimédia en réseau peut être utilisé de façon illégitime. Dans le mode de réalisation de la présente invention, avant le début de la conférence multimédia en réseau ou au cours de la conférence, l'utilisateur règle l'enregistrement du contenu de la conférence et définit la clé et crypte le contenu d'enregistrement de la conférence à l'aide de la clé. En outre, au cours de la conférence ou après la fin de la conférence, l'utilisateur peut reproduire le contenu de conférence enregistré selon la clé prédéfinie. Le mode de réalisation de l'invention peut être appliqué dans le système de conférence multimédia en réseau.
PCT/CN2009/076098 2008-12-26 2009-12-26 Procédé et dispositif d'enregistrement crypté et d'affichage décrypté de conférence multimédia en réseau WO2010072179A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810188925.8 2008-12-26
CN2008101889258A CN101547196B (zh) 2008-12-26 2008-12-26 网络多媒体会议的加密录制和解密播放方法、装置

Publications (1)

Publication Number Publication Date
WO2010072179A1 true WO2010072179A1 (fr) 2010-07-01

Family

ID=41194085

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/076098 WO2010072179A1 (fr) 2008-12-26 2009-12-26 Procédé et dispositif d'enregistrement crypté et d'affichage décrypté de conférence multimédia en réseau

Country Status (2)

Country Link
CN (1) CN101547196B (fr)
WO (1) WO2010072179A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10326803B1 (en) 2014-07-30 2019-06-18 The University Of Tulsa System, method and apparatus for network security monitoring, information sharing, and collective intelligence
CN115001860A (zh) * 2022-07-20 2022-09-02 广州市保伦电子有限公司 无纸化数字会议的安全管理系统

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101547196B (zh) * 2008-12-26 2012-11-07 华为技术有限公司 网络多媒体会议的加密录制和解密播放方法、装置
CN103166913B (zh) * 2011-12-09 2015-10-21 华为技术有限公司 加密媒体流的录制方法及交换控制设备
CN105141637A (zh) * 2015-09-25 2015-12-09 中铁工程装备集团有限公司 一种以流为粒度的传输加密方法
CN108234922B (zh) * 2016-12-14 2019-03-01 视联动力信息技术股份有限公司 一种录播方法及装置
CN112135086B (zh) * 2020-11-24 2021-02-09 全时云商务服务股份有限公司 一种会议录制加密方法、系统和可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1383326A (zh) * 2001-04-20 2002-12-04 安科数码媒体有限公司 数字式音频及视频媒体处理设备及其处理方法
CN101087399A (zh) * 2006-06-09 2007-12-12 中兴通讯股份有限公司 一种多媒体终端及其用于会议录制、播放的方法
US20080209516A1 (en) * 2007-02-23 2008-08-28 Nick Nassiri Signature and identity authentication and documentation using a third party witnessed authenticator via a video conference
CN101547196A (zh) * 2008-12-26 2009-09-30 华为技术有限公司 网络多媒体会议的加密录制和解密播放方法、装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1383326A (zh) * 2001-04-20 2002-12-04 安科数码媒体有限公司 数字式音频及视频媒体处理设备及其处理方法
CN101087399A (zh) * 2006-06-09 2007-12-12 中兴通讯股份有限公司 一种多媒体终端及其用于会议录制、播放的方法
US20080209516A1 (en) * 2007-02-23 2008-08-28 Nick Nassiri Signature and identity authentication and documentation using a third party witnessed authenticator via a video conference
CN101547196A (zh) * 2008-12-26 2009-09-30 华为技术有限公司 网络多媒体会议的加密录制和解密播放方法、装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10326803B1 (en) 2014-07-30 2019-06-18 The University Of Tulsa System, method and apparatus for network security monitoring, information sharing, and collective intelligence
CN115001860A (zh) * 2022-07-20 2022-09-02 广州市保伦电子有限公司 无纸化数字会议的安全管理系统

Also Published As

Publication number Publication date
CN101547196B (zh) 2012-11-07
CN101547196A (zh) 2009-09-30

Similar Documents

Publication Publication Date Title
WO2010072179A1 (fr) Procédé et dispositif d'enregistrement crypté et d'affichage décrypté de conférence multimédia en réseau
TWI760527B (zh) 對影音檔案加解密的方法及系統
CN102347943B (zh) 基于rtsp会话发送和接收流传输数据的方法和设备
US7536470B2 (en) Random access read/write media format for an on-demand distributed streaming system
US9635335B2 (en) System and methods for recording a compressed video and audio stream
US8452008B2 (en) Content distributing method, apparatus and system
CN108881205B (zh) 一种hls流媒体的安全播放系统及播放方法
US11528128B2 (en) Encryption management, content recording management, and playback management in a network environment
JP2007014006A (ja) コンピュータネットワーク上を行き来するデータパケットの監視方法
CA2511914A1 (fr) Systeme de dechiffrement securise de multimedia en continu par dechiffrement selectif d'informations
US20100008506A1 (en) Method and apparatus for performing voip-based communication using bio keys
US20110194692A1 (en) Voice-over internet protocol (voip) scrambling mechanism
WO2009018738A1 (fr) Procédé, dispositif et système de service associé destinés à fournir un contenu vidéo
CN109672664B (zh) 一种视联网终端的认证方法和系统
US10798067B2 (en) Recording encrypted media session
KR20060064469A (ko) 멀티캐스트 방식으로 스트리밍 서비스되는 동영상 파일의보호 장치 및 그 방법
CN101313510A (zh) 媒体流密钥管理方法及系统以及应用服务器
CN108768920B (zh) 一种录播数据处理方法及装置
WO2015196590A1 (fr) Procédé et appareil de lecture de vidéo en nuage
CN108599928B (zh) 密钥管理方法及装置
WO2008089694A1 (fr) Procédé, système et équipement d'obtention de clé de protection de flux multimédia dans un réseau ims
US20110258657A1 (en) System and method for secured digital video broadcasting of instantaneous testimony
JP2003271530A (ja) 通信システム,システム間関連装置,プログラム,及び,記録媒体
EP2713576B1 (fr) Système et procédé pour traiter un contenu multimédia en temps réel
RU2013127119A (ru) Оптимизация мультимедиа в реальном времени во время удаленных сеансов

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09834132

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09834132

Country of ref document: EP

Kind code of ref document: A1