WO2017113817A1 - 一种利用数字指纹技术保护视频的方法及装置 - Google Patents

一种利用数字指纹技术保护视频的方法及装置 Download PDF

Info

Publication number
WO2017113817A1
WO2017113817A1 PCT/CN2016/096072 CN2016096072W WO2017113817A1 WO 2017113817 A1 WO2017113817 A1 WO 2017113817A1 CN 2016096072 W CN2016096072 W CN 2016096072W WO 2017113817 A1 WO2017113817 A1 WO 2017113817A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital fingerprint
user equipment
video
digital
protection policy
Prior art date
Application number
PCT/CN2016/096072
Other languages
English (en)
French (fr)
Inventor
黄永菁
贾记磊
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2017113817A1 publication Critical patent/WO2017113817A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/239Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/239Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
    • H04N21/2393Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/436Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
    • H04N21/43615Interfacing a Home Network, e.g. for connecting the client to a plurality of peripherals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/438Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving MPEG packets from an IP network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/438Interfacing the downstream path of the transmission network originating from a server, e.g. retrieving MPEG packets from an IP network
    • H04N21/4383Accessing a communication channel
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/85Assembly of content; Generation of multimedia applications
    • H04N21/858Linking data to content, e.g. by linking an URL to a video object, by creating a hotspot
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/85Assembly of content; Generation of multimedia applications
    • H04N21/858Linking data to content, e.g. by linking an URL to a video object, by creating a hotspot
    • H04N21/8586Linking data to content, e.g. by linking an URL to a video object, by creating a hotspot by using a URL

Definitions

  • the present invention relates to digital fingerprint technology, and more particularly to a method and apparatus for protecting video using digital fingerprint technology in a hybrid video system.
  • Digital Fingerprinting is mainly used for copyright protection.
  • Digital fingerprinting is to embed different iconic identification codes, fingerprints, into digital media using digital watermarking techniques, and then distribute the digital media embedded with fingerprints to users. After the publisher discovers the piracy, it can determine the source of the illegal copy by extracting the fingerprints in the pirated products, and prosecute the pirates, thus playing the role of copyright protection.
  • DRM Digital Right Management
  • the basic working principle of DRM technology is to first establish a digital content authorization center, and then encrypt and package the original digital media content.
  • the encrypted digital content has its own independent identifier and encryption key. After the user obtains the encrypted digital content, it cannot be directly used. It must apply to and purchase the content license from the Digital Content Authorization Center.
  • the authorization information includes the decryption key and usage restrictions.
  • DRM technology ensures that users can use digital content only after successful authorization, thus protecting the legitimate rights of the content owner. However, DRM technology cannot guarantee the problem of ripping or pirating legitimate video content during playback.
  • the first aspect provides a video protection method, including: a user equipment sends a video request to a network side device, where the user equipment receives a video stream that is sent by the network side device according to the video request, and the video
  • the digital stream includes a digital fingerprint protection policy
  • the user equipment obtains a digital fingerprint based on the hardware information of the user equipment according to the digital fingerprint protection policy, and then displays the digital fingerprint according to the protection strategy of the digital fingerprint.
  • the user equipment can obtain the digital fingerprint according to the digital fingerprint protection policy, and then display the image to prevent the protected video content from being ripped or stolen.
  • the video stream sent by the network side device may further include a digital fingerprint generated by the user equipment, and the user equipment may obtain the digital fingerprint directly from the video stream sent by the network side.
  • the user equipment may obtain the hardware information of the user equipment locally according to the digital fingerprint information in the digital fingerprint protection policy, and use the hardware information of the user equipment as a digital fingerprint, or further according to the hardware.
  • the information generates a digital fingerprint.
  • the digital fingerprint protection policy includes one or more of the following: a channel identifier, a user identifier, and a digital fingerprint information. , digital fingerprint display location, digital fingerprint display mode, digital fingerprint display duration. In this implementation manner, the digital fingerprint protection policy can be flexibly set according to actual needs.
  • a user equipment including: a sending unit, configured to send a video request to a network side device, and a receiving unit, configured to receive a video stream that is sent by the network side device according to the video request, the video
  • the flow includes a digital fingerprint protection policy; the processing unit is configured to obtain a digital fingerprint based on the hardware information of the user equipment; and the display unit is configured to display the digital fingerprint according to the protection strategy of the digital fingerprint.
  • the user equipment can be used to perform the video protection method as described above.
  • the processing unit is specifically configured to:
  • the digital fingerprint generated based on the hardware information of the user equipment is obtained from the video stream sent by the network side.
  • the processing unit is configured to locally acquire hardware information of the user equipment from the user equipment according to the digital fingerprint protection policy, and generate a digital fingerprint according to the hardware information of the user equipment.
  • the user equipment may be a digital broadcast television (DVB) set top box, an interactive network television (IPTV) set top box, or an OTT set top box or a network television integrated with DVB, IPTV, OTT set top box functions.
  • DVD digital broadcast television
  • IPTV interactive network television
  • OTT OTT set top box
  • a television network system including:
  • the television network system can be used to perform the video protection method as described above.
  • the television network system is:
  • DVD Digital Broadcast Television
  • IPTV Interactive Internet Television
  • OTT network television system OTT network television system
  • a hybrid television system is provided, the digital television system (DVB) system, an interactive network television (IPTV) system, and two or three of the OTT network video systems, and the second aspect as above The user equipment.
  • DVD digital television system
  • IPTV interactive network television
  • a user equipment having a function to implement the user equipment in the foregoing method.
  • the functions may be implemented by hardware or by corresponding software implemented by hardware.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the user equipment includes a processor and a memory for storing application code supporting the user equipment to perform the above method, the processor being configured to perform the storage in the memory s application.
  • the user equipment may also include a communication interface for communicating with other devices or communication networks.
  • an embodiment of the present invention provides a computer storage medium for storing computer software instructions used by the user equipment, which includes a program designed to execute the foregoing aspects for a user equipment.
  • the embodiment of the present invention further provides a video system, which has the function of implementing the actual video system execution in the foregoing method.
  • the functions may be implemented by hardware or by corresponding software implemented by hardware.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • the structure of the video system includes a processor and a memory for storing application code supporting the video system to perform the above method, the processor being configured to perform the in-memory storage s application.
  • the video system may also include a communication interface for communicating with other devices or communication networks.
  • an embodiment of the present invention provides a computer storage medium for storing computer software instructions for use in the video system, including a program designed to perform the above aspects for a video system.
  • a hybrid video system comprising a user equipment as described above and a video system as described above.
  • the hybrid video system can be used to implement the video protection method as described above.
  • the embodiment of the present invention can configure a flexible digital fingerprint protection policy for a specific channel, a specific user group, and a specified user equipment.
  • the user equipment displays a digital fingerprint according to a digital fingerprint protection policy when playing a video, preventing the video content from being rummaged and stolen. record.
  • FIG. 2 is a block diagram of a hybrid video system in accordance with an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a general structure of a user equipment according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a network side device according to an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart of a video protection method according to an embodiment of the present invention.
  • FIG. 6 is a schematic flowchart of a video protection method according to another embodiment of the present invention.
  • FIG. 7 is a signaling interaction diagram of a video protection method in an IP scenario according to an embodiment of the present invention.
  • FIG. 8 is a signaling interaction diagram of a video protection method in a DVB scenario according to an embodiment of the present invention.
  • FIG. 9 is a signaling interaction diagram of a video protection method in a DVB scenario according to another embodiment of the present invention.
  • FIG. 10 is a signaling interaction diagram of a video protection method in an IP scenario according to another embodiment of the present invention.
  • FIG. 1 is an application scenario diagram of a solution in accordance with the present invention.
  • the Hybrid Video system is based on a unified technology platform and supports three scenes of digital video broadcasting (DVB), internet protocol television (IPTV), and OTT (over the top) video. It also supports the above scenarios.
  • DVD digital video broadcasting
  • IPTV internet protocol television
  • OTT over the top video. It also supports the above scenarios.
  • a hybrid TV system that combines two or two applications.
  • the IPTV scenario refers to the service delivered by the managed network (Internet), and the subscriber accesses and experiences the IPTV service through a set top box (STB).
  • the IPTV content source can come from a Content Provider (CP) or can be specially produced by the operator.
  • the IPTV service is an IP network as a transmission channel, providing users with a variety of interactive multimedia services including digital television.
  • the OTT scenario refers to the delivery of services through an unmanaged network (Unmanaged Network). Subscribers experience OTT services through terminals such as computers (PCs), tablets, and smartphones.
  • the OTT service has the same experience as the Internet service, and has the characteristics of multi-screen sharing and mobility.
  • the OTT service is based on IP network transmission, and users can use different types of terminals (such as mobile phones, tablets, computers, etc.). Watch the show anytime, anywhere via the Internet. Users can obtain content directly from Internet Content Providers (Internet CPs), or they can purchase OTT services from operators and obtain specially produced OTT content from operators.
  • Internet CPs Internet Content Providers
  • the DVB scenario refers to the use of DVB technology to deliver services based on wireless or cable or satellite broadcast, and the subscribers experience the service through DVB-enabled STB.
  • DVB services usually only contain audio and video broadcasts. Users can watch DVB-issued content through a unified electronic program guide (EPG) interface, and can perform personal video recording (PVR) on video content through the Hybrid Video platform.
  • EPG electronic program guide
  • PVR personal video recording
  • DVB mainly includes the following types according to different transmission modes: DVB-T (Terrestrial): DVB based on terrestrial wireless transmission.
  • DVB-C (Cable) DVB based on cable television transmission.
  • DVB-S/DVB-S2 (Satellite): DVB based on satellite transmission.
  • the DVB scenario in Figure 1 is exemplified by DVB-S.
  • FIG. 2 is a network architecture diagram of a hybrid video system according to an embodiment of the invention.
  • the Hybrid Video system is mainly composed of a central node 201, an edge node 202, and a home network 203:
  • the central node 201 is responsible for docking the IP backbone network, deploying the core components of the content management, distribution, and operation of the Hybrid Video system.
  • the central node can also provide various management and service functions, and support the existing service support system and network management system of the docking operator to provide unified management and maintenance functions.
  • the central node is generally deployed with a head terminal system, which is responsible for obtaining media content from an external content source, and is subjected to compression encoding processing to be converted into a media file or media stream conforming to the format requirement; a Unified Management System (UMS) subsystem, the subsystem It is an operation and management platform for hybrid video systems, providing operators with functions such as content management, service management, product management, subscriber management, partner management, and device management.
  • Media Entertainment Middleware (MEM) subsystem is used for Establish a business logic relationship with the service platform for the subscriber, and provide subscribers with services such as access authentication, authentication, service ordering, and EPG scheduling.
  • the edge node 202 is usually connected to the aggregation network, and is a network node that provides a media service and a portal display to a certain area in the Hybrid Video system, and deploys functional components such as a media server and an EPG server.
  • the edge node can centrally provide services such as display and content for subscribers in the corresponding network segment, and divert the service pressure of the central node.
  • the media server is mainly responsible for content storage and distribution, and establishes a connection with the user equipment according to the content request of the user equipment, and sends the stored media content to the user equipment in streaming form.
  • the EPG server is a user-oriented service portal that provides an EPG interface to the user terminal, providing users with interactive guidance such as content, services, and personalization settings.
  • the home network 203 includes a network access device and a user device, the network access device provides an IP network access function, and the subscriber experiences content and services through the user device.
  • FIG. 3 is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
  • the user equipment 300 includes at least one processor 301, a communication bus 302, a memory 303, and at least one communication interface 304.
  • Processor 301 can be a general purpose central processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more integrated circuits for controlling the execution of the program of the present invention.
  • CPU central processing unit
  • ASIC application-specific integrated circuit
  • Communication bus 302 can include a path for communicating information between the components described above.
  • the communication interface 304 uses devices such as any transceiver for communicating with other devices or communication networks, such as Ethernet, Radio Access Network (RAN), Wireless Local Area Networks (WLAN), and the like.
  • RAN Radio Access Network
  • WLAN Wireless Local Area Networks
  • the memory 303 can be a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a random access memory (RAM) or other type that can store information and instructions.
  • the dynamic storage device can also be an Electrically Erasable Programmable Read-Only Memory (EEPROM), a Compact Disc Read-Only Memory (CD-ROM) or other optical disc storage, and a disc storage device. (including compact discs, laser discs, optical discs, digital versatile discs, Blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or can be used to carry or store desired program code in the form of instructions or data structures and can be Any other media accessed, but not limited to this.
  • the memory can exist independently and be connected to the processor via a bus.
  • the memory can also be integrated with the processor.
  • the memory 303 is used to store application code for executing the solution of the present invention, and is controlled by the processor 301 for execution.
  • the processor 301 is configured to execute application code stored in the memory 303.
  • processor 301 may include one or more CPUs, such as CPU0 and CPU1 in FIG. Each of these processors can be a single-CPU processor or a multi-core processor.
  • a processor herein may refer to one or more devices, circuits, and/or processing cores for processing data, such as computer program instructions.
  • computer device 300 may also include an output device 305 and an input device 306.
  • the output device 305 is in communication with the processor 301 and can display the message in a variety of ways. interest.
  • the output device 305 can be a liquid crystal display (LCD), a light emitting diode (LED) display device, a cathode ray tube (CRT) display device, or a projector. Wait.
  • Input device 306 is in communication with processor 301 and can accept user input in a variety of ways.
  • input device 306 can be a mouse, keyboard, touch screen device, or sensing device, and the like.
  • the user equipment 300 can be a desktop, a portable computer, a network server, a personal digital assistant (PDA), a mobile phone, a tablet, a wireless user device, a set top box, a hybrid set top box, or a network with an integrated set top box function.
  • PDA personal digital assistant
  • TV or a device of similar construction in Figure 3.
  • the embodiment of the present invention does not limit the type of the user equipment 300.
  • FIG. 4 is a schematic diagram of a network side device according to an embodiment of the present invention. As shown in FIG. 4, the network side device may include:
  • the digital fingerprint protection policy management module 401 is configured to set a digital fingerprint protection policy.
  • the encoder 402 is configured to obtain a digital fingerprint protection policy from the digital fingerprint protection policy management module 401, and embed the digital fingerprint protection policy into the channel code stream.
  • the media server 403 is configured to deliver a media stream to the user equipment.
  • the digital fingerprint protection policy management module 401 is further configured to acquire hardware information of the user equipment, generate a digital fingerprint based on the hardware information of the user equipment, and provide the digital fingerprint to the encoder 402, and encode the digital fingerprint.
  • the 402 inserts the digital fingerprint into the channel code stream.
  • the hardware information of the user equipment may be hardware information such as a hardware identifier of the user equipment or a MAC address or a serial number of the DVB card.
  • the encoder 402 can be disposed in the head terminal system of the central node as shown in FIG. 2, and the digital fingerprint protection policy management module 401 can be an independent device or a functional module of the encoder 402. It is installed in the head terminal system of the center node as shown in FIG. 2.
  • the media server 403 can be disposed in an edge node as shown in FIG. 2.
  • the video protection method of the embodiment of the present invention may be implemented in conjunction with the network device shown in FIG.
  • the main idea of the technical solution of the present invention is: superimposing a digital fingerprint on a video stream, and the digital fingerprint is obtained according to hardware information of the user equipment.
  • An optional method is that the user equipment superimposes a layer to display a digital fingerprint during video playback.
  • Another alternative is to extend the digital fingerprint based on the hardware information of the user equipment directly in the video stream to ensure that the pirated or ripped user equipment can be traced after the video is ripped or stolen.
  • FIG. 5 is a video protection method according to an embodiment of the present invention.
  • a digital fingerprint is locally obtained by a user equipment:
  • the user equipment sends a video request to the network side device.
  • the user equipment can send a video request to the media server in the edge node 202 as shown in FIG. 2 through the access network.
  • the video request may include identification information such as a video identifier or a channel identifier.
  • the user equipment receives a video stream that is sent by the network side device according to the video request, where the video stream includes a protection strategy of a digital fingerprint.
  • the network side device sends a corresponding video stream to the user equipment according to the video identifier or the channel identifier in the user equipment request.
  • the network side device may define a digital fingerprint protection policy for a certain channel.
  • the digital fingerprint protection strategy can include one or more of the following information:
  • a channel identifier that defines a channel or a group of channels or all channels to which the digital fingerprint protection policy is in effect.
  • User ID which is used to define a user or a group of users or all users whose digital fingerprint protection policy is effective.
  • Digital fingerprint information which is used to define a specific digital fingerprint.
  • the digital fingerprint information may be: an STB MAC address, or a DVB card serial number, or an encrypted string or generated image processed based on hardware information of the user equipment.
  • additional information for defining other information displayed by the digital fingerprint, the additional information may include:
  • the position of the digital fingerprint display may be the coordinates on the screen, or the position of the screen marked by the serial number after dividing the screen into nine squares or sixteen squares.
  • the digital fingerprint is text, it may include the font, size, and color of the digital fingerprint.
  • the digital fingerprint is a picture, it may include a picture display effect (transparent, translucent, opaque).
  • the length of the digital fingerprint display such as 10 minutes.
  • the digital fingerprint protection policy can be added to the channel program or the video program code stream through the encoder, and sent to the user equipment through the media stream.
  • the user equipment locally obtains a digital fingerprint based on hardware information of the user equipment.
  • the user equipment may generate a digital fingerprint according to the hardware information of the user equipment in advance and store the backup.
  • the user equipment may locally obtain the digital fingerprint protection policy according to the digital fingerprint protection policy.
  • Obtain hardware information such as MAC address, terminal identification serial number, or DVB card serial number
  • the user equipment may generate a digital fingerprint, or directly use the hardware information of the user equipment as a digital fingerprint.
  • the user equipment displays the digital fingerprint according to the protection policy of the digital fingerprint.
  • the STB After receiving the media stream, the STB parses out the digital fingerprint protection policy from the stream, and displays the corresponding digital fingerprint (such as the STB DVB card serial number) at the specified location, and automatically hides after the presentation time arrives.
  • the digital fingerprint such as the STB DVB card serial number
  • the digital fingerprint protection strategy is for the HBO channel, for all users, in the lower left corner of the screen, the string of the MAC address of the STB used by the current user is displayed for 10 minutes, the font is Times New Roman, the size is 10.5, the color It is black. Then the STB performs a corresponding display operation according to the digital fingerprint protection policy.
  • the embodiment may be further extended, and the operator may extend the information specific to the operator in the digital fingerprint protection policy, such as the special logo name of the operator, the subscription package ordered by the user, and the like, during playing in the media stream.
  • the operator may extend the information specific to the operator in the digital fingerprint protection policy, such as the special logo name of the operator, the subscription package ordered by the user, and the like, during playing in the media stream.
  • FIG. 6 is a video content protection method according to an embodiment of the present invention.
  • a digital fingerprint is delivered by a network side device.
  • the user equipment sends a video request to the network side device.
  • the network side device (such as the digital fingerprint protection policy management module shown in FIG. 4) acquires hardware information of the user equipment in an interactive manner, generates a digital fingerprint according to the hardware information, and the encoder protects the digital fingerprint and the digital fingerprint.
  • the policy is embedded in the video stream.
  • the video stream to which the digital fingerprint and the digital fingerprint protection policy are added is delivered to the user equipment through the media server.
  • the user equipment may report the hardware information of the user equipment to the network side device in the first registration authentication.
  • the user equipment may also report the hardware information of the user equipment to the network side device in the video request.
  • the user equipment acquires a digital fingerprint based on hardware information of the user equipment from the video stream.
  • the STB After receiving the media stream, the STB parses out the extended digital fingerprint protection policy and the digital fingerprint from the stream, and displays the corresponding digital fingerprint according to the digital fingerprint protection policy at a specified location, and automatically hides after the presentation duration arrives.
  • FIG. 7 is a signaling interaction diagram of a video protection method according to another embodiment of the present invention.
  • a digital fingerprint protection policy is sent based on an IP channel.
  • the network side device sends a digital fingerprint protection policy for a certain channel to the user equipment through an Extensible Messaging and Presence Protocol (XMPP) message.
  • XMPP Extensible Messaging and Presence Protocol
  • the STB that receives the XMPP message containing the digital fingerprint protection policy reports the acquired hardware information of the user equipment (such as the MAC address of the STB) to the EPG server when the user enters the specified channel, according to the digital fingerprint protection policy.
  • the specified location displays a digital fingerprint based on the device hardware information, which is automatically hidden after the presentation time is reached.
  • the processing flow for issuing a digital fingerprint protection policy through an IP channel is shown in FIG. 7 .
  • the real-time message management system sets a digital fingerprint protection policy, and the specific information of the digital fingerprint protection policy is as described in step 502 of FIG. 5.
  • the digital fingerprint protection policy may also be generated by the digital fingerprint protection policy management module, and then sent to the real-time message management system.
  • the real-time message system sends the digital fingerprint protection policy to the corresponding STB through the real-time message via the IP channel.
  • the real-time messaging system sends a digital fingerprint protection policy to the corresponding STB through the XMPP message.
  • the corresponding STB may determine, according to the protection policy in the digital fingerprint protection policy, which users are valid.
  • the STB receives a real-time message including a digital fingerprint protection policy.
  • the STB needs to support real-time message reception and parsing.
  • the STB is required to support the XMPP protocol stack.
  • the STB acquires a digital fingerprint of the STB-based hardware information according to the digital fingerprint protection policy.
  • the STB determines the STB hardware information that needs to be acquired according to the digital fingerprint information in the digital fingerprint protection policy.
  • the digital fingerprint information is the device serial number of the STB
  • the STB acquires the device serial number of the STB according to the digital fingerprint information.
  • the STB may not process the acquired STB hardware information, and directly obtains the information.
  • the hardware information is used as a digital fingerprint.
  • the STB can use a certain algorithm to calculate and process the STB hardware information to obtain a digital fingerprint. The specific algorithm is not limited in the embodiment of the present invention.
  • the STB displays the digital fingerprint according to the digital fingerprint protection strategy.
  • the STB displays the digital fingerprint in a prescribed manner at a specified location according to specific policy information in the digital fingerprint protection policy.
  • the digital fingerprint protection strategy is to display the current user's STB serial number, the font is Arial, and the size is 10 for all users in the position where the screen position is 110 and the ordinate is 100. No., the color is red, and the fingerprint will disappear automatically after 1 hour. Then, the STB performs a corresponding display operation according to the digital fingerprint protection policy.
  • the feature of the solution is that a digital fingerprint protection policy based on the hardware information of the user equipment can be set for a specific channel, and the digital fingerprint protection policy is sent by the real-time message to the user equipment of the corresponding user by using the IP channel, and the user equipment plays the video when playing the video.
  • the layer mode superimposes the digital fingerprint information based on the hardware of the user equipment.
  • the method utilizes the existing real-time message management system, and the delivery method is simple and convenient, and the operability is strong.
  • FIG. 8 is a video protection method according to another embodiment of the present invention.
  • a digital fingerprint protection policy is sent based on a DVB channel.
  • the processing flow of carrying the digital fingerprint protection strategy in the DVB code stream is shown in FIG. 8.
  • the encoder requests a digital fingerprint protection policy from the digital fingerprint protection policy management module.
  • the digital fingerprint protection policy management module returns a digital fingerprint protection policy to the encoder.
  • the encoder inserts the digital fingerprint protection policy extension into the corresponding channel code stream for output.
  • the digital fingerprint protection policy is embedded in the HBO channel code stream.
  • the STB receives the channel code stream from the DVB channel.
  • the STB parses the digital fingerprint protection policy from the channel code stream.
  • the STB acquires hardware information of the STB according to the digital fingerprint protection policy.
  • step 704 refers to the implementation of step 704 as shown in FIG.
  • the STB superimposes the layer on the channel code stream to display the fingerprint information.
  • the string of the MAC address of the STB used by the current user is displayed for 10 minutes.
  • the font is Times New Roman, the size is small five, the color is black, and the fingerprint disappears automatically after 10 minutes.
  • a digital fingerprint protection policy based on the hardware information of the user equipment may be set for a specific channel, and a digital fingerprint protection policy is sent to the user equipment of the corresponding user by using the DVB channel, and the user equipment superimposes the layer based on the layer when playing the video.
  • Digital fingerprint information of the user equipment hardware The digital fingerprint can be displayed on the screen for manual viewing. After the video is ripned, the digital fingerprint can be traced to the source to find the source leaking STB, which can effectively prevent the legitimate channel content from being logged.
  • FIG. 9 is a video content protection method according to an embodiment of the present invention.
  • a digital fingerprint is sent by a DVB network device.
  • the DVB network side device obtains the digital fingerprint based on the hardware information of the user equipment in an interactive manner, and embeds the digital fingerprint in the video, and sends the digital fingerprint to the designated STB along with the video stream, and the STB obtains the video.
  • the video stream is played normally, but after the video stream is pirated, the digital fingerprint can be parsed from the video stream, and after decryption, it is learned which STB or STBs may be counterfeited and cause piracy.
  • the processing flow for embedding a digital fingerprint in a DVB stream is as shown in FIG.
  • the digital fingerprint protection policy management module acquires hardware information of the STB device.
  • the digital fingerprint protection policy management module can obtain STB hardware information of all registered users when the STB is initially registered. Specific hardware information can be found in the above.
  • the digital fingerprint protection policy management module groups the STBs, and sets a digital fingerprint protection policy for each group of STBs.
  • the digital fingerprint protection policy is set separately for each STB, the processing overhead is large and the processing efficiency is low. Therefore, in this embodiment, after the STBs are grouped, a digital fingerprint protection policy is set for each group of STBs.
  • a digital fingerprint protection policy is set for each group of STBs.
  • the digital fingerprint is specifically an encrypted string or a generated picture processed by a set of STB hardware information.
  • the digital fingerprint protection policy can further add the following information:
  • the digital fingerprint protection policy is specific to which group of STBs.
  • the dividing dimension of the STB may be based on the physical area, or the address segment of the STB static IP, or the STB serial number range, or the STB MAC address segment, or the serial number of the STB DVB card.
  • the method for generating the digital fingerprint may be: splicing the MAC addresses of the group of STBs together, separating the MAC addresses by delimiters, and calculating the spliced strings by using an encryption algorithm to generate a string. This string is used as the digital fingerprint of the set of STBs.
  • the encryption algorithm may use a symmetric encryption algorithm, such as AES128, to facilitate subsequent analysis of the traced source STB after obtaining the digital fingerprint from the leaked channel code stream.
  • AES1208 a symmetric encryption algorithm
  • this embodiment does not limit the specific algorithm.
  • the encoder requests the digital fingerprint protection policy management module to acquire a digital fingerprint protection policy and a digital fingerprint.
  • the digital fingerprint protection policy management module returns a digital fingerprint protection policy and a digital fingerprint to the encoder.
  • the encoder embeds a digital fingerprint protection policy and a digital fingerprint in the corresponding channel code stream.
  • the digital fingerprint protection policy is for the HBO channel
  • the digital fingerprint protection policy and the digital fingerprint are embedded in the HBO channel stream.
  • the STB receives the channel code stream, normally decodes and plays, and displays the digital fingerprint according to the digital fingerprint protection policy.
  • the leaked code stream can be acquired, and the digital fingerprint therein can be analyzed, from which an STB or a group of STBs that may be leaked are known.
  • the channel may be delivered to the user equipment in multicast mode or unicast mode.
  • the process is not described here.
  • the hardware information of the user equipment (such as the MAC address of the STB) is reported at the same time.
  • the hybrid video system (HVS) platform has a digital fingerprint protection policy for the specified channel.
  • the HVS platform can check whether the channel requested by the user equipment is to superimpose the digital fingerprint, and if so, the HVS platform notifies the content distribution network (content delivery)
  • the network, CDN is directly added to the channel media stream after the digital fingerprint is generated based on the hardware information of the user equipment.
  • the STB plays normally. However, after the video content is stolen, the STB can analyze the digital fingerprint carried in the media stream by capturing or otherwise, and locate the leaked source STB.
  • a real-time message management system sets a digital fingerprint protection policy.
  • the real-time message management system synchronizes the digital fingerprint protection policy to the CDN.
  • the CDN saves the digital fingerprint protection policy.
  • the user plays a certain channel by unicast.
  • the user After the user obtains the on-demand link of a certain channel through the EPG page, the user can directly click the link to play the channel, and the user click behavior triggers the STB to request the MEM to obtain the unicast URL of the channel.
  • MEM obtains the unicast URL of the channel.
  • the MEM can obtain the unicast URL corresponding to the channel according to the channel identifier used in the request for on-demand.
  • MEM returns the unicast URL of the channel to the STB.
  • the STB requests the channel media stream from the CDN according to the unicast URL, and reports the STB hardware information.
  • the STB After obtaining the URL of the channel, the STB directly requests the media server of the CDN to send the channel media stream.
  • the STB hardware information may be carried in the play request.
  • the CDN checks whether the current channel and the current STB have a preset digital fingerprint protection policy.
  • the CDN may determine, according to the channel identifier and the hardware information of the STB, whether the channel and the STB have a preset digital fingerprint protection policy.
  • step 1009 If there is no matching digital fingerprint protection policy, the media stream of the channel is directly sent to the STB, and if yes, the process proceeds to step 1010.
  • the CDN generates a digital fingerprint of the STB according to the matched digital fingerprint protection policy.
  • the CDN generates a digital fingerprint using the hardware information reported by the STB according to the digital fingerprint information in the digital fingerprint policy.
  • the CDN embeds the generated digital fingerprint of the STB into the channel code stream, and sends the channel media stream to the STB.
  • the STB After receiving the media stream of the channel, the STB normally decodes and plays the digital fingerprint.
  • the leaked channel media stream can be obtained, and the digital fingerprint can be analyzed, and according to the digital fingerprint, it can be determined which STB is the leak source, thereby preventing the legitimate video content from being stolen.
  • the feature of the solution is that the user equipment carries the hardware information of the user equipment in the channel unicast request to the CDN, and the digital fingerprint based on the hardware of the user equipment is added to the channel media stream by the CDN, and then sent to the user equipment. After the channel video is stolen, the leaked source STB can be accurately located to prevent the video from being stolen.
  • the user equipment, the user terminal, or the terminal device are different expressions of the same concept.
  • Channel streams, media streams or code streams are also different expressions of the same concept.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, or an electrical, mechanical or other form of connection.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the embodiments of the present invention.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.

Abstract

本发明实施例提供了一种利用数字指纹技术的视频保护方法,该方法包括:用户设备向网络侧设备发送视频请求,然后接收所述网络侧设备基于所述视频请求下发的视频流,该视频流中包括数字指纹的保护策略,用户设备根据该数字指纹保护策略获取基于用户设备硬件信息的数字指纹,然后根据所述数字指纹保护策略,展示所述数字指纹。该方法可以针对特定的频道、特定的用户组、指定的用户设备来配置灵活的数字指纹保护策略,防止视频内容被盗录。

Description

一种利用数字指纹技术保护视频的方法及装置
本申请要求于2015年12月29日提交中国专利局、申请号为201511017237.1、发明名称为“一种利用数字指纹技术保护视频的方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及数字指纹技术,尤其涉及一种应用在混合视频系统中利用数字指纹技术保护视频的方法及装置。
背景技术
作为信息隐藏的一个重要分支,数字指纹(Digital Fingerprinting))主要用于版权保护。数字指纹是将不同的标志性识别代码——指纹,利用数字水印技术嵌入到数字媒体中,然后将嵌入了指纹的数字媒体分发给用户。发行商发现盗版行为后,就能通过提取盗版产品中的指纹,确定非法复制的来源,对盗版者进行起诉,从而起到版权保护的作用。
随着网络视频业务的快速发展,数字版权管理技术(Digital Right Management,DRM)应运而生。DRM是指通过限制媒体权限以及对文件的转发权限,使用媒体内容加密来实现保护内容提供商利益的一种手段。通过DRM可以有效的限制媒体文件的非授权使用,从而保护知识产权和发行方的经济利益。
DRM技术的基本工作原理是,首先建立数字内容授权中心,然后对原始的数字媒体内容进行加密打包处理,经过加密打包的数字内容拥有自己独立的标识符及加密密钥。用户得到经过加密的数字内容后,无法直接使用,必须到数字内容授权中心申请和购买内容使用授权,授权信息中包括解密密钥及使用限制等内容。DRM技术保证了用户只有在成功获得授权后,才能够使用数字内容,从而保障了内容所有人的合法权益。但是DRM技术无法保证合法视频内容在播放过程中的翻录或盗录问题。
发明内容
有鉴于此,有必要提供一种防止合法视频内容翻录或者盗录的方法。
第一方面,提供一种视频保护方法,包括:用户设备向网络侧设备发送视频请求,该用户设备接收网络侧设备基于所述视频请求下发的视频流,所述视 频流中包括数字指纹保护策略,用户设备根据数字指纹保护策略获取基于用户设备硬件信息的数字指纹,然后根据所述数字指纹的保护策略,展示所述数字指纹。该方法中,用户设备可以根据数字指纹保护策略,获取数字指纹后进行展示,防止受保护的视频内容被翻录或者盗录。
根据第一方面的第一实施方式中,网络侧设备下发的视频流中进一步可以包括基于用户设备生成的数字指纹,则用户设备可直接从网络侧下发的视频流中获取数字指纹。
根据第一方面的第二实施方式中,用户设备可以根据数字指纹保护策略中的数字指纹信息,从本地获取用户设备的硬件信息,将该用户设备的硬件信息作为数字指纹,或者进一步根据该硬件信息生成数字指纹。
根据第一方面或第一方面第一实施方式或第一方面第二实施方式的第三实施方式中,所述数字指纹保护策略包括如下一种或多种:频道标识,用户标识,数字指纹信息,数字指纹展示位置,数字指纹展示方式,数字指纹展示时长。该实施方式中,可以根据实际需要灵活设置数字指纹保护策略。
第二方面,提供一种用户设备,包括:发送单元,用于向网络侧设备发送视频请求;接收单元,用于接收所述网络侧设备基于所述视频请求下发的视频流,所述视频流中包括数字指纹保护策略;处理单元,用于获取基于用户设备硬件信息的数字指纹;显示单元,用于根据所述数字指纹的保护策略,展示所述数字指纹。该用户设备可以用以执行如上所述的视频保护方法。
根据第二方面的第一实施方式中,所述处理单元具体用于:
从所述网络侧下发的视频流中获取基于用户设备硬件信息生成的数字指纹。
根据第二方面的第二实施方式中,所述处理单元具体用于根据所述数字指纹保护策略从用户设备本地获取用户设备的硬件信息,根据所述用户设备的硬件信息生成数字指纹。
根据第二方面,该用户设备可以是数字广播电视(DVB)机顶盒,交互式网络电视(IPTV)机顶盒,或OTT机顶盒或集成有DVB、IPTV、OTT机顶盒功能的网络电视。
第三方面,提供一种电视网络系统,包括:
接收单元,用于接收用户设备的视频请求;发送单元,用于基于所述用户设备的视频请求向所述用户设备发送视频流,所述视频流中包括数字指纹保护策略,所述数字指纹保护策略用于指示用户设备根据所述数字指纹的保护策略, 展示数字指纹。该电视网络系统可用以执行如上所述的视频保护方法。
根据第三方面的第一实施方式中,所述电视网络系统为:
数字广播电视(DVB)系统,或交互式网络电视(IPTV)系统或OTT网络电视系统。
第四方面,提供一种混合电视系统,该混合电视系统包括数字广播(DVB)系统,交互式网络电视(IPTV)系统,以及OTT网络视频系统中的两种或三种,以及如上第二方面所述的用户设备。
第五方面,提供了一种用户设备,该用户设备具有实现上述方法实际中用户设备执行的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,用户设备的结构中包括处理器和存储器,所述存储器用于存储支持用户设备执行上述方法的应用程序代码,所述处理器被配置为用于执行所述存储器中存储的应用程序。所述用户设备还可以包括通信接口,用于与其他设备或通信网络通信。
第六方面,本发明实施例提供了一种计算机存储介质,用于储存为上述用户设备所用的计算机软件指令,其包含用于执行上述方面为用户设备所设计的程序。
第七方面,本发明实施例还提供一种视频系统,该视频系统具有实现上述方法实际中视频系统执行的功能。所述功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。所述硬件或软件包括一个或多个与上述功能相对应的模块。
在一个可能的设计中,视频系统的结构中包括处理器和存储器,所述存储器用于存储支持视频系统执行上述方法的应用程序代码,所述处理器被配置为用于执行所述存储器中存储的应用程序。所述视频系统还可以包括通信接口,用于与其他设备或通信网络通信。
第八方面,本发明实施例提供了一种计算机存储介质,用于储存为上述视频系统所用的计算机软件指令,其包含用于执行上述方面为视频系统所设计的程序。
第九方面,提供一种混合视频系统,包括如上所述的用户设备以及如上所述的视频系统。
该混合视频系统可用于实现如上所述的视频保护方法。
本发明实施方案可以针对特定的频道、特定的用户组、指定的用户设备来配置灵活的数字指纹保护策略,用户设备在播放视频时根据数字指纹保护策略显示数字指纹,防止视频内容被翻录和盗录。
附图说明
图1是依据本发明方案的应用场景图;
图2是依据本发明一实施例的混合视频系统架构图;
图3是本发明一实施例的用户设备通用结构示意图;
图4是本发明一实施例的网络侧设备结构示意图;
图5是本发明一实施例的视频保护方法流程示意图;
图6为本发明另一实施例的视频保护方法流程示意图;
图7为本发明一实施例的IP场景下视频保护方法信令交互图;
图8为本发明一实施例的DVB场景下视频保护方法信令交互图;
图9为本发明另一实施例的DVB场景下视频保护方法信令交互图;
图10为本发明另一实施例的IP场景下视频保护方法信令交互图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行描述。
图1是依据本发明方案的应用场景图。
Hybrid Video系统是基于统一技术平台,支持数字广播电视(digital video broadcast,DVB)、交互式网络电视(internet protocol television,IPTV)、OTT(over the top)视频三个场景融合,也支持上述场景的两两融合或单独应用的混合电视系统。
其中,IPTV场景指通过可管理(Managed Network)的互联网网络下发业务,订户通过机顶盒(set top box,STB)接入并体验IPTV业务。IPTV内容源可以来自内容提供商(Content Provider,CP),也可以来自运营商的专门制作。IPTV业务是以IP网络为传输通道,为用户提供包括数字电视在内的多种交互式多媒体服务的业务。
OTT场景指通过未管理的(Unmanaged Network)的互联网网络下发业务,订户通过计算机(PC)、平板电脑、智能手机等终端体验OTT业务。OTT业务与互联网服务的体验方式相同,具有多屏共享、移动性强等特点。OTT业务基于IP网络传输,用户可以使用不同类型终端(如手机、平板电脑、计算机等) 通过互联网随时随地观看节目。用户可以直接从互联网内容提供商(Internet CPs)获取内容,也可以购买运营商的OTT业务,从运营商获取经过专门制作的OTT内容。
DVB场景是指采用DVB技术以基于无线或有线或卫星广播方式下发业务,订户通过支持DVB的STB体验业务。DVB业务通常只包含音视频广播。用户可以通过统一的电子节目菜单(electronic program guide,EPG)界面收看DVB下发的内容,并可以通过Hybrid Video平台对视频内容进行个人视频录制(personal video recording,PVR)。DVB按不同的传输方式主要包括以下几类:DVB-T(Terrestrial):基于地面无线传输的DVB。DVB-C(Cable):基于有线电视网传输的DVB。DVB-S/DVB-S2(Satellite):基于卫星传输的DVB。图1中DVB场景以DVB-S为例。
图2是依据本发明一实施例的混合视频(Hybrid video)系统网络架构图。
如图2所示Hybrid Video系统主要由中心节点201、边缘节点202和家庭网络203组成:
中心节点201负责对接IP骨干网(backbone network),部署Hybrid Video系统的内容管理、分发以及运营的核心部件。中心节点还可以提供各项管理和服务功能,并支持对接运营商已有的业务支撑系统和网管系统,提供统一的管理和维护功能。中心节点一般部署有头端子系统,负责从外部内容源获取媒体内容,经过压缩编码处理,转换为符合格式要求的媒体文件或媒体流;统一管理(Unified Management System,UMS)子系统,该子系统是混合视频系统的运营管理平台,向运营商提供内容管理、业务管理、产品管理、订户管理、合作伙伴管理、设备管理等功能;媒体娱乐中间件(Media Entertainment Middleware,MEM)子系统,用于为订户建立与业务平台之间的业务逻辑关系,向订户提供接入认证、鉴权、业务订购、EPG调度等服务。
边缘节点202通常对接汇聚网,是Hybrid Video系统向一定区域内提供媒体服务和门户展示的网络节点,部署有媒体服务器、EPG服务器等功能部件。边缘节点可以集中为相应网段内订户提供展示、内容等服务,分流中心节点的业务压力。媒体服务器主要负责内容存储与分发,根据用户设备的内容请求,与用户设备建立连接,并将存储的媒体内容以流媒体形式发送到用户设备。EPG服务器是面向用户的业务入口,向用户终端提供EPG界面,为用户提供内容、业务及个性化设置等交互指引。
家庭网络203包括网络接入设备和用户设备,网络接入设备提供IP网络接入功能,订户通过用户设备体验内容和业务。
图3为本发明一实施例的用户设备结构示意图,如图3所示,用户设备300包括至少一个处理器301,通信总线302,存储器303以及至少一个通信接口304。
处理器301可以是一个通用中央处理器(CPU),微处理器,特定应用集成电路(application-specific integrated circuit,ASIC),或一个或多个用于控制本发明方案程序执行的集成电路。
通信总线302可包括一通路,在上述组件之间传送信息。所述通信接口304,使用任何收发器一类的装置,用于与其他设备或通信网络通信,如以太网,无线接入网(RAN),无线局域网(Wireless Local Area Networks,WLAN)等。
存储器303可以是只读存储器(read-only memory,ROM)或可存储静态信息和指令的其他类型的静态存储设备,随机存取存储器(random access memory,RAM)或者可存储信息和指令的其他类型的动态存储设备,也可以是电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、光碟存储(包括压缩光碟、激光碟、光碟、数字通用光碟、蓝光光碟等)、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。存储器可以是独立存在,通过总线与处理器相连接。存储器也可以和处理器集成在一起。
其中,所述存储器303用于存储执行本发明方案的应用程序代码,并由处理器301来控制执行。所述处理器301用于执行所述存储器303中存储的应用程序代码。
在具体实现中,作为一种实施例,处理器301可以包括一个或多个CPU,例如图3中的CPU0和CPU1。这些处理器中的每一个可以是一个单核(single-CPU)处理器,也可以是一个多核(multi-CPU)处理器。这里的处理器可以指一个或多个设备、电路、和/或用于处理数据(例如计算机程序指令)的处理核。
在具体实现中,作为一种实施例,计算机设备300还可以包括输出设备305和输入设备306。输出设备305和处理器301通信,可以以多种方式来显示信 息。例如,输出设备305可以是液晶显示器(liquid crystal display,LCD),发光二级管(light emitting diode,LED)显示设备,阴极射线管(cathode ray tube,CRT)显示设备,或投影仪(projector)等。输入设备306和处理器301通信,可以以多种方式接受用户的输入。例如,输入设备306可以是鼠标、键盘、触摸屏设备或传感设备等。
在具体实现中,用户设备300可以是台式机、便携式电脑、网络服务器、掌上电脑(Personal Digital Assistant,PDA)、移动手机、平板电脑、无线用户设备、机顶盒,混合机顶盒或集成有机顶盒功能的网络电视,或有图3中类似结构的设备。本发明实施例不限定用户设备300的类型。
图4为本发明一实施例的网络侧设备示意图,如图4所示,该网络侧设备可以包括:
数字指纹保护策略管理模块401,用于设置数字指纹保护策略。
编码器402,用于从数字指纹保护策略管理模块401中获取数字指纹保护策略,将该数字指纹保护策略嵌入到频道码流中。
媒体服务器403,用于向用户设备下发媒体流。
在另一种可选的实施方式中,数字指纹保护策略管理模块401还用于获取用户设备的硬件信息,基于用户设备的硬件信息生成数字指纹,并将该数字指纹提供给编码器402,编码器402将该数字指纹嵌入到频道码流中。
可选的,用户设备的硬件信息可以是用户设备的硬件标识或者MAC地址或者DVB卡序列号等硬件信息。
在具体实现方式中,编码器402可以设置在如图2所示的中心节点的头端子系统中,数字指纹保护策略管理模块401可以是独立的设备,也可以作为编码器402的一个功能模块,设置于如图2所示的中心节点的头端子系统中。媒体服务器403可以设置于如图2所示的边缘节点中。
如图3所示的用户设备与如图4所示的网络侧设备可以配合实施本发明实施例的视频保护方法。
本发明技术方案主要思路为:在视频流上叠加数字指纹,数字指纹是根据用户设备的硬件信息处理后得到的,一种可选的方式是用户设备在视频播放时叠加一个图层显示数字指纹,另一种可选的方式是直接在视频流中扩展添加基于用户设备硬件信息的数字指纹,以确保在视频被翻录或盗录后能够溯源找到盗录或翻录的用户设备。
图5为本发明实施例的视频保护方法,该实施例中,数字指纹由用户设备从本地获取:
501、用户设备向网络侧设备发送视频请求。
具体的,用户设备可以通过接入网络向如图2中所示的边缘节点202中的媒体服务器发送视频请求。视频请求中可以包括视频标识或者频道标识等标识信息。
502、用户设备接收所述网络侧设备基于所述视频请求下发的视频流,所述视频流中包括数字指纹的保护策略。
网络侧设备根据用户设备请求中的视频标识或者频道标识向用户设备发送对应的视频流。
以直播频道为例,针对DVB通道(可以是DVB-S、DVB-T、DVB-C等)和IP通道的直播频道,网络侧设备可以定义针对某个频道的数字指纹保护策略。
数字指纹保护策略,可以包括如下信息中的一种或多种:
1)频道标识,用于定义该数字指纹保护策略生效的某个频道或一组频道或所有频道。
2)用户标识,用于定义该数字指纹保护策略生效的某个用户或一组用户或所有用户。
3)数字指纹信息,用于定义具体的数字指纹,数字指纹信息可以是:STB MAC地址,或DVB卡序列号,或基于用户设备硬件信息处理后的加密串或生成的图片。
4)其他附加信息,用于定义数字指纹展示的其他信息,附加信息可以包括:
a)数字指纹展示的位置,可以是屏幕上的坐标,或者将屏幕划分成九宫格或十六宫格后以序号标志的位置。
b)若数字指纹是文字,则可以包括数字指纹的字体、大小、颜色。
c)若数字指纹是图片,则可以包括图片展示效果(透明、半透明、不透明)。
d)数字指纹展示时长,比如展示10分钟。
上述描述的是一条数字指纹保护策略的基础信息,关于数字指纹其他的展示效果也可以在保护策略中扩展。
网络侧设备设定好数字指纹保护策略后,可以通过编码器将数字指纹保护策略添加到频道节目或者视频节目码流中,通过媒体流下发给用户设备。
503、用户设备从本地获取基于用户设备硬件信息的数字指纹。
一种可选的方式中,用户设备可以提前根据用户设备的硬件信息生成数字指纹后存储备用,另一种方式中,用户设备可以在收到数字指纹保护策略后,根据数字指纹保护策略从本地获取用户设备的硬件信息(如MAC地址,终端标识序列号,或DVB卡序列号等)生成数字指纹,或者直接将用户设备的硬件信息作为数字指纹。
504、用户设备根据所述数字指纹的保护策略,展示所述数字指纹。
STB接收到媒体流后,从流中解析出数字指纹保护策略,在指定位置展示对应的数字指纹(比如STB DVB卡序列号),且在展示时长到达后,自动隐藏。
例如:数字指纹保护策略为,针对HBO频道,针对所有用户,在屏幕的九宫格左下角,将当前用户所使用STB的MAC地址的字符串展示10分钟,字体为Times New Roman,大小为10.5,颜色为黑色。则STB根据该数字指纹保护策略执行相应的展示操作。
可选的,本实施例还可以进一步扩展,运营商可以在数字指纹保护策略中扩展运营商特有的信息,比如运营商的特殊标志名称、用户订购的套餐等,在媒体流中播放过程中,通过叠加图层,展示运营商的特殊标志、用户订购的套餐标志等,以显示的方式来检查是否有非法用户绕过运营商授权来接收并播放视频流。
图6为本发明一实施例的视频内容保护方法,该实施例中,数字指纹由网络侧设备下发。
601、用户设备向网络侧设备发送视频请求。
本步骤可参考501。
602、接收所述网络侧设备基于所述视频请求下发的视频流,所述视频流中包括数字指纹的保护策略和数字指纹。
具体的,网络侧设备(如图4中所示的数字指纹保护策略管理模块)通过交互式方式获取用户设备的硬件信息,根据该硬件信息生成数字指纹,编码器将该数字指纹以及数字指纹保护策略嵌入到视频码流中。通过媒体服务器将添加有数字指纹以及数字指纹保护策略的视频流下发给用户设备。
用户设备可以在首次注册认证中,将用户设备的硬件信息上报给网络侧设备,可选的,用户设备也可以在视频请求中将用户设备的硬件信息上报给网络侧设备。
603、用户设备从视频流中获取基于用户设备硬件信息的数字指纹。
604、根据所述数字指纹的保护策略,展示所述数字指纹。
STB接收到媒体流后,从流中解析出扩展的数字指纹保护策略和数字指纹,根据数字指纹保护策略在指定位置展示对应的数字指纹,且在展示时长到达后,自动隐藏。
图7为本发明另一实施例的视频保护方法信令交互图,该实施例中,数字指纹保护策略是基于IP通道下发。在IP通道下,网络侧设备通过可扩展的信息和呈现协议(Extensible Messaging and Presence Protocol,XMPP)消息将针对某个频道的数字指纹保护策略下发给用户设备。接收到包含数字指纹保护策略的XMPP消息的STB,根据数字指纹保护策略要求,在用户进入指定频道播放时,将获取到的用户设备硬件信息(比如STB的MAC地址)上报给EPG服务器,并在指定的位置展示基于设备硬件信息的数字指纹,在展示时长达到后,自动隐藏。
通过IP通道下发数字指纹保护策略的处理流程如图7所示。
701、实时消息管理系统设置数字指纹保护策略,数字指纹保护策略具体信息如图5步骤502中所述。
可选的,也可由数字指纹保护策略管理模块生成数字指纹保护策略,然后发送给实时消息管理系统。
702、实时消息系统经由IP通道,通过实时消息将数字指纹保护策略下发给对应的STB。
比如实时消息系统通过XMPP消息来下发数字指纹保护策略给对应的STB。
具体的,对应的STB可以根据数字指纹保护策略中的该保护策略具体针对哪些用户生效确定。
703、STB接收包含数字指纹保护策略的实时消息。
需要注意的是:STB需要支持实时消息接收和解析,比如,需要STB支持XMPP协议栈。
704、STB根据该数字指纹保护策略,获取基于STB的硬件信息的数字指纹。
具体的,STB根据数字指纹保护策略中的数字指纹信息,确定需要获取的STB硬件信息。例如,数字指纹保护策略中,数字指纹信息为STB的设备序列号,则STB根据数字指纹信息获取STB的设备序列号。
一种可选的方式中,STB可不对获取的STB硬件信息做处理,直接将获取 的硬件信息作为数字指纹,另外一种方式中,STB可以采用一定的算法对STB硬件信息作计算处理后获得数字指纹。具体的算法,本发明实施例不做限制。
705、STB根据数字指纹保护策略,展示数字指纹。
具体的,STB根据数字指纹保护策略中的具体策略信息,在规定的位置,以规定的方式显示数字指纹。
例如:数字指纹保护策略为在播放所有的频道时,针对所有用户,在屏幕位置为屏幕横坐标为110,纵坐标为100的位置,展示当前用户的STB序列号,字体为Arial,大小为10号,颜色为红色,指纹展示1小时后自动消失。则STB根据该数字指纹保护策略执行对应展示操作。
该方案的特点是,可以针对特定频道设置基于用户设备硬件信息的数字指纹保护策略,借助IP通道利用实时消息下发数字指纹保护策略给对应的用户的用户设备,用户设备在播放视频时以图层方式叠加基于用户设备硬件的数字指纹信息。该方式利用现有的实时消息管理系统,下发方式简单方便,可操作性强。
图8为本发明又一实施例的视频保护方法,该实施例中,数字指纹保护策略是基于DVB通道下发。
DVB码流中携带数字指纹保护策略的处理流程如图8所示。
801、通过数字指纹保护策略管理模块设置数字指纹保护策略,具体保护策略信息如上文图5步骤502中所述,不再赘述。
802、编码器向数字指纹保护策略管理模块请求获取数字指纹保护策略。
803、数字指纹保护策略管理模块向编码器返回数字指纹保护策略。
804、编码器将数字指纹保护策略扩展嵌入对应的频道码流中输出。
如:数字指纹保护策略中限定适用频道为HBO频道,则在HBO频道码流中嵌入该数字指纹保护策略。
805、STB从DVB通道接收频道码流。
807、STB从频道码流中解析出数字指纹保护策略。
808、STB根据数字指纹保护策略,获取STB的硬件信息。
具体方式可参考如图7中所示步骤704的实现。
809、STB根据数字指纹保护策略,在频道码流上叠加图层,展示指纹信息。
具体方式可参考如图7中所示步骤705的实现
如在HBO频道码流上叠加图层,针对所有用户,在屏幕的九宫格左下角, 将当前用户所使用STB的MAC地址的字符串展示10分钟,字体为Times New Roman,大小为小五,颜色为黑色,指纹展示10分钟后自动消失。
该实施例中,可以针对特定频道设置基于用户设备硬件信息的数字指纹保护策略,借助DVB通道下发数字指纹保护策略给对应的用户的用户设备,用户设备在播放视频时以图层方式叠加基于用户设备硬件的数字指纹信息。数字指纹可以显示的展示在屏幕上,方便人工查看,在视频被翻录后,可以通过数字指纹来溯源,找到源头泄露STB,可以有效防止合法频道内容被翻录。
图9为本发明一实施例的视频内容保护方法,该实施例中,数字指纹由DVB网络设备下发。
本发明实施例中,DVB网络侧设备通过交互式方式获取基于用户设备硬件信息的数字指纹,并在视频中嵌入该数字指纹,将该数字指纹随视频流下发给指定STB,当STB获取到视频流后,正常播放视频流,但是当视频流被盗录后,能够从视频流中解析出数字指纹,解密后获悉可能是哪台STB或者哪些STB被仿冒导致盗录。
在DVB码流中嵌入数字指纹的处理流程如图9所示。
901、数字指纹保护策略管理模块获取STB设备的硬件信息。
可选的,数字指纹保护策略管理模块可在STB初始注册时,获取所有注册用户的STB硬件信息。具体硬件信息可参考上文中介绍。
902、数字指纹保护策略管理模块将STB分组,针对每组STB设置数字指纹保护策略。
因针对每一STB均单独设置数字指纹保护策略,会导致处理开销大,处理效率低。因此本实施例中可以将STB分组后,针对每组STB设置一个数字指纹保护策略。具体数字指纹保护策略信息可参考上文。在本实施例中,数字指纹具体为一组STB的硬件信息进行处理后的加密串或生成的图片。
该数字指纹保护策略可进一步添加如下信息:
该数字指纹保护策略具体针对哪组STB生效,STB的划分维度可以是根据物理区域,或STB静态IP的地址段,或STB序列号范围,或STB MAC地址段,或STB DVB卡的序号等。
比如,根据STB序号,从最小的序号开始,每10台STB作为一组。该组数字指纹的生成方式可以为:将该组STB的MAC地址拼接在一起,MAC地址之间用分隔符分开,将拼接后的字符串采用加密算法计算后生成字符串,将 该字符串作为该组STB的数字指纹。
可选的,加密算法可以采用对称加密算法,比如AES128等,方便后续从泄露的频道码流中获取到数字指纹后解析溯源泄露的STB。但本实施例不对具体算法作限定。
903、编码器向数字指纹保护策略管理模块请求获取数字指纹保护策略和数字指纹。
904、数字指纹保护策略管理模块向编码器返回数字指纹保护策略和数字指纹。
905、编码器在对应的频道码流中,嵌入数字指纹保护策略和数字指纹。
比如:数字指纹保护策略针对HBO频道,则将该数字指纹保护策略和数字指纹嵌入到HBO频道流中。
906、STB接收到频道码流,正常解码播放,根据数字指纹保护策略显示数字指纹。
此后,若是某个频道码流被泄露,可以获取泄露的码流,分析其中的数字指纹,从其中获知可能泄露的某个STB或某组STB。
在IP通道下,频道可能是组播方式或者单播方式递交到用户设备的,对于组播方式处理同DVB通道,处理流程不再赘述。
对于单播方式,当用户设备向媒体娱乐中间件(Media Entertainment Middleware,MEM)请求获取频道单播流时,会同时上报用户设备的硬件信息(比如STB的MAC地址)。如混合视频系统(HVS)平台中有设置的指定频道的数字指纹保护策略,此时,HVS平台可以检查用户设备请求的频道是否要叠加数字指纹,若是,则HVS平台通知内容分发网络(content delivery network,CDN)基于该用户设备的硬件信息生成数字指纹后直接添加在频道媒体流的中。STB接收到频道流后,正常播放,但在视频内容被盗录后,能够通过抓包或其他方式分析出媒体流中携带的数字指纹,定位到泄露源STB。
该方式处理流程如下:
1001、实时消息管理系统设置数字指纹保护策略。
具体方式和数字指纹保护策略可参考上文,在此不再赘述。
1002、实时消息管理系统同步数字指纹保护策略到CDN。
1003、CDN保存数字指纹保护策略。
1004、用户通过单播方式播放某个频道。
用户通过EPG页面获取某个频道的点播链接后,可直接点击该链接播放该频道,则用户点击行为会触发STB向MEM请求获取该频道的单播URL。
1005、MEM获取该频道的单播URL。
MEM可以根据用于点播请求中的频道标识获取该频道对应单播URL。
1006、MEM返回该频道的单播URL给STB。
1007、STB根据该单播URL向CDN请求频道媒体流,同时上报STB硬件信息。
STB在获取到该频道的URL后直接向CDN的媒体服务器请求发送频道媒体流,本实施例中,可以在该播放请求中携带STB的硬件信息。
1008、CDN检查当前频道、当前STB是否有预设的数字指纹保护策略。
可选的,CDN可以根据该频道标识以及STB的硬件信息判断该频道以及该STB是否有预设的数字指纹保护策略。
1009、若没有匹配的数字指纹保护策略,则直接向STB发送该频道的媒体流,若有,则进入步骤1010。
1010、CDN根据匹配的数字指纹保护策略,生成该STB的数字指纹。
CDN根据数字指纹策略中的数字指纹信息,使用STB上报的硬件信息生成数字指纹。
1011、CDN将生成的STB的数字指纹嵌入到频道码流中,向STB发送该频道媒体流。
1012、STB接收到该频道媒体流后,正常解码播放,显示数字指纹。
此后,若是某个频道视频内容被泄露,可以获取泄露的频道媒体流,分析其中的数字指纹,根据数字指纹就可以判断具体是哪台STB为泄露源,从而防止合法视频内容被盗录。
该方案的特点是,用户设备在向CDN发送频道单播请求中携带用户设备的硬件信息,通过CDN在频道媒体流中添加基于用户设备硬件的数字指纹后下发给用户设备。在频道视频被盗录后,可以精确定位到泄露源STB,防止视频被盗录。
需要注意的是,在本发明实施例中,用户设备、用户终端或者终端设备均是对同一概念的不同表达方式。频道流,媒体流或者码流也均为对同一概念的不同表达方式。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示 例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口、装置或单元的间接耦合或通信连接,也可以是电的,机械的或其它的形式连接。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本发明实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以是两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本发明的保护范围之内。
因此,本发明的保护范围应以权利要求的保护范围为准。

Claims (15)

  1. 一种利用数字指纹技术的视频保护方法,其特征在于,包括:
    用户设备向网络侧设备发送视频请求;
    接收所述网络侧设备基于所述视频请求下发的视频流,所述视频流中包括数字指纹保护策略;
    获取基于用户设备硬件信息的数字指纹;
    根据所述数字指纹保护策略,展示所述数字指纹。
  2. 如权利要求1所述的视频保护方法,其特征在于,所述获取基于用户设备硬件信息的数字指纹,包括:
    从所述网络侧下发的视频流中获取基于用户设备硬件信息生成的数字指纹。
  3. 如权利要求1所述的视频保护方法,其特征在于,所述获取基于用户设备硬件信息的数字指纹,包括:
    根据所述数字指纹保护策略从用户设备本地获取用户设备的硬件信息,根据所述用户设备的硬件信息生成数字指纹。
  4. 如权利要求1-3任一项所述的视频保护方法,其特征在于,所述数字指纹保护策略包括如下一种或多种:
    频道标识,用户标识,数字指纹信息,数字指纹展示位置,数字指纹展示方式,数字指纹展示时长。
  5. 如权利要求1-4任一项所述的视频保护方法,其特征在于,所述网络侧设备包括:
    数字广播电视(DVB)系统网络设备,交互式网络电视(IPTV)系统网络设备或OTT(over the top)视频系统网络设备。
  6. 一种用户设备,其特征在于,包括:
    发送单元,用于向网络侧设备发送视频请求;
    接收单元,用于接收所述网络侧设备基于所述视频请求下发的视频流,所述视频流中包括数字指纹保护策略;
    处理单元,用于获取基于用户设备硬件信息的数字指纹;
    显示单元,用于根据所述数字指纹保护策略,展示所述数字指纹。
  7. 如权利要求6所述的用户设备,其特征在于,所述处理单元具体用于:
    从所述网络侧下发的视频流中获取基于用户设备硬件信息生成的数字指纹。
  8. 如权利要求6所述用户设备,其特征在于,所述处理单元还具体用于:
    根据所述数字指纹保护策略从用户设备本地获取用户设备的硬件信息,根据所述用户设备的硬件信息生成数字指纹。
  9. 如权利要求6-8任一项所述的用户设备,其特征在于,所述接收单元接收的数字指纹保护策略包括如下一种或多种:
    频道标识,用户标识,数字指纹信息,数字指纹展示位置,数字指纹展示方式,数字指纹展示时长。
  10. 如权利要求6-9任一项所述的用户设备,其特征在于,所述用户设备包括:
    数字广播电视(DVB)机顶盒,交互式网络电视(IPTV)机顶盒,或OTT机顶盒或集成有DVB、IPTV、OTT机顶盒功能的网络电视。
  11. 一种视频系统,其特征在于,包括:
    接收单元,用于接收用户设备的视频请求;
    发送单元,用于基于所述用户设备的视频请求向所述用户设备发送视频流,所述视频流中包括数字指纹保护策略,所述数字指纹保护策略用于指示用户设备根据所述数字指纹保护策略,展示数字指纹。
  12. 如权利要求11所述的视频系统,其特征在于,所述视频流中还包括基于用户设备硬件信息生成的数字指纹。
  13. 如权利11或12所述的视频系统,其特征在于,所述数字指纹保护策略包括如下一种或多种:
    频道标识,用户标识,数字指纹信息,数字指纹展示位置,数字指纹展示方式,数字指纹展示时长。
  14. 如权利要求11-13任一项所述的视频系统,其特征在于,所述视频系统为:
    数字广播电视(DVB)系统,或交互式网络电视(IPTV)系统或OTT网络视频系统。
  15. 一种混合视频系统,其特征在于,包括:
    如权利要求14所述的:数字广播(DVB)电视系统,交互式网络电视(IPTV)系统,以及OTT网络视频系统中的两种或三种,以及
    如权利要求6-10任一项所述的用户设备。
PCT/CN2016/096072 2015-12-29 2016-08-19 一种利用数字指纹技术保护视频的方法及装置 WO2017113817A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201511017237.1 2015-12-29
CN201511017237.1A CN105657453A (zh) 2015-12-29 2015-12-29 一种利用数字指纹技术保护视频的方法及装置

Publications (1)

Publication Number Publication Date
WO2017113817A1 true WO2017113817A1 (zh) 2017-07-06

Family

ID=56478182

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/096072 WO2017113817A1 (zh) 2015-12-29 2016-08-19 一种利用数字指纹技术保护视频的方法及装置

Country Status (2)

Country Link
CN (1) CN105657453A (zh)
WO (1) WO2017113817A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657453A (zh) * 2015-12-29 2016-06-08 华为技术有限公司 一种利用数字指纹技术保护视频的方法及装置
CN107302527B (zh) * 2017-06-09 2020-09-25 奇安信科技集团股份有限公司 一种设备异常检测方法及装置
CN109218811A (zh) * 2018-10-15 2019-01-15 四川长虹电器股份有限公司 录制回放指纹的系统
CN111107397A (zh) * 2019-12-30 2020-05-05 广东南方新媒体股份有限公司 基于播控平台的集成加密内容播放系统与方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070242826A1 (en) * 2006-04-14 2007-10-18 Widevine Technologies, Inc. Audio/video identification watermarking
CN102164303A (zh) * 2010-02-24 2011-08-24 中兴通讯股份有限公司 视频版权保护方法、系统及视频发布方实体
CN103686333A (zh) * 2013-12-19 2014-03-26 深圳市九洲电器有限公司 一种音视频保护方法及音视频终端
CN103796038A (zh) * 2014-01-28 2014-05-14 北京视博数字电视科技有限公司 点阵指纹生成方法、设备和系统
CN105657453A (zh) * 2015-12-29 2016-06-08 华为技术有限公司 一种利用数字指纹技术保护视频的方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100412973C (zh) * 2002-08-21 2008-08-20 汤姆森特许公司 用户设备以及在用户设备上对数字数据压制水印的方法
US8429365B2 (en) * 2009-06-26 2013-04-23 Sandisk Technologies Inc. Memory device and method for embedding host-identification information into content
CN101668170A (zh) * 2009-09-23 2010-03-10 中山大学 一种抗时间同步攻击的数字电视节目版权保护的方法
CN101917611A (zh) * 2010-08-31 2010-12-15 北京德博正业科技有限公司 能够追踪传播源的视频输出装置
CN103379101A (zh) * 2012-04-20 2013-10-30 腾讯科技(深圳)有限公司 一种水印生成方法、客户端及服务器

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070242826A1 (en) * 2006-04-14 2007-10-18 Widevine Technologies, Inc. Audio/video identification watermarking
CN102164303A (zh) * 2010-02-24 2011-08-24 中兴通讯股份有限公司 视频版权保护方法、系统及视频发布方实体
CN103686333A (zh) * 2013-12-19 2014-03-26 深圳市九洲电器有限公司 一种音视频保护方法及音视频终端
CN103796038A (zh) * 2014-01-28 2014-05-14 北京视博数字电视科技有限公司 点阵指纹生成方法、设备和系统
CN105657453A (zh) * 2015-12-29 2016-06-08 华为技术有限公司 一种利用数字指纹技术保护视频的方法及装置

Also Published As

Publication number Publication date
CN105657453A (zh) 2016-06-08

Similar Documents

Publication Publication Date Title
US10754930B2 (en) Remotely managed trusted execution environment for digital rights management in a distributed network with thin clients
US9367885B2 (en) Method and system for adding and detecting watermark
KR101854919B1 (ko) Drm 서비스 제공 방법 및 장치
CN106845172B (zh) 用于创建基于时间的动态水印的系统和方法
US9418209B2 (en) Systems and methods for manipulating sensitive information in a secure mobile environment
CA2829323C (en) Authenticating credentials for mobile platforms
EP2925007B1 (en) Information processing device and information processing method
JP4598616B2 (ja) ストリーミング方式メディアプレーヤ
US8745655B2 (en) Emergency alerts during playback of video streams on portable devices
US8510851B2 (en) Method and apparatus for accessing content protected media streams
KR102653289B1 (ko) 수신 장치, 송신 장치 및 데이터 처리 방법
US20170127151A1 (en) Method and Device for Protecting Video Digital Copyrights
KR20110004333A (ko) 스트림에서의 레코딩가능한 콘텐트의 프로세싱
US11490161B2 (en) Content rights management for mobile devices
EP3134838B1 (en) Ownership identification, signaling, and handling of content components in streaming media
KR101705010B1 (ko) 스트림에서의 레코딩가능한 콘텐트의 프로세싱
WO2017113817A1 (zh) 一种利用数字指纹技术保护视频的方法及装置
US20220046332A1 (en) System and method for automatic detection and reporting of group watermarking data
WO2015008252A1 (en) A system for receiving and decrypting multimedia content
JP5350021B2 (ja) ファイル生成装置、ファイル再生装置およびコンピュータプログラム
CN103002322A (zh) 一种向订户提供非授权内容相关信息的方法和装置
WO2015189834A1 (en) Delivery of drm protected content to distributed user stations
KR101450649B1 (ko) 소프트웨어 보정필터를 이용한 멀티미디어 컨텐츠 drm 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16880610

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16880610

Country of ref document: EP

Kind code of ref document: A1