WO2017215514A1 - 音视频的加密播放方法及其系统 - Google Patents

音视频的加密播放方法及其系统 Download PDF

Info

Publication number
WO2017215514A1
WO2017215514A1 PCT/CN2017/087637 CN2017087637W WO2017215514A1 WO 2017215514 A1 WO2017215514 A1 WO 2017215514A1 CN 2017087637 W CN2017087637 W CN 2017087637W WO 2017215514 A1 WO2017215514 A1 WO 2017215514A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
server
encrypted
audio
video
Prior art date
Application number
PCT/CN2017/087637
Other languages
English (en)
French (fr)
Inventor
徐伟杰
Original Assignee
深圳创维数字技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳创维数字技术有限公司 filed Critical 深圳创维数字技术有限公司
Publication of WO2017215514A1 publication Critical patent/WO2017215514A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • H04N19/46Embedding additional information in the video signal during the compression process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption

Definitions

  • the present disclosure relates to the field of audio and video technology, for example, to an encrypted playback method of audio and video and a system thereof.
  • HTTP Hypertext Transfer Protocol
  • HLS HTTP Live Streaming, Apple's dynamic rate adaptation technology
  • the AES-128 (an encryption algorithm) audio and video code stream data encryption method is provided in the HLS protocol.
  • the server front end cuts the video source (code stream) of the same content with different resolutions into slices of 5 to 10 seconds, and then generates an M3U8 slice index file.
  • the M3U8 index relationship shown in Figure 1 has different network speed bandwidths corresponding to different resolutions and is divided into different slices.
  • the medium (Mid) speed corresponds to the 4 megabyte bandwidth and the standard definition slice (such as Mid_01.ts ⁇ Mid_03.ts, there are actually multiple, that is, Mid_0n.ts, n is a positive integer, here are three examples).
  • Low_01.ts to Low_03.ts indicate slices corresponding to low speed
  • High_01.ts to High_03.ts indicate slices corresponding to high speed.
  • the AES-128 (AES-The Advanced Encryption Standard, a specification used by the National Institute of Standards and Technology for Encrypting Electronic Data) is used to encrypt the slice, and the encrypted slice and the plaintext key are simultaneously published to HTTP or HTTPS ( Hyper Text Transfer Protocol over Secure Socket Layer) On the server.
  • the HLS client first finds the URL of the main index file, downloads and parses it, parses the M3U8 index file, and compares the bandwidth with the stream stream slice. Then, according to the bandwidth of the client, select the corresponding slice file and download the corresponding AES-128. Key (key) for decryption playback.
  • the security level is not high enough. There is no difference in the communication process between HLS client entities.
  • the client requests the same encrypted video source and the same decryption key. Different clients can decrypt and play with the same key.
  • the communication process cannot identify individual differences, and cannot configure different content rights for the client.
  • an object of the present disclosure is to provide an audio and video encryption playing method and a system thereof, so as to solve the problem that the existing HLS protocol cannot protect the digital copyright of the HLS audio and video, the security level is low, and the individual cannot be identified.
  • Technical issues of difference are to provide an audio and video encryption playing method and a system thereof, so as to solve the problem that the existing HLS protocol cannot protect the digital copyright of the HLS audio and video, the security level is low, and the individual cannot be identified.
  • An encryption and playing method for audio and video comprising:
  • the client obtains the index file from the server and parses it;
  • the client obtains the encrypted AES key from the server, decrypts the encrypted AES key, decrypts the pre-encrypted audio video obtained from the server and plays it with the decrypted AES key;
  • the client obtains real-time encrypted audio and video from the server and decrypts the play.
  • the step of authenticating the client and the server with each other includes:
  • the CA root public key is used to verify the vendor certificate, and the vendor certificate is used to check whether the device certificate is legal. If the device certificate is legal, the device certificate is sent to the server;
  • the server verifies whether the device certificate sent by the client is legal. If the device certificate is valid, the authentication success message is returned to the client.
  • the server verifies whether the device certificate sent by the client is legal, which is determined by comparing whether a mac address in the device certificate is the same as an actual communication mac address, if the device certificate is If the mac address in the device is the same as the mac address of the actual communication, the device certificate is legal. If the mac address in the device certificate is different from the actual mac address, the device certificate is invalid.
  • the step of obtaining, by the client, the encrypted AES key from the server, and decrypting the encrypted AES key, and decrypting the pre-encrypted audio video obtained from the server by using the decrypted AES key and playing the specific one includes:
  • the client requests an AES key from the server;
  • the server checks the rights of the client and encrypts the AES key, and when the client has permission, returns the encrypted AES key;
  • the client decrypts the encrypted AES key with a private key, and requests audio and video from the server according to the index file;
  • the server verifies whether the rights of the client are legal, and if the rights of the client are legal, returning pre-encrypted audio and video to the client;
  • the client decrypts the pre-encrypted audio and video with the decrypted AES key and plays.
  • the encrypting the AES key by the server means that the server encrypts the AES key by using a public key in the device certificate of the client.
  • the step of the client obtaining the real-time encrypted audio and video from the server and decrypting the playing specifically includes:
  • the client requests audio and video from the server according to the index file
  • the server verifies whether the rights of the client are legal. If the rights of the client are legal, the audio and video are encrypted by using the public key of the client;
  • the server returns the encrypted audio and video to the client, and the client decrypts and plays the encrypted audio and video with a private key.
  • the server verifies whether the permission of the client is legal, whether the mac address communicated by the client and the server matches the mac address in the device certificate received by the server, if the device certificate is If the mac address in the device is the same as the mac address of the communication, the client's permission is legal. If the mac address in the device certificate is different from the mac address of the communication, the client's permission is invalid.
  • An encrypted playing system for implementing an encrypted playing method of audio and video as described above, comprising a client and a server;
  • the client and the server authenticate each other; if the authentication passes, the client obtains an index file from the server and parses;
  • the client obtains the encrypted AES key from the server, decrypts the encrypted AES key, decrypts the pre-encrypted audio obtained from the server and plays it with the decrypted AES key; or the client obtains the real-time encrypted audio and video from the server. And decrypt the play.
  • the step of authenticating the client and the server with each other includes:
  • the CA root public key is used to verify the vendor certificate, and the vendor certificate is used to check whether the device certificate is legal. If the device certificate is legal, the device certificate is sent to the server;
  • the server verifies whether the device certificate sent by the client is legal. If the device certificate is valid, the authentication success message is returned to the client.
  • the server verifies whether the device certificate sent by the client is legal, which is determined by comparing whether a mac address in the device certificate is the same as an actual communication mac address, if the device certificate is If the mac address in the device is the same as the mac address of the actual communication, the device certificate is legal. If the mac address in the device certificate is different from the actual mac address, the device certificate is invalid.
  • the step of obtaining, by the client, the encrypted AES key from the server, and decrypting the encrypted AES key, and decrypting the pre-encrypted audio video obtained from the server by using the decrypted AES key and playing the specific one includes:
  • the client requests an AES key from the server;
  • the server checks the rights of the client and encrypts the AES key, and when the client has permission, returns the encrypted AES key;
  • the client decrypts the encrypted AES key with a private key, and requests audio and video from the server according to the index file;
  • the server verifies whether the rights of the client are legal, if the rights of the client If it is legal, the pre-encrypted audio and video is returned to the client; the client decrypts the pre-encrypted audio and video with the decrypted AES key and plays.
  • the encrypting the AES key by the server means that the server encrypts the AES key by using a public key in the device certificate of the client.
  • the step of the client obtaining the real-time encrypted audio and video from the server and decrypting the playing specifically includes:
  • the client requests audio and video from the server according to the index file
  • the server verifies whether the rights of the client are legal. If the rights of the client are legal, the audio and video are encrypted by using the public key of the client;
  • the server returns the encrypted audio and video to the client, and the client decrypts and plays the encrypted audio and video with a private key.
  • the server verifies whether the permission of the client is legal, whether the mac address communicated by the client and the server matches the mac address in the device certificate received by the server, if the device certificate is If the mac address in the device is the same as the mac address of the communication, the client's permission is legal. If the mac address in the device certificate is different from the mac address of the communication, the client's permission is invalid.
  • a non-transitory computer readable storage medium storing computer executable instructions arranged to perform the method of any of the above.
  • An electronic device comprising:
  • At least one processor At least one processor
  • the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to cause the at least one processor to perform the method of any of the above.
  • the present disclosure provides an audio and video encryption playing method and a system thereof, and the audio and video encryption playing method includes: authenticating between a client and a server; if the authentication is passed, The client obtains the index file from the server and parses; the client obtains the encrypted AES key from the server, decrypts the encrypted AES key, decrypts the pre-encrypted audio video obtained from the server and plays it with the decrypted AES key; or The client obtains real-time encrypted audio and video from the server and decrypts the playback.
  • the individual differences of the client can be identified, and the copyright protection of the digital content can be realized by encrypting and decrypting the AES key or encrypting and decrypting the audio and video, thereby improving the security, thereby solving the problem that the existing HLS protocol cannot protect the HLS audio and video numbers.
  • 1 is a schematic diagram showing the relationship of an existing M3U8 index file
  • Embodiment 1 is a schematic flow chart of Embodiment 1 of an encrypted playing method of the audio and video of the present disclosure
  • Embodiment 3 is a partial flow chart of Embodiment 2 of an encrypted playing method of the audio and video of the present disclosure
  • Embodiment 4 is a partial flow chart of Embodiment 3 of an encrypted playing method of the audio and video of the present disclosure
  • Embodiment 3 is a timing diagram of Embodiment 3 of an encrypted playing method of the audio and video of the present disclosure
  • Embodiment 6 is a partial flow chart of Embodiment 4 of an encrypted playing method of the audio and video of the present disclosure
  • Embodiment 7 is a timing diagram of Embodiment 4 of an encrypted playing method of the audio and video of the present disclosure
  • Figure 8 is a block diagram showing the structure of an encrypted playback system of the audio and video of the present disclosure
  • FIG. 9 is a schematic diagram showing the hardware structure of an electronic device according to the present disclosure.
  • the present disclosure provides an audio and video encryption playing method and system thereof, and the audio and video protection problem for audio and video from front-end configuration to client playback, based on the HLS protocol, through identity authentication, using the public key of the client device certificate to AES Key (Advanced Encryption Standard) encryption, or instant encryption of audio and video to achieve copyright protection of digital content.
  • AES Key Advanced Encryption Standard
  • the method for encrypting audio and video includes the following steps:
  • the client and the server authenticate each other.
  • the client obtains the index file from the server and parses it.
  • the client obtains the encrypted AES key from the server, decrypts the encrypted AES key, and decrypts the pre-encrypted audio video obtained from the server by using the decrypted AES key and plays the same;
  • the client obtains real-time encrypted audio and video from the server and decrypts the play.
  • the identity verification between the client and the server is mainly to verify whether both parties are legal by verifying the device certificate and the vendor certificate (both in the X.509 format). And these certificates are set before leaving the factory, and before the step 100, the certificate generation process is further included, specifically:
  • the CA Certification Center issues a signature certificate to the equipment manufacturer.
  • the equipment manufacturer When the equipment manufacturer produces the equipment, the equipment manufacturer assigns the public key, private key and The mac address, and each device is signed with a vendor private key to generate a device certificate.
  • the device certificate contains information such as the mac address, public key, and expiration date of the device.
  • CA root public key that is, the root public key of the CA certificate authority
  • vendor certificate the vendor certificate
  • device certificate the device's public key
  • private key the private key
  • the operator can configure the rights of the audio and video program sources of different clients according to the device certificate and the mac address, and use the mac address and the device certificate as the identity of the client device.
  • a strict certificate management chain ensures the security of the entire system.
  • the step 100 specifically includes:
  • Step 101 When the client is powered on, the CA root public key is used to verify the vendor certificate, and the vendor certificate is used to check whether the device certificate is legal. If the device certificate is legal, the device certificate is sent to the server.
  • the client is specifically a device, which can be a set top box, a mobile phone, a computer, a tablet, and the like.
  • the device certificate includes summary information such as the device manufacturer, validity period, mac address (physical address), and public key.
  • the client verifies the identity authenticity by verifying the device certificate.
  • Step 102 The server verifies whether the device certificate sent by the client is legal. If the device certificate is legal, the authentication success message is returned to the client.
  • the server verifies whether the device certificate sent by the client is legal, and refers to comparing a mac address in the device certificate with a mac address actually communicating, that is, a mac address used when a communication connection between the client and the server is used. Whether it is the same or not, if the mac address in the device certificate is the same as the mac address of the actual communication, the device certificate is legal; if the mac address in the device certificate is different from the actual communication mac address, then The device certificate is invalid.
  • Step 103 The client verifies that the server certificate is legal. If the certificate is legal, Then, the authentication is passed, and step 200 is performed.
  • the device certificate or the manufacturer certificate is invalid on the client.
  • the device certificate is invalid on the server and the authentication failure message is returned.
  • the client requests an index file (ie, an M3U8 file) from the server, and the server returns a corresponding index file after the response, and the client parses the index file to find the slice at the current network speed. (ie the corresponding audio and video data).
  • an index file ie, an M3U8 file
  • step 300 is replaced by step 301 to step 305.
  • Steps 301 to 305 are specifically:
  • Step 301 The client requests an AES key from the server.
  • Step 302 The server checks the rights of the client and encrypts the AES key, and when the client has the permission, returns the encrypted AES key.
  • the permission here is to check if the client has purchased the relevant video playback permission package.
  • the server authenticates in step 100, it receives a device certificate from the client.
  • the server encrypts the AES key with the public key in the device certificate.
  • Step 303 The client decrypts the encrypted AES key with a private key, and requests audio and video from the server according to the index file.
  • the private key of the client corresponds to the public key, so the AES key encrypted with the public key can be decrypted by the private key. Because the private and public keys of different clients are not Similarly, the encrypted AES keys generated by the server are also different, and correspond to the client one-to-one. Different clients have different AES keys, and there are differences between the clients, which can solve the problem that different clients in the prior art use the same key for decryption and playback, resulting in lower security.
  • Step 304 The server verifies whether the rights of the client are legal. If the rights of the client are legal, the pre-encrypted audio and video is returned to the client.
  • Step 305 The client decrypts the pre-encrypted audio and video with the decrypted AES key and plays.
  • Checking the user right here determines whether the client has the right to play the audio and video, that is, whether the mac address actually communicated with the server by the client matches the mac address in the device certificate received by the server.
  • the matching has the right to return the pre-encrypted audio and video data (that is, the slice found according to the index file) to the client, and the client can play the decrypted audio and video after decrypting.
  • Audio and video data is encrypted by the server in advance with AES-128. If there is no match and no rights, other client-side piracy may occur, and the client will display no signal.
  • step 300 is replaced by step 310 to step 330.
  • Steps 310 to 330 are specifically:
  • Step 310 The client requests audio and video from the server according to the index file.
  • Step 320 The server verifies whether the rights of the client are legal. If the rights of the client are legal, the audio and video are encrypted by using the public key of the client.
  • the server receives the device certificate of the client in step 100, and the device certificate has the public key of the client.
  • the server encrypts the audio and video (ie, the corresponding slice) that needs to be played in combination with the client's public key and the existing audio and video encryption algorithm.
  • Step 330 The server returns the encrypted audio and video to the client, and the client decrypts and plays the encrypted audio and video with a private key.
  • the client decryption is decrypted according to its own private key and the existing audio and video encryption algorithm.
  • the AES key encryption method returns pre-encrypted audio and video, it saves the real-time encryption time of audio and video, so it is suitable for the case of large data volume.
  • the audio and video encryption method requires current real-time encryption, and it takes a certain encryption time. In order to avoid excessive audio and video buffering time, it is suitable for the case where the requested data amount is small.
  • the AES key encryption method needs to first detect whether the user has the right to request audio and video according to the mac address, and has the authority to encrypt the AES key.
  • the audio and video encryption method does not require the AES key to directly encrypt the audio and video with the public key of the device.
  • AES key encryption mode encryption and decryption of pre-encrypted audio and video is prior art.
  • the server encrypts the audio and video with the public key of the client, and the client decrypts using the private key. This is because the encrypted stream received by the client is different, so the security is enhanced by the client's private key (unique) decryption, and other clients cannot decrypt the playback even if the audio and video are intercepted.
  • the present disclosure further provides an encrypted playback system for audio and video, as shown in FIG. 8, including a client 10 and a server 20.
  • the client 10 and the server 20 authenticate each other; if the authentication passes, the client obtains an index file from the server and parses it.
  • the client obtains the encrypted AES key from the server and encrypts the The AES key is decrypted, and the pre-encrypted audio obtained from the server is decrypted and played by the decrypted AES key; or the client obtains the real-time encrypted audio and video from the server and decrypts the play.
  • the present disclosure also provides a non-transitory computer readable storage medium storing computer executable instructions arranged to perform the method of any of the above embodiments.
  • the present disclosure also provides a hardware structure diagram of an electronic device.
  • the electronic device can perform the method steps provided by the above method embodiments.
  • the electronic device (such as a stereo or a computer) includes:
  • At least one processor 60 which is exemplified by a processor 60 in FIG. 9; a display 61; and a memory 62, which may further include a communication interface 63 and a bus 64.
  • the processor 60, the display screen 61, the memory 62, and the communication interface 63 can complete communication with each other through the bus 64.
  • the display screen 61 is set to display a user guidance interface preset in the initial setting mode.
  • Communication interface 63 can transmit information.
  • Processor 60 may invoke logic instructions in memory 62 to perform the methods in the above-described embodiments.
  • logic instructions in the memory 62 described above may be implemented in the form of a software functional unit and sold or used as a stand-alone product, and may be stored in a computer readable storage medium.
  • the memory 62 is a computer readable storage medium, and can be configured to store a software program, a computer executable program, a program instruction or a module corresponding to the method in the embodiment of the present disclosure.
  • the processor 60 executes the functional applications and data processing by executing software programs, instructions or modules stored in the memory 62, i.e., implements the methods of the above-described embodiments.
  • the memory 62 may include a storage program area and a storage data area, wherein the program area is stored
  • the operating system, an application required for at least one function may be stored; the storage data area may store data created according to the use of the terminal device, and the like.
  • the memory 62 may include a high speed random access memory, and may also include a nonvolatile memory.
  • All or part of the steps of the above embodiments may be completed by hardware, or may be executed by a program to execute related hardware.
  • the program may be stored in a computer readable storage medium, and the storage medium may be a non-transitory storage medium, including a USB flash drive.
  • the audio and video encryption playing method and system thereof provided by the present disclosure are different from the common HLS protocol, and the client first uses the device certificate and the mac address as the identity to identify the identity. You can apply for audio and video after you have legal status. When you need to play, you need to obtain the encrypted AES key and decrypt it through the device's private key, and then apply for the audio and video to be played. Or use the client's public key to encrypt the audio and video after feedback; because the private key is Unique to each client to improve security.
  • the device's public key is used to encrypt the data transmission process, and the actual communication mac address is compared with the mac address in the device certificate to verify the permissions, ensuring that the communication process is protected and will not be intercepted.
  • the device certificate and mac address are different based on each client, which can better prevent other devices from cloning audio and video data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

本公开涉及一种音视频的加密播放方法及其系统,所述音视频的加密播放方法包括:客户端与服务器之间相互进行身份验证;若身份验证通过时,客户端从服务器获取索引文件并解析;客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放;或者,客户端从服务器获取实时加密的音视频并解密播放。

Description

音视频的加密播放方法及其系统 技术领域
本公开涉及音视频技术领域,例如涉及一种音视频的加密播放方法及其系统。
背景技术
随着互联网的普及和网络带宽的增加,越来越多人选择通过网络观看视频节目,享受网络带来的便利。美国苹果公司推出了HTTP(Hypertext transfer protocol,超文本传送协议)音视频数据下载HLS(HTTP Live Streaming,Apple的动态码率自适应技术)协议,使用户能根据当前网络带宽,实时自动选择不同分辨率的码流,保证可以流畅地观看音视频。
HLS协议里提供了AES-128(一种加密算法)音视频码流数据加密方法。服务器前端将同一内容不同分辨率的视频源(码流),分别切割为5~10秒的切片,然后生成M3U8切片索引文件。如图1所示的M3U8索引关系不同的网速带宽对应不同的分辨率,分为不同的切片。如中(Mid)速对应4兆带宽和标清的切片(如Mid_01.ts~Mid_03.ts,实际上有多个,即Mid_0n.ts,n为正整数,此处以3个为例)。Low_01.ts~Low_03.ts表示低速对应的切片,High_01.ts~High_03.ts表示高速对应的切片。之后用AES-128(AES-The Advanced Encryption Standard,是美国国家标准与技术研究所用于加密电子数据的规范)的key对切片加密,把加密后的切片和明文的key同时发布到HTTP或HTTPS(Hyper Text Transfer Protocol over Secure Socket Layer)服 务器上。
HLS客户端先找到主索引(index)文件URL,下载并解析,通过解析后M3U8索引文件,不同带宽与码流切片对应关系,然后根据客户端的带宽选择对应的切片文件并下载对应AES-128的Key(密钥)进行解密播放。
近年来,国家越来越重视音视频数字版本的保护,保障音视频发行方的权益,维护市场的健康发展,随之带来的是传播过程的音频数据保护需求。而上述现有的音视频播放方式只能对传播过程进行简单保护,其存在以下缺点:
1、不能保护HLS音视频数字版权。因为是遵循标准的HLS协议,所以支持AES-128解密的客户端都可以拿到解密的key后进行解密播放。
2、安全级别不够高。HLS客户端个体之间通讯过程没有差异。客户端请求的都是同一加密视频源和相同的解密key,不同客户端可以用相同的key进行解密播放。
3、通讯过程不能识别个体差异,不能针对客户端进行不同内容权限的配置。
因此,现有技术还有待于改进和发展。
发明内容
鉴于上述现有技术的不足之处,本公开的目的在于提供一种音视频的加密播放方法及其系统,以解决现有HLS协议不能保护HLS音视频数字版权、安全级别较低、不能识别个体差异的技术问题。
为了达到上述目的,本公开采取了以下技术方案:
一种音视频的加密播放方法,包括:
客户端与服务器之间相互进行身份验证;
若身份验证通过时,客户端从服务器获取索引文件并解析;
客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放;
或者,客户端从服务器获取实时加密的音视频并解密播放。
可选的,所述客户端与服务器之间相互进行身份验证的步骤具体包括:
客户端开机时用CA root公钥校验厂商证书,用所述厂商证书检查自身的设备证书是否合法,若所述设备证书合法时,发送所述设备证书给服务器;
服务器校验所述客户端发送的所述设备证书是否合法,若所述设备证书合法时,返回认证成功消息给客户端。
可选的,所述服务器校验所述客户端发送的所述设备证书是否合法,是指通过比较所述设备证书里的mac地址与实际通讯的mac地址是否相同来判断,若所述设备证书里的mac地址与实际通讯的mac地址相同,则所述设备证书合法;若所述设备证书里的mac地址与实际通讯的mac地址不相同,则所述设备证书不合法。
可选的,所述客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放的步骤具体包括:
所述客户端向所述服务器请求AES key;
所述服务器检查所述客户端的权限并对AES key加密,在所述客户端有权限时,返回加密的AES key;
所述客户端用私钥对所述加密的AES key进行解密,并根据索引文件向所述服务器请求音视频;
所述服务器校验所述客户端的权限是否合法,若所述客户端的权限合法,则返回预加密的音视频给客户端;
所述客户端用所述解密的AES key解密所述预加密的音视频并播放。
可选的,所述服务器对AES key加密,是指所述服务器结合所述客户端的所述设备证书里的公钥对AES key进行加密。
可选的,所述客户端从服务器获取实时加密的音视频并解密播放的步骤具体包括:
客户端根据索引文件向服务器请求音视频;
服务器校验所述客户端的权限是否合法,若所述客户端的权限合法,则用所述客户端的公钥加密音视频;
服务器返回加密的音视频给所述客户端,客户端用私钥对所述加密的音视频进行解密播放。
可选的,所述服务器校验所述客户端的权限是否合法,是指所述客户端与服务器通讯的mac地址与服务器收到的所述设备证书里的mac地址是否匹配,若所述设备证书里的mac地址与所述通讯的mac地址相同,则所述客户端的权限合法;若所述设备证书里的mac地址与所述通讯的mac地址不相同,则所述客户端的权限不合法。
一种用于实现如上所述的音视频的加密播放方法的加密播放系统,包括客户端和服务器;
所述客户端与服务器之间相互进行身份验证;若身份验证通过时,客户端从服务器获取索引文件并解析;
客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放;或者,客户端从服务器获取实时加密的音视频并解密播放。
可选的,所述客户端与服务器之间相互进行身份验证的步骤具体包括:
客户端开机时用CA root公钥校验厂商证书,用所述厂商证书检查自身的设备证书是否合法,若所述设备证书合法时,发送所述设备证书给服务器;
服务器校验所述客户端发送的所述设备证书是否合法,若所述设备证书合法时,返回认证成功消息给客户端。
可选的,所述服务器校验所述客户端发送的所述设备证书是否合法,是指通过比较所述设备证书里的mac地址与实际通讯的mac地址是否相同来判断,若所述设备证书里的mac地址与实际通讯的mac地址相同,则所述设备证书合法;若所述设备证书里的mac地址与实际通讯的mac地址不相同,则所述设备证书不合法。
可选的,所述客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放的步骤具体包括:
所述客户端向所述服务器请求AES key;
所述服务器检查所述客户端的权限并对AES key加密,在所述客户端有权限时,返回加密的AES key;
所述客户端用私钥对所述加密的AES key进行解密,并根据索引文件向所述服务器请求音视频;
所述服务器校验所述客户端的权限是否合法,若所述客户端的权 限合法,则返回预加密的音视频给客户端;所述客户端用所述解密的AES key解密所述预加密的音视频并播放。
可选的,所述服务器对AES key加密,是指所述服务器结合所述客户端的所述设备证书里的公钥对AES key进行加密。
可选的,所述客户端从服务器获取实时加密的音视频并解密播放的步骤具体包括:
客户端根据索引文件向服务器请求音视频;
服务器校验所述客户端的权限是否合法,若所述客户端的权限合法,则用所述客户端的公钥加密音视频;
服务器返回加密的音视频给所述客户端,客户端用私钥对所述加密的音视频进行解密播放。
可选的,所述服务器校验所述客户端的权限是否合法,是指所述客户端与服务器通讯的mac地址与服务器收到的所述设备证书里的mac地址是否匹配,若所述设备证书里的mac地址与所述通讯的mac地址相同,则所述客户端的权限合法;若所述设备证书里的mac地址与所述通讯的mac地址不相同,则所述客户端的权限不合法。
一种非暂态计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行如上任一项的方法。
一种电子设备,包括:
至少一个处理器;以及
与所述至少一个处理器通信连接的存储器;其中,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器执行如上任一项的方法。
相较于现有技术,本公开提供的一种音视频的加密播放方法及其系统,所述音视频的加密播放方法包括:客户端与服务器之间相互进行身份验证;若身份验证通过时,客户端从服务器获取索引文件并解析;客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放;或者,客户端从服务器获取实时加密的音视频并解密播放。通过身份验证能识别出客户端的个体差异,通过对AES key加解密,或对音视频加解密来实现数字内容的版权保护,提高了安全性,从而解决了现有HLS协议不能保护HLS音视频数字版权、安全级别较低、不能识别个体差异的技术问题。
附图说明
为了清楚地说明本公开实施例中的技术方案,下面将对本公开实施例描述中使用的附图进行介绍。
图1是现有的M3U8索引文件的关系示意图;
图2是本公开音视频的加密播放方法实施例一的流程示意图;
图3是本公开音视频的加密播放方法实施例二的部分流程示意图;
图4是本公开音视频的加密播放方法实施例三的部分流程示意图;
图5是本公开音视频的加密播放方法实施例三的时序示意图;
图6是本公开音视频的加密播放方法实施例四的部分流程示意图;
图7是本公开音视频的加密播放方法实施例四的时序示意图;
图8是本公开音视频的加密播放系统的结构框图;以及
图9为本公开的电子设备的硬件结构示意图。
具体实施方式
本公开提供了一种音视频的加密播放方法及其系统,针对音视频从前端配置到客户端播放的音视频保护问题,基于HLS协议,通过身份认证、用客户端的设备证书的公钥对AES key(Advanced Encryption Standard,高级加密标准)加密、或对音视频即时加密来实现数字内容的版权保护。为使本公开的目的、技术方案及优点更加清楚、明确,以下参照附图并举实施例对本公开进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本公开,并不用于限定本公开。
实施例一
请参阅图2,本公开提供的音视频的加密播放方法包括以下步骤:
100、客户端与服务器之间相互进行身份验证。
200、若身份验证通过时,客户端从服务器获取索引文件并解析。
300、客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放;
或者,客户端从服务器获取实时加密的音视频并解密播放。
本实施例中,客户端与服务器之间进行的身份验证,主要是通过校验设备证书和厂商证书(均是X.509格式的证书)来验证双方是否都合法。而这些证书是在出厂前设置的,则在所述步骤100之前,还包括证书生成过程,具体为:
A01、CA认证中心给设备厂商颁发签名证书。
A02、设备厂商生产设备时,设备厂商给设备分配公钥,私钥和 mac地址,并用厂商私钥给每台设备签名生成设备证书。所述设备证书里包含了设备最终使用的mac地址,公钥,有效期等信息。
A03、设备在出货(以及工作)时,应该携带CA root公钥(即CA认证中心的根公钥)、厂商证书、设备证书、设备的公钥和私钥。
这样运营商可以根据设备证书和mac地址配置不同客户端的音视频节目源的权限,以mac址址和设备证书作为客户端设备的身份标识。具有严格的证书管理链,能保证整个系统的安全。
实施例二
如图3所示,所述步骤100具体包括:
步骤101、客户端开机时用CA root公钥校验厂商证书,用所述厂商证书检查自身的设备证书是否合法,若所述设备证书合法时,发送所述设备证书给服务器。
客户端具体为一设备,可以为机顶盒、手机、电脑、平板等。所述设备证书包括设备厂商,有效期,mac址址(物理地址)和公钥等摘要信息。客户端通过校验该设备证书,从而来验证其身份真实性。
步骤102、服务器校验所述客户端发送的所述设备证书是否合法,若所述设备证书合法时,返回认证成功消息给客户端。
所述服务器校验所述客户端发送的所述设备证书是否合法,是指通过比较所述设备证书里的mac地址与实际通讯的mac地址即客户端与服务器之间通讯连接时使用的mac地址)是否相同来判断,若所述设备证书里的mac地址与实际通讯的mac地址相同,则所述设备证书合法;若所述设备证书里的mac地址与实际通讯的mac地址不相同,则所述设备证书不合法。
步骤103、客户端校验服务器证书是否合法,若所述证书合法时, 则身份验证通过,执行步骤200。
上述校验中,若出现不合法,则直接在客户端上提示设备证书或厂商证书不合法,在服务器上提示设备证书不合法并返回认证失败消息。通过双方的身份验证,通讯过程中能识别出客户端的个体差异,针对不同的客户端、服务器可进行不同的内容权限配置,从而可加强对客户端的控制和提高通讯安全。
在需要播放音视频时,在所述步骤200中,客户端向服务器请求索引文件(即M3U8文件),服务器响应后返回对应的索引文件,客户端解析该索引文件以找到当前网速下的切片(即相应的音视频数据)。
实施例三
请同时参阅图4和图5,本实施例与实施例一的流程基本相同,不同的是,将步骤300替换为步骤301至步骤步骤305,步骤301至步骤305具体为:
步骤301、所述客户端向所述服务器请求AES key。
步骤302、所述服务器检查所述客户端的权限并对AES key加密,在所述客户端有权限时,返回加密的AES key。
此处的权限是检查该客户端是否有购买相关视频播放权限套餐。服务器在步骤100中进行身份验证时,有收到客户端的设备证书。服务器结合设备证书里的公钥对AES key进行加密。
步骤303、所述客户端用私钥对所述加密的AES key进行解密,并根据索引文件向所述服务器请求音视频。
客户端的私钥(private key)和公钥是相对应的,因此用该公钥加密的AES key可以通过私钥解密。由于不同客户端的私钥和公钥不 同,服务器生成的加密的AES key也各不相同,且与客户端一一对应。不同的客户端有不同的AES key,客户端之间存在差异,就能解决现有技术中不同客户端用相同的key进行解密播放导致安全性较低的问题。
步骤304、所述服务器校验所述客户端的权限是否合法,若所述客户端的权限合法,则返回预加密的音视频给客户端。
步骤305、所述客户端用所述解密的AES key解密所述预加密的音视频并播放。
此处校验用户权限即判断该客户端是否有权限播放该音视频,即客户端实际与服务器通讯的mac地址与服务器收到的设备证书里的mac地址是否匹配。匹配则有权限,将已经预先加密好的音视频数据(即根据索引文件查找出的切片)返回给客户端,客户端对预加密音视频进行解密后即可播放。音视频数据的是服务器提前用AES-128加密。不匹配无权,可能出现其他客户端盗用的情况,则不返回,客户端显示无信号。
实施例四
请同时参阅图6和图7,本实施例与实施例一的流程基本相同,不同的是,将步骤300替换为步骤310至步骤步骤330,步骤310至步骤330具体为:
步骤310、客户端根据索引文件向服务器请求音视频。
步骤320、服务器校验所述客户端的权限是否合法,若所述客户端的权限合法,则用所述客户端的公钥加密音视频。
校验用户权限是否合法,是判断客户端实际与服务器通讯的mac地址与服务器收到的设备证书里的mac地址是否匹配。匹配就合法, 不匹配就不合法。服务器在步骤100中有收到客户端的设备证书,设备证书里有客户端的公钥。服务器结合客户端的公钥和现有的音视频加密算法对需要播放的音视频(即对应的切片)加密。
步骤330、服务器返回加密的音视频给所述客户端,客户端用私钥对所述加密的音视频进行解密播放。
客户端解密是根据自身的私钥和现有的音视频加密算法即可解密。
图5所示与图7所示的加密方式的区别在于:
1、由于AES key加密方式返回的是预加密音视频,节省了音视频实时加密时间,因此适用于数据量大的情况。音视频加密方式需要当前实时加密,需花费一定的加密时间,为避免出现音视频缓冲时间过长,因此适用于请求数据量较小的情况。
2、AES key加密方式需要先根据mac地址来检测用户是否有请求音视频的权限,有权限才能进行加密AES key。音视频加密方式不用请求AES key,直接用设备的公钥对音视频进行加密。
3、AES key加密方式中,预加密音视频的加解密为现有技术。而音视频加密方式中,服务器用客户端的公钥对音视频加密,客户端使用私钥解密。这是因为客户端接收到的加密流是不一样的,因此通过客户端的私钥(唯一的)解密来提高安全性,其他客户端即使截获该音视频也无法解密播放。
基于上述实施例,本公开还提供一种音视频的加密播放系统,如图8所示,包括客户端10和服务器20。所述客户端10与服务器20之间相互进行身份验证;若身份验证通过时,客户端从服务器获取索引文件并解析。客户端从服务器获取加密的AES key,并对所述加密 的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放;或者,客户端从服务器获取实时加密的音视频并解密播放。
本公开还提供了一种非暂态计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述任一实施例中的方法。
本公开还提供了一种电子设备的硬件结构示意图。该电子设备可以执行上述方法实施例提供的方法步骤。如图9所示,该电子设备(如音响或电脑等)包括:
至少一个处理器(processor)60,图9中以一个处理器60为例;显示屏61;以及存储器(memory)62,还可以包括通信接口(Communications Interface)63和总线64。其中,处理器60、显示屏61、存储器62和通信接口63可以通过总线64完成相互间的通信。显示屏61设置为显示初始设置模式中预设的用户引导界面。通信接口63可以传输信息。处理器60可以调用存储器62中的逻辑指令,以执行上述实施例中的方法。
此外,上述的存储器62中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。
存储器62作为一种计算机可读存储介质,可设置为存储软件程序、计算机可执行程序,如本公开实施例中的方法对应的程序指令或模块。处理器60通过运行存储在存储器62中的软件程序、指令或模块,从而执行功能应用以及数据处理,即实现上述实施例中的方法。
存储器62可包括存储程序区和存储数据区,其中,存储程序区 可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据终端设备的使用所创建的数据等。此外,存储器62可以包括高速随机存取存储器,还可以包括非易失性存储器。
上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,该程序可以存储于一计算机可读存储介质中,存储介质可以是非暂态存储介质,包括U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁盘或光盘等等多种可以存储程序代码的介质,也可以是暂态存储介质。
综上所述,本公开所提供的一种音视频的加密播放方法及其系统,区别于普通的HLS协议,客户端先利用设备证书和mac地址作为身份标识进行身份识别。身份合法后才能申请播放音视频。需要播放时采用先获取加密的AES key并通过设备的私钥才能正确解密,之后再申请需要播放的音视频的方式;或直接使用客户端的公钥加密音视频后反馈的方式;由于私钥是各客户端独有的,可提高安全性。服务器传输数据时使用设备的公钥对数据传输过程加密,还将实际通讯的mac地址与设备证书里的mac地址进行比较来校验权限,保证通讯过程是受保护且不会被拦截。基于各客户端的设备证书和mac地址都不一样,能较好地防止其他设备克隆音视频数据。
应当理解的是,本公开的应用不限于上述的举例,对本领域普通技术人员来说,可以根据上述说明加以改进或变换,所有这些改进和变换都应属于本公开所附权利要求的保护范围。

Claims (16)

  1. 一种音视频的加密播放方法,包括:
    客户端与服务器之间相互进行身份验证;
    若身份验证通过时,客户端从服务器获取索引文件并解析;
    客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放;
    或者,客户端从服务器获取实时加密的音视频并解密播放。
  2. 根据权利要求1所述的音视频的加密播放方法,其中,所述客户端与服务器之间相互进行身份验证的步骤具体包括:
    客户端开机时用CA root公钥校验厂商证书,用所述厂商证书检查自身的设备证书是否合法,若所述设备证书合法时,发送所述设备证书给服务器;
    服务器校验所述客户端发送的所述设备证书是否合法,若所述设备证书合法时,返回认证成功消息给客户端。
  3. 根据权利要求2所述的音视频的加密播放方法,其中,所述服务器校验所述客户端发送的所述设备证书是否合法,是指通过比较所述设备证书里的mac地址与实际通讯的mac地址是否相同来判断,若所述设备证书里的mac地址与实际通讯的mac地址相同,则所述设备证书合法;若所述设备证书里的mac地址与实际通讯的mac地址不相同,则所述设备证书不合法。
  4. 根据权利要求1所述的音视频的加密播放方法,其中,所述客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放的步骤具体包括:
    所述客户端向所述服务器请求AES key;
    所述服务器检查所述客户端的权限并对AES key加密,在所述客户端有权限时,返回加密的AES key;
    所述客户端用私钥对所述加密的AES key进行解密,并根据索引文件向所述服务器请求音视频;
    所述服务器校验所述客户端的权限是否合法,若所述客户端的权限合法,则返回预加密的音视频给客户端;
    所述客户端用所述解密的AES key解密所述预加密的音视频并播放。
  5. 根据权利要求4所述的音视频的加密播放方法,其中,所述服务器对AES key加密,是指所述服务器结合所述客户端的所述设备证书里的公钥对AES key进行加密。
  6. 根据权利要求2所述的音视频的加密播放方法,其中,所述客户端从服务器获取实时加密的音视频并解密播放的步骤具体包括:
    客户端根据索引文件向服务器请求音视频;
    服务器校验所述客户端的权限是否合法,若所述客户端的权限合法,则用所述客户端的公钥加密音视频;
    服务器返回加密的音视频给所述客户端,客户端用私钥对所述加密的音视频进行解密播放。
  7. 根据权利要求6所述的音视频的加密播放方法,其中,所述服务器校验所述客户端的权限是否合法,是指所述客户端与服务器通讯的mac地址与服务器收到的所述设备证书里的mac地址是否匹配,若所述设备证书里的mac地址与所述通讯的mac地址相同,则所述客户端的权限合法;若所述设备证书里的mac地址与所述通讯的mac 地址不相同,则所述客户端的权限不合法。
  8. 一种用于实现权利要求1所述的音视频的加密播放方法的加密播放系统,包括客户端和服务器;
    所述客户端与服务器之间相互进行身份验证;若身份验证通过时,客户端从服务器获取索引文件并解析;
    客户端从服务器获取加密的AES key,并对所述加密的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放;或者,客户端从服务器获取实时加密的音视频并解密播放。
  9. 根据权利要求8所述的音视频的加密播放方法的加密播放系统,其中,所述客户端与服务器之间相互进行身份验证的步骤具体包括:
    客户端开机时用CA root公钥校验厂商证书,用所述厂商证书检查自身的设备证书是否合法,若所述设备证书合法时,发送所述设备证书给服务器;
    服务器校验所述客户端发送的所述设备证书是否合法,若所述设备证书合法时,返回认证成功消息给客户端。
  10. 根据权利要求9所述的音视频的加密播放方法的加密播放系统,其中,所述服务器校验所述客户端发送的所述设备证书是否合法,是指通过比较所述设备证书里的mac地址与实际通讯的mac地址是否相同来判断,若所述设备证书里的mac地址与实际通讯的mac地址相同,则所述设备证书合法;若所述设备证书里的mac地址与实际通讯的mac地址不相同,则所述设备证书不合法。
  11. 根据权利要求8所述的音视频的加密播放方法的加密播放系统,其中,所述客户端从服务器获取加密的AES key,并对所述加密 的AES key进行解密,用解密的AES key解密从服务器获取的预加密音视频并播放的步骤具体包括:
    所述客户端向所述服务器请求AES key;
    所述服务器检查所述客户端的权限并对AES key加密,在所述客户端有权限时,返回加密的AES key;
    所述客户端用私钥对所述加密的AES key进行解密,并根据索引文件向所述服务器请求音视频;
    所述服务器校验所述客户端的权限是否合法,若所述客户端的权限合法,则返回预加密的音视频给客户端;所述客户端用所述解密的AES key解密所述预加密的音视频并播放。
  12. 根据权利要求11所述的音视频的加密播放方法的加密播放系统,其中,所述服务器对AES key加密,是指所述服务器结合所述客户端的所述设备证书里的公钥对AES key进行加密。
  13. 根据权利要求8所述的音视频的加密播放方法的加密播放系统,其中,所述客户端从服务器获取实时加密的音视频并解密播放的步骤具体包括:
    客户端根据索引文件向服务器请求音视频;
    服务器校验所述客户端的权限是否合法,若所述客户端的权限合法,则用所述客户端的公钥加密音视频;
    服务器返回加密的音视频给所述客户端,客户端用私钥对所述加密的音视频进行解密播放。
  14. 根据权利要求8所述的音视频的加密播放方法的加密播放系统,其中,所述服务器校验所述客户端的权限是否合法,是指所述客户端与服务器通讯的mac地址与服务器收到的所述设备证书里的 mac地址是否匹配,若所述设备证书里的mac地址与所述通讯的mac地址相同,则所述客户端的权限合法;若所述设备证书里的mac地址与所述通讯的mac地址不相同,则所述客户端的权限不合法。
  15. 一种非暂态计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行权利要求1-7中任一项的方法。
  16. 一种电子设备,包括:
    至少一个处理器;以及
    与所述至少一个处理器通信连接的存储器;其中,
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器执行权利要求1-7中任一项的方法。
PCT/CN2017/087637 2016-06-14 2017-06-09 音视频的加密播放方法及其系统 WO2017215514A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610413357.1 2016-06-14
CN201610413357.1A CN105939484B (zh) 2016-06-14 2016-06-14 一种音视频的加密播放方法及其系统

Publications (1)

Publication Number Publication Date
WO2017215514A1 true WO2017215514A1 (zh) 2017-12-21

Family

ID=57152437

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/087637 WO2017215514A1 (zh) 2016-06-14 2017-06-09 音视频的加密播放方法及其系统

Country Status (2)

Country Link
CN (1) CN105939484B (zh)
WO (1) WO2017215514A1 (zh)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113810778A (zh) * 2021-10-21 2021-12-17 深圳Tcl新技术有限公司 监控视频处理方法、装置、存储介质及电子设备
CN113923482A (zh) * 2021-09-02 2022-01-11 北京奇艺世纪科技有限公司 一种视频播放方法、系统、电子设备及存储介质
CN114679608A (zh) * 2022-04-11 2022-06-28 武汉博晟安全技术股份有限公司 Vr视频加密播放方法、服务器、用户端和系统
CN117241067A (zh) * 2023-11-15 2023-12-15 华录出版传媒有限公司 一种基于指纹水印的视频安全调阅方法及系统

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105939484B (zh) * 2016-06-14 2019-02-26 深圳创维数字技术有限公司 一种音视频的加密播放方法及其系统
CN106603738A (zh) * 2016-11-23 2017-04-26 济南中维世纪科技有限公司 一种监控设备防止区域串货的方法
CN106936815A (zh) * 2017-02-06 2017-07-07 北京音未文化传媒有限责任公司 一种基于加密音频流的文件传输系统及其方法
CN106993201A (zh) * 2017-03-17 2017-07-28 武汉斗鱼网络科技有限公司 视频播放的权限校验方法及装置
CN109698935A (zh) * 2017-10-24 2019-04-30 中国移动通信有限公司研究院 监控视频加密解密方法及装置、设备、存储介质、系统
CN110139131A (zh) * 2018-02-09 2019-08-16 网宿科技股份有限公司 一种播放视频文件的方法和终端
CN110138716B (zh) * 2018-02-09 2020-11-27 网宿科技股份有限公司 一种密钥的提供、视频播放方法、服务器及客户端
CN108924596B (zh) * 2018-08-28 2020-11-13 苏州科达科技股份有限公司 媒体数据传输方法、装置及存储介质
CN110446075A (zh) * 2019-08-14 2019-11-12 杭州安恒信息技术股份有限公司 加密方法及装置、解密方法及装置、电子设备
CN111143793B (zh) * 2019-12-13 2021-05-28 支付宝(杭州)信息技术有限公司 访问控制方法和访问控制装置
CN111818365A (zh) * 2020-06-19 2020-10-23 华新(北京)网络科技有限公司 一种基于sm系列国密算法的视频安全传输的方法
CN114501069B (zh) * 2020-11-13 2024-06-07 北京新氧科技有限公司 基于hls的多媒体播放方法、系统、设备及存储介质
CN114143576B (zh) * 2021-11-26 2024-04-09 广东爱视文化发展有限公司 一种音视频加密保护点播方法、装置及电子设备
CN114157912B (zh) * 2021-11-26 2024-08-23 瑞森网安(福建)信息科技有限公司 一种云视频播放方法及其在影像投屏中的应用
CN114007106B (zh) * 2021-12-15 2023-11-10 创盛视联数码科技(北京)有限公司 一种h5视频加密播放方法
CN115834926B (zh) * 2022-11-21 2023-11-21 深圳市超时代软件有限公司 基于h.265熵编码二值化的视频加密方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7231516B1 (en) * 2002-04-11 2007-06-12 General Instrument Corporation Networked digital video recording system with copy protection and random access playback
CN101127764A (zh) * 2007-09-11 2008-02-20 神州亿品科技有限公司 实现音视频安全播放的方法、认证模块及系统
CN102333236A (zh) * 2011-10-27 2012-01-25 中国华录集团有限公司 视频内容的加解密系统
CN104298896A (zh) * 2014-09-30 2015-01-21 广州星汇文化发展有限公司 数字版权保护与分发方法及系统
US20150150038A1 (en) * 2013-11-22 2015-05-28 Verizon Patent And Licensing Inc. Video content protection
CN105939484A (zh) * 2016-06-14 2016-09-14 深圳创维数字技术有限公司 一种音视频的加密播放方法及其系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100551056C (zh) * 2008-06-06 2009-10-14 南京邮电大学 基于高级加密标准的视频加密方法
CN101459826B (zh) * 2008-12-30 2010-12-01 青岛华威视通数字传媒有限公司 一种视频点播系统的版权保护方法
CN102186101B (zh) * 2011-04-18 2013-07-31 青岛海大新星计算机工程中心 一种数字家庭视频及服务资源保护方法
CN103873243B (zh) * 2012-12-12 2018-06-15 腾讯科技(北京)有限公司 实现数据安全传输的方法、系统、服务器和终端
CN103731679B (zh) * 2013-12-30 2017-05-24 世纪龙信息网络有限责任公司 移动视频播放系统及其实现方法
CN104144160A (zh) * 2014-07-08 2014-11-12 北京彩云动力教育科技有限公司 一种在线视频资源防下载方法及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7231516B1 (en) * 2002-04-11 2007-06-12 General Instrument Corporation Networked digital video recording system with copy protection and random access playback
CN101127764A (zh) * 2007-09-11 2008-02-20 神州亿品科技有限公司 实现音视频安全播放的方法、认证模块及系统
CN102333236A (zh) * 2011-10-27 2012-01-25 中国华录集团有限公司 视频内容的加解密系统
US20150150038A1 (en) * 2013-11-22 2015-05-28 Verizon Patent And Licensing Inc. Video content protection
CN104298896A (zh) * 2014-09-30 2015-01-21 广州星汇文化发展有限公司 数字版权保护与分发方法及系统
CN105939484A (zh) * 2016-06-14 2016-09-14 深圳创维数字技术有限公司 一种音视频的加密播放方法及其系统

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113923482A (zh) * 2021-09-02 2022-01-11 北京奇艺世纪科技有限公司 一种视频播放方法、系统、电子设备及存储介质
CN113810778A (zh) * 2021-10-21 2021-12-17 深圳Tcl新技术有限公司 监控视频处理方法、装置、存储介质及电子设备
CN114679608A (zh) * 2022-04-11 2022-06-28 武汉博晟安全技术股份有限公司 Vr视频加密播放方法、服务器、用户端和系统
CN114679608B (zh) * 2022-04-11 2023-08-25 武汉博晟安全技术股份有限公司 Vr视频加密播放方法、服务器、用户端、系统、电子设备和介质
CN117241067A (zh) * 2023-11-15 2023-12-15 华录出版传媒有限公司 一种基于指纹水印的视频安全调阅方法及系统
CN117241067B (zh) * 2023-11-15 2024-02-09 华录出版传媒有限公司 一种基于指纹水印的视频安全调阅方法及系统

Also Published As

Publication number Publication date
CN105939484A (zh) 2016-09-14
CN105939484B (zh) 2019-02-26

Similar Documents

Publication Publication Date Title
WO2017215514A1 (zh) 音视频的加密播放方法及其系统
US11055429B2 (en) Key providing method, video playing method, server and client
CA2948895C (en) Provisioning drm credentials on a client device using an update server
TWI510066B (zh) 用於安全串流媒體內容之系統和方法
KR101366243B1 (ko) 인증을 통한 데이터 전송 방법 및 그 장치
CN107707504B (zh) 一种流媒体的播放方法、系统以及服务器和客户端
CN106571951B (zh) 审计日志获取方法、系统及装置
CN108494811B (zh) 数据传输安全认证方法及装置
US10055553B2 (en) PC secure video path
WO2015184743A1 (zh) 对视频直播进行防盗链处理的方法及其系统
CN103152321B (zh) 流媒体内容和服务的数字权利管理的方法和系统
CN108881205A (zh) 一种hls流媒体的安全播放系统及播放方法
WO2018120998A1 (zh) 机顶盒与服务器的交互方法及系统
US12095910B2 (en) System for thin client devices in hybrid edge cloud systems
US20220171832A1 (en) Scalable key management for encrypting digital rights management authorization tokens
US10521564B2 (en) Operating a device for forwarding protected content to a client unit
CN102843335B (zh) 流媒体内容的处理方法和设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17812625

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17812625

Country of ref document: EP

Kind code of ref document: A1