WO2023103413A1 - 媒体数据解密方法、装置、计算机设备和存储介质 - Google Patents

媒体数据解密方法、装置、计算机设备和存储介质 Download PDF

Info

Publication number
WO2023103413A1
WO2023103413A1 PCT/CN2022/108891 CN2022108891W WO2023103413A1 WO 2023103413 A1 WO2023103413 A1 WO 2023103413A1 CN 2022108891 W CN2022108891 W CN 2022108891W WO 2023103413 A1 WO2023103413 A1 WO 2023103413A1
Authority
WO
WIPO (PCT)
Prior art keywords
media data
data
position index
index data
display screen
Prior art date
Application number
PCT/CN2022/108891
Other languages
English (en)
French (fr)
Inventor
祁峰
余诚志
Original Assignee
深圳市洲明科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市洲明科技股份有限公司 filed Critical 深圳市洲明科技股份有限公司
Publication of WO2023103413A1 publication Critical patent/WO2023103413A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/40Information retrieval; Database structures therefor; File system structures therefor of multimedia data, e.g. slideshows comprising image and additional audio data
    • G06F16/41Indexing; Data structures therefor; Storage structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

Definitions

  • the present application relates to the technical field of data decryption, in particular to a media data decryption method, device, computer equipment and storage medium.
  • a media data decryption method is provided.
  • a method for decrypting media data includes:
  • the media data encryption package is obtained by encrypting the original media data out of order according to the position index data, and the position index data corresponds to the structural parameters of the display screen;
  • the media data to be decrypted is decrypted to obtain the decrypted media data.
  • a device for decrypting media data includes:
  • the data acquisition module is used to obtain the media data encryption package, and the media data encryption package is obtained by performing out-of-order encryption on the original media data according to the position index data, and the position index data corresponds to the structural parameters of the display screen;
  • the first data decryption module is used to decrypt the media data encryption package, and obtain the location out-of-order index data and the media data to be decrypted;
  • the circuit configuration module is used to configure the programmable logic circuit of the control system of the display screen in the media data playback terminal according to the position disorder index data;
  • the second data decryption module is configured to decrypt the media data to be decrypted based on the configured programmable logic circuit to obtain decrypted media data.
  • a computer device comprising a memory and one or more processors, the memory having stored therein computer readable instructions which, when executed by the processor, cause the one or more processors to perform The following steps:
  • the media data encryption package is obtained by encrypting the original media data out of order according to the position index data, and the position index data corresponds to the structural parameters of the display screen;
  • the media data to be decrypted is decrypted to obtain the decrypted media data.
  • One or more computer storage media storing computer readable instructions that, when executed by one or more processors, cause the one or more processors to perform the following steps:
  • the media data encryption package is obtained by encrypting the original media data out of order according to the position index data, and the position index data corresponds to the structural parameters of the display screen;
  • the media data to be decrypted is decrypted to obtain the decrypted media data.
  • Fig. 1 is the application scenario diagram of the media data decryption method in an embodiment
  • Fig. 2 is a schematic flow chart of a method for decrypting media data in an embodiment
  • Fig. 3 is a schematic diagram of the process of obtaining position rearrangement index data in an embodiment
  • Fig. 4 is a detailed flowchart of a method for decrypting media data in an embodiment
  • Fig. 5 is a detailed flow diagram of a method for decrypting media data in another embodiment
  • Fig. 6 is a structural block diagram of a media data decryption device in an embodiment
  • Fig. 7 is a structural block diagram of a media data decryption device in another embodiment
  • Figure 8 is a diagram of the internal structure of a computer device in one embodiment.
  • the media data decryption method provided in this application can be applied to the application environment shown in FIG. 1 .
  • the data encryption terminal 102 and the data decryption terminal 104 communicate through the network.
  • the data encryption end 102 may send a media data encryption packet to the data decryption end 104, and the media data encryption packet is obtained by encrypting the original media data out of order according to the position index data, and the position index data corresponds to the structural parameters of the display screen
  • the data decryption terminal 104 obtains the media data encryption package, then decrypts the media data encryption package to obtain the position disorder index data and the media data to be decrypted, and then configures the control system of the display screen in the media data player terminal according to the position disorder index data
  • the programmable logic circuit based on the configured programmable logic circuit, decrypts the media data to be decrypted to obtain the decrypted media data.
  • the data encryption terminal 102 includes but not limited to an encryption coding engine
  • a method for decrypting media data is provided.
  • the method is applied to the data decryption terminal in FIG. 1 as an example, including the following steps:
  • the media data encryption package is obtained.
  • the media data encryption package is obtained by encrypting the original media data out of order according to the position index data, and the position index data corresponds to the structural parameters of the display screen.
  • the external screen driven by the data decryption terminal takes the LED display screen as an example.
  • the screen body of the LED display screen is composed of a cabinet, and the cabinet is composed of modules. Therefore, the display screen in this embodiment Structural parameters include the size of the LED module dot matrix, the size of the LED box dot matrix and the size of the LED screen dot matrix.
  • the media data encryption package is encrypted by the data encryption end.
  • the specific encryption process can be: obtain the media data to be encrypted and the display screen structure parameters of the media data playback end.
  • the display screen structure parameters include the module dot matrix scale, the box dot matrix scale and The size of the screen dot matrix, according to the size of the module dot matrix, build a module data arrangement table (also called a module model) corresponding to the size of the module dot matrix
  • the box data arrangement table corresponding to the scale also called the box model
  • constructs the screen data arrangement table corresponding to the screen dot matrix scale also called the screen model
  • the position disorder index data represents the mapping relationship between the logical and physical positions of the pixels on the display screen
  • each frame of image of the media data to be encrypted is divided into image blocks whose size is proportional to the size of the module dot matrix of the display screen.
  • Group-level position disorder index data perform pixel disorder operation on each image block, obtain module-level pixel disorder encryption results, and perform pixel arrangement on module-level pixel disorder encryption results according to box-level position disorder index data
  • the out-of-sequence encryption result of the screen-level pixels corresponding to each frame of image in the media data obtains the encrypted media data.
  • the module model, cabinet model and screen model in the LED display system can be obtained through pixel sketch point table, cabinet data arrangement table and cabinet connection diagram.
  • the pixel sketch point table includes the logical relationship between the LED display pixel and the drive circuit
  • the cabinet data arrangement table contains the relative relationship between the output data of each module and the receiving card
  • the cabinet connection diagram includes the The connection relationship between the body and the display screen.
  • the LED display is installed in a 96*96 dot box composed of 32*32 dot matrix modules in a horizontal direction of 4*height of 3 Taking the LED screen as an example, the position disordered index data is taken as an example of the position disordered index table.
  • the process of obtaining the media data encryption package can be as follows:
  • the staff imports the video data to be encrypted and the structural parameters of the LED display at the video playback end at the data encryption end, including 32*32 dot matrix modules, 3*3 dot matrix cabinets and 4*3 dot matrix screens, and then sends data encryption instruction, the processor at the data encryption end responds to the data encryption instruction, and builds a 32*32 module model (32*32 Matrix), 3*3 box model (4*3 matrix) and 4*3 screen model (4*3 matrix), and then, according to the shuffling algorithm for 32*32 module model, 3*3 box model and The 4*3 screen models are operated out of order to obtain the module model, cabinet model and screen model after the disorder, and then analyze the module model, cabinet model and screen model before and after the disorder to obtain the module level Position out-of-order index table, cabinet-level position out-of-order index table, and screen-level position out-of-order index table.
  • the 32*32 module-level location random index table uses the 32*32 module-level location random index table to cut each frame of the video data into image blocks of 32*32 points in sequence (from top to bottom, from left to right), and obtain multiple image blocks , and then perform pixel out-of-order operation on each image block to generate a new out-of-order image block, and obtain the module-level encryption result.
  • the module-level position out-of-order index table can be encrypted and saved, and then according to the 3*3 box
  • the level position random index data is arranged and combined with the module-level encrypted results to obtain the box-level encrypted results.
  • the box-level position random index table is encrypted and saved.
  • the MD5 operation is performed on the encrypted video data through the MD5 Message-Digest Algorithm to generate the MD5 check code, and then the module-level position disorder index data and the cabinet-level position disorder index data are The data is packaged together with screen-level location random index data, encrypted video data, and MD5 check code to obtain an encrypted media data package.
  • the media data encryption package may be sent to the media data player through a content distribution network or a file transfer protocol.
  • Step 204 decrypt the encrypted media data package, and obtain the position disorder index data and the media data to be decrypted.
  • a decryption algorithm may be used to decrypt the data media encrypted package at the first level, so as to obtain the position disorder index data and the video data to be decrypted.
  • the encrypted media data package is a file
  • the position disorder index file and the media data file may be divided according to the file name.
  • the media data encryption package is a split file including the location disordered index file and the media data file, it can be directly decrypted to obtain the location disordered index file and the media data file to be decrypted.
  • the position disordered index data is obtained by performing a disordered operation on the data arrangement table.
  • the cell values in the table are the elements in the table before the disordered order.
  • the storage location in .
  • a random shuffle operation is performed on a 4*4 pixel arrangement table (different table colors represent different pixel information)
  • the pixel arrangement table after the scrambling is obtained, and the pixel arrangement table before and after the scrambling is compared , that is, a 4*4 location random index table can be obtained.
  • the random operation is performed on the original positive sequence 4*4 data arrangement table, which corresponds to (4*4)! -1 kind of arrangement (excluding the case of positive order arrangement), the corresponding can get (4*4)! - 1 table of position disorder index.
  • the out-of-order data arrangement table can be restored to the original positive-order data arrangement table.
  • the out-of-order images can also be restored to the normal-order images according to the location out-of-order index table.
  • the decrypted position disorder index data should include the module level position disorder index table, the cabinet level position disorder index table and the screen body level position disorder index table.
  • Step 206 configure the programmable logic circuit of the control system of the display screen in the media data player terminal according to the position disorder index data.
  • the control system of the display screen takes the control system of the stand-alone version of the LED display screen as an example.
  • the control system of the LED display screen is a system that controls the correct display of the large LED screen according to user needs.
  • the system is also called LED display controller and LED display control card. It is the core component of the LED display. It is mainly responsible for converting external video input signals or onboard multimedia files into digital signals that are easily recognized by the LED large screen.
  • the device that lights up the large LED screen is similar to the graphics card in a home computer.
  • the programmable logic circuit for configuring the control system of the display screen in the media data playback terminal is the programmable logic circuit in the control system for configuring the LED display screen.
  • the specific configuration process may be: converting the obtained location random index table into a machine-recognizable language such as hexadecimal ASCII code, and then configuring the programmable logic circuit in the control system of the LED display.
  • Step 208 based on the configured programmable logic circuit, decrypt the media data to be decrypted to obtain decrypted media data.
  • the data initialization method includes a RAP initialization method, an RCP initialization method, or an RSP initialization method.
  • the purpose of restoring the disordered image information to the normal sequence image information can be achieved by creating a lookup table. Complete the logic implementation of the image information decryption process. Based on the created lookup table and according to the coding format of the pixel position table, a unique pixel out-of-order index table corresponding to the encoded video data can be generated, and then the out-of-order image information can be restored to the normal order by using the pixel out-of-order index table image information.
  • the programmable logic circuit of the control system of the display screen in the media data player end, so that the configured programmable logic circuit and the LED screen Corresponding to the structure of the LED screen, so that in the decryption process, it is necessary to rely on the real-time decryption capability of the playback hardware and the corresponding relationship between the programmable logic circuit and the LED screen structure to perform decryption, and because the index data is disordered according to the position
  • the index data is disordered according to the position
  • the structural parameters of the display screen include the module dot matrix scale of the display screen, the cabinet dot matrix scale and the screen body dot matrix scale, and the position index data is passed through the structure of the display screen
  • the parameters are obtained and represent the mapping relationship between the logical and physical positions of the display pixels of the display screen.
  • the position disorder index data includes module-level position disorder index data, cabinet-level position disorder index data, and screen body-level position disorder index data. data;
  • Step 204 includes: Step 224, decrypting the media data encrypted package, and obtaining the position disorder index data including module level position disorder index data, cabinet level position disorder index data, screen body level position disorder index data and media to be decrypted data;
  • step 206 includes: step 226, filling module-level position disorder index data, cabinet-level position disorder index data, and screen body-level position disorder index data into corresponding cache areas in the control system of the display screen respectively , to configure the programmable logic circuit of the control system of the display screen in the media data player terminal.
  • the position disorder index data obtained by decryption includes module-level position disorder index data, cabinet-level position disorder index data, and screen body-level position disorder index data, and the LED display control of the LED display
  • the receiving card memory of the system is preset with three areas corresponding to storage module-level position disorder index data, cabinet-level position disorder index data, and screen-level position disorder index data.
  • the configuration of the programmable logic circuit can be : Fill module-level position disorder index data, cabinet-level position disorder index data, and screen-level position disorder index data into the corresponding areas in the memory of the receiving card of the control system of the LED display (that is, the receiving card's memory RAM), and then data initialization to complete the configuration of the programmable logic circuit.
  • the MCU unit on the receiving card will verify the configuration data, and then transfer the storage to the non-volatile card. backed up in the FLASH memory.
  • the cabinet data arrangement table and the cabinet connection diagram during the encryption-decryption process there is no need to save relevant information in the receiving card , even if there is relevant information stored in RAM during use, it needs to be cleared regularly through firmware operations.
  • the above-mentioned configuration manner can realize orderly decryption of encrypted out-of-order video data.
  • step 208 includes: step 228, based on the configured programmable logic circuit, call the MFC (Multi Format Codec, multi-format coder) media decoder, to be decrypted media data decrypt.
  • MFC Multi Format Codec, multi-format coder
  • the MFC media decoder may be called to efficiently decode the video data to be decrypted based on the configured programmable logic circuit. It can be understood that, in other embodiments, other types of media decoders may also be used for decoding, which may be determined according to the format of the media data to be decrypted, which is not limited here.
  • step 203 before decrypting the encrypted media data package, it also includes: step 203, carrying out legality check to the encrypted media data package; step 224 includes: step 244, when the encrypted media data package passes When verifying the validity, decrypt the media data encryption package, and obtain the position disorder index data, including the module level position disorder index data, the cabinet level position disorder index data, the screen body level position disorder index data and the media to be decrypted data.
  • the legality of the media data encryption package can be checked. If the legality check is passed, it proves that the data integrity and correctness of the media data encryption package has not been compromised. Tampering, at this point, the decryption of the media data encryption package begins. In this embodiment, before decrypting the encrypted media data packet, a legality check is performed, which can further ensure correct and safe playback of the media data.
  • the encrypted media data package carries a first check code; performing a legality check on the encrypted media data package includes: performing a hash operation on the encrypted media data package, generating a second check code, and judging the second verification code. Whether the verification code matches the first verification code, so as to verify the validity of the encrypted media data package.
  • the check code takes MD5 check code as an example, and the encrypted media data package carries the first MD5 check code.
  • the MD5 operation can be performed on the encrypted media data package to obtain the second MD5 check code, then compare whether the first MD5 check code matches the second MD5 check code, if they match, it proves that the media data encryption package has not been tampered with, otherwise, it shows that the media data encryption package has been tampered with.
  • the legality verification of the encrypted media data package can be performed simply and effectively.
  • the data encryption end sends the media data encryption packet carrying the media data to be decrypted, the position rearrangement index data and the first MD5 check code to the data decryption end.
  • the receiving card of the data decryption end can first Perform MD5 calculation on the media data encryption package to obtain the second MD5 check code, and then compare whether the first MD5 check code matches the second MD5 check code. If they match, it proves that the media data encryption package has not been tampered with.
  • the decryption algorithm uses the decryption algorithm to decrypt the media data encryption package at the first layer, and obtain the position rearrangement index data (including module-level position rearrangement index data, cabinet-level position rearrangement index data, and screen body-level position rearrangement index data) and To decrypt the media data, fill the module-level position rearrangement index data, cabinet-level position rearrangement index data, and screen body-level position rearrangement index data into the corresponding areas in the memory RAM of the receiving card, and then perform data initialization. To complete the configuration of the programmable logic circuit. Finally, based on the configured programmable logic circuit, the MFC media decoder is called to decode and play the pixel-rearranged video data.
  • the position rearrangement index data including module-level position rearrangement index data, cabinet-level position rearrangement index data, and screen body-level position rearrangement index data
  • To decrypt the media data fill the module-level position rearrangement index data, cabinet-level position rearrangement index data, and screen body-
  • steps in FIG. 2 and the flow charts in FIGS. 4-5 are shown sequentially as indicated by the arrows, these steps are not necessarily executed sequentially in the order indicated by the arrows. Unless otherwise specified herein, there is no strict order restriction on the execution of these steps, and these steps can be executed in other orders. Moreover, at least some of the steps in Figure 2 and Figures 4-5 may include multiple sub-steps or multiple stages, these sub-steps or stages are not necessarily executed at the same time, but may be executed at different times, The execution order of these sub-steps or stages is not necessarily performed sequentially, but may be executed alternately or alternately with at least a part of other steps or sub-steps or stages of other steps.
  • a media data decryption device including: a data acquisition module 510, a first data decryption module 520, a circuit configuration module 530 and a second data decryption module 540, wherein:
  • the data acquisition module 510 is used to acquire the media data encryption package, which is obtained by encrypting the original media data in random order according to the position index data, and the position index data corresponds to the structural parameters of the display screen.
  • the first data decryption module 520 is configured to decrypt the encrypted media data package, and obtain the position disorder index data and the media data to be decrypted.
  • the circuit configuration module 530 is used to configure the programmable logic circuit of the control system of the display screen in the media data player terminal according to the position disorder index data.
  • the second data decryption module 540 is configured to decrypt the media data to be decrypted based on the configured programmable logic circuit to obtain decrypted media data.
  • the above-mentioned media data decryption device configures the programmable logic circuit of the control system of the display screen in the media data playback terminal according to the position disorder index data corresponding to the structural parameters of the display screen, so that the configured programmable logic circuit and the LED screen Corresponding structures, so that in the decryption process, it is necessary to rely on the real-time decryption capability of the player hardware and the corresponding relationship between the programmable logic circuit and the LED screen structure to perform decryption, and because the random index data is encrypted according to the position
  • There are many possibilities for the obtained encryption result of the media data therefore, it is absolutely impossible for an attacker to decipher, and the information security of the media data is fully guaranteed.
  • the structural parameters of the display screen include the module dot matrix scale of the display screen, the cabinet dot matrix scale and the screen body dot matrix scale, the position index data is obtained through the structural parameters of the display screen, and the characterization display
  • the mapping relationship between the logical and physical positions of the display pixels of the screen, the position disorder index data includes the module level position disorder index data, the cabinet level position disorder index data and the screen body level position disorder index data;
  • the circuit configuration module 530 is also used to fill the module-level position out-of-order index data, cabinet-level position out-of-order index data, and screen-level position out-of-order index data into the corresponding buffer areas in the control system of the display screen, so as to Configure the programmable logic circuit of the control system of the display screen in the media data playback terminal.
  • the second data decryption module 540 is further configured to call an MFC media decoder to decrypt the media data to be decrypted based on the configured programmable logic circuit.
  • the device also includes a data legality checking module 550, which is used to check the legality of the media data encryption package; the first data decryption module 520 is also used to When the packet passes the validity check, the encrypted media data packet is decrypted.
  • a data legality checking module 550 which is used to check the legality of the media data encryption package
  • the first data decryption module 520 is also used to When the packet passes the validity check, the encrypted media data packet is decrypted.
  • the encrypted media data packet carries a first verification code
  • the data legality verification module 550 is also used to perform a hash operation on the encrypted media data packet to generate a second verification code and judge the second verification code. Whether the code matches the first check code, so as to check the validity of the encrypted media data package.
  • Each module in the above-mentioned media data decryption device can be fully or partially realized by software, hardware and a combination thereof.
  • the above-mentioned modules can be embedded in or independent of the processor in the computer device in the form of hardware, and can also be stored in the memory of the computer device in the form of software, so that the processor can call and execute the corresponding operations of the above modules.
  • a computer device which may be a data decryption device in an LED display broadcast control system, and its internal structure may be as shown in FIG. 8 .
  • the computer equipment includes a programmable core circuit connected by a system bus, a processor, a memory, a VRAM (Video RAM, video random access memory) PHY interface, a copper cable interface, and the like.
  • the processor of the computer device is used to provide computing and control capabilities, including but not limited to the microprocessor ARM.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory, and the non-volatile storage medium may be a FLASH memory.
  • the non-volatile storage medium stores an operating system, computer-readable instructions, and the like.
  • the internal memory provides an environment for the execution of the operating system and computer readable instructions in the non-volatile storage medium.
  • the PHY interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer-readable instructions are executed by the processor, a method for decrypting media data is implemented.
  • FIG. 8 is only a block diagram of a partial structure related to the solution of this application, and does not constitute a limitation on the computer equipment to which the solution of this application is applied.
  • the specific computer equipment can be More or fewer components than shown in the figures may be included, or some components may be combined, or have a different arrangement of components.
  • a computer device comprising a memory and one or more processors, wherein computer-readable instructions are stored in the memory, and when the computer-readable instructions are executed by the processor, the one or more processors perform the following steps: obtaining a media data encryption package , the media data encryption package is obtained by encrypting the original media data in random order according to the position index data.
  • the location disorder index data configures the programmable logic circuit of the control system of the display screen in the media data player, based on the configured programmable logic circuit, decrypts the media data to be decrypted to obtain the decrypted media data.
  • the structural parameters of the display screen include the module dot matrix scale of the display screen, the cabinet dot matrix scale and the screen body dot matrix scale, the position index data is obtained through the structural parameters of the display screen, and the characterization display
  • the mapping relationship between the logical and physical positions of the display pixels of the screen, the position disorder index data includes the module level position disorder index data, the cabinet level position disorder index data and the screen body level position disorder index data;
  • the processor executes the computer-readable instructions, the following steps are also implemented: filling the module-level position disorder index data, the cabinet-level position disorder index data, and the screen body-level position disorder index data into the control system of the display screen respectively
  • the corresponding buffer area is used to configure the programmable logic circuit of the control system of the display screen in the media data player.
  • the processor executes the computer-readable instructions, the following steps are further implemented: based on the configured programmable logic circuit, calling the MFC media decoder to decrypt the media data to be decrypted.
  • the processor when the processor executes the computer-readable instructions, the following steps are further implemented: performing a legality check on the encrypted media data package, and decrypting the encrypted media data package when the encrypted media data package passes the legality check.
  • the encrypted media data package carries the first check code
  • the processor also implements the following steps when executing the computer-readable instructions: performing a hash operation on the encrypted media data package to generate a second check code, when the second check code is When the second check code matches the first check code, it is determined that the encrypted media data package passes the legality check.
  • the media data encryption package carries the first MD5 code
  • the processor also implements the following steps when executing the computer-readable instructions: the media data encryption package is hashed to generate a second MD5 code, and when the second MD5 When the code matches the first MD5 code, it is determined that the media data encryption package passes the legality check.
  • One or more computer storage media storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, one or more processors perform the following steps: obtain a media data encryption package, a media data encryption package
  • the original media data is obtained by encrypting the original media data in random order.
  • the position index data corresponds to the structural parameters of the display screen
  • the encrypted media data packet is decrypted to obtain the position disorder index data and the media data to be decrypted.
  • the position disorder index data Configure the programmable logic circuit of the control system of the display screen in the media data player terminal, and based on the configured programmable logic circuit, decrypt the media data to be decrypted to obtain the decrypted media data.
  • the computer storage medium is a readable storage medium, and the readable storage medium may be non-volatile or volatile.
  • the structural parameters of the display screen include the module dot matrix scale of the display screen, the cabinet dot matrix scale and the screen body dot matrix scale, the position index data is obtained through the structural parameters of the display screen, and the characterization display
  • the mapping relationship between the logical and physical positions of the display pixels of the screen, the position disorder index data includes the module level position disorder index data, the cabinet level position disorder index data and the screen body level position disorder index data;
  • the following steps are also implemented: filling the module-level position disorder index data, the cabinet-level position disorder index data, and the screen body-level position disorder index data into the control system of the display screen respectively
  • the corresponding buffer area in the media data player is used to configure the programmable logic circuit of the control system of the display screen in the media data player.
  • the following steps are further implemented: calling the MFC media decoder based on the configured programmable logic circuit, and decrypting the media data to be decrypted.
  • the following steps are also implemented: performing a legality check on the encrypted media data package, and decrypting the encrypted media data package when the encrypted media data package passes the legality check .
  • the encrypted media data package carries a first check code
  • the computer-readable instructions are executed by the processor to further implement the following steps: perform a hash operation on the encrypted media data package to generate a second check code, when When the second check code matches the first check code, it is determined that the encrypted media data package passes the validity check.
  • the encrypted media data packet carries the first MD5 code
  • the computer-readable instructions are executed by the processor to further implement the following steps: perform a hash operation on the encrypted media data packet to generate a second MD5 code, when the second When the MD5 code matches the first MD5 code, it is determined that the encrypted media data package passes the legality check.
  • the computer-readable instructions can be stored in a non-volatile computer
  • the computer-readable instructions may include the processes of the embodiments of the above-mentioned methods when executed.
  • any reference to storage, database or other media used in the various embodiments provided in the present application may include at least one of non-volatile and volatile storage.
  • Non-volatile memory can include read-only memory (Read-Only Memory, ROM), magnetic tape, floppy disk, flash memory, optical memory, high-density embedded non-volatile memory, resistive variable memory (ReRAM), magnetic variable memory (Magnetoresistive Random Access Memory, MRAM), Ferroelectric Random Access Memory (FRAM), Phase Change Memory (Phase Change Memory, PCM), graphene memory, etc.
  • the volatile memory may include random access memory (Random Access Memory, RAM) or external cache memory, etc.
  • RAM Random Access Memory
  • RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM).
  • the processors involved in the various embodiments provided by this application can be general-purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, data processing logic devices based on quantum computing, etc., and are not limited to this.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Storage Device Security (AREA)

Abstract

一种媒体数据解密方法,包括:获取媒体数据加密包,媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应,解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据,根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路,基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。

Description

媒体数据解密方法、装置、计算机设备和存储介质
相关申请的交叉引用
本申请要求于2021年12月10日提交中国专利局,申请号为202111510831X,申请名称为“媒体数据解密方法、装置、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及数据解密技术领域,特别是涉及一种媒体数据解密方法、装置、计算机设备和存储介质。
背景技术
随着LED(Light Emitting Diode,发光二极管)显示屏行业的蓬勃发展,其应用领域也越来越广。显示屏作为传媒载体的一种重要途径,越来越多的被市场认可。随之智慧城市建设的深入发展,显示屏也更加智能化,便捷化,只要有网络便可实现远程控制。技术的发展给大屏管理人员带来便捷的同时,也带来了一定的信息安全隐患。因此,出现了对媒体数据加密和媒体数据解密的方法。
然而,发明人意识到,传统的媒体数据解密算法,基本上都是通过使用常见的解密算法对媒体信息进行解密操作,同时配合不同的鉴权方式进行播放控制,显示屏子系统依然保持原有的逐点映射模式,这样在其播控设备底层操作系统被入侵或取得控制权后,不论媒体是否被授权,依然可以通过硬件映射的模式被投射到显示屏体。
由此可见,传统的媒体数据解密方法存在信息安全性不高的问题。
发明内容
根据本申请公开的各种实施例,提供一种媒体数据解密方法、装置、计算机设备和存储介质。
一种媒体数据解密方法包括:
获取媒体数据加密包,媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应;
解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据;
根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路;
基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。
一种媒体数据解密装置包括:
数据获取模块,用于获取媒体数据加密包,媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应;
第一数据解密模块,用于解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据;
电路配置模块,用于根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路;
第二数据解密模块,用于基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。
一种计算机设备,包括存储器和一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述一个或多个处理器执行以下步骤:
获取媒体数据加密包,媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应;
解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据;
根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路;
基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。
一个或多个存储有计算机可读指令的计算机存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
获取媒体数据加密包,媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应;
解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据;
根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路;
基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为一个实施例中媒体数据解密方法的应用场景图;
图2为一个实施例中媒体数据解密方法的流程示意图;
图3为一个实施例中得到位置重排索引数据的过程示意图;
图4为一个实施例中媒体数据解密方法的详细流程示意图;
图5为另一个实施例中媒体数据解密方法的详细流程示意图;
图6为一个实施例中媒体数据解密装置的结构框图;
图7为另一个实施例中媒体数据解密装置的结构框图;
图8为一个实施例中计算机设备的内部结构图。
具体实施方式
为了使本申请的技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供的媒体数据解密方法,可以应用于如图1所示的应用环境中。LED显示屏播控系统中,数据加密端102与数据解密端104通过网络进行通信。具体的,可以是数据加密端102发送媒体数据加密包至数据解密端104,该媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应,数据解密端104获取媒体数据加密包,然后,解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据,再根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路,基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。其中,数据加密端102包括不限于加密编码引擎,数据解密端104包括但不限于接收卡。
在其中一个实施例中,如图2所示,提供了一种媒体数据解密方法,以该方法应用于图1中的数据解密端为例进行说明,包括以下步骤:
步骤202,获取媒体数据加密包,媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应。
本实施例中,受数据解密端驱动的外部屏体以LED显示屏为例,LED显示屏的屏体由箱体组成,而箱体又由模组组成,因此,本实施例中的显示屏结构参数包括LED模组点阵规模、LED箱体点阵规模和LED屏体点阵规模。媒体数据加密包由数据加密端加密得到,具体的加密过程可以是:获取待加密媒体数据和媒体数据播放端的显示屏结构参数,显示屏结构参数包括模组点阵规模、箱体点阵规模和屏体点阵规模,根据模组点阵规模,构建与模组点阵规模对应的模组数据排列表(也可以称为模组模型),根据箱体点阵规模,构建与箱体点阵规模对应的箱体数据排列表(也可以称为箱体模型),根据屏体点阵规模,构建与屏体点阵规模对应的屏体数据排列表(也可以称为屏体模型),分别对模组数据排列表、箱体数据排列表和屏体数据排列表进行乱序操作,得到模组级位置乱序索引数据、箱体级位置乱序索引数据和屏体级位置乱序索引数据,其中,位置乱序索引数据表征显示屏像素的逻辑与物理位置的映射关系,将待加密媒体数据的每帧图像分割为大小与显示屏的模组点阵规模成正比的图像块,根据模组级位置乱序索引数据,对各图像块进行像素乱 序操作,得到模组级像素乱序加密结果,根据箱体级位置乱序索引数据,对模组级像素乱序加密结果进行像素排列组合,得到箱体级像素乱序加密结果,根据屏体级位置乱序索引数据,对箱体级像素乱序加密结果进行像素排列组合,得到屏体级像素乱序加密结果,归集待加密媒体数据中每帧图像对应的屏体级像素乱序加密结果,得到已加密的媒体数据。具体的,LED显示系统中的模组模型、箱体模型和屏体模型,可以是通过像素描点表、箱体数据排列表和箱体连线图得到。具体的,像素描点表包括LED显示像素与驱动电路之间的逻辑关系,箱体数据排列表包含每个模组和接收卡的输出数据之间的相对关系,箱体连线图包括各个箱体跟显示屏的连接关系。
下面结合一个实施例对数据加密端加密待传输的媒体数据得到媒体数据加密包进行说明,LED显示屏以由32*32点阵模组构成的96*96点箱体安装成横向4*高度3的LED屏为例,位置乱序索引数据以位置乱序索引表为例,媒体数据加密包的得到过程可以是:
工作人员于数据加密端导入待加密视频数据和视频播放端的LED显示屏结构参数,包括32*32点阵模组、3*3点阵箱体和4*3点阵屏体,然后发送数据加密指令,数据加密端的处理器响应该数据加密指令,根据32*32点阵模组、3*3点阵箱体和4*3点阵屏体,对应构建32*32模组模型(32*32矩阵)、3*3箱体模型(4*3矩阵)和4*3屏体模型(4*3矩阵),然后,根据洗牌算法对32*32模组模型、3*3箱体模型和4*3屏体模型进行乱序操作,得到乱序后的模组模型、箱体模型和屏体模型,然后分析乱序前后的模组模型、箱体模型和屏体模型,得到模组级位置乱序索引表、箱体级位置乱序索引表和屏体级位置乱序索引表。
然后,利用32*32模组级位置乱序索引表针对视频数据中每帧画面按序(由上至下,由左至右)切割成32*32点大小的图像块,得到多个图像块,然后对各图像块进行像素乱序操作,生成新的乱序的图像块,得到模组级加密结果,进一步的,可加密保存模组级位置乱序索引表,再根据3*3箱体级位置乱序索引数据对模组级加密结果进行排列组合,得到箱体级加密结果,同样,加密保存箱体级位置乱序索引表,最后,根据4*3屏体级位置乱序索引表对箱体级加密结果进行排列组合,得到屏体级加密结果,同样,加密保存屏体级位置乱序索引表,并加密保存,至此,得到单帧图像处理得到的加密结果。按照上述处理,逐帧完成对整个视频数据的加密处理,归集每帧图像对应的屏体级像素乱序加密结果,得到已加密的视频数据,然后将加密结果存储为数据文件。进一步的,通过MD5信息摘要算法(MD5 Message-Digest Algorithm)对已加密的视频数据进行MD5运算,生成MD5校验码,然后,将模组级位置乱序索引数据、箱体级位置乱序索引数据和屏体级位置乱序索引数据、已加密的视频数据和MD5校验码一起打包,得到媒体数据加密包。可以是通过内容分发网络或文件传输协议将媒体数据加密包发送至媒体数据播放端。
步骤204,解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据。
当获取媒体数据加密包时,可以是使用解密算法对数据媒体加密包进行第一层解密,得到位置乱序索引数据和待解密的视频数据。具体实施时,若媒体数据加密包是一份文件, 可以是根据文件名分割出位置乱序索引文件和媒体数据文件。若媒体数据加密包是包含位置乱序索引文件和媒体数据文件的分体文件,则可直接解密得到位置乱序索引文件和待解密媒体数据文件。位置乱序索引数据由对数据排列表进行乱序操作得到,以位置乱序索引表为例,其表格内的单元值为乱序前的表内元素经过乱序后,在乱序数据排列表中的存储的位置。如图3所示,若对一个4*4的像素排列表(表格颜色的不同代表像素信息的不同)进行随机乱序操作,得到乱序后的像素排列表,对比乱序前后的像素排列表,即能得到4*4的位置乱序索引表。可以理解的是,对原始的正序的4*4数据排列表进行乱序操作,其对应有(4*4)!-1种排列方式(不包括正序排列的情况),对应可得到(4*4)!-1张位置乱序索引表。本实施例中根据位置乱序索引表,能够将乱序后的数据排列表还原为原始的正序的数据排列表。如此,在后续的图像加密过程中,也可依据此位置乱序索引表,将乱序后的图像还原为正序的图像。
承接上述实施例,此时,解密出的位置乱序索引数据应包括模组级位置乱序索引表、箱体级位置乱序索引表和屏体级位置乱序索引表。
步骤206,根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路。
本实施例中,显示屏的控制系统以单机版的LED显示屏的控制系统为例,LED显示屏的控制系统是按照用户需求控制LED大屏幕正确显示的系统,单机版的LED显示屏的控制系统又称LED显示屏控制器、LED显示屏控制卡,它是组成LED显示屏的核心部件、主要负责将外部的视频输入信号或者板载的多媒体文件转换成LED大屏幕易于识别的数字信号,从而点亮LED大屏幕的设备,其类似于家用电脑中的显卡。配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路是配置LED显示屏的控制系统中的可编程逻辑电路。具体的配置过程可以是:将得到位置乱序索引表转换为机器可识别的语言如十六进制的ASCII码,进而配置LED显示屏的控制系统内的可编程逻辑电路。
步骤208,基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。
完成LED显示屏的控制系统内的可编程逻辑电路的配置后,由于像素描点表、箱体数据排列表和箱体连线格式数据分别与模组模型、箱体模型、屏体模型构成反函数关系,所以经过加密而乱序的像素信息会依次被初始化为接收卡内存中箱体连线格式数据、箱体数据排列表和像素描点表,然后一一进行反向硬件实时映射解码,完成媒体数据的实时解密过程,将乱序的视频数据还原为正序的视频数据。具体的,本实施例中,数据初始化的方法包括RAP初始化方法、RCP初始化方法或RSP初始化方法。由于LED信息显示系统可以通过位置乱序索引表,支持LED显示像素的逻辑-物理位置重映射,则可以通过创建查找表,达成将乱序后的图像信息还原成正序的图像信息的目的,以完成图像信息解密过程的逻辑实现。基于已创建的查找表,根据像素位置表编码格式,可以生成与已编码的视频数据对应的唯一像素乱序索引表,进而以此像素乱序索引表,将乱序后的图像信息 还原成正序的图像信息。
上述媒体数据解密方法中,根据与显示屏的结构参数对应的位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路,使得已配置的可编程逻辑电路与LED屏的结构相对应,从而实现了在解密过程中,需要同时依赖播放端硬件的实时解密能力和可编程逻辑电路与LED屏结构的对应关系,才能进行解密,并且由于根据位置乱序索引数据乱序加密得到的媒体数据的加密结果存在有非常多种可能性,因此,使得攻击者绝无破解的可能,充分保证了媒体数据的信息安全。
如图4所示,在其中一个实施例中,显示屏的结构参数包括显示屏的模组点阵规模、箱体点阵规模和屏体点阵规模,位置索引数据通过所述显示屏的结构参数得到,且表征显示屏的显示像素的逻辑与物理位置的映射关系,位置乱序索引数据包括模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据;
步骤204包括:步骤224,解密媒体数据加密包,得到位置乱序索引数据包括模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据和待解密媒体数据;步骤206包括:步骤226,将模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据,分别填充至显示屏的控制系统中对应的缓存区域,以配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路。
具体实施时,解密得到的位置乱序索引数据包括模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据,而LED显示屏的LED显示屏的控制系统的接收卡内存中预设有对应存储模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据的三个区域,可编程逻辑电路的配置可以是:将模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据分别填充至LED显示屏的控制系统的接收卡内存中对应的区域(即接收卡的内存RAM中),然后进行数据初始化,以完成可编程逻辑电路的配置。进一步的,由于RAM具备断电丢失的特性,为了对接收卡上可编程逻辑进行正确的初始化工作,接收卡上的MCU单元会对这些配置数据进行校验,然后转移存储到卡上非易失的FLASH存储器中备份。本申请的方案中,由于需要在加密-解密过程对上述的像素描点表、箱体数据排列表和箱体连线图三个数学模型进行混淆操作,因此,在接收卡不需要保存相关信息,即使在使用过程中RAM里存储有相关信息,也需要通过固件操作定时清除。本实施例中,上述配置方式能够实现已加密乱序的视频数据的有序解密。
如图4所示,在其中一个实施例中,步骤208包括:步骤228,基于已配置的可编程逻辑电路,调用MFC(Multi Format Codec,多格式编码器)媒体解码器,对待解密媒体数据进行解密。
具体实施时可以是基于已配置的可编程逻辑电路,调用MFC媒体解码器,对待解密的视频数据进行高效解码。可以理解的是,在其他实施例中,还可以是利用其他类型的媒体解码器进行解码,具体可根据待解密的媒体数据的格式而定,在此不做限定。
如图5所示,在其中一个实施例中,解密媒体数据加密包之前,还包括:步骤203,对媒体数据加密包进行合法性校验;步骤224包括:步骤244,当媒体数据加密包通过合法性校验时,则解密媒体数据加密包,得到位置乱序索引数据包括模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据和待解密媒体数据。
为了防止媒体数据加密包在传输过程被攻击者拦截篡改,可以对媒体数据加密包进行合法性校验,若合法性校验通过,则证明媒体数据加密包的数据完整性和正确性,未被篡改,此时,则开始解密媒体数据加密包。本实施例中,解密媒体数据加密包之前,进行合法性校验,能够进一步保障媒体数据的正确且安全的播放。
在其中一个实施例中,媒体数据加密包携带第一校验码;对媒体数据加密包进行合法性校验包括:对媒体数据加密包进行哈希运算,生成第二校验码,判断第二校验码与第一校验码是否匹配,以对媒体数据加密包进行合法性校验。
本实施例中,校验码以MD5校验码为例,媒体数据加密包携带第一MD5校验码,当获取媒体数据加密包之后,可以对媒体数据加密包进行MD5运算,得到第二MD5校验码,然后比较第一MD5校验码和第二MD5校验码是否相匹配,若相匹配,则证明媒体数据加密包未被篡改过,否则,则表明媒体数据加密包被篡改过。本实施例中,通过匹配校验码的方式,能够简单有效地对媒体数据加密包进行合法性校验。
为了对本申请提供的媒体数据解密方法进行更为清楚的说明,下面结合一个具体实施例进行说明:
数据加密端将携带有待解密媒体数据、位置重排索引数据以及第一MD5校验码的媒体数据加密包发送至数据解密端,数据解密端的接收卡在接收到媒体数据加密包后,可先对媒体数据加密包进行MD5运算,得到第二MD5校验码,然后比较第一MD5校验码和第二MD5校验码是否相匹配,若相匹配,则证明媒体数据加密包未被篡改过,通过解密算法对媒体数据加密包进行第一层解密,得到位置重排索引数据(包括模组级位置重排索引数据、箱体级位置重排索引数据以及屏体级位置重排索引数据)和待解密媒体数据,将模组级位置重排索引数据、箱体级位置重排索引数据以及屏体级位置重排索引数据分别填充至接收卡的内存RAM中对应的区域,然后进行数据初始化,以完成可编程逻辑电路的配置。最后,基于已配置的可编程逻辑电路,调用MFC媒体解码器,对像素重排的视频数据进行解码播放。
应该理解的是,虽然图2、以及图4-图5的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2、以及图4-图5中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
在其中一个实施例中,如图6所示,提供了一种媒体数据解密装置,包括:数据获取模块510、第一数据解密模块520、电路配置模块530和第二数据解密模块540,其中:
数据获取模块510,用于获取媒体数据加密包,媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应。
第一数据解密模块520,用于解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据。
电路配置模块530,用于根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路。
第二数据解密模块540,用于基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。
上述媒体数据解密装置,根据与显示屏的结构参数对应的位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路,使得已配置的可编程逻辑电路与LED屏的结构相对应,从而实现了在解密过程中,需要同时依赖播放端硬件的实时解密能力和可编程逻辑电路与LED屏结构的对应关系,才能进行解密,并且由于根据位置乱序索引数据乱序加密得到的媒体数据的加密结果存在有非常多种可能性,因此,使得攻击者绝无破解的可能,充分保证了媒体数据的信息安全。
在其中一个实施例中,显示屏的结构参数包括显示屏的模组点阵规模、箱体点阵规模和屏体点阵规模,位置索引数据通过所述显示屏的结构参数得到,且表征显示屏的显示像素的逻辑与物理位置的映射关系,位置乱序索引数据包括模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据;
电路配置模块530还用于将模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据,分别填充至显示屏的控制系统中对应的缓存区域,以配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路。
在其中一个实施例中,第二数据解密模块540还用于基于已配置的可编程逻辑电路,调用MFC媒体解码器,对待解密媒体数据进行解密。
如图7所示,在其中一个实施例中,装置还包括数据合法性校验模块550,用于对媒体数据加密包进行合法性校验;第一数据解密模块520还用于当媒体数据加密包通过合法性校验时,则解密媒体数据加密包。
在其中一个实施例中,媒体数据加密包携带第一校验码,数据合法性校验模块550还用于对媒体数据加密包进行哈希运算,生成第二校验码,判断第二校验码与第一校验码是否匹配,以对媒体数据加密包进行合法性校验。
关于媒体数据解密装置的具体限定可以参见上文中对于媒体数据解密方法的限定,在此不再赘述。上述媒体数据解密装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软 件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在其中一个实施例中,提供了一种计算机设备,该计算机设备可以是LED显示播控系统中的数据解密设备,其内部结构图可以如图8所示。该计算机设备包括通过系统总线连接的可编程核心电路、处理器、存储器、VRAM(Video RAM,影像随机接达记忆器)PHY接口和铜缆接口等。其中,该计算机设备的处理器用于提供计算和控制能力,包括但不限于微处理器ARM。该计算机设备的存储器包括非易失性存储介质、内存储器,非易失性存储介质可以是FLASH存储器。该非易失性存储介质存储有操作系统和计算机可读指令等。该内存储器为非易失性存储介质中的操作系统和计算机可读指令的运行提供环境。该计算机设备的PHY接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种媒体数据解密方法。
本领域技术人员可以理解,图8中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
一种计算机设备,包括存储器和一个或多个处理器,存储器中储存有计算机可读指令,计算机可读指令被处理器执行时,使得一个或多个处理器执行以下步骤:获取媒体数据加密包,媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应,解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据,根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路,基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。
在其中一个实施例中,显示屏的结构参数包括显示屏的模组点阵规模、箱体点阵规模和屏体点阵规模,位置索引数据通过所述显示屏的结构参数得到,且表征显示屏的显示像素的逻辑与物理位置的映射关系,位置乱序索引数据包括模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据;
处理器执行计算机可读指令时还实现以下步骤:将模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据,分别填充至显示屏的控制系统中对应的缓存区域,以配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:基于已配置的可编程逻辑电路,调用MFC媒体解码器,对待解密媒体数据进行解密。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:对媒体数据加密包进行合法性校验,当媒体数据加密包通过合法性校验时,则解密媒体数据加密包。
在其中一个实施例中,媒体数据加密包携带第一校验码,处理器执行计算机可读指令时还实现以下步骤:对媒体数据加密包进行哈希运算,生成第二校验码,当第二校验码与第一校验码相匹配时,判定媒体数据加密包通过合法性校验。
在其中一个实施例中,媒体数据加密包携带第一MD5码,处理器执行计算机可读指令时还实现以下步骤:对媒体数据加密包进行哈希运算,生成第二MD5码,当第二MD5码与第一MD5码匹配时,判定媒体数据加密包通过合法性校验。
一个或多个存储有计算机可读指令的计算机存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:获取媒体数据加密包,媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,位置索引数据与显示屏的结构参数对应,解密媒体数据加密包,得到位置乱序索引数据和待解密媒体数据,根据位置乱序索引数据,配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路,基于已配置的可编程逻辑电路,对待解密媒体数据进行解密,得到已解密媒体数据。
其中,该计算机存储介质为可读存储介质,可读存储介质可以是非易失性,也可以是易失性的。
在其中一个实施例中,显示屏的结构参数包括显示屏的模组点阵规模、箱体点阵规模和屏体点阵规模,位置索引数据通过所述显示屏的结构参数得到,且表征显示屏的显示像素的逻辑与物理位置的映射关系,位置乱序索引数据包括模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据;
计算机可读指令被处理器执行时还实现以下步骤:将模组级位置乱序索引数据、箱体级位置乱序索引数据以及屏体级位置乱序索引数据,分别填充至显示屏的控制系统中对应的缓存区域,以配置媒体数据播放端中显示屏的控制系统的可编程逻辑电路。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:基于已配置的可编程逻辑电路,调用MFC媒体解码器,对待解密媒体数据进行解密。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:对媒体数据加密包进行合法性校验,当媒体数据加密包通过合法性校验时,则解密媒体数据加密包。
在其中一个实施例中,媒体数据加密包携带第一校验码,计算机可读指令被处理器执行时还实现以下步骤:对媒体数据加密包进行哈希运算,生成第二校验码,当第二校验码与第一校验码相匹配时,判定媒体数据加密包通过合法性校验。
在其中一个实施例中,媒体数据加密包携带第一MD5码,计算机可读指令被处理器执行时还实现以下步骤:对媒体数据加密包进行哈希运算,生成第二MD5码,当第二MD5码与第一MD5码匹配时,判定媒体数据加密包通过合法性校验。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、数据库或其它介质的任何引用,均可包括非易失性和易失性存储器中的至少一种。非易失性存储器可包括只读存储器(Read-Only Memory,ROM)、磁带、软盘、闪存、光存储器、高密度嵌入式非易失性存储器、阻变存储器(ReRAM)、磁变存储器(Magnetoresistive Random Access Memory, MRAM)、铁电存储器(Ferroelectric Random Access Memory,FRAM)、相变存储器(Phase Change Memory,PCM)、石墨烯存储器等。易失性存储器可包括随机存取存储器(Random Access Memory,RAM)或外部高速缓冲存储器等。作为说明而非局限,RAM可以是多种形式,比如静态随机存取存储器(Static Random Access Memory,SRAM)或动态随机存取存储器(Dynamic Random Access Memory,DRAM)等。本申请所提供的各实施例中所涉及的处理器可为通用处理器、中央处理器、图形处理器、数字信号处理器、可编程逻辑器、基于量子计算的数据处理逻辑器等,不限于此。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种媒体数据解密方法,包括:
    获取媒体数据加密包,所述媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,所述位置索引数据与显示屏的结构参数对应;
    解密所述媒体数据加密包,得到位置索引数据和待解密媒体数据;
    根据所述位置索引数据,配置所述显示屏的控制系统的可编程逻辑电路;及
    基于已配置的可编程逻辑电路,对所述待解密媒体数据进行解密,得到已解密媒体数据。
  2. 根据权利要求1所述的媒体数据解密方法,其特征在于,所述显示屏的结构参数包括显示屏的模组点阵规模、箱体点阵规模和屏体点阵规模,所述位置索引数据通过所述显示屏的结构参数得到,且表征所述显示屏的显示像素的逻辑与物理位置的映射关系,所述位置索引数据包括模组级位置索引数据、箱体级位置索引数据以及屏体级位置索引数据;
    所述根据所述位置索引数据,配置所述媒体数据播放端中显示屏的控制系统的可编程逻辑电路包括:
    将所述模组级位置索引数据、所述箱体级位置索引数据以及所述屏体级位置索引数据,分别填充至所述显示屏的控制系统中对应的缓存区域,以配置所述媒体数据播放端中显示屏的控制系统的可编程逻辑电路。
  3. 根据权利要求1所述的媒体数据解密方法,其特征在于,所述基于已配置的可编程逻辑电路,对所述待解密媒体数据进行解密包括:
    基于已配置的可编程逻辑电路,调用MFC媒体解码器,对所述待解密媒体数据进行解密。
  4. 根据权利要求1所述的媒体数据解密方法,其特征在于,所述解密所述媒体数据加密包之前,还包括:
    对所述媒体数据加密包进行合法性校验;
    所述解密所述媒体数据加密包包括:
    当所述媒体数据加密包通过合法性校验时,则解密所述媒体数据加密包。
  5. 根据权利要求4所述的媒体数据解密方法,其特征在于,所述媒体数据加密包携带第一校验码;
    所述对所述媒体数据加密包进行合法性校验包括:
    对所述媒体数据加密包进行哈希运算,生成第二校验码;及
    当所述第二校验码与所述第一校验码相匹配时,则判定所述媒体数据加密包通过合法性校验。
  6. 根据权利要求5所述的媒体数据解密方法,其特征在于,所述第一校验码和所述第二校验码均为MD5码。
  7. 一种媒体数据解密装置,应用于媒体数据播放端,包括:
    数据获取模块,用于获取媒体数据加密包,所述媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,所述位置索引数据与显示屏的结构参数对应;
    第一数据解密模块,用于解密所述媒体数据加密包,得到位置乱序索引数据和待解密媒体数据;
    电路配置模块,用于根据所述位置乱序索引数据,配置所述媒体数据播放端中显示屏的控制系统的可编程逻辑电路;及
    第二数据解密模块,用于基于已配置的可编程逻辑电路,对所述待解密媒体数据进行解密,得到已解密媒体数据。
  8. 根据权利要求7所述的媒体数据解密装置,其特征在于,所述显示屏的结构参数包括显示屏的模组点阵规模、箱体点阵规模和屏体点阵规模,所述位置索引数据通过所述显示屏的结构参数得到,且表征所述显示屏的显示像素的逻辑与物理位置的映射关系,所述位置索引数据包括模组级位置索引数据、箱体级位置索引数据以及屏体级位置索引数据;
    所述电路配置模块还用于将所述模组级位置索引数据、所述箱体级位置索引数据以及所述屏体级位置索引数据,分别填充至所述显示屏的控制系统中对应的缓存区域,以配置所述媒体数据播放端中显示屏的控制系统的可编程逻辑电路。
  9. 一种计算机设备,包括存储器及一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    获取媒体数据加密包,所述媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,所述位置索引数据与显示屏的结构参数对应;
    解密所述媒体数据加密包,得到位置索引数据和待解密媒体数据;
    根据所述位置索引数据,配置所述显示屏的控制系统的可编程逻辑电路;及
    基于已配置的可编程逻辑电路,对所述待解密媒体数据进行解密,得到已解密媒体数据。
  10. 根据权利要求9所述的计算机设备,其特征在于,所述显示屏的结构参数包括显示屏的模组点阵规模、箱体点阵规模和屏体点阵规模,所述位置索引数据通过所述显示屏的结构参数得到,且表征所述显示屏的显示像素的逻辑与物理位置的映射关系,所述位置索引数据包括模组级位置索引数据、箱体级位置索引数据以及屏体级位置索引数据;
    所述处理器执行所述计算机可读指令时还执行以下步骤:
    将所述模组级位置索引数据、所述箱体级位置索引数据以及所述屏体级位置索引数据,分别填充至所述显示屏的控制系统中对应的缓存区域,以配置所述媒体数据播放端中显示屏的控制系统的可编程逻辑电路。
  11. 根据权利要求9所述的计算机设备,其特征在于,所述处理器执行所述计算机可 读指令时还执行以下步骤:
    基于已配置的可编程逻辑电路,调用MFC媒体解码器,对所述待解密媒体数据进行解密。
  12. 根据权利要求9所述的计算机设备,其特征在于,所述处理器执行所述计算机可读指令时还执行以下步骤:
    对所述媒体数据加密包进行合法性校验;
    当所述媒体数据加密包通过合法性校验时,则解密所述媒体数据加密包。
  13. 根据权利要求12所述的计算机设备,其特征在于,所述媒体数据加密包携带第一校验码;
    所述处理器执行所述计算机可读指令时还执行以下步骤:
    对所述媒体数据加密包进行哈希运算,生成第二校验码;及
    当所述第二校验码与所述第一校验码相匹配时,则判定所述媒体数据加密包通过合法性校验。
  14. 根据权利要求12所述的计算机设备,其特征在于,所述媒体数据加密包携带第一MD5码;
    所述处理器执行所述计算机可读指令时还执行以下步骤:
    对所述媒体数据加密包进行哈希运算,生成第二MD5码;及
    当所述第二MD5码与所述第一MD5码相匹配时,则判定所述媒体数据加密包通过合法性校验。
  15. 一个或多个存储有计算机可读指令的计算机存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    获取媒体数据加密包,所述媒体数据加密包根据位置索引数据对原始媒体数据进行像素乱序加密得到,所述位置索引数据与显示屏的结构参数对应;
    解密所述媒体数据加密包,得到位置索引数据和待解密媒体数据;
    根据所述位置索引数据,配置所述显示屏的控制系统的可编程逻辑电路;及
    基于已配置的可编程逻辑电路,对所述待解密媒体数据进行解密,得到已解密媒体数据。
  16. 根据权利要求15所述的计算机存储介质,其特征在于,所述显示屏的结构参数包括显示屏的模组点阵规模、箱体点阵规模和屏体点阵规模,所述位置索引数据通过所述显示屏的结构参数得到,且表征所述显示屏的显示像素的逻辑与物理位置的映射关系,所述位置索引数据包括模组级位置索引数据、箱体级位置索引数据以及屏体级位置索引数据;
    所述计算机可读指令被所述处理器执行时还执行以下步骤:
    将所述模组级位置索引数据、所述箱体级位置索引数据以及所述屏体级位置索引数据,分别填充至所述显示屏的控制系统中对应的缓存区域,以配置所述媒体数据播放端中 显示屏的控制系统的可编程逻辑电路。
  17. 根据权利要求15所述的计算机存储介质,其特征在于,所述计算机可读指令被所述处理器执行时还执行以下步骤:
    基于已配置的可编程逻辑电路,调用MFC媒体解码器,对所述待解密媒体数据进行解密。
  18. 根据权利要求15所述的计算机存储介质,其特征在于,所述计算机可读指令被所述处理器执行时还执行以下步骤:
    对所述媒体数据加密包进行合法性校验;
    当所述媒体数据加密包通过合法性校验时,则解密所述媒体数据加密包。
  19. 根据权利要求18所述的计算机存储介质,其特征在于,所述媒体数据加密包携带第一校验码;
    所述计算机可读指令被所述处理器执行时还执行以下步骤:
    对所述媒体数据加密包进行哈希运算,生成第二校验码;及
    当所述第二校验码与所述第一校验码相匹配时,则判定所述媒体数据加密包通过合法性校验。
  20. 根据权利要求18所述的计算机存储介质,其特征在于,所述媒体数据加密包携带第一MD5码;
    所述计算机可读指令被所述处理器执行时还执行以下步骤:
    对所述媒体数据加密包进行哈希运算,生成第二MD5码;及
    当所述第二MD5码与所述第一MD5码相匹配时,则判定所述媒体数据加密包通过合法性校验。
PCT/CN2022/108891 2021-12-10 2022-07-29 媒体数据解密方法、装置、计算机设备和存储介质 WO2023103413A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111510831.XA CN114337988A (zh) 2021-12-10 2021-12-10 媒体数据解密方法、装置、计算机设备和存储介质
CN202111510831.X 2021-12-10

Publications (1)

Publication Number Publication Date
WO2023103413A1 true WO2023103413A1 (zh) 2023-06-15

Family

ID=81050531

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/108891 WO2023103413A1 (zh) 2021-12-10 2022-07-29 媒体数据解密方法、装置、计算机设备和存储介质

Country Status (2)

Country Link
CN (1) CN114337988A (zh)
WO (1) WO2023103413A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114337988A (zh) * 2021-12-10 2022-04-12 深圳市洲明科技股份有限公司 媒体数据解密方法、装置、计算机设备和存储介质
WO2023103414A1 (zh) * 2021-12-10 2023-06-15 深圳市洲明科技股份有限公司 媒体数据加密方法和装置、媒体数据播放方法和系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110248045A (zh) * 2019-06-19 2019-09-17 广东工业大学 一种猫映射图像加密方法、解密方法以及相关装置
CN110598430A (zh) * 2019-08-30 2019-12-20 天津大学 基于改进的Logistic映射的图像加密方法
US20200099876A1 (en) * 2018-09-25 2020-03-26 Olympus Corporation Image processing device and image pickup apparatus
CN111832035A (zh) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 一种图像的加密存储方法和装置
CN112272262A (zh) * 2020-10-23 2021-01-26 北京邮电大学 一种图像加密、解密方法及装置
CN114337988A (zh) * 2021-12-10 2022-04-12 深圳市洲明科技股份有限公司 媒体数据解密方法、装置、计算机设备和存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200099876A1 (en) * 2018-09-25 2020-03-26 Olympus Corporation Image processing device and image pickup apparatus
CN111832035A (zh) * 2019-04-23 2020-10-27 北京掌慧纵盈科技股份有限公司 一种图像的加密存储方法和装置
CN110248045A (zh) * 2019-06-19 2019-09-17 广东工业大学 一种猫映射图像加密方法、解密方法以及相关装置
CN110598430A (zh) * 2019-08-30 2019-12-20 天津大学 基于改进的Logistic映射的图像加密方法
CN112272262A (zh) * 2020-10-23 2021-01-26 北京邮电大学 一种图像加密、解密方法及装置
CN114337988A (zh) * 2021-12-10 2022-04-12 深圳市洲明科技股份有限公司 媒体数据解密方法、装置、计算机设备和存储介质

Also Published As

Publication number Publication date
CN114337988A (zh) 2022-04-12

Similar Documents

Publication Publication Date Title
WO2023103413A1 (zh) 媒体数据解密方法、装置、计算机设备和存储介质
CN111709038B (zh) 文件加密解密方法、分布式存储系统、设备及存储介质
CN101719205B (zh) 一种数字版权管理方法及系统
US20140122895A1 (en) Providing Security Support for Digital Rights Management in Different Formats
CN109564553A (zh) 多阶段存储器完整性方法和装置
JP2004140667A (ja) 情報処理方法
CN100596197C (zh) 一种数字电影音视频版权保护系统及方法
CN103841469A (zh) 一种数字电影版权保护方法和装置
CN103607452A (zh) 虚拟机终端数据的获取方法、装置及系统
US20060018465A1 (en) Information-processing system, information-processing apparatus, information-processing method, and program
WO2021217939A1 (zh) 用于区块链数据处理的方法、装置及可读存储介质
CN109495459A (zh) 媒体数据加密方法、系统、设备及存储介质
EP3276912A1 (en) Segmented encryption for content delivery
EP4315732A1 (en) Partial authentication tag aggregation to support interleaved encryption and authentication operations on multiple data records
WO2023103414A1 (zh) 媒体数据加密方法和装置、媒体数据播放方法和系统
CN106850211A (zh) 一种基于mac地址的加密方法及系统
WO2016202089A1 (zh) 一种远端存储设备的数据加密方法、装置及系统
CN114338648A (zh) 一种基于国密算法的sftp多端文件安全传输的方法及系统
CN114286116B (zh) 媒体数据播放方法、装置和系统
CN114186255A (zh) 媒体数据加密方法、装置、计算机设备和存储介质
CN115174261A (zh) 基于分阶划层与密中密分发的混合加密解密系统与方法
US7483535B2 (en) Transmission of generalized scalable bit-streams
CN115766244A (zh) 车联网信息加密方法、装置、计算机设备和存储介质
CN111130788B (zh) 数据处理方法和系统、数据读取方法和iSCSI服务器
CN115085983A (zh) 数据处理方法、装置、计算机可读存储介质和电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22902847

Country of ref document: EP

Kind code of ref document: A1