CN106209896B - Streaming media encryption method and module based on audio and video formats - Google Patents
Streaming media encryption method and module based on audio and video formats Download PDFInfo
- Publication number
- CN106209896B CN106209896B CN201610613721.9A CN201610613721A CN106209896B CN 106209896 B CN106209896 B CN 106209896B CN 201610613721 A CN201610613721 A CN 201610613721A CN 106209896 B CN106209896 B CN 106209896B
- Authority
- CN
- China
- Prior art keywords
- encryption
- audio
- video file
- encrypted
- video
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 101100378010 Bacillus subtilis (strain 168) accC1 gene Proteins 0.000 claims description 5
- 101100322122 Bacillus subtilis (strain 168) accC2 gene Proteins 0.000 claims description 5
- 101150070497 accC gene Proteins 0.000 claims description 5
- 230000004044 response Effects 0.000 claims description 5
- 230000000977 initiatory effect Effects 0.000 claims description 2
- 230000004048 modification Effects 0.000 claims description 2
- 238000012986 modification Methods 0.000 claims description 2
- 238000012545 processing Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 10
- 230000005540 biological transmission Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 206010011971 Decreased interest Diseases 0.000 description 1
- 208000003028 Stuttering Diseases 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/70—Media network packetisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/75—Media network packet handling
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The application relates to a method and a module for encrypting streaming media based on an audio and video format. The scheme comprises the following steps: receiving an audio-video file to be encrypted and a key provided by a user for encryption; encrypting the audio-video file based on the key provided by the user by using an encryption algorithm associated with the encryption level according to the set encryption level; and outputting the encrypted audio and video file.
Description
Technical Field
The present application relates to the technical field of streaming media encryption, and in particular, to a streaming media encryption method and module based on an audio/video format.
Background
With the development of internet technology and the continuous increase of network bandwidth, users watching videos through the internet have become a daily habit having a tendency to replace the conventional watching of television. More and more users choose to view various video files from content providers on the internet. Although many contents provided by a content provider are free, a large amount of video is required to be smoothly viewed after a certain fee is charged to a user for the needs of the content provider's own economic interests. Such charging mechanisms are related to copyright protection of video content. And a perfect video content copyright protection mechanism is always lacked in the internet field of China, so that illegal copy and propagation of charged video content are easy to carry out.
In order to solve the illegal copy and retransmission, especially for streaming media contents, the existing internet also provides some copyright protection mechanisms using encryption/decryption technology, such as MPEG, H26x, WMV all provide corresponding video encryption mechanisms. However, the current streaming media encryption schemes are complex and have high requirements on computing processing capacity. However, as communication technology is continuously developed, more and more users begin to use mobile end devices, such as mobile phones, smart phones, personal digital assistants, tablets, and the like, to access video content on the internet. These mobile devices have limited processing power for computing video files compared to personal computers (e.g., desktop or notebook), and thus the complexity of encrypting and decrypting streaming media cannot be too high. This also makes these streams easily cracked and then freely distributed, resulting in a loss of interest to the content provider.
Moreover, the existing encryption/decryption scheme destroys the structure of the audio/video file after encrypting the audio/video file, which requires that the subsequent network transmission link can be compatible with the destroyed structure. Especially for a Content Delivery Network (CDN), since the encrypted audio/video file structure is damaged, the CDN needs to parse the format again to identify the real content of the content, which brings inconvenience to the CDN and greatly reduces the content storage and delivery efficiency of the CDN. And also provides a barrier to the spread of the entire encryption/decryption scheme.
Therefore, there is a need to provide a novel encryption/decryption scheme to solve the above-mentioned problems in the prior art.
Disclosure of Invention
An object of the present application is to solve various inconveniences in existing encryption/decryption schemes used in copyright protection of streaming media contents.
The application relates to a streaming media encryption method and system based on an audio and video format.
In a first aspect of the present application, a method for encrypting streaming media based on an audio-video format is provided, including: receiving an audio-video file to be encrypted and a key provided by a user for encryption; encrypting the audio-video file based on the key provided by the user by using an encryption algorithm associated with the encryption level according to the set encryption level; and outputting the encrypted audio and video file.
In a second aspect of the present application, there is provided a method of viewing streaming media encrypted according to the method of claim 1, comprising: initiating a request to play the encrypted audio-video file, the request including a URL where the encrypted audio-video file is stored and a key provided by the user; sending the request to a player having a decryption module and parsing the request by the player to obtain the URL and a key; the player initiates a download request of the encrypted audio and video file to a cloud service computer based on the URL; the player decrypts the downloaded encrypted audio and video file data based on the key while downloading the encrypted audio and video file data from the cloud service computer and simultaneously returns the decrypted audio and video file data to the user for playing.
In a third aspect of the present application, an encryption module for encrypting streaming media based on an audio-video format is provided, which includes: the input port is used for receiving an audio and video file needing to be encrypted and a key provided by a user and used for encryption; an encryption level port to assist a user in setting an encryption level to encrypt the audio-video file based on the key provided by the user using an encryption algorithm associated with the encryption level; an output port for outputting the encrypted audio-video file.
Drawings
FIG. 1 is a schematic diagram of a system operating environment according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of the operation of an encryption module according to an embodiment of the present invention.
Fig. 3 is a flow diagram of a method for encrypting an audio-video file according to an embodiment of the present invention.
Fig. 4 is a flow diagram of providing a user with a requested audio-video file based on a user-initiated request to view an encrypted audio-video file in accordance with an embodiment of the present invention.
Detailed Description
The method mainly solves the problem of copyright protection of the video, and particularly, only a user who obtains a decryption algorithm and a secret key can decrypt and watch the encrypted video.
The current streaming media encryption schemes are complex and have high requirements on the computing processing capacity of equipment, so that high CPU load is occupied. Especially, when the mobile terminal plays, due to limited device resources, the decryption may cause problems of delay, stutter, or asynchronous sound and image in video playing, which seriously affects the user viewing experience. Even on the PC side, the complex decryption scheme can affect the viewing experience of the user when the PC performs multitasking operations that consume more resources. In addition, after the existing encryption scheme encrypts the audio and video files, the structure of the audio and video files is damaged, and thus the compatibility problem can be brought to the link of network transmission. Particularly, when the audio/video file is streaming media content, the disruption of the file structure may cause the original streaming data transmission sequence to be disordered, so that the streaming media content cannot be normally viewed through a network.
Aiming at two main problems existing in the current streaming media encryption scheme, the application provides a streaming media encryption method and system based on an audio and video format. The method and system provide the following improvements over prior solutions:
(1) on the premise of guaranteeing the same security level of the audio and video files, the complexity of encryption is minimized.
(2) On the premise of not influencing the experience of watching the audio and video files of the user, the complexity of decryption is minimized.
(3) The sizes of the files before and after encryption are kept consistent, so that the uploading and downloading flow is not increased.
(4) The original audio and video file structure is not changed after encryption, and the compatibility problem brought by a network transmission link is reduced.
First, as shown in FIG. 1, a schematic diagram of a system operating environment 100 according to an embodiment of the present invention is disclosed. In the system operating environment 100, a cloud service computer 110 and a client source station 120 connected through a network 130 are included. The cloud service computer 110 provides a user with a desired service through a network in an on-demand, easily extensible manner. For example, in the present embodiment, the cloud service computer 110 may provide a cloud storage service and a cloud encryption service. The cloud storage service may receive the audio and video file to be encrypted from the client source station 120, store the audio and video file in a cloud storage module in the cloud service computer 110, and return the URL of the audio and video file stored in the cloud storage module to the client source station 120. The cloud encryption service may encrypt a corresponding audio/video file stored by the cloud storage service according to a request of the encrypted audio/video file from the client source station 120 received by the cloud service computer 110, store the encrypted audio/video file in the cloud storage module, and return a URL corresponding to the encrypted audio/video file stored in the cloud storage module to the client source station 120. Due to the fact that the cloud technology is utilized, in the embodiment, storage and encryption of the audio and video files can be completed by the cloud service computer 110, the requirement for computing processing capacity of the client source station is greatly reduced, and a user can achieve good viewing experience even if the user uses a mobile device with limited processing capacity, such as a smart phone.
Next, in FIG. 2, an operational schematic of an encryption module 200 according to an embodiment of the present invention is disclosed. The encryption module 200 may be implemented by using units having an arithmetic function, such as a CPU, a microprocessor, and a coprocessor. Specifically, the encryption module includes: the input port is used for receiving an audio and video file needing to be encrypted and a key provided by a user and used for encryption; an encryption level port to assist a user in setting an encryption level to encrypt the audio-video file based on the key provided by the user using an encryption algorithm associated with the encryption level; and an output port for outputting the encrypted audio-video file. Unlike the prior art encryption schemes that provide only one encryption mechanism, the encryption module of the present invention provides multiple levels of encryption depending on the user's usage scenario.
For example, in one embodiment, if the audio-video file needs to be encrypted for charging purposes only, an encryption level of 0 may be provided. In the encryption level, the encryption module only encrypts some key information in the audio and video file without destroying the integrity of the audio and video frame data. Thus, the cost is minimized and the consumed processing resources such as a CPU are almost negligible in decryption. In particular practice, this encryption level may be used to limit the encrypted audiovisual files from being played by a general purpose player. In other words, only a dedicated player with a corresponding decryption function can play such a level of encrypted audio-video files. But the special player can smoothly play the whole audio and video file without decrypting the whole file from beginning to end only by spending a few resources to decrypt the key information in the audio and video file. Since this encryption level 0 has the feature of consuming very little resources, it is well suited to be incorporated into video applications for mobile devices with limited processing resources. Many media players developed specifically for mobile devices may employ such encryption levels to provide a good video experience for the user by reducing the resource consumption of the mobile device by encryption/decryption while ensuring a sufficient level of security for audio-video files. In addition, the encryption level can not change the structure of the original audio/video file, thereby reducing the compatibility problem brought by the link of network transmission.
Secondly, in another embodiment, an encryption level of level 1 may also be provided when the audio-video file contains important content that is not known to others. At this level, encryption of specified data in the audio/video frame is added to achieve the purpose of destroying the integrity of the audio/video frame data file. Since the integrity of the file is destroyed while the file is encrypted, if the user does not have a corresponding key, the original audio/video file cannot be completely restored from the encrypted data. Moreover, because the integrity of the audio and video file is damaged, even if the user only wants to obtain a certain section of video in the audio and video file, the security level of the audio and video file is greatly improved, and important contents contained in the audio and video file are well protected. However, the encryption scheme of level 1 is relatively complex and consumes more processing resources than the encryption scheme of level 0, and thus it is more suitable to be implemented by a cloud service computer having sufficient processing resources or by a server on a network that can also be connected to the cloud service computer.
The level 0 and level 1 encryption algorithms that may be implemented are described in detail below. In the description, the most common mp4 video file is discussed as an example. Those skilled in the art will appreciate that the mp4 video file is for illustrative purposes only and is not intended to limit the present invention thereto. Indeed, any other video and audio format file is suitable for use with the inventive arrangements, such as RMVB, AVI, WMV, MKV, MPG, etc. video formats and MP3, WAV, WMA, APE, etc. audio formats.
1. Encryption algorithms (currently exemplified encryption of mp4 video files) include:
1.1 modifying the value of Major brand to a value specified by an encryption algorithm indicating whether the video file is an encrypted file;
1.2 modify the value of Minor version to indicate the encryption level of the video file, e.g., 0 for level 0, 1 for level 1, and so on;
1.3 modifying names of Avc1box, accC box, mp4a box and mp4v box as names specified by an encryption algorithm, because a common player needs to analyze the field for initialization, destroying the name of the field can result in that the common player cannot find the field and cannot analyze the contents of the field, so as to achieve the effect of preliminary encryption;
1.4, carrying out self-defined encryption operation (such as bit operation) on the content of each box specified by 1.3 and a key provided by a client, and replacing the original content with the obtained encrypted content, wherein the number of bytes before and after encryption is kept unchanged, so that the purpose of not changing the structure and size of a video file can be realized;
the steps from 1.1 to 1.4 belong to the encryption algorithm of encryption level 0, in other words, if the user chooses to perform encryption of encryption level 0 on the video file, the encryption process ends here.
When the user selects the encryption level 1, the encryption algorithm includes, in addition to the above-mentioned encryption steps:
1.5 for a specified number of bytes of data of a video key frame, the following operations are performed:
it is AES (advanced Encryption standard) encrypted using a client-provided key, which is a block Encryption, so the specified number of bytes must be an integer multiple of 16. Since non-key frames of the video must rely on key frames for decoding, only the key frames need to be encrypted; taking an audio/video file with a key frame size of 10000 bytes as an example, the specified byte number of the video is 128 bytes, and the specified byte number of the audio is 64 bytes. In other embodiments, for example, in the case of performing AES encryption on data of specified byte number of an audio frame in an audio/video file, since the decoding of the audio frame does not need to depend on an adjacent audio frame, the AES encryption is performed on each audio frame; because AES encryption does not change the byte number, the structure and the size of the video file can be ensured not to be changed; it should be noted that although the AES encryption technique is described, the example is for illustrative purposes only, and other suitable encryption techniques may be applied to the encryption process.
1.6 for each key frame in the video, sequentially performing AES encryption of the video key frame (in the case of an audio frame, for each audio frame) in a loop until the end of the file, the encryption process to this level 1 is complete.
It should be noted that the above encryption algorithm is described for illustrative purposes only, and is not intended to limit the encryption algorithm of the present invention in any way. Other suitable encryption algorithms may be applied in the present invention.
It should be understood that the level 0 and level 1 encryption levels described above are merely exemplary illustrations and are not intended to limit the present solution to these two levels. Indeed, in other embodiments, more levels of encryption may be provided to achieve different privacy goals depending on the security requirements of the scene. For example, in a certain encryption level, when the key of the user is not right, the audio-video file can be actively destroyed, even in some encryption levels, when the key is incorrect, an alarm (for example, by means of notification, message, link, and the like) can be actively sent to a corresponding content provider or police to remind that the audio-video file is illegally accessed, and the like. Those skilled in the art can program other levels of encryption processing to achieve additional security requirements such as those described above, depending on the particular needs. For the sake of economy, a detailed description is not given here.
In the above, a multilevel encryption technique adopted by the encryption module of the present application is introduced, which can be well adapted to various device resources and user requirements, thereby providing a more flexible encryption solution.
With the encryption scheme of the present application in mind, a flow diagram of a method 300 for encrypting audio-visual files in accordance with an embodiment of the present invention will now be described with reference to fig. 3. First, at 310, an encryption module receives from a user of a client source station an audio-video file to be encrypted and a corresponding key provided by the user for encryption. At step 320, the encryption level is communicated to the encryption module via an interface, such as by presenting a user interface to the user for the user to select the desired encryption level. It should be noted that this step is optional and not necessary, as the encryption module may have a default encryption level without specific user specification. The encryption module encrypts the audio-video file with the specified encryption level only if the user specifies the other encryption level. Subsequently, at step 330, the encryption module encrypts the audio-video file based on the key input by the user using an encryption algorithm associated with the encryption level according to the encryption level selected by the user. The encryption may be performed by an encryption module at the mobile device or by an encryption server in the cloud service computer depending on the complexity of the encryption algorithm associated with the selected encryption level and the demand for processing resources. Next, in step 340, after completing the encryption of the audio-video file, the encryption module outputs the encrypted audio-video file to, for example, store in a storage module of the cloud service computer. Alternatively, after the encrypted audiovisual file is output and stored at step 340, the encryption module may return a response to the user indicating that the encryption and saving of the audiovisual file is complete to inform the user that the requested encryption task has been completed at step 350. After receiving the response of successful encryption, the client source station updates the file list of the client source station to record the completion of the encryption task.
In another embodiment, in addition to receiving the audio/video file to be encrypted from the user of the client source station, the encryption module may also receive a URL associated with the audio/video file to be encrypted from the user of the client source station and download the audio/video file to be encrypted from a network location specified by the URL, or the user of the client source station may store the audio/video file to be encrypted in advance in a storage module at the cloud service computer for invocation of the encryption module at the cloud service computer.
In yet another embodiment, when the encryption module at the cloud service computer performs the encryption task and stores the encrypted audio-video file, in addition to returning a success response to the client source station at step 350, the URL of the encrypted audio-video file may be returned to the client source station along with it.
Next, a flowchart for providing a user with a requested audio-video file based on a user-initiated request to view an encrypted audio-video file according to an embodiment of the present invention will be described with reference to fig. 4. First, at step 410, a user of a client source station clicks an icon of an audiovisual file on the client source station in an application (e.g., browser, file manager) to initiate a video play request. In step 420, the client source station sends the video play request to a player having a decryption module, the request including the URL of the encrypted audio-video file and the user-supplied key. At step 430, after receiving the video play request, the player parses the request to obtain the URL and key of the encrypted audio-video file therein. In step 440, the player initiates a GET download request for the encrypted audio video file to the cloud service computer based on the URL of the encrypted audio video file. In step 450, the cloud service computer returns the encrypted audio and video file associated with the URL to the player according to the received GET download request. In step 460, the player starts to download the audio/video file data from the cloud service computer while decrypting the downloaded audio/video file data based on the key and simultaneously returns the decrypted audio/video file data to the user for playing. And continuing the whole process until the whole audio and video file is played. In the above scheme, the player is installed at the client source. In yet another embodiment, the cloud service computer may also have the decryption module. Because, when the encrypted audio/video file is encrypted based on level 0, the decryption process does not consume too many resources of the client source, and does not affect the viewing experience of the user, the player of the client source has the ability to decode and provide a smooth viewing experience. However, when the encrypted audio/video file is encrypted based on the level 1 or higher, the decryption module can complete a relatively complex decryption process of the encrypted audio/video file at the cloud service computer by using the powerful processing resources of the cloud service computer, and then return the decrypted audio/video file to the player at the client source, at this time, the decryption module of the player does not need to consume a large amount of limited resources to decrypt the received audio/video file, but the player directly plays the decrypted audio/video file, thereby ensuring smooth viewing experience. In the following, a specific decryption algorithm procedure is exemplified. As mentioned above, the decryption process is also discussed with the mp4 video file as an example, and other suitable video and audio format files are equally applicable to the present application:
2. decryption algorithms (decryption of the current example mp4 video file) include:
2.1 recovering the value of Major brand as the original value before encryption;
2.2 analyzing Minor version to obtain the encrypted level and restoring the level to the original value before encryption;
2.3 recovery of modification of Avc1box, accC box, mp4a box, mp4v box names by the encryption algorithm so that they are restored to the original names;
2.4 decrypting the encrypted content of the box according to the key provided by the user to obtain the original content, and completing the decryption process for the encryption level 0.
If the user selects encryption level 1 for encrypting the video file, the decryption algorithm includes, in addition to the above decryption steps:
2.5 continuing to decrypt the encrypted data of the video key frame (in the case of audio frames, each audio frame) by the specified number of bytes according to the key provided by the user to obtain the original data;
2.5 the decryption of the video key frames (in the case of audio frames, each audio frame) is performed in a loop until the end of the file, until the decryption process is complete.
As described above, the decryption process described above may be implemented embedded in the player.
It should be noted that the above decryption algorithm is described for illustrative purposes only, and is not intended to limit the decryption algorithm of the present invention in any way. Other suitable decryption algorithms may be applied in the present invention.
Those skilled in the art will appreciate that the present invention may be practiced with the following benefits, from the various embodiments described in conjunction with the above-described figures:
(1) different encryption levels are set according to different use scenes of customers so as to realize the best compromise of data security and playing experience.
(2) The encrypted key is provided by the client, and conflicts do not exist among different clients, namely one client cannot watch and use the audio-video files of another client, so that the security of the audio-video files of each client is guaranteed.
(3) The sizes of the files before and after encryption are consistent, the flow of uploading and downloading of the client and the user is not increased, and the benefits of the client and the user are ensured.
(4) The original audio and video file structure is not changed after encryption, and the compatibility problem brought by a network transmission link is reduced.
(5) The complexity of encryption is minimized, so that the decryption cost of the user side is minimum, and the viewing experience of the user can be improved.
The subject matter of the present application is described with specificity herein to meet statutory requirements. However, the description itself is not intended to limit the scope of this patent. Rather, the inventors have contemplated that the claimed subject matter might also be embodied in other ways, to include different steps or combinations of steps similar to the ones described in this document, in conjunction with other present or future technologies. Moreover, although the terms "step" and/or "block" may be used herein to connote different elements of methods employed, the terms should not be interpreted as implying any particular order among or between various steps herein disclosed unless and except when the order of individual steps is explicitly described.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the described features or acts or to the order of the described acts. More specifically, the described features and acts are disclosed as example forms of implementing the claims. The present application may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the application is, therefore, indicated by the appended claims rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Claims (8)
1. A method for encrypting streaming media based on audio and video formats is characterized by comprising the following steps:
receiving an audio-video file to be encrypted and a key provided by a user for encryption;
encrypting the audio-video file based on the key provided by the user by using an encryption algorithm associated with the encryption level according to a set encryption level, wherein the encryption algorithm associated with the encryption level is different for different encryption levels;
outputting the encrypted audio and video file;
wherein, when the audio/video file is an MP4 video file, the encryption algorithm comprises the following steps:
modifying a value of Major brand to a value specified by the encryption algorithm, the value indicating whether the video file is an encrypted file;
modifying the value of Minor version to represent the encryption level of the video file, wherein a value of 0 represents an encryption level of 0 and a value of 1 represents an encryption level of 1;
modifying Avc1box, accC box, mp4a box, mp4v box names as the names specified by the encryption algorithm;
carrying out encryption operation on the content of each box and a key provided by a client, and replacing the original content with the obtained encrypted content;
encryption level if the encryption level is 1, the following steps are continued:
wherein if the Minor version value is 0, the encryption algorithm is ended, and when the Minor version value is 1, the encryption algorithm further includes the steps of:
and sequentially and circularly executing AES encryption to the tail part of the audio/video file for the data with the specified byte number of each key frame of the video.
2. The method of claim 1, further comprising:
and storing the output encrypted audio and video file in a storage module of the cloud service computer, and returning a response indicating that the encryption and the storage of the audio and video file are completed to the user, wherein the response comprises the URL of the encrypted audio and video file.
3. The method of claim 1, wherein the encryption level is communicated over an interface or the encryption level is a default encryption level.
4. The method of claim 1, wherein for audio frames in the audio video file, the AES encryption is performed for each audio frame until the end of the audio video file.
5. A method of viewing streaming media encrypted according to the method of claim 1, comprising:
initiating a request to play the encrypted audio-video file, the request including a URL where the encrypted audio-video file is stored and a key provided by the user;
sending the request to a player having a decryption module and parsing the request by the player to obtain the URL and a key;
the player initiates a download request of the encrypted audio and video file to a cloud service computer based on the URL;
the player decrypts the downloaded data of the encrypted audio and video file based on the key and plays the decrypted audio and video file while downloading the data of the encrypted audio and video file from the cloud service computer;
wherein when the audio/video file is an MP4 video file, the decrypting includes the steps of:
recovering the value of the Major brand as the original value before encryption;
restoring modifications to Avc1box, accC box, mp4a box, mp4v box names by the encryption algorithm so that they are restored to the original names;
decrypting the encrypted content in each box according to a key provided by a user to obtain original content;
wherein, when the value of Minor version is 1, the decryption further comprises the following steps:
and for the encrypted data with the specified byte number of each key frame of the video, sequentially executing decryption according to a key provided by a user until the tail part of the audio/video file so as to obtain original data.
6. The method of claim 5, wherein the decryption module is also installable at the cloud service computer, and wherein the decrypting is performed by the decryption module at the cloud service computer instead of the player when the encrypted audio-video file is encrypted based on an encryption level of encryption level 1 or higher.
7. A method as claimed in claim 5, wherein for audio frames in the audiovisual file, the decryption is performed for each audio frame up to the end of the audiovisual file.
8. An encryption module for encrypting streaming media based on an audio-video format is characterized by comprising:
the input port is used for receiving an audio and video file needing to be encrypted and a key provided by a user and used for encryption;
an encryption level port to assist a user in setting an encryption level to encrypt the audio-video file based on the key provided by the user using an encryption algorithm associated with the encryption level, wherein the encryption algorithm associated with the encryption level is different for different encryption levels;
an output port for outputting encrypted audio and video files;
wherein, when the audio/video file is an MP4 video file, the encryption algorithm comprises the following steps:
modifying a value of Major brand to a value specified by the encryption algorithm, the value indicating whether the video file is an encrypted file;
modifying the value of Minor version to represent the encryption level of the video file, wherein a value of 0 represents an encryption level of 0 and a value of 1 represents an encryption level of 1;
modifying Avc1box, accC box, mp4a box, mp4v box names as the names specified by the encryption algorithm;
carrying out encryption operation on the content of each box and a key provided by a client, and replacing the original content with the obtained encrypted content;
encryption level if the encryption level is 1, the following steps are continued:
wherein if the Minor version value is 0, the encryption algorithm is ended, and when the Minor version value is 1, the encryption algorithm further includes the steps of:
and sequentially and circularly executing AES encryption to the tail part of the audio/video file for the data with the specified byte number of each key frame of the video.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610613721.9A CN106209896B (en) | 2016-07-29 | 2016-07-29 | Streaming media encryption method and module based on audio and video formats |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610613721.9A CN106209896B (en) | 2016-07-29 | 2016-07-29 | Streaming media encryption method and module based on audio and video formats |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106209896A CN106209896A (en) | 2016-12-07 |
CN106209896B true CN106209896B (en) | 2020-02-18 |
Family
ID=57496829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610613721.9A Expired - Fee Related CN106209896B (en) | 2016-07-29 | 2016-07-29 | Streaming media encryption method and module based on audio and video formats |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209896B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110650107A (en) * | 2018-06-26 | 2020-01-03 | 杭州海康威视数字技术股份有限公司 | Data processing method, device and system |
CN111093097A (en) * | 2019-12-20 | 2020-05-01 | 北京云享智胜科技有限公司 | Stream media data encryption and decryption method and device, electronic equipment and storage medium |
CN112966284A (en) * | 2021-03-26 | 2021-06-15 | 知印信息技术(天津)有限公司 | File encryption and decryption method and system and computer readable storage medium |
CN115225869B (en) * | 2022-09-20 | 2022-12-20 | 广州万协通信息技术有限公司 | Directional processing method and device for monitoring data |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1494803A (en) * | 2001-02-26 | 2004-05-05 | �ɸ���Ӱ��ɷ�����˾ | Encryption of compressed video stream |
CN1997159A (en) * | 2006-09-29 | 2007-07-11 | 清华大学深圳研究生院 | Encryption method of video stream based on H.264 coding standard with controllable quality |
CN101350918A (en) * | 2008-09-05 | 2009-01-21 | 清华大学 | Method for protecting copyright of video content |
CN101895396A (en) * | 2010-07-14 | 2010-11-24 | 中兴通讯股份有限公司 | Mobile terminal and encryption method thereof |
CN102647420A (en) * | 2012-03-31 | 2012-08-22 | 苏州阔地网络科技有限公司 | Control method and system for preventing illegal connection |
CN103248474A (en) * | 2012-02-01 | 2013-08-14 | 华为技术有限公司 | Encryption and decryption method and device for streaming media |
CN103716637A (en) * | 2014-01-15 | 2014-04-09 | 北京工业大学 | H.264 compressed domain layered video encryption method based on content analysis |
CN105208404A (en) * | 2015-08-26 | 2015-12-30 | 北京新东方迅程网络科技有限公司 | Video encryption and decryption method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020141582A1 (en) * | 2001-03-28 | 2002-10-03 | Kocher Paul C. | Content security layer providing long-term renewable security |
-
2016
- 2016-07-29 CN CN201610613721.9A patent/CN106209896B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1494803A (en) * | 2001-02-26 | 2004-05-05 | �ɸ���Ӱ��ɷ�����˾ | Encryption of compressed video stream |
CN1997159A (en) * | 2006-09-29 | 2007-07-11 | 清华大学深圳研究生院 | Encryption method of video stream based on H.264 coding standard with controllable quality |
CN101350918A (en) * | 2008-09-05 | 2009-01-21 | 清华大学 | Method for protecting copyright of video content |
CN101895396A (en) * | 2010-07-14 | 2010-11-24 | 中兴通讯股份有限公司 | Mobile terminal and encryption method thereof |
CN103248474A (en) * | 2012-02-01 | 2013-08-14 | 华为技术有限公司 | Encryption and decryption method and device for streaming media |
CN102647420A (en) * | 2012-03-31 | 2012-08-22 | 苏州阔地网络科技有限公司 | Control method and system for preventing illegal connection |
CN103716637A (en) * | 2014-01-15 | 2014-04-09 | 北京工业大学 | H.264 compressed domain layered video encryption method based on content analysis |
CN105208404A (en) * | 2015-08-26 | 2015-12-30 | 北京新东方迅程网络科技有限公司 | Video encryption and decryption method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106209896A (en) | 2016-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10645430B2 (en) | Reducing time to first encrypted frame in a content stream | |
CN102308547B (en) | Method for streaming multimedia data over a non-streaming protocol | |
TWI610562B (en) | Real-time or near real-time streaming | |
JP5730786B2 (en) | Multiple content protection systems in one file | |
US9385998B2 (en) | Signaling and carriage of protection and usage information for dynamic adaptive streaming | |
EP2420952B1 (en) | System and method for protecting digital media content | |
CN101409713A (en) | Content distribution system, distribution server, terminal, and content distributing method | |
KR20090018634A (en) | Advertising transfer and playback on portable devices | |
US9450748B2 (en) | Decryption of content including partial-block discard | |
US7249264B2 (en) | Secure IP based streaming in a format independent manner | |
JP2013534684A (en) | Method and apparatus for providing DRM service | |
TW201210324A (en) | Real-time or near real-time streaming | |
CN104255010A (en) | Support for short cryptoperiods in template mode | |
JP2019521606A (en) | Provision of online media content via satellite broadcasting system | |
CN106209896B (en) | Streaming media encryption method and module based on audio and video formats | |
US20130322628A1 (en) | Apparatus and method for transceiving content in a digital broadcast system | |
US20110066843A1 (en) | Mobile media play system and method | |
CN109120998A (en) | media data transmission method, device and storage medium | |
US10127396B2 (en) | System and method for local generation of streaming content with a hint track | |
US8196214B2 (en) | Method and apparatus for securing content using encryption with embedded key in content | |
US20070189578A1 (en) | Computer-implemented method and system for perceptual cryptography in file-sharing environments | |
Hua et al. | Content protection for IPTV-current state of the art and challenges |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200218 |