An encryption and decryption method for video stream media programs

A technology for media programs and video programs, applied in the field of encryption and decryption of video streaming media programs, can solve the problems of insecurity, lack of video program encryption and charging payment technical support means, and complicated payment process, so as to avoid black box operations.

Inactive Publication Date: 2008-02-20
融创天下(上海)科技发展有限公司
View PDF0 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, for online video programs to develop smoothly, a good program source is the first priority. In addition, there must be a feasible, convenient and safe payment method that is easy for the audience to operate. These are difficult to achieve on the wired Internet. Because the payment mode is not easy to solve, it is not advisable to collect cash directly from users, and the online payment process is complicated and not safe
However, in the development of paid video program services on the wireless Internet with mobile phones as access terminals, there is already a mature and reliable payment model that is easy for viewers to accept. At present, there is still a lack of corresponding technical support methods for video program encryption and fee payment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Embodiment 1: Encryption and decryption processing of live video programs

[0028] For the programs broadcast live by the TV server according to the program schedule, the mobile phone player can ask the server for a general unlock code bound to the communication number of the client. Later, when playing the live video programs provided by the server, the unlock process will be automatically performed by the player. Finish. TV operators can design different levels of unlocking codes. These unlocking codes are associated with program rates, such as a monthly subscription system, or a charging system based on the number of programs. For example, the monthly subscription system unlocking codes are valid within a certain period of time. All kinds of live programs within the specified range are regularly deducted from the mobile phone number’s communication fee account, and the unlock code of the charge-by-quantity system is generated by the TV server according to the charact...

Embodiment 2

[0030] Embodiment 2: Encryption and decryption processing of video-on-demand programs

[0031] Mobile phone users can also order and watch programs they are interested in on the TV server according to their preferences. Such programs are rich in resources and may become the main way to watch mobile TV. For on-demand TV programs, encryption and decryption are implemented in two ways:

[0032] One is that the TV server broadcasts a soft encryption lock in the beginning of the program file in advance. When the user orders and tries to watch, the TV server sends the program data to the user's mobile phone. The subtitle prompt for watching, and the remaining time that the user may still watch for free, such as 5 minutes, is displayed through the subtitle countdown method. If the user does not confirm, the server stops sending data after 5 minutes, and is limited in a certain time (as in 2 hours), the user can not continue to try this program, but can change a program to try. If t...

Embodiment 3

[0034] Embodiment 3: Encryption and decryption processing of video file download and playback

[0035] If the mobile phone user downloads the program file to play offline, after the server deducts the program fee according to the above method, when the user starts downloading, insert the soft encryption key into the program file and send it to the mobile phone for downloading, and the key in the soft encryption key is the same as the user's Mobile phone number binding. After the user's mobile phone has downloaded the program file, it can be played on the local player. During the playback, when the player detects that there is a soft encryption lock, it will compare the key of the soft encryption lock with the mobile phone number of the machine. If match, continue to play the program file, otherwise prompt the user that the program file is downloaded for a fee and cannot continue to play on this machine, prompting the user to pay for downloading again.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The utility model discloses an encryption and decryption method of a video streaming media program, which is characterized in that: firstly, an encryption and decryption module is founded in a video server, and the video program which needs to be encrypted is processed; secondly, a soft encryption lock is inserted to a specific part of the video program which needs to be encrypted; thirdly, client side users are suggested to pay for watching when users encounters the soft encryption lock in the process of playing the encrypted video program; fourthly, program fee from communication accounts of the users is deducted when the users confirm, and the transmitting content of charging program is automatically recovered. The technical proposal of the utility model has the advantages of providingan effective management means for the operation of charging the video program, enabling suppliers and buyers of the video program to transact with mutual informed and voluntary choice through the soft encryption lock method to encrypt the charging video program dynamically, avoiding black box work and the arisen trust crisis in various transactions of network information, and ensuring healthy andorderly development of transactions of network information.

Description

technical field [0001] The invention relates to the application field of video streaming media, in particular to an encryption and decryption method for video streaming media programs. Background technique [0002] The Internet is a technology-driven industry, and technological innovation is driving the rapid development of this industry. With the continuous improvement of network bandwidth and the development of data processing technology, the information dissemination on the Internet is also developing towards enrichment and diversification. From simple text and pictures to high-quality audio and video transmission, the Internet has been integrated into our work and life. Among them, video, as an advanced stage of Internet information transmission, is becoming a milestone in the development of the Internet. Entertainment and cultural video programs will become the main force in the development of Internet video business, especially the wireless Internet with mobile phones...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N7/167H04N7/16
Inventor 赵忠华魏勇
Owner 融创天下(上海)科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products