An encryption and decryption method for video stream media programs
A technology for media programs and video programs, applied in the field of encryption and decryption of video streaming media programs, can solve the problems of insecurity, complex payment process, lack of video program encryption and charging payment technical support means, etc., to avoid black box operations.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0028] Embodiment 1: Encryption and decryption processing of live video programs
[0029] For the programs broadcast live by the TV server according to the program schedule, the mobile phone player can ask the server for a general unlock code bound to the communication number of the client. Later, when playing the live video programs provided by the server, the unlock process will be automatically performed by the player. Finish. TV operators can design different levels of unlocking codes. These unlocking codes are associated with program rates, such as a monthly subscription system, or a charging system based on the number of programs. For example, the monthly subscription system unlocking codes are valid within a certain period of time. All kinds of live programs within the specified range are regularly deducted from the mobile phone number’s communication fee account, and the unlock code of the charge-by-quantity system is generated by the TV server according to the charact...
Embodiment 2
[0031] Embodiment 2: Encryption and decryption processing of video-on-demand programs
[0032] Mobile phone users can also order and watch programs they are interested in on the TV server according to their preferences. Such programs are rich in resources and may become the main way to watch mobile TV. For on-demand TV programs, encryption and decryption are implemented in two ways:
[0033]One is that the TV server broadcasts a soft encryption lock in the beginning of the program file in advance. When the user orders and tries to watch, the TV server sends the program data to the user's mobile phone. The subtitle prompt for watching, and the remaining time that the user may still watch for free, such as 5 minutes, is displayed through the subtitle countdown method. If the user does not confirm, the server stops sending data after 5 minutes, and is limited in a certain time (as in 2 hours), the user can not continue to try this program, but can change a program to try. If th...
Embodiment 3
[0035] Embodiment 3: Encryption and decryption processing of video file download and playback
[0036] If the mobile phone user downloads the program file to play offline, after the server deducts the program fee according to the above method, when the user starts downloading, insert the soft encryption key into the program file and send it to the mobile phone for downloading, and the key in the soft encryption key is the same as the user's Mobile phone number binding. After the user's mobile phone has downloaded the program file, it can be played on the local player. During the playback, when the player detects that there is a soft encryption lock, it will compare the key of the soft encryption lock with the mobile phone number of the machine. If match, continue to play the program file, otherwise prompt the user that the program file is downloaded for a fee and cannot continue to play on this machine, prompting the user to pay for downloading again.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com