Method for security protection of video data of set top box for peer-to-peer computing

A technology for security protection and video data, which is applied in the direction of TV, color TV, color TV parts, etc., to achieve the effect of good security, improved concealment and high security

Inactive Publication Date: 2010-07-21
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Technical problem: the purpose of the present invention is to propose a video data security protection method for a peer-to-p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for security protection of video data of set top box for peer-to-peer computing
  • Method for security protection of video data of set top box for peer-to-peer computing
  • Method for security protection of video data of set top box for peer-to-peer computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] 1. Architecture

[0036] This solution is mainly divided into four parts: publishing server, media server, key server and user set-top box. The specific architecture is as follows: figure 1 .

[0037] Publisher contains scrambler, key generator, video encoder, audio encoder and multiplexer. The original video can be regarded as an image sequence of 25 frames per second, that is, 25 images per second. The scrambling encryptor is an image encryptor that encrypts 25 images per second. A key generator generates keys for scrambling encryption and decryption. Since the encrypted video image is very large and cannot be transmitted on the network, a video encoder is used, which uses the great correlation and redundancy between video images to compress the video image, and forms a packaged basic image after compression. Stream (PES, Program Elementary Stream) file. The original audio data is also very large and is not suitable for transmission on the network. It must be com...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for security protection of video data of a set top box for peer-to-peer computing, which is a technical method for security protection of video data of a P2P IPTV system. On the basis of the P2P IPTV system, a digital image scrambling encryption technology is introduced, and a single key server is designed, thereby achieving the purpose of security protection of video data in the P2P IPTV system. The invention solves the security problem caused by that the P2P IPTV system uses a P2P network for transmitting video data. The method expands the P2P IPTV system on the basis that the original framework of the P2P IPTV system is not changed, designs an encryption algorithm and generation, management, transmission and use of keys, has the advantages of innovation, security, expandability and practicability, and has good application prospects and market value.

Description

technical field [0001] The present invention proposes a technical method for video data security protection of a P2P IPTV system (interactive network TV system based on peer-to-peer computing technology), which solves the security problem of video data transmission by a user end set-top box through a P2P network, It belongs to the cross technical field of peer-to-peer computing and network security. Background technique [0002] Peer-to-peer network, that is, P2P (Peer-to-Peer) network, enables thousands of computers to share computer resources and services through direct exchange. In a P2P network, all computers are in an equal position, that is, each computer in the network can request network services and provide network services for other computers. This feature makes the P2P network have very good scalability, can complete the aggregation and sharing of resources at a low cost, and also allows computers in the network to have greater autonomy in the management of each ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N7/16H04N5/00H04N7/173
Inventor 王汝传陈粒韩志杰李致远吴敏支萌萌徐鹤邵星
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products