Social video information security method and system

A video information and security technology, applied in the field of social video information security and systems, can solve problems such as the inability to guarantee the randomness of communication keys, the lack of user personal copyright protection, and the inability to verify user identities, etc.

Inactive Publication Date: 2012-12-19
NANJING UNIV
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, there is no negotiation mechanism between communication users, and user identities cannot be verified. In some cases, imitation attacks cannot be avoided; the randomness of each communication key cannot be guaranteed.
Secondly, the security device lacks a self-protection mechanism. Once the device is lost or stolen, a third party can decipher the entire security system based on its hardware design and software code.
it's quite dangerous
[0005] In addition, most video applications or websites currently only add the logo of the service provider as a clear text watermark to the video after the user uploads the video, such as Youku, Tudou, etc., which can protect the video copyright of the service provider, but lacks The copyright protection of the user's personal, the user's video cannot be effectively appealed after being stolen or destroyed by others

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social video information security method and system
  • Social video information security method and system
  • Social video information security method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention uses multiple data encryption methods, mainly including 128-bit block encryption AES algorithm; 1024-bit asymmetric encryption RSA algorithm; 64-bit stream encryption chaos pseudo-random sequence (CPRS Chaotic Pseudo-Random Sequence) algorithm and data summary Algorithm sha-1 algorithm, which mainly solves the following functional modules: (1) user identity authentication (2) key negotiation (3) media data encrypted transmission (4) key update (5) video integrity

[0036] (1) User identity authentication

[0037] Before the two parties establish communication, the legitimacy of the client user must first be verified. Only with legitimate authenticated users, the server will establish a secure communication connection with it and provide services.

[0038]When the user requests a server connection, the server sends the server time, that is, the user login time, as the unique identification information to the user, and the user uses the personal ID ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a social video information security method and a system. The method comprises the following four steps of identity authentication, key negotiation, encryption communication and rekeying and video integrity. The method comprises the following steps that a server carries out identity legitimacy authentication to connected users; two parties consult a post-communication key through asymmetric encryption and information digest algorithms; in the communication process, data streams are encrypted by using a chaotic pseudorandom sequence; and the server ensures that the video integrity is not damaged through two aspects of adding plaintext watermark and saving integrity information. The method and the system are applied, so that the user identity can be authenticated, imitation and attack are avoided, the randomness of every communication key is ensured, the personal information and the privacy of the users are prevented from being stolen, and the fact that the copyright of the videos shared by the users is not illegally infringed is effectively ensured. The technical scheme of the method and the system has a good development prospect.

Description

1. Technical field [0001] The invention belongs to the technical field of information security, and specifically relates to an information security system in the video social process. It combines various security technologies to construct a complete and effective social security system, and proposes a comprehensive user identity authentication, encryption Multiple secure communication methods for key negotiation, media data encryption, key update, and video integrity protection to better protect information security in the video social field. 2. Background technology [0002] With the development of society and the arrival of the information age, people exchange more and more information, and the application of various wireless communication devices is also becoming more and more popular. Due to the openness of wireless channels, information security has become a problem that cannot be ignored. Especially in the context of the rapid development of social networks, users' pe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04N21/835H04N21/8358
Inventor 王健葛浩杜红阳高晖
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products