Safety responsibility identifying method of video content for integration of three networks

A video content and three-network integration technology, applied in selective content distribution, image communication, electrical components, etc., can solve the problems that the responsible party cannot be traced, the responsible party cannot be confirmed, and the triple-network integration environment has not been found.

Inactive Publication Date: 2013-09-18
COMMUNICATION UNIVERSITY OF CHINA
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this process, multiple business processes and subjects are involved, and when content dissemination occurs in violation of laws, regulations, and ethics, it is impossible to trace the responsible party
[0005] Analyzing the above process, it can be seen that there are two insecure factors that make it impossible to confirm the responsible party. One: the insecurity of the channel, digital video content may be tampered with by malicious attackers when it is transmitted on an open network; Trust, that is, the untrustworthiness of the review department and content provider
The review department may tamper with the review content sent by the content provider, or the illegal content may pass the review due to lax checks; the content provider may also change or replace the content after receiving the review
[0006] By consulting relevant patents and literature, no method for identifying security responsibilities for the process of dissemination of video content has been found for the triple play environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety responsibility identifying method of video content for integration of three networks
  • Safety responsibility identifying method of video content for integration of three networks
  • Safety responsibility identifying method of video content for integration of three networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0117] In the embodiment of the present invention, three nodes are deployed, which are respectively a content provider (Content Provider, referred to as CP), an audit department (Audit Provider, referred to as AP) and a network operator (Network Operator, referred to as NO). A video content security responsibility identification system is deployed on each node. In this embodiment, the computer is "DELL computer, Intel(R) Core(TM) i5-2400CPU3.10GHz3.10GHz, 4.00GB memory, 1T hard disk". Adopt VC++ programming to realize.

[0118] The specific implementation plan is:

[0119] The whole system is mainly divided into two major processes, namely, the review and distribution process of video content and the responsibility determination process in case of disputes. The review and distribution process is that the CP in the three networks uploads the produced video content to a unified AP for review. After the review is passed, the AP returns the content to the CP, and the CP then dis...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a safety responsibility identifying method of video content for integration of three networks, and belongs to the field of computer information security. The method is designed by aiming at the problem that the video content is transmitted in an open network and interacts with a plurality of unreliable main bodies, and when illegal video content is transmitted, a responsible party cannot be determined. The method comprises the following steps of selecting a plurality of key frames of a video randomly in time dimension and dividing the frames into a plurality of groups according to numbers of the frames; in space dimension, dividing each key frame into a central area, a fringe area and a corner area and distributing different sampling rates for different areas; after cascading the sampling information of the key frames in the same group, performing bit commitment; in the transmission process, negotiating a confidential correspondence identifier by both parties, wherein the recipient determines whether the video content is falsified or not by verifying the confidential correspondence identifier and the bit commitment value. Once dispute occurs, a confidential comparison protocol is adopted between both parties to confidentially compare the bit commitment result so as to achieve responsibility confirmation.

Description

Technical field: [0001] The invention belongs to the field of computer information security, and is designed for the new business model of triple network integration, where video content is transmitted on an open network and business interaction is performed between multiple untrustworthy subjects, and when an illegal video content transmission event occurs, the responsible party cannot be determined. . Based on the technology of bit commitment and secrecy comparison, the present invention designs a video content security responsibility determination method oriented to the integration of three networks, and the method has good implementability and safety. Background technique: [0002] "Triple play" refers to the mutual penetration and compatibility of telecommunication network, radio and television network and computer communication network, and gradually integrate into a unified information communication network in the world. Through technological transformation, the three...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/83H04N21/8352
Inventor 王永滨刘文伏文龙于鹏于水源谢卫华隋爱娜
Owner COMMUNICATION UNIVERSITY OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products