Method and device for transmitting multimedia resources

A technology for multimedia resources and encryption algorithms, applied in the field of computer and communication, can solve the problems of hidden dangers, property losses, and the legal user rights and interests of multimedia resources cannot be effectively protected, so as to improve efficiency, increase security, and protect multimedia resources. Effect

Inactive Publication Date: 2013-11-27
TVMINING BEIJING MEDIA TECH
4 Cites 5 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0004] However, since multimedia resources are not restricted during transmission and use after acquiring multimedia resources, some users without authority can obtain multimedia resources through illegal means or channels, so that the rights and interest...
View more

Method used

Embodiments of the present invention realize that the decryption device is used as a plug-in, when the user who logs in in the client has the authority to obtain the multimedia resource, the client can download the plug-in from the server to decrypt the multimedia resource, effectively protecting the multimedia resource While enhancing the functionality of the client.
[0073] Embodiments of the present invention determine whether to decrypt the encrypted multimedia resource according to the user's authority. When the user has authority, the multimedia resource is decrypted. When the user does not have authority, the multimedia resource is not decrypted, and the transmitted multimedia resource is received. Af...
View more

Abstract

The invention discloses a method and device for transmitting multimedia resources. The method comprises the steps of receiving a request for obtaining the multimedia resources, transmitting the pre-encrypted multimedia resources, indicating a terminal with the permission to carry out decryption, and enabling the multimedia resources to be invisible for a terminal without the permission. According to the embodiment of the method and device for transmitting the multimedia resources, transmission of the encrypted multimedia resources is achieved, and the function of protecting the multimedia resources is achieved while the multimedia resources are transmitted.

Application Domain

User identity/authority verification

Technology Topic

Computer terminal

Image

  • Method and device for transmitting multimedia resources
  • Method and device for transmitting multimedia resources
  • Method and device for transmitting multimedia resources

Examples

  • Experimental program(1)

Example Embodiment

[0060] The preferred embodiments of the present invention will be described below with reference to the accompanying drawings. It should be understood that the preferred embodiments described here are only used to illustrate and explain the present invention, and are not used to limit the present invention.
[0061] The method for transmitting multimedia resources proposed in the embodiment of the present invention is applicable to set-top boxes, live broadcast servers, smart terminals (such as mobile phones, computers, tablet computers, etc.), and the like. In the embodiment of the present invention, the server sends the encrypted multimedia resource, the decryption device decrypts the multimedia resource, and then the decryption device sends the decrypted multimedia resource to the client requesting the multimedia resource. Among them, the decryption device is preset with a decryption algorithm corresponding to the multimedia resource encryption algorithm. In addition, the decryption device can be used as a decryption module to be integrated in the client that sends the request for multimedia resources, or it can be independent of the client and act as a server with The middleware between the clients decrypts the multimedia resources, and the middleware is installed in the terminal. Among them, multiple clients can be installed in one terminal, for example, multiple clients that watch videos can be installed in a mobile phone.
[0062] See figure 1 , The main method flow of the server sending multimedia resources in the embodiment of the present invention is as follows:
[0063] Step 101: Receive a request for acquiring multimedia resources.
[0064] Step 102: Send the pre-encrypted multimedia resources, instruct the authorized terminal to decrypt, and be transparent to the unauthorized terminal.
[0065] Wherein, being transparent to an unauthorized terminal means that the unauthorized terminal does not perform further decryption after receiving the pre-encrypted multimedia resource sent by the server.
[0066] Among them, the multimedia resources can be encrypted in advance on the server side. The encryption method is, for example, symmetric encryption, that is, encryption and decryption use the same key, usually called "Session Key"; or asymmetric encryption, that is, encryption It is not the same key used for decryption. There are usually two keys called "public key" and "private key". Both of them must be used in pairs, otherwise the encrypted file cannot be opened. Encryption algorithms such as DES (Data Encryption Standard); 3DES (Triple DES), a symmetric algorithm based on DES, encrypts a piece of data with three different keys three times; RC2 and RC4, one with variable length encryption An algorithm for encrypting a large amount of data with a key; IDEA (International Data Encryption Algorithm); AES (Advanced Encryption Standard, Advanced Encryption Standard), etc.
[0067] Preferably, when the multimedia resource is encrypted, the multimedia resource can be encrypted in segments, and the segment length can be set. For example, if the segment length is set to 32 bits (bit), then the multimedia resource is set in units of 32 bits. Encrypted.
[0068] The embodiment of the present invention realizes the transmission of encrypted multimedia resources, and plays a role of protecting the multimedia resources while transmitting the multimedia resources.
[0069] See figure 2 , The main method flow of receiving multimedia resources in the embodiment of the present invention is as follows:
[0070] Step 201: Receive pre-encrypted multimedia resources sent by the server.
[0071] Step 202: Determine whether the user requesting the multimedia resource has the authority to obtain the multimedia resource.
[0072] Step 203: When the user has the right to obtain the multimedia resource, decrypt the multimedia resource.
[0073] The embodiment of the present invention determines whether to decrypt the encrypted multimedia resource according to the user's authority. When the user has the authority, the multimedia resource is decrypted. When the user does not have the authority, the multimedia resource is not decrypted, and the transmitted multimedia resource can be effectively received. The protection of multimedia resources.
[0074] See image 3 In the embodiment of the present invention, when the decryption device is integrated as a decryption module in a client that sends a request for acquiring multimedia resources, the process of the method for transmitting multimedia resources on the server side is as follows:
[0075] Step 301: Receive a request for acquiring multimedia resources sent by the client.
[0076] Step 302: Send the pre-encrypted multimedia resources to the client, and instruct the authorized terminal to perform decryption, which is transparent to the unauthorized terminal.
[0077] The embodiment of the present invention realizes the transmission of encrypted multimedia resources to the client sending the multimedia resource request, and plays a role of protecting the multimedia resources while transmitting the multimedia resources.
[0078] See Figure 4 In the embodiment of the present invention, when the decryption device is integrated on the client, the process of the method for transmitting multimedia resources on the client side is as follows:
[0079] Step 401: Send a request for acquiring multimedia resources to the server.
[0080] Step 402: Receive the pre-encrypted multimedia resource sent by the server.
[0081] Step 403: Determine whether the user logging in to the client has the authority to obtain the multimedia resource; if yes, execute step 404, if not, execute step 405.
[0082] Preferably, the client can send the information of the user logged in the client to the server, and the server determines whether the user has the authority to obtain the multimedia resource according to the user's information and returns the result to the client.
[0083] Preferably, whether the user logging in to the client terminal has the right to obtain the multimedia resource includes, for example, determining whether the user logging in to the client terminal is a member, or whether the user has paid for the multimedia resource that needs to be charged.
[0084] Step 404: Decrypt the received encrypted multimedia resource.
[0085] Preferably, the decryption can be performed according to the preset number of decryption bits. For example, when the number of encrypted bits is 32 bits, the number of decrypted bits can be 64 bits. When two pieces of 32-bit encrypted multimedia resources are received, they are decrypted together.
[0086] Step 405: Display a message that there is no right to obtain the multimedia resource.
[0087] In the embodiment of the present invention, after the client terminal receives the encrypted multimedia resource, it determines that the user logged in on the client terminal has the authority to obtain the multimedia resource before decrypting the encrypted multimedia resource, so as to ensure the normal acquisition and use by authorized users The multimedia resources are protected at the same time.
[0088] In the embodiment of the present invention, the decryption device may not be in the client that sends the request to obtain the multimedia resource at first. When the client determines that the user logged in at the client has the authority to obtain the multimedia resource, the client then obtains the multimedia resource from the server. Download the decryption device in the, and integrate the decryption device as a plug-in into the client for decryption, see Figure 5 Take the client request to obtain audio as an example to describe the method in detail. The method flow is as follows:
[0089] Step 501: The client sends a request for obtaining audio to the server.
[0090] Step 502: The server receives the audio acquisition request sent by the client.
[0091] Step 503: The server sends the pre-encrypted audio to the client, and instructs the authorized terminal to decrypt, and is transparent to the unauthorized terminal.
[0092] Step 504: The client receives the pre-encrypted audio sent by the server.
[0093] Step 505: The client judges whether the user identifier (user identifier) ​​logging in the client has the authority to obtain the multimedia resource; if yes, execute step 506; if not, execute step 511.
[0094] Step 506: The client judges whether there is a decryption plug-in locally; if yes, execute step 510, if not, execute step 507.
[0095] Step 507: The client sends a request to download the decryption plug-in to the server.
[0096] Step 508: The server sends the decryption plug-in to the client.
[0097] Step 509: The client receives and installs the decryption plug-in.
[0098] In this step, the installation operation can also be performed after the client receives the user's instruction to agree to install the decryption plug-in.
[0099] Step 510: The decryption plug-in in the client decrypts the audio.
[0100] Step 511: The client displays a message that it is not authorized to obtain the audio.
[0101] The embodiment of the present invention realizes that the decryption device is used as a plug-in. When the user logged in on the client has the authority to obtain multimedia resources, the client can download the plug-in from the server to decrypt the multimedia resources, which effectively protects the multimedia resources while enhancing The function of the client.
[0102] See Image 6 In the embodiment of the present invention, when the encryption device is used as a middleware independent of the client that sends the request for obtaining multimedia resources, the process of the method for transmitting multimedia resources on the server side is as follows:
[0103] Step 601: Receive a request for acquiring multimedia resources sent by a client, where the request includes information about the middleware associated with the client.
[0104] Step 602: Send the pre-encrypted multimedia resource to the middleware, instruct a terminal with permission to decrypt, and be transparent to the terminal without permission; wherein, the multimedia resource includes the information of the client that sends the request for acquiring the multimedia resource.
[0105] In the embodiment of the present invention, the encrypted multimedia resource is sent to the middleware, which realizes the unification of the multimedia resource transmission direction, facilitates the management and transmission of the multimedia resource, transmits the encrypted multimedia resource, and plays the role of protecting the multimedia resource.
[0106] See Figure 7 In the embodiment of the present invention, when the encryption device is used as middleware independently of the client that sends the request for acquiring multimedia resources, the process of the method for transmitting multimedia resources on the middleware side is as follows:
[0107] Step 701: Receive a pre-encrypted multimedia resource sent by a server; wherein, the multimedia resource includes information of a client that sends a request for acquiring the multimedia resource.
[0108] Wherein, the information of the client that sends the request for acquiring the multimedia resource is used to instruct the middleware to determine which client to establish a connection with, and to instruct the middleware to decrypt and send the decrypted multimedia resource to the client.
[0109] Step 702: Obtain the user ID logged in the client from the information of the client.
[0110] Step 703: Determine whether the user ID has the authority to obtain the multimedia resource; if yes, execute step 704, if not, execute step 706.
[0111] Step 704: Decrypt the multimedia resource.
[0112] Step 705: Send the decrypted multimedia resource to the client.
[0113] Step 706: Send a message that the client is not authorized to obtain the multimedia resource.
[0114] The embodiment of the present invention realizes that the middleware judges whether the logged-in user in the client that sends the request for acquiring the multimedia resource has the authority to acquire the multimedia resource, and reduces the resource consumption of the server and the client. When the user has the authority to obtain multimedia resources, the middleware decrypts the encrypted multimedia resources, ensuring that the authorized users normally obtain the multimedia resources while protecting the multimedia resources. In addition, the middleware can be associated with multiple clients to realize the extensive sharing of middleware decryption functions, intensive management and transmission of multimedia resources.
[0115] Before sending encrypted multimedia resources in the embodiment of the present invention, relevant information can be pre-added to the encrypted multimedia resources to instruct the middleware to perform related operations. The middleware can determine whether the encrypted multimedia resources need to be encrypted according to the information contained in the multimedia resources. Decrypt multimedia resources. In the following, taking video transmission as an example, the method of transmitting multimedia resources is described, see Figure 8 , The detailed method process is as follows:
[0116] Step 801: The client sends a request for acquiring a video to the server, and the request includes information about the middleware associated with the client.
[0117] Step 802: The server receives a video acquisition request sent by the client.
[0118] Step 803: The server adds encrypted information to the video according to the user ID permissions logged in the client, the encrypted information includes: whether the video is encrypted, whether the video needs to be decrypted, and the video is encrypted Length and algorithm and information of the client requesting the video.
[0119] Step 804: The server sends the video with the encrypted information added to the middleware associated with the client to instruct the authorized terminal to decrypt, which is transparent to the unauthorized terminal.
[0120] Step 805: The middleware receives the video with encrypted information added.
[0121] Step 806: The middleware determines whether the video is encrypted according to whether the video is encrypted in the encrypted information, if yes, execute step 807, if not, execute step 809.
[0122] For example, determine whether the video is encrypted according to the setting under the field "Is the video encrypted" included in the video. For example, if the field is set to "Yes", it is determined that the video is encrypted, and the field is set to "No". "It is determined that the video is not encrypted.
[0123] Step 807: The middleware determines whether the video needs to be decrypted according to whether the video needs to be decrypted in the encrypted information, if yes, execute step 808, if not, execute step 810.
[0124] For example, it is judged according to the setting under the field of "Whether the video needs to be decrypted" included in the video, for example, if this field is set to "Yes", the video is determined to be decrypted, and the field is set to "No" to determine The video is not decrypted.
[0125] Step 808: The middleware decrypts the video according to the encrypted length and algorithm of the video in the encrypted information.
[0126] Step 809: The middleware sends the decrypted video to the client.
[0127] In this step, if the video is encrypted, the middleware sends the decrypted video to the client; if the video is not encrypted, the middleware sends the unencrypted video to the client.
[0128] Step 810: The middleware sends a message that the client is not authorized to obtain the video.
[0129] The embodiments of the present invention implement corresponding operations to be performed according to the information contained in the multimedia resources, improve the efficiency of transmitting multimedia resources, and increase the security of multimedia resources in the transmission process.
[0130] The embodiment of the present invention also proposes a device for transmitting multimedia resources, see Picture 9 , The device for sending multimedia resources includes:
[0131] The first receiving module 901 is configured to receive a request for acquiring multimedia resources;
[0132] The sending module 902 is configured to send the pre-encrypted multimedia resources, instruct the authorized terminal to decrypt, and be transparent to the unauthorized terminal.
[0133] Preferably, see Picture 10 The device further includes: an information adding module 903 configured to add encrypted information to the multimedia resource according to the authority of the user who sent the request;
[0134] The sending module 902 is used to send the pre-encrypted multimedia resources with encrypted information added.
[0135] Preferably, the encryption information includes: whether the multimedia resource has been encrypted, whether the multimedia resource can be decrypted and an encryption algorithm used.
[0136] A device for transmitting multimedia resources, see Picture 11 , The devices for receiving multimedia resources include:
[0137] The second receiving module 1101 is configured to receive pre-encrypted multimedia resources sent by the server;
[0138] The judging module 1102 is used to judge whether the user requesting the multimedia resource has the authority to obtain the multimedia resource;
[0139] The decryption module 1103 is configured to decrypt the multimedia resource when the user has the right to obtain the multimedia resource.
[0140] Preferably, see Picture 12 , The decryption module includes:
[0141] The determining unit 1104 is configured to determine whether the user has a decryption plug-in when the user has the authority to obtain the multimedia resource;
[0142] The installation unit 1105 is used to download and install the decryption plug-in from the server when there is no decryption plug-in;
[0143] The decryption unit 1106 is configured to use the decryption plug-in to decrypt the multimedia resource.
[0144] Preferably, see Figure 13 , The second receiving module includes a receiving unit 1107, configured to receive a multimedia resource that is pre-encrypted and added with encrypted information sent by the server;
[0145] The judgment module 1102 is configured to judge whether the user has the right to obtain the multimedia resource according to the encrypted information.
[0146] Preferably, the encryption information includes: whether the multimedia resource has been encrypted, whether the multimedia resource can be decrypted and an encryption algorithm used.
[0147] Those skilled in the art should understand that the embodiments of the present invention may be provided as methods, systems, or computer program products. Therefore, the present invention may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, the present invention may be in the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, optical storage, etc.) containing computer-usable program codes.
[0148] The present invention is described with reference to flowcharts and/or block diagrams of methods, devices (systems), and computer program products according to embodiments of the present invention. It should be understood that each process and/or block in the flowchart and/or block diagram, and the combination of processes and/or blocks in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions can be provided to the processor of a general-purpose computer, a special-purpose computer, an embedded processor, or other programmable data processing equipment to generate a machine, so that the instructions executed by the processor of the computer or other programmable data processing equipment are generated for use In the process Figure one Process or multiple processes and/or boxes Figure one A device with functions specified in a block or multiple blocks.
[0149] These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device. The device is implemented in the process Figure one Process or multiple processes and/or boxes Figure one Functions specified in a box or multiple boxes.
[0150] These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment. Instructions are provided to implement the process Figure one Process or multiple processes and/or boxes Figure one Steps of functions specified in a box or multiple boxes.
[0151] Obviously, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention. In this way, if these modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalent technologies, the present invention is also intended to include these modifications and variations.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Systems and methods for notifying multiple hosts from an industrial controller

ActiveUS8150959B1reusable block of code very difficultimprove efficiency
Owner:ROCKWELL AUTOMATION TECH

MIMO-OFDM transmitter

InactiveUS20070253504A1improve efficiencyreduce time
Owner:FUJITSU LTD

Systems and methods for providing treatment planning

InactiveUS20050182654A1high quality of careimprove efficiency
Owner:ALIGN TECH

Classification and recommendation of technical efficacy words

  • Improve efficiency
  • improve security
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products