A kind of protection method and device for multimedia data
A multimedia data and multimedia server technology, applied in the direction of digital data protection, user identity/authority verification, electrical components, etc., can solve problems such as the inability to play multimedia data normally, obtain keys, and the inability of mobile smart terminals to play multimedia data normally. Achieve the effect of protecting multimedia data
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] see image 3 , which is a flowchart of a method for protecting multimedia data provided in Embodiment 1 of the present invention, the method includes the following steps:
[0060] Step 301: In response to a user's download request, the client downloads multimedia data to be played from the multimedia server, and the multimedia data is not protected by encryption.
[0061] Step 302: the client encrypts and protects the multimedia data by using the data key bound to itself.
[0062] The data key used to encrypt and decrypt the multimedia data is bound to the client, that is to say, the data key used by the client on different smart mobile terminals is different.
[0063] In a preferred embodiment of the present invention, the data key is pre-generated by the client according to the device identification of the smart mobile terminal. Therefore, a smart mobile terminal only has a unique device identifier, and the unique device identifier can only generate and correspond t...
Embodiment 2
[0114] In order to prevent the illegal client from maliciously downloading multimedia data from the multimedia server, a more preferred method is that before the client downloads the multimedia data to be played from the multimedia server, the client first accepts the verification performed by the verification server, and if the verification is passed, The client can further download multimedia data to be played from the multimedia server. On the contrary, if the authentication fails, the client cannot download the multimedia data to be played from the multimedia server. see Figure 6 , which is a flow chart of another method for protecting multimedia data provided in Embodiment 2 of the present invention, the method includes the following steps:
[0115] Verification process:
[0116] Step 601: The client encrypts the client key previously agreed with the verification server by using the encryption algorithm previously agreed with the verification server to generate a ciphe...
Embodiment 3
[0138] Corresponding to the above method for protecting multimedia data, an embodiment of the present invention also provides a device for protecting multimedia data. see Figure 7 , which is a structural diagram of a device for protecting multimedia data provided in Embodiment 3 of the present invention. The device includes a download unit 701 , a data encryption unit 702 , a storage unit 703 , a data decryption unit 704 and a playback unit 705 . The internal structure and connection relationship of the device will be further introduced below in conjunction with the working principle of the device.
[0139] The downloading unit 701 is configured to download multimedia data to be played from a multimedia server in response to a user's download request, and the multimedia data is not protected by encryption.
[0140] The data encryption unit 702 is configured to encrypt and protect the multimedia data with a data key bound to the client itself, wherein the data keys are differ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


