Data encryption method and system
A data encryption and data technology, applied in the field of data processing, can solve the problems of large resource usage, low efficiency, and high equipment load of transmission links
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] refer to figure 1 , shows a flowchart of steps of a data encryption method in Embodiment 1 of the present invention. In this embodiment, the data encryption method may include the following steps:
[0049] Step 102, according to the pseudo-random sequence, extract data of a set size from the payload of the TS packet as data to be encrypted.
[0050] The data encryption method described in this embodiment can be mainly applied to encrypting audio and video data. Among them, the audio and video data can be transmitted specifically according to TS stream: TransportStream, TS stream, transport stream, and other custom information data such as video and audio can be packaged into transport packets for sub-packet (TS data packet) transmission. The packet length of each TS data packet is 188 bytes (including a 4-byte header and a 184-byte payload).
[0051] In this embodiment, data of a certain length may be selected from the 184-byte payload portion as the data to be encry...
Embodiment 2
[0061] refer to figure 2 , shows a flow chart of steps of a data encryption method in Embodiment 2 of the present invention. In this embodiment, the data encryption method may include the following steps:
[0062] Step 202, according to the TS protocol, encapsulate the audio and video data into a TS stream.
[0063] In this embodiment, the audio and video data may be encapsulated into a TS stream according to the TS protocol, wherein the TS stream includes at least one TS data packet.
[0064] Step 204, according to the pseudo-random sequence, extract data of a set size from the payload of the TS packet as data to be encrypted.
[0065] As mentioned above, the TS stream determined according to one piece of audio or video data includes at least one TS data packet, and the audio or video data is transmitted in packets based on the at least one TS data packet.
[0066] In this embodiment, for different TS data packets, different randomly generated pseudo-random sequences may ...
Embodiment 3
[0082] In combination with the foregoing embodiments, this embodiment uses an encryption process for audio and video data as an example to describe the data encryption method described in the foregoing embodiments. In the case of no contradiction, the encryption process for audio and video data may be combined with the technical features of the data encryption method described in the above embodiments. It should be noted that the data encryption method described in the present invention includes but not limited to encryption applied to audio and video data.
[0083] refer to image 3 , shows a basic block diagram of a system architecture for implementing a method for encrypting audio and video data in Embodiment 3 of the present invention. In this embodiment, the encryption of the audio and video data can be based on image 3 The system architecture shown is realized, wherein the system architecture may include: TS stream encapsulation module, first cache, second cache, M se...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
