Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multimedia data encryption and decryption method and device

A technology for multimedia data and multimedia data packets, applied in the network field, can solve problems such as stealing and encryption key tampering, and achieve the effects of ensuring security, improving security, and increasing difficulty.

Inactive Publication Date: 2016-11-23
VISIONVERA INFORMATION TECH CO LTD
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention discloses a method and device for encrypting and decrypting multimedia data, so as to solve the problem that the encryption key may be tampered with or stolen in the existing encryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multimedia data encryption and decryption method and device
  • Multimedia data encryption and decryption method and device
  • Multimedia data encryption and decryption method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0046] In the Internet environment, multimedia data may be intercepted by hackers during network transmission, resulting in theft or tampering of the multimedia data. For example, in a video conference, audio and video streams may be intercepted by hackers in the network and thus Restoring meeting content, especially for confidential meetings, will seriously affect the security of its meeting content transmission.

[0047] The invention provides a method for encrypting multimedia data, which uses a secondary key to encrypt multimedia data to obtain a corresponding encrypted stream; the secondary key is encrypted by an external primary key input through the RS232 serial port, Obtain the corresponding transmission key; since the enc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a multimedia data encryption and decryption method and device. The encryption method specifically includes adopting a second level key for encrypting multimedia data and obtaining corresponding encryption key flow; adopting a first level key for encrypting a second level key and obtaining a corresponding transmission key. Since the encryption key flow and the transmission key are transmitted in the network and the first level key as a decryption key is not transmitted in the network, safety of the multimedia data in the network is ensured and a problem that the multimedia data is stolen or tampered is solved. Besides, the invention adopts the second level key for encrypting the multimedia data and adopts the first level key for encrypting the second level key, difficulty of decoding the encryption key flow is increased, thus the multimedia data transmission safety is further improved.

Description

technical field [0001] The embodiment of the present invention relates to the field of network technologies, and in particular to a method and device for encrypting and decrypting multimedia data. Background technique [0002] In modern life, network technology poses a serious threat to the confidentiality of network information. Many confidential information are stolen by others using the network, causing huge losses to national and personal information security. Therefore, the use of encryption for network transmission information is becoming more and more popular. attach importance to. [0003] The encryption method that usually adopts in the prior art is: security encryption algorithm, it adopts encryption methods such as DES (Data Encryption Standard, Data Encryption Standard) to encrypt multimedia data, this security encryption algorithm regards video file as common data file, Regardless of the format of the video file, changing the original information data through t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06
Inventor 杨春晖李殿坤王艳辉
Owner VISIONVERA INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products