Authority authentication method, encryption method, device and system for network video access

A technology of network video and encryption algorithm, applied in the field of Internet video information, can solve problems such as security risks, achieve the effect of ensuring security and improving user experience

Active Publication Date: 2020-04-21
POWERINFO
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the object of the present invention is to provide a network video access authority authentication method, encryption method, device and system, to solve the problem of security risks in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authority authentication method, encryption method, device and system for network video access
  • Authority authentication method, encryption method, device and system for network video access
  • Authority authentication method, encryption method, device and system for network video access

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0050] The embodiment of the present invention provides a network video access authentication method, which is applied to the video server 100. The video server 100 can provide video services for the video client 200. The video client 200 can be used by the user and can communicate with the video The communication device with which the server 100 establishes a connection, such as a personal computer, a mobile phone, a tablet computer, and the like. When the user needs the video service end 100 to provide video services when using the video client 200, different video client 200 users can have personalized services, and realize the authority identification to the video client 200 by the video server 100 to determine the video client. Whether the terminal 200 has the correct access rights. Such as figure 1 As shown, it is a schematic diagram of the interaction between the video client 200 and the video server 100 .

[0051] Such as figure 2 As shown, the authorization method...

no. 2 example

[0099] The authorization authentication method for network video access described above is an authentication method applied to the video server 100, and the corresponding video client 200 also needs to encrypt the authorization information. The embodiment of the present invention also provides a permission encryption method, which is applied to the video client 200, such as Figure 4 As shown, the method includes the following steps.

[0100] Step S201, determine at least one encryption algorithm and at least one encryption key corresponding to the permission information according to preset rules.

[0101] As mentioned above, when the video client 200 sends a video service request to the video server 100 , the permission information corresponding to the video client 200 may be sent to the video server 100 . And the permission information sent is encrypted.

[0102] In detail, the video client 200 is configured with multiple encryption algorithms and multiple encryption keys,...

no. 3 example

[0137] The embodiment of the present invention also provides a permission identification device 10, which is applied to the video server 100, such as Figure 6 As shown, the authority authentication device 10 includes an information acquisition module 101 , a decryption algorithm and key determination module 102 , a decryption module 103 and an authentication module 104 .

[0138] An information acquisition module 101, configured to receive encrypted permission information sent by the video client 200;

[0139] Decryption algorithm and key determination module 102, configured to determine at least one decryption algorithm and at least one decryption key corresponding to the encrypted permission information according to preset rules;

[0140] A decryption module 103, configured to decrypt the encrypted permission information at least once by using the at least one decryption algorithm and at least one decryption key to obtain decrypted permission information;

[0141] The iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network video access permission identification method, apparatus and system, and a permission encryption method and apparatus, and relates to the technical field of internet video information. Permission information sent by a video client is identified, a corresponding decryption algorithm and a decryption key are determined through predetermined rules, and thus the permission information is decrypted. When the decrypted permission information conforms to predetermined conditions, it is determined that permission identification succeeds. In the permission identification process, a user does not have to register an account in advance by use of the video client, and user experience is improved. At the same time, decryption of the permission information requires use of a correct decryption algorithm and a correct decryption key at the same time, and otherwise, correct permission information cannot be obtained, such that the risk of being captured, analyzed and cracked during the communication process is avoided. In addition, the decryption algorithm and the decryption key are independent of each other so that even if one of the two is cracked, the system security can be ensured through the protection strategy of the other.

Description

technical field [0001] The present invention relates to the technical field of Internet video information, in particular to an authentication method, encryption method, device and system for accessing network video. Background technique [0002] According to public information, the traffic generated by online video accounted for 73% of the total Internet traffic in 2016, and this figure will reach 82% in 2021. As the main carrier of office, entertainment, information, education and other activities, online video content has become an indispensable part of most people's lives. While providing videos, video content providers deliver advertisements and other promotional information to video clients through video servers to realize commercial value. However, in the existing video services, the transmitted information is easy to be captured and cracked, and the security is poor. Contents of the invention [0003] In view of this, the object of the present invention is to prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0435H04L63/0838
Inventor 李伟华李毅要文涛
Owner POWERINFO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products