Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for processing video in TF card

A video processing and video technology, applied in the field of video processing in TF card, to achieve large application space, protect security and uniqueness, and enhance the effect of expanding space

Pending Publication Date: 2021-06-22
成都知了汇智科技有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Video courseware and video players are widely used in education and training systems, audio-visual media platforms, advertising and other fields. At present, the encryption protection methods in this field are mostly encrypted by software algorithms through specified methods, and then analyzed and played by specified players. Or after encrypting through the USB-Shield, check the correctness through the specified SDK and then analyze and play it through the specified player. Although the above solution can solve the problem of data encryption and program protection, because the USB-Shield is mostly used for PCs, mobile devices There is no standard USB interface, so data security can only be completed by software solutions. With the development of network security and information security, the above-mentioned methods have more and more problems and restrictions, and they are easy to bypass through technical means.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for processing video in TF card
  • Method for processing video in TF card
  • Method for processing video in TF card

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to describe the present invention more clearly, the present invention will be further described below in conjunction with the accompanying drawings and examples. The specific protection scope of the application belongs to the protection scope of the application under the timely enlightenment of the application and without any creative work.

[0021] see figure 1 , the invention discloses a method for processing video in a TF card, comprising the following steps: video splitting: splitting a complete video file in a TF card to split it into multiple block files; video encryption: converting all Encrypt the block files and generate a loading sequence list; video decryption: insert the TF card into the playback device, obtain the encryption key file in the TF card, and then decrypt and play all the block files according to the loading sequence list. In this embodiment, a complete video is first split into a plurality of different block files, and these block file...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for processing a video in a TF card, which comprises the following steps of: splitting the video: splitting a complete video file in the TF card into a plurality of block files; video encryption: encrypting all the block files, and generating a loading sequence list; and video decryption: inserting the TF card into a playing device, obtaining the encryption key file in the TF card, and then decrypting and playing all the block files according to the loading sequence list. According to the method, a set of video data encryption and program protection solution which is high in pertinence, multiple in limiting condition, difficult to copy and crack and rapid in application is formed by combining the standard TF card with the running data generated in the running container of the CPU, the memory, the hard disk, the network card and the software program of the tablet computer, so that data information of a company is protected.

Description

technical field [0001] The invention relates to the field of data encryption and program protection of mobile electronic equipment, in particular to a method for processing video in a TF card. Background technique [0002] Video courseware and video players are widely used in education and training systems, audio-visual media platforms, advertising and other fields. At present, the encryption protection methods in this field are mostly encrypted by software algorithms through specified methods, and then analyzed and played by specified players. Or after encrypting through the USB-Shield, check the correctness through the specified SDK and then analyze and play it through the specified player. Although the above solution can solve the problem of data encryption and program protection, because the USB-Shield is mostly used for PCs, mobile devices There is no standard USB interface, so data security can only be completed by software solutions. With the development of network se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N21/2347H04N21/4405H04N21/854
CPCH04N21/4405H04N21/85406H04N21/2347
Inventor 何智慧杨正辉游思佳
Owner 成都知了汇智科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products