Encryption method and system for streaming video
A technology of streaming transmission and encryption method, which is applied in the field of encryption method and system for streaming video transmission, which can solve the problems of long encryption time, limited video format compatibility, and increased data volume, so as to achieve fast operation speed and increase the number of cracks Difficulty, the effect of low computing resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0040] This embodiment provides an encryption method for streaming video;
[0041] Such as figure 1 As shown, encryption methods for streaming video include:
[0042] S101: Obtain the streaming video to be encrypted; divide the streaming video to be encrypted into several blocks according to the set number of bytes;
[0043] S102: Generate a block key for each block; based on the block key, generate a corresponding key character for each to-be-encrypted byte of the encrypted streaming video;
[0044] S103: Generate a random factor for each byte to be encrypted of the streaming video to be encrypted; based on the key character and random factor of each byte to be encrypted, obtain the final key corresponding to the byte to be encrypted;
[0045] S104: Using the final key corresponding to each byte to be encrypted, encrypt corresponding bytes of the video stream to be encrypted; and encrypt all bytes to be encrypted in the video stream to be encrypted.
[0046] Further, said ...
Embodiment 2
[0074] This embodiment provides an encryption system for streaming video;
[0075] Encryption system for streaming video, including:
[0076] The obtaining module is configured to: obtain the streaming video to be encrypted; divide the streaming video to be encrypted into several blocks according to the set number of bytes;
[0077] A block secret key generation module, which is configured to: generate a block key for each block; based on the block key, generate a corresponding key character for each to-be-encrypted byte of the encrypted streaming video;
[0078] The final secret key generation module is configured to: generate a random factor for each byte to be encrypted of the streaming video to be encrypted; obtain the byte to be encrypted based on the key character and the random factor of each byte to be encrypted the corresponding final key;
[0079] The encryption module is configured to: use the final key corresponding to each byte to be encrypted to encrypt the cor...
Embodiment 3
[0084] This embodiment also provides an electronic device, including: one or more processors, one or more memories, and one or more computer programs; wherein, the processor is connected to the memory, and the one or more computer programs are programmed Stored in the memory, when the electronic device is running, the processor executes one or more computer programs stored in the memory, so that the electronic device executes the method described in Embodiment 1 above.
[0085] It should be understood that in this embodiment, the processor can be a central processing unit CPU, and the processor can also be other general-purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate array FPGA or other programmable logic devices , discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com