Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and system for streaming video

A technology of streaming transmission and encryption method, which is applied in the field of encryption method and system for streaming video transmission, which can solve the problems of long encryption time, limited video format compatibility, and increased data volume, so as to achieve fast operation speed and increase the number of cracks Difficulty, the effect of low computing resources

Pending Publication Date: 2022-04-22
山东点盾云网络科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. By transforming the video frame, this type of technology relies on the analysis and processing of the video coding structure, the encryption time is long, the real-time performance is poor, and the compatibility of the video format is also very limited
[0006] 2. Based on conventional encryption algorithms such as AES, most of them need to encrypt from the starting position of the file, and it is not easy to support direct encryption of data at any position, so that it cannot support video streaming and dragging at any position; and this type of method The encryption speed is slow and the amount of data increases after encryption, which is not suitable for the encryption of massive video data
In the XOR operation, if the key rule is simple or even a key is fixed, the attacker can easily find the law of the ciphertext data through the input of a large amount of data, and the security is not enough; there are also complex key rules, such as the ChaCha20 algorithm, for Keep the XOR keys used for each byte encryption different, and a new set of keys will be recalculated when each set of keys is used up. During the encryption process of a 64GB video file, more than 1 billion key changes are required operation, low efficiency; especially since the calculation of the new key depends on the results of the previous set of keys, if the player directly drags to a certain position at the end to play, it must first perform hundreds of millions of key transformations to get the position The correct key of the data will consume a lot of calculations at this time, which will cause freezes during dragging and playing, and is not suitable for dragging and playing videos.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and system for streaming video

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] This embodiment provides an encryption method for streaming video;

[0041] Such as figure 1 As shown, encryption methods for streaming video include:

[0042] S101: Obtain the streaming video to be encrypted; divide the streaming video to be encrypted into several blocks according to the set number of bytes;

[0043] S102: Generate a block key for each block; based on the block key, generate a corresponding key character for each to-be-encrypted byte of the encrypted streaming video;

[0044] S103: Generate a random factor for each byte to be encrypted of the streaming video to be encrypted; based on the key character and random factor of each byte to be encrypted, obtain the final key corresponding to the byte to be encrypted;

[0045] S104: Using the final key corresponding to each byte to be encrypted, encrypt corresponding bytes of the video stream to be encrypted; and encrypt all bytes to be encrypted in the video stream to be encrypted.

[0046] Further, said ...

Embodiment 2

[0074] This embodiment provides an encryption system for streaming video;

[0075] Encryption system for streaming video, including:

[0076] The obtaining module is configured to: obtain the streaming video to be encrypted; divide the streaming video to be encrypted into several blocks according to the set number of bytes;

[0077] A block secret key generation module, which is configured to: generate a block key for each block; based on the block key, generate a corresponding key character for each to-be-encrypted byte of the encrypted streaming video;

[0078] The final secret key generation module is configured to: generate a random factor for each byte to be encrypted of the streaming video to be encrypted; obtain the byte to be encrypted based on the key character and the random factor of each byte to be encrypted the corresponding final key;

[0079] The encryption module is configured to: use the final key corresponding to each byte to be encrypted to encrypt the cor...

Embodiment 3

[0084] This embodiment also provides an electronic device, including: one or more processors, one or more memories, and one or more computer programs; wherein, the processor is connected to the memory, and the one or more computer programs are programmed Stored in the memory, when the electronic device is running, the processor executes one or more computer programs stored in the memory, so that the electronic device executes the method described in Embodiment 1 above.

[0085] It should be understood that in this embodiment, the processor can be a central processing unit CPU, and the processor can also be other general-purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate array FPGA or other programmable logic devices , discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a streaming video-oriented encryption method and system. The streaming video-oriented encryption method comprises the following steps: acquiring a streaming video to be encrypted; the method comprises the following steps: dividing a streaming transmission video to be encrypted into a plurality of blocks according to a set byte number; generating a block key for each block; based on the block key, generating a corresponding key character for each byte to be encrypted of the streaming transmission video to be encrypted; generating a random factor for each byte to be encrypted of the streaming transmission video to be encrypted; based on the key character and the random factor of each to-be-encrypted byte, obtaining a final key corresponding to the to-be-encrypted byte; performing encryption processing on the corresponding bytes of the streaming transmission video to be encrypted by adopting the final key corresponding to each byte to be encrypted; and encrypting all bytes to be encrypted in the streaming transmission video. Various video formats are compatible, and the video can be quickly encrypted and decrypted when being dragged at any position; ciphertexts generated for different data have strong randomness, and rules are not easy to collide.

Description

technical field [0001] The invention relates to the technical field of video encryption, in particular to an encryption method and system for streaming video. Background technique [0002] The statements in this section merely mention the background technology related to the present invention and do not necessarily constitute the prior art. [0003] With the development of Internet technology, the application and dissemination of video files are becoming more and more extensive. Especially with the increase in bandwidth, more video files do not want to wait until the download is complete to play, but need to be watched online, hoping to be able to smoothly drag to any position to play. At the same time, content creators urgently need video encryption methods that are efficient, safe, and compatible with multiple video formats, which can be used in real-time streaming scenarios. [0004] There are several types of encryption technologies for existing video files: [0005] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/2347H04L9/06H04L9/08
CPCH04N21/2347H04L9/0643H04L9/0869
Inventor 张鹏高玉飞
Owner 山东点盾云网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products