Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Video and audio credible playing method based on asymmetric encryption

A technology of asymmetric encryption and playback method, applied in the field of digital security, can solve the problems of inability to determine illegal replacement of video streaming media, lack of verification considerations for video content, etc., to improve reliability, achieve security and real-time performance, and reduce computing effect of overhead

Active Publication Date: 2019-12-20
CHENGDU SOBEY DIGITAL TECH CO LTD
View PDF17 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is: in order to solve the current lack of verification considerations for the disseminated video content, and it is impossible to determine whether the video streaming media has been illegally replaced in the dissemination channel, the present invention provides a video and audio trusted playback method based on asymmetric encryption , apply asymmetric encryption technology to the key data of encrypted video streaming media, to ensure that the client can detect whether the video streaming media has been illegally replaced in the communication channel according to the encrypted key data, and realize reliable transmission and trusted playback of network video

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video and audio credible playing method based on asymmetric encryption
  • Video and audio credible playing method based on asymmetric encryption
  • Video and audio credible playing method based on asymmetric encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Such as figure 1 As shown, the present embodiment provides a trusted video and audio playback method based on asymmetric encryption, including the following steps:

[0065] S1: The publishing end embeds a digital signature encrypted with a private key into the video streaming media during the transcoding service process of the video streaming media, and then pushes the video streaming media embedded with the digital signature to the intermediate network;

[0066] Usually, the transcoding service of the video publishing end is to successively scale, encode and sign the decoded video streaming media, but in this embodiment, the digital signature encrypted by the private key is embedded into the video streaming media; the involved in S1 The intermediate network is the existing network circulation channel, which is used as the media of video streaming media;

[0067] S2: After receiving the video streaming media through the intermediate network, the client extracts the di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a video and audio credible playing method based on asymmetric encryption, and relates to the technical field of digital security, and the method comprises the steps that a publishing end embeds a digital signature encrypted by a private key into a video streaming media in a general transcoding service process of the video streaming media, and pushes the video streaming media embedded with the digital signature to an intermediate network; the client receives the video streaming media through the intermediate network; digital signatures therein is extracted, the digitalsignature is decrypted by using the public key to obtain data for detection; and a detection result is deduced according to the detection data to control the player to play the video streaming media content. According to the invention, the detection process is transferred from the Internet to the transceiving end; by combining the one-way hash algorithm and the asymmetric encryption technology, while it is ensured that the behaviors of tampering and replacing the streaming media in the transmission process can be detected by the user side, the calculation overhead is greatly reduced, the complex asymmetric encryption technology can be applied to video streaming media application, and the basic real-time requirement of the streaming media is met.

Description

technical field [0001] The present invention relates to the technical field of digital security, and more specifically relates to an asymmetric encryption-based video and audio trusted playback method. Background technique [0002] Video streaming media is currently the highest proportion of video data transmission in the Internet. While streaming media provides high real-time network communication services, it has certain security risks. [0003] With the expansion of the Internet scale, the source video often needs to go through the third-party Internet video live broadcast service platform and corresponding video technology service provider through the Internet from the source end to the audience end. Even if it does not pass through the third-party video platform, it needs to be accelerated through a commercial CDN network . In this context, video flows and is distributed among these manufacturers, and the network security levels of these manufacturers are uneven. The b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/845H04N21/472H04N21/266H04N21/2187H04N21/8549H04N21/2347
CPCH04N21/2187H04N21/2347H04N21/26606H04N21/47202H04N21/8456H04N21/8549
Inventor 王炜谢超平肖睿
Owner CHENGDU SOBEY DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products