[go: up one dir, main page]

CN109151506B - A method, system and server for video file operation - Google Patents

A method, system and server for video file operation Download PDF

Info

Publication number
CN109151506B
CN109151506B CN201810845203.9A CN201810845203A CN109151506B CN 109151506 B CN109151506 B CN 109151506B CN 201810845203 A CN201810845203 A CN 201810845203A CN 109151506 B CN109151506 B CN 109151506B
Authority
CN
China
Prior art keywords
user
video file
video
operated
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201810845203.9A
Other languages
Chinese (zh)
Other versions
CN109151506A (en
Inventor
刘义
黄焕昭
余荣
张浩川
苏天培
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201810845203.9A priority Critical patent/CN109151506B/en
Publication of CN109151506A publication Critical patent/CN109151506A/en
Application granted granted Critical
Publication of CN109151506B publication Critical patent/CN109151506B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Graphics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)

Abstract

本申请公开了一种视频文件操作的方法,包括:将用户请求发送至版权方的版权终端,并判断是否接收到版权方发送的允许命令;若是,则授予用户操作权限,并根据操作权限为用户生成专属权限码;判断用户终端内是否存有待操作视频文件;若用户终端内存有待操作视频文件,则将包含专属权限码的第一数据包发送至用户终端。本申请通过将用户请求发送至版权方的版权终端,由版权方审核用户的请求,审核通过则授予用户相应的权限,从而实现防止用户随意传播,保护了视频提供商即版权方的合法权益,同时能对待操作视频文件进行路径追踪,进而确定盗播者的身份信息。本申请同时还提供了一种视频文件操作的系统、设备及计算机可读存储介质,具有上述有益效果。

Figure 201810845203

The present application discloses a method for operating a video file, which includes: sending a user request to a copyright terminal of a copyright owner, and judging whether a permission command sent by the copyright owner is received; The user generates an exclusive authorization code; determines whether there is a video file to be operated in the user terminal; if there is a video file to be operated in the user terminal, a first data packet containing the exclusive authorization code is sent to the user terminal. In this application, by sending the user request to the copyright terminal of the copyright owner, the copyright owner will review the user's request, and the user will be granted the corresponding permissions if the review is passed, so as to prevent the user from spreading at will, and protect the legitimate rights and interests of the video provider, that is, the copyright owner. At the same time, it can track the path of the video file to be operated, and then determine the identity information of the pirate. The present application also provides a system, a device and a computer-readable storage medium for operating a video file, which have the above beneficial effects.

Figure 201810845203

Description

Method, system and server for operating video file
Technical Field
The present application relates to the field of network video playing technologies, and in particular, to a method, a system, a server, and a computer-readable storage medium for video file operation.
Background
With the continuous upgrading of the mobile internet environment, the advantages that the fragment time of a user and the user can be obtained by watching videos at the mobile terminal at any time and any place can be filled, and the video user is rapidly increased. According to a 41 st statistical report of the development conditions of the Chinese Internet in 2018 published by CNNI, the network video user scale reaches 5.79 hundred million by 12 months in 2017, and is increased by 3437 ten thousand compared with the last year, and accounts for 75.0% of the total netizens. Based on such a huge user base, the network video becomes the corner of various capital and advertisers, and the film and television spread a great new momentum. Typically, a mainstream video website will, on average, upload thousands or even more of video works per day for viewing by users, making video an important component of the current internet content composition.
However, the video on the network is not only an information carrier and an information transmission form in the internet era, but also an infringer due to its efficient transmission mode, and is very easy to generate various copyright disputes. Driven by benefits, the video piracy problem in the current network is prominent, the content copyright is not effectively protected, and a plurality of video websites are mostly played in a pirated form, so that copyright disputes are increased, the enthusiasm of content providers is influenced to a great extent, and the healthy development of the content network video industry in China is not facilitated.
For the piracy infringement problem of videos, a digital watermarking technology is generally adopted in a plurality of video websites at present, for example, LOGO is added in video content, and the purpose that when other websites or individuals play or transmit the videos, the copyright parties can trace back related responsibilities after knowing the videos is achieved; or the video resources of some video websites are only browsed by the registered user in order to prevent being embezzled, and the user is not allowed to download the video resources.
In the prior art, most video websites simply embed information for identifying image copyright owners, such as LOGO, description and the like, into videos, and copyright information is easily tampered, for example, another LOGO is used to cover the copyright information, so that the legal rights and interests of the copyright owners cannot be effectively maintained; in addition, in an environment where the internet is open, cases often occur where videos are edited, copied, downloaded, and illegally distributed at will.
Therefore, how to prevent the video file from being illegally broadcast is a technical problem that needs to be solved by those skilled in the art at present.
Disclosure of Invention
The application aims to provide a method, a system, a server and a computer readable storage medium for video file operation, which are used for preventing video files from being embezzled.
In order to solve the above technical problem, the present application provides a method for operating a video file, including:
receiving a user request sent by a user terminal;
determining required operation authority, a video file to be operated and a copyright party of the video file to be operated according to the user request;
sending the user request to a copyright terminal of the copyright party, and judging whether an allowing command sent by the copyright party is received;
if so, granting the operation authority to the user, and generating an exclusive authority code for the user according to the operation authority;
judging whether the video file to be operated exists in the user terminal;
and when the video file to be operated is stored in the user terminal, sending a first data packet containing the exclusive permission code to the user terminal so that a user can perform related operation on the video file to be operated according to the exclusive permission code.
Optionally, when the video file to be operated is not stored in the user terminal, the method further includes:
sending a second data packet containing the exclusive permission code to the user terminal;
when receiving an authority code input by a user, judging whether the authority code input by the user is consistent with the exclusive authority code;
and if so, encrypting the video file to be operated, and sending the obtained encrypted file packet and the key to the user terminal.
Optionally, after sending the first data packet containing the exclusive right code to the user terminal, the method further includes:
when the user performs related operation on the video file to be operated according to the exclusive permission code, recording the operation times of the user;
judging whether the user operation times exceed a first threshold value or not;
and if so, prohibiting the user from operating the video file to be operated.
Optionally, the method further includes:
when the violation behavior is detected, outputting warning information; wherein the violation behavior comprises at least one of an illegal tampering right behavior and a bypassing right check behavior.
Optionally, the determining, according to the user request, the required operation permission, the video file to be operated, and the copyright owner of the video file to be operated include:
extracting a user identity from the user request;
authenticating the user identity identification, and judging whether the user identity identification is in an abnormal state; wherein the abnormal state comprises at least one of a loss reporting state, an untrusted state and a logout state;
if so, feeding back the information of requesting invalidity to the user terminal;
if not, determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request.
Optionally, the method further includes:
when a video file uploaded by a user is received, authenticating the user uploading the video file;
when the authentication is passed, marking the user as a copyright side of the video file;
granting the copyright side the copyright ownership right of the video file; the copyright ownership permission comprises at least one of a video deletion permission and a video secondary authorization permission;
and generating a video identification code according to the video file, and writing the video identification code and the user identity of the copyright party into a database.
Optionally, the method further includes:
when the fed-back video violation information is received, respectively recording the number of the video violation information of each video file;
marking the video files of which the number of the video violation information exceeds a second threshold value as video files to be audited;
sending the video file to be audited to a management platform, and judging whether violation determining information sent by an administrator is received or not;
and if so, deleting the video file to be audited.
The present application further provides a system for video file manipulation, the system comprising:
the receiving module is used for receiving a user request sent by a user terminal;
the determining module is used for determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request;
the first judgment module is used for sending the user request to a copyright terminal of the copyright party and judging whether an allowing command sent by the copyright party is received or not;
the first permission granting module is used for granting the operation permission to the user when receiving a permission command sent by the copyright party and generating an exclusive permission code for the user according to the operation permission;
the second judgment module is used for judging whether the video file to be operated exists in the user terminal;
and the first sending module is used for sending a first data packet containing the exclusive permission code to the user terminal when the video file to be operated is stored in the user terminal so as to enable a user to perform related operation on the video file to be operated according to the exclusive permission code.
The present application also provides a video file operation server, including:
a memory for storing a computer program;
a processor for implementing the steps of the method of video file manipulation as described in any one of the above when said computer program is executed.
The present application further provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the method of video file manipulation as set forth in any one of the preceding claims.
The method for operating the video file comprises the following steps: receiving a user request sent by a user terminal; determining required operation authority, a video file to be operated and a copyright party of the video file to be operated according to a user request; sending the user request to a copyright terminal of a copyright party, and judging whether an allowing command sent by the copyright party is received; if so, granting the user operation authority, and generating an exclusive authority code for the user according to the operation authority; judging whether a video file to be operated exists in the user terminal; and if the video file to be operated is stored in the user terminal, sending the first data packet containing the exclusive permission code to the user terminal so that the user can perform related operation on the video file to be operated according to the exclusive permission code.
According to the technical scheme, the user request is sent to the copyright terminal of the copyright party, the request of the user is checked by the copyright party, corresponding permission is granted to the user if the user passes the checking, whether the video file to be operated exists in the user terminal is further judged, if the user passes the checking, the user is enabled to carry out related operation on the video file to be operated according to the permission, accordingly, the specificity of video file operation is achieved, the user is prevented from being spread randomly, legal rights and interests of a video provider, namely the copyright party, are protected, meanwhile, path tracking can be carried out on the video file to be operated, and identity information of a pirate is further determined. The application also provides a system, a server and a computer readable storage medium for video file operation, which have the beneficial effects and are not repeated herein.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a method for operating a video file according to an embodiment of the present application;
FIG. 2 is a flow chart of an actual representation of S102 in the method of video file manipulation provided in FIG. 1;
FIG. 3 is a flow chart of another method for video file manipulation according to an embodiment of the present application;
fig. 4 is a flowchart of a method for operating a video file according to an embodiment of the present application;
FIG. 5 is a flowchart of a method for video file manipulation according to an embodiment of the present application;
fig. 6 is a block diagram of a system for video file manipulation according to an embodiment of the present application;
FIG. 7 is a block diagram of another system for video file manipulation provided by embodiments of the present application;
fig. 8 is a structural diagram of a video file operation server according to an embodiment of the present application.
Detailed Description
The core of the application is to provide a method, a system, a server and a computer readable storage medium for video file operation, which are used for preventing video files from being embezzled.
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for operating a video file according to an embodiment of the present disclosure.
The method specifically comprises the following steps:
s101: receiving a user request sent by a user terminal;
for the piracy infringement problem of videos, a digital watermarking technology is generally adopted in a plurality of video websites at present, for example, LOGO is added in video content, and the purpose that when other websites or individuals play or transmit the videos, the copyright parties can trace back related responsibilities after knowing the videos is achieved; or the video resources of some video websites are only browsed by the registered user in order to prevent being embezzled, and the user is not allowed to download the video resources.
In the prior art, most video websites simply embed information for identifying image copyright owners, such as LOGO, description and the like, into videos, and copyright information is easily tampered, for example, another LOGO is used to cover the copyright information, so that the legal rights and interests of the copyright owners cannot be effectively maintained; in addition, in an environment where the internet is open, cases often occur where videos are edited, copied, downloaded, and illegally distributed at will.
Based on this, the present application provides a method of video file manipulation to solve the above-mentioned problems.
S102: determining required operation authority, a video file to be operated and a copyright party of the video file to be operated according to a user request;
when a user wants to perform operations such as watching, downloading, clipping and the like on a certain video file, a corresponding user request can be sent to the system through the user terminal, and the system determines the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request; the copyright party is a user with the authority of deleting or secondarily authorizing the video file to be operated;
optionally, the required operation permission, the video file to be operated, and the copyright side of the video file to be operated are determined according to the user request, which may specifically be directly obtaining the related information included in the user request.
S103: sending the user request to a copyright terminal of a copyright party, and judging whether an allowing command sent by the copyright party is received;
if yes, go to step S104;
optionally, the determining whether the permission command sent by the copyright party is received may specifically be determining whether the permission command sent by the copyright party is received within a preset time;
further, when the permission command sent by the copyright party is not received within the preset time, a prompt message of request failure can be fed back to the user terminal to inform the user that the copyright party of the video file to be operated does not permit the operation request of the user.
S104: granting the user operation authority, and generating an exclusive authority code for the user according to the operation authority;
after the copyright side agrees with the request of the user, the server grants the operation authority of the user according to the request of the user, and generates an exclusive authority code for the user according to the operation authority;
preferably, the exclusive right code mentioned here may be a 32-bit hash value generated according to the right requested by the user, and its main functions include two aspects: firstly, when the operation of a user on a video file to be operated is the first operation, before the server sends an encrypted video file packet and a secret key to the user, the identity of the user and the behavior of the user need to be determined, and the system is verified through an authority code so as to prevent the user from being tampered; and secondly, if the server guides the user to a site authorized by the copyright owner, such as a video website, the site can verify the authority of the user through the authority code.
Preferably, the generation mode of the exclusive permission code may specifically be: the server writes a user Request into a Request script in a form of 'application time-video valid time-allowed playing times-additional information', and then adds a user identity identifier and a video identification code of a video file to be operated into the Request script to form a character string of 'user identity identifier-video identification code-application time-video valid time-allowed playing times-additional information', and generates an exclusive authority code through a preset encryption algorithm;
the Request script is a script file prestored in the first data packet and the second data packet and can be used for recording information such as a video identification code, an operation application of a user to the video file to be operated, the authority granted by a copyright party, the operation record of the video file and the like.
The user identity identification can be specifically distributed for each legally registered user by the server, and identity information submitted by the user on the server can be checked through the user identity identification; the video identification code may specifically be a unique identification code of each video file stored on the server, the additional information may specifically include at least one of information such as a video format and a video resolution, the exclusive authority code may be a 32-bit hash value, and the preset encryption algorithm may specifically be an MD5 encryption algorithm, an SHA-1 encryption algorithm, or another encryption algorithm capable of generating a hash value;
MD5 is a secure hash algorithm, and inputting two different plaintext will not result in the same output value, and according to the output value, the original plaintext cannot be obtained, i.e. the process is irreversible; the calculated MD5 value length is fixed for data with any length; and any change is made to the original data, even if only 1 byte is modified, the obtained MD5 value is very different.
S105: judging whether a video file to be operated exists in the user terminal;
if yes, the process proceeds to step S106.
S106: and sending the first data packet containing the exclusive permission code to a user terminal so that a user performs related operation on the video file to be operated according to the exclusive permission code.
The method comprises the steps that whether a video file to be operated exists in a user terminal or not is judged, if yes, a first data packet containing an exclusive authority code is sent to the user terminal, and a user can perform related operation on the video file to be operated according to the exclusive authority code;
optionally, the first data packet mentioned herein may specifically include an exclusive permission code and a Request script;
furthermore, the user performs related operations on the video file to be operated according to the exclusive permission code, and the implementation manner of the method can be specifically realized through a Request script, the Request script automatically performs permission check every time the user operates the video, and sends a new user operation application to the server and returns an application result under the condition that the user authorization is invalid.
Preferably, when the user performs related operations on the video file to be operated according to the exclusive permission code, the operation times of the video file to be operated can be recorded through the Request script, when the user tries to operate the video file to be operated again, the Request script can firstly check the operation permission of the user and check whether the exclusive permission code exists, and if the permission does not accord with the exclusive permission code, the user operation is prohibited;
further, the inconsistency of the authority referred to herein may be that the number of user operations reaches a threshold, and the specific process may be:
when a user performs related operation on a video file to be operated according to the exclusive authority code, recording the operation times of the user;
judging whether the operation times of the user exceed a first threshold value or not;
and if so, prohibiting the user from operating the video file to be operated.
Further, the inconsistency of the authority may also be a threshold value reached by the user operation time, and the specific process may also be:
when a user performs related operation on a video file to be operated according to the exclusive authority code, recording the operation time of the user;
judging whether the user operation time exceeds a second threshold value;
and if so, prohibiting the user from operating the video file to be operated.
Preferably, after the user is prohibited from operating the video file to be operated, the Request script may further send an operation Request of the user to the server, and the copyright side determines whether to approve a new video operation application of the user, and if the copyright side approves the new Request of the user, the server sends a new permission code to the user terminal to replace the original permission code, and at this time, the user may perform a new operation on the video file to be operated.
Preferably, when the violation is detected, warning information can be output; wherein, the violation behavior comprises at least one of illegal tampering right behavior and bypassing right check behavior;
further, when a serious violation is detected, such as a virus-type brute force attack, the local video resource and the key can be directly deleted, then the user is marked as an 'untrusted' state in a Request script, the user is uploaded to a cloud database, and finally a local data packet is deleted.
Based on the technical scheme, the method for operating the video file provided by the application sends the user request to the copyright terminal of the copyright party, the copyright party verifies the user request, if the verification is passed, the corresponding authority is granted to the user, then whether the video file to be operated exists in the user terminal is judged, if yes, the user is enabled to carry out related operation on the video file to be operated according to the authority, therefore, the specificity of the video file operation is realized, the user is prevented from randomly spreading, the legal rights and interests of a video provider, namely the copyright party, are protected, meanwhile, the path tracking can be carried out on the video file to be operated, and further the identity information of a pirate is determined.
Based on the above technical solution, please refer to fig. 2, fig. 2 is a flowchart of an actual expression manner of S102 in the method for operating a video file provided in fig. 1, that is, determining a required operation permission, a video file to be operated, and a copyright owner of the video file to be operated according to a user request, and specifically, the method may also include the following steps:
s201: extracting a user identity from the user request;
s202: authenticating the user identity and judging whether the user identity is in an abnormal state or not;
if yes, go to step S203; if not, go to step S204;
the abnormal state mentioned herein may specifically include, but is not limited to, at least one of a loss-reporting state, an untrusted state, and a logged-off state.
S203: feeding back the information of requesting invalidity to the user terminal;
s204: and determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request.
Based on the technical scheme, the embodiment of the application extracts the user identity from the user request after receiving the user request sent by the user terminal; authenticating the user identity identification, judging whether the user identity identification is in an abnormal state or not, and feeding back information of requesting invalidity to the user terminal if the user identity identification is in the abnormal state; and if the current state is not the abnormal state, determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request so as to ensure the credibility of the user identity.
For step S105 in the above embodiment, when the video file to be operated is not stored in the user terminal, the steps shown in fig. 3 may also be executed;
referring to fig. 3, fig. 3 is a flowchart of another video file operation method according to an embodiment of the present application, which may specifically include the following steps:
s301: sending a second data packet containing the exclusive authority code to the user terminal;
optionally, the second data packet mentioned here may specifically include an exclusive permission code, a Request script, a Monitor state detection script, and an Encrypt decryption script, where the Monitor state detection script has the following functions: firstly, the states of a data packet, a key and a video file are monitored, and only locally specified programs are allowed to access and read the files; the second is a deleting function, which can delete the video files in the user terminal; the Encrypt decryption script can decrypt the encrypted file packet through the secret key to obtain the original video file.
S302: when receiving an authority code input by a user, judging whether the authority code input by the user is consistent with the exclusive authority code;
if yes, go to step S302;
s303: and encrypting the video file to be operated, and sending the obtained encrypted file packet and the key to the user terminal.
Preferably, the encrypting the video file to be operated mentioned here may be performed by the following specific process:
the video file to be operated is added into a coding encryption queue, the content of the video file is coded and encrypted by adopting a symmetric encryption algorithm, and the symmetric encryption (also called private key encryption) refers to an encryption algorithm using the same secret key for encryption and decryption. The principle of encryption here is: each encrypted file is encrypted before being encrypted by using a dynamic key generator to randomly generate a 256-bit key, and the content of the file is symmetrically encrypted by the key. When the encryption is finished, an encrypted video file packet and a key can be obtained;
furthermore, after receiving the message that the user passes the authentication, the server can copy and store the secret key into the secret key management system, and meanwhile, the secret key transmission adopts an SSL encryption channel to ensure the security of the transmission data.
Based on the technical scheme, when the video file to be operated is not stored in the user terminal, the operation request of the user to the video file to be operated is a first application for the video file by default, because the communication content is possibly peeped and tampered on the communication line, the server confirms whether the request is the application of the user by checking the authority code, so that the authority code input by the user is compared with the exclusive authority code, if the authority code and the exclusive authority code are consistent, the verification is passed, the server considers that the legal user is the video operation application provided by the user to the server through the mobile terminal and obtains the agreement of a copyright party, the video file to be operated is encrypted, and the obtained encrypted file packet and the obtained secret key are sent to the user terminal so that the user can perform related operations.
Based on the foregoing embodiments, please refer to fig. 4, and fig. 4 is a flowchart of another method for operating a video file according to an embodiment of the present application.
The method specifically comprises the following steps:
s401: when a video file uploaded by a user is received, authenticating the user uploading the video file;
s402: when the authentication is passed, the user is marked as a copyright side of the video file;
s403: granting the copyright owner authority to the video file of the copyright party;
the copyright ownership right mentioned here can include but is not limited to at least one of video deletion right and video secondary authorization right;
the video secondary authorization authority is that the copyright parties can transfer the copyright of the video resource to other users, after a plurality of users apply for operation requests of the video file, the server can automatically distribute the user requests to all the copyright parties of the video file on the server for authorization, and as long as any one copyright party agrees with the user requests, the server can send the video resource to the user terminal.
Preferably, if the copyright owner transfers the copyright of the video resource to other sites, such as video websites, when the user applies for online viewing of the video resource without downloading, the server will automatically direct the user's request to these sites, and the user can directly input the permission code for online viewing.
S404: and generating a video identification code according to the video file, and writing the video identification code and the user identity of the copyright party into a database.
Based on the foregoing embodiments, please refer to fig. 5, and fig. 5 is a flowchart of another method for operating a video file according to an embodiment of the present application.
The method specifically comprises the following steps:
s501: when the fed-back video violation information is received, respectively recording the number of the video violation information of each video file;
s502: marking the video files with the number of the video violation information exceeding a second threshold value as video files to be audited;
s503: sending the video file to be audited to a management platform, and judging whether violation determining information sent by an administrator is received or not;
if yes, go to step S504;
optionally, the determining whether the violation determining information sent by the administrator is received may specifically be determining whether the violation determining information sent by the administrator is received within a preset time, and if not, marking the video file to be audited as a legal file.
S504: and deleting the video file to be audited.
Based on the technical scheme, when a plurality of users feed back video resource violation (such as improper talk, low content and the like), in order to reduce the possibility of misjudgment of the video resource, the embodiment of the application sends a video file to be audited to a management platform, so that a manager can manually audit the video file and judge whether violation determining information sent by the manager is received, when the violation determining information sent by the manager is received, the video violation is confirmed, the server can directly cross the authority of the video copyright side to delete the video resource from the video server, and further, the local resource file can be forcibly deleted through a Monitor state detection script in a data packet, so that the violation video is ensured to be completely invalid, and the legal responsibility of an uploader can be traced through path tracking if necessary.
Referring to fig. 6, fig. 6 is a block diagram of a system for video file operation according to an embodiment of the present disclosure.
The system may include:
a receiving module 100, configured to receive a user request sent by a user terminal;
the determining module 200 is configured to determine a required operation permission, a video file to be operated, and a copyright owner of the video file to be operated according to a user request;
a first judging module 300, configured to send a user request to a copyright terminal of a copyright party, and judge whether an allowing command sent by the copyright party is received;
the first permission granting module 400 is configured to grant an operation permission to a user when receiving a permission command sent by a copyright owner, and generate an exclusive permission code for the user according to the operation permission;
a second judging module 500, configured to judge whether a video file to be operated exists in the user terminal;
the first sending module 600 is configured to send a first data packet including an exclusive permission code to the user terminal when the video file to be operated is stored in the user terminal, so that a user performs a related operation on the video file to be operated according to the exclusive permission code.
Referring to fig. 7, fig. 7 is a block diagram of another video file operation system according to an embodiment of the present disclosure.
The system may further comprise:
the second sending module is used for sending a second data packet containing the exclusive right code to the user terminal;
the third judging module is used for judging whether the authority code input by the user is consistent with the exclusive authority code when the authority code input by the user is received;
and the encryption module is used for encrypting the video file to be operated when the authority code input by the user is consistent with the exclusive authority code, and sending the obtained encrypted file packet and the key to the user terminal.
Preferably, the system may further include:
the first recording module is used for recording the operation times of the user when the user performs related operation on the video file to be operated according to the exclusive authority code;
the fourth judging module is used for judging whether the operation times of the user exceed the first threshold value;
and the operation forbidding module is used for forbidding the user to operate the video file to be operated when the operation times of the user exceed the first threshold value.
Preferably, the system may further include:
the warning module is used for outputting warning information when the violation behavior is detected; wherein the illegal action comprises at least one of illegal right tampering action and bypassing right checking action.
The determining module 200 may include:
the extraction submodule is used for extracting the user identity identification from the user request;
the authentication submodule is used for authenticating the user identity and judging whether the user identity is in an abnormal state; wherein the abnormal state comprises at least one of a loss reporting state, an untrusted state and a logout state;
the feedback submodule is used for feeding back the information of invalid request to the user terminal when the user identity is in an abnormal state;
and the determining submodule is used for determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request when the user identity identification is not in the abnormal state.
Preferably, the system may further include:
the authentication module is used for authenticating the user uploading the video file when receiving the video file uploaded by the user;
the first marking module is used for marking the user as a copyright side of the video file when the authentication is passed;
the second permission granting module is used for granting the copyright ownership permission of the video file of the copyright side; the copyright ownership permission comprises at least one of a video deletion permission and a video secondary authorization permission;
and the generating and writing module is used for generating a video identification code according to the video file and writing the video identification code and the user identity identification of the copyright party into a database.
Preferably, the system may further include:
the second recording module is used for respectively recording the number of the video violation information of each video file when the fed back video violation information is received;
the second marking module is used for marking the video files with the number of the video violation information exceeding a second threshold value as video files to be audited;
the fifth judgment module is used for sending the video file to be audited to the management platform and judging whether violation determination information sent by an administrator is received or not;
and the deleting module is used for deleting the video file to be audited when the violation determination information sent by the administrator is received.
Since the embodiment of the system portion corresponds to the embodiment of the method portion, the description of the embodiment of the system portion refers to the description of the embodiment of the method portion, and is not repeated here.
Referring to fig. 8, fig. 8 is a structural diagram of a video file operation server according to an embodiment of the present application.
The video file manipulation server 700 may vary significantly depending on configuration or performance, and may include one or more processors (CPUs) 722 (e.g., one or more processors) and memory 732, one or more storage media 730 (e.g., one or more mass storage devices) storing applications 742 or data 744. Memory 732 and storage medium 730 may be, among other things, transient storage or persistent storage. The program stored in the storage medium 730 may include one or more modules (not shown), each of which may include a sequence of instruction operations for the device. Further, the central processor 722 may be configured to communicate with the storage medium 730, and execute a series of instruction operations in the storage medium 730 on the video file operation server 700.
The video file manipulation server 700 may also include one or more power supplies 726, one or more wired or wireless network interfaces 750, one or more input-output interfaces 758, and/or one or more operating systems 741, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and so forth.
The steps in the method of video file manipulation described above in fig. 1 to 5 are implemented by the video file manipulation server based on the structure shown in fig. 8.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the apparatus and the module described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus, server and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of modules is merely a division of logical functions, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a function calling device, or a network device) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
A method, system, server and computer-readable storage medium for video file manipulation provided by the present application are described in detail above. The principles and embodiments of the present application are explained herein using specific examples, which are provided only to help understand the method and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A method of video file manipulation, comprising:
receiving a user request sent by a user terminal;
determining required operation authority, a video file to be operated and a copyright party of the video file to be operated according to the user request;
sending the user request to a copyright terminal of the copyright party, and judging whether an allowing command sent by the copyright party is received;
if so, granting the operation authority to the user, and generating an exclusive authority code for the user according to the operation authority, wherein the exclusive authority code is a 32-bit hash value generated according to the authority requested by the user;
judging whether the video file to be operated exists in the user terminal;
and when the video file to be operated is stored in the user terminal, sending a first data packet containing the exclusive permission code to the user terminal so that a user can perform related operation on the video file to be operated according to the exclusive permission code.
2. The method according to claim 1, wherein when the video file to be operated is not stored in the user terminal, further comprising:
sending a second data packet containing the exclusive permission code to the user terminal;
when receiving an authority code input by a user, judging whether the authority code input by the user is consistent with the exclusive authority code;
and if so, encrypting the video file to be operated, and sending the obtained encrypted file packet and the key to the user terminal.
3. The method of claim 1, further comprising, after sending the first data packet containing the dedicated privilege code to the user terminal:
when the user performs related operation on the video file to be operated according to the exclusive permission code, recording the operation times of the user;
judging whether the user operation times exceed a first threshold value or not;
and if so, prohibiting the user from operating the video file to be operated.
4. The method of claim 1, further comprising:
when the violation behavior is detected, outputting warning information; wherein the violation behavior comprises at least one of an illegal tampering right behavior and a bypassing right check behavior.
5. The method according to claim 1, wherein the determining the required operation authority, the video file to be operated and the copyright side of the video file to be operated according to the user request comprises:
extracting a user identity from the user request;
authenticating the user identity identification, and judging whether the user identity identification is in an abnormal state; wherein the abnormal state comprises at least one of a loss reporting state, an untrusted state and a logout state;
if so, feeding back the information of requesting invalidity to the user terminal;
if not, determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request.
6. The method of claim 1, further comprising:
when a video file uploaded by a user is received, authenticating the user uploading the video file;
when the authentication is passed, marking the user as a copyright side of the video file;
granting the copyright side the copyright ownership right of the video file; the copyright ownership permission comprises at least one of a video deletion permission and a video secondary authorization permission;
and generating a video identification code according to the video file, and writing the video identification code and the user identity of the copyright party into a database.
7. The method of any one of claims 1-6, further comprising:
when the fed-back video violation information is received, respectively recording the number of the video violation information of each video file;
marking the video files of which the number of the video violation information exceeds a second threshold value as video files to be audited;
sending the video file to be audited to a management platform, and judging whether violation determining information sent by an administrator is received or not;
and if so, deleting the video file to be audited.
8. A system for video file manipulation, comprising:
the receiving module is used for receiving a user request sent by a user terminal;
the determining module is used for determining the required operation authority, the video file to be operated and the copyright party of the video file to be operated according to the user request;
the first judgment module is used for sending the user request to a copyright terminal of the copyright party and judging whether an allowing command sent by the copyright party is received or not;
the first permission granting module is used for granting the operation permission to the user when receiving an permission command sent by the copyright party, and generating an exclusive permission code for the user according to the operation permission, wherein the exclusive permission code is a 32-bit hash value generated according to the permission obtained by the user request;
the second judgment module is used for judging whether the video file to be operated exists in the user terminal;
and the first sending module is used for sending a first data packet containing the exclusive permission code to the user terminal when the video file to be operated is stored in the user terminal so as to enable a user to perform related operation on the video file to be operated according to the exclusive permission code.
9. A video file manipulation server, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the method of video file manipulation according to any one of claims 1 to 7 when executing said computer program.
10. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of video file manipulation according to any one of claims 1 to 7.
CN201810845203.9A 2018-07-27 2018-07-27 A method, system and server for video file operation Expired - Fee Related CN109151506B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810845203.9A CN109151506B (en) 2018-07-27 2018-07-27 A method, system and server for video file operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810845203.9A CN109151506B (en) 2018-07-27 2018-07-27 A method, system and server for video file operation

Publications (2)

Publication Number Publication Date
CN109151506A CN109151506A (en) 2019-01-04
CN109151506B true CN109151506B (en) 2021-04-16

Family

ID=64799011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810845203.9A Expired - Fee Related CN109151506B (en) 2018-07-27 2018-07-27 A method, system and server for video file operation

Country Status (1)

Country Link
CN (1) CN109151506B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111694970A (en) * 2019-03-13 2020-09-22 阿里巴巴集团控股有限公司 Data processing method, device and system
CN110493660B (en) * 2019-07-04 2020-06-19 天脉聚源(杭州)传媒科技有限公司 Method, system, device and storage medium for processing clipped video data
CN111263198A (en) * 2020-02-16 2020-06-09 袁芳 Pirate tracking method of video resources
CN112702314A (en) * 2020-12-04 2021-04-23 珠海格力电器股份有限公司 Method and device for processing video file of camera equipment
CN114980298A (en) * 2022-05-12 2022-08-30 元道通信股份有限公司 Tamper-proofing method based on positioning system and network time information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1858769A (en) * 2006-02-17 2006-11-08 华为技术有限公司 Method and system for limiting using part of using medium content
CN103248472A (en) * 2013-04-16 2013-08-14 华为技术有限公司 Operation request processing method and system and attack identification device
CN103377441A (en) * 2012-04-18 2013-10-30 深圳版达网络科技发展有限公司 Network multimedia copyright trading and management system
CN103716690A (en) * 2013-12-27 2014-04-09 广州华多网络科技有限公司 Multimedia live broadcast whistle-blowing method, terminal, server and system
CN105430431A (en) * 2015-11-06 2016-03-23 华为技术有限公司 Multimedia data playing method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752671A (en) * 2011-04-20 2012-10-24 鸿富锦精密工业(深圳)有限公司 Electronic device and copyright protection method of played content of electronic device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1858769A (en) * 2006-02-17 2006-11-08 华为技术有限公司 Method and system for limiting using part of using medium content
CN103377441A (en) * 2012-04-18 2013-10-30 深圳版达网络科技发展有限公司 Network multimedia copyright trading and management system
CN103248472A (en) * 2013-04-16 2013-08-14 华为技术有限公司 Operation request processing method and system and attack identification device
CN103716690A (en) * 2013-12-27 2014-04-09 广州华多网络科技有限公司 Multimedia live broadcast whistle-blowing method, terminal, server and system
CN105430431A (en) * 2015-11-06 2016-03-23 华为技术有限公司 Multimedia data playing method and device

Also Published As

Publication number Publication date
CN109151506A (en) 2019-01-04

Similar Documents

Publication Publication Date Title
US11366878B2 (en) Method and apparatus for delivering encoded content
CN109151506B (en) A method, system and server for video file operation
US9607131B2 (en) Secure and efficient content screening in a networked environment
KR100467929B1 (en) System for protecting and managing digital contents
US20200226233A1 (en) Distributed ledger-based digital content piracy deterrence
CN103282925B (en) System and method for protecting user privacy in multimedia uploaded to an internet site
US8934624B2 (en) Decoupling rights in a digital content unit from download
KR101219839B1 (en) Flexible licensing architecture in content rights management systems
US8955141B2 (en) Method of digital rights management about a compressed file
US20060149683A1 (en) User terminal for receiving license
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
JP2003330365A (en) Content distribution / receiving method
CN116055767B (en) Video file processing method, device, equipment and readable storage medium
CN101923616A (en) Service providing device, user terminal and copyright protection method in copyright protection
KR100886235B1 (en) Method and system for synchronizing data of personal mobile terminal
US8495749B2 (en) Method, apparatus and computer program product for a content protection system for protecting personal content
CN118590679A (en) Video digital copyright control method and system
HK40052790A (en) Playback processing method and apparatus for video file, electronic device and storage medium
KR20090089223A (en) Encryption / Decryption Methods for Storage and Use of Official Documents
TW201207663A (en) Datebase server, customer terminal and protection method for copyright safty
Peinado Digital Rights Management and Windows Media Player
HK1184252A (en) Improvements in watermark extraction efficiency
HK1183534A (en) Secure and efficient content screening in a networked environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210416