[go: up one dir, main page]

CN112752122B - Video encryption transmission method of intelligent camera and computer readable storage medium - Google Patents

Video encryption transmission method of intelligent camera and computer readable storage medium Download PDF

Info

Publication number
CN112752122B
CN112752122B CN202011601824.6A CN202011601824A CN112752122B CN 112752122 B CN112752122 B CN 112752122B CN 202011601824 A CN202011601824 A CN 202011601824A CN 112752122 B CN112752122 B CN 112752122B
Authority
CN
China
Prior art keywords
video
video segment
file
address
encryption key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011601824.6A
Other languages
Chinese (zh)
Other versions
CN112752122A (en
Inventor
李哲
张磊
周开军
曹飞
杜新胜
张辉极
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN202011601824.6A priority Critical patent/CN112752122B/en
Publication of CN112752122A publication Critical patent/CN112752122A/en
Application granted granted Critical
Publication of CN112752122B publication Critical patent/CN112752122B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a video encryption transmission method of an intelligent camera and a computer readable storage medium, wherein the method comprises the following steps: the cloud end segments a video to be transmitted, and generates an initial m3u file according to the address corresponding to each video segment; generating an encryption key; generating an initial vector; traversing addresses in the m3u file, and taking a video clip corresponding to the currently traversed address as a current video clip; encrypting the address of the current video segment through the encryption key and the vector corresponding to the current video segment to obtain an address ciphertext of the current video segment; determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment; after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment; and encoding the encryption key, and sending the encoded encryption key and the new m3u file to the control end. The invention can improve the safety of video transmission from the cloud end of the intelligent camera to the control end.

Description

Video encryption transmission method of intelligent camera and computer readable storage medium
Technical Field
The invention relates to the technical field of secure transmission, in particular to a video encryption transmission method of an intelligent camera and a computer readable storage medium.
Background
Along with the development of the internet of things in recent years, the application of an intelligent video monitoring camera is more and more extensive, each large internet of things equipment manufacturer has own intelligent camera equipment, and videos shot by the camera can be transmitted to a cloud end for storage in the shooting process. The video recording is played back and viewed through a mobile control terminal App or a PC control terminal App and a Web mode. The transmission process from the cloud video to the control end needs to ensure the safety of the video and the efficiency of video transmission. Some manufacturers hide the video URL, but the security is not enough, and some manufacturers directly encrypt the video head, disguise the video for transmission, but can sniff and capture the video head by some tools; some video is directly encrypted, so that the video transmission and playing efficiency is very low, and hidden dangers also exist in the key transmission process.
The more popular transport means used today is video segmentation transport based on HLS protocol. Because the HLS protocol is a download-oriented protocol and can pass through any firewall or proxy server that allows HTTP data to pass through, video is fragmented prior to transmission. Due to the inherent advantages, the support degree is high, the technology is simple, and mainstream camera manufacturers adopt the mode. Due to the openness of the protocol, video transmission aiming at the HLS protocol is encrypted after video segmentation, and then can be played after segmentation decoding and merging are carried out at a client. The sectional encryption transmission mode ensures that the efficiency of downloading the buffered video by the control end App also increases certain safety.
At present, a transmission mode based on an HLS protocol generally adopts an AES-128 mode to segment and encrypt a video, transmission efficiency and safety are improved to a certain extent, but generally m3u8 files and network request data packets returned by the HLS are analyzed, fragment downloading information and encryption keys after the whole video is segmented can be obtained, then video fragment information is downloaded and decrypted and combined, and the whole complete video can also be intercepted. The entire segmentation, encryption and decryption process can be done by the ffmpeg tool. Therefore, the transmission method based on the HLS protocol cannot guarantee high security at present.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the video encryption transmission method of the intelligent camera and the computer readable storage medium can improve the security of video transmission from the cloud end of the intelligent camera to the control end.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: a video encryption transmission method of an intelligent camera comprises the following steps:
the cloud end segments the video to be transmitted to obtain video clips, and generates an initial m3u file according to the address corresponding to each video clip;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video clip through the encryption key and the vector corresponding to the current video clip to obtain an address ciphertext of the current video clip, wherein the vector corresponding to the first video clip is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and coding the encryption key, and sending the coded encryption key and the new m3u file to a control end.
The invention also proposes a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method as described above.
The invention has the beneficial effects that: based on an HLS protocol, on the basis of performing fragment processing on a video, a dynamic vector is generated according to a preset vector generation rule, and the addresses of all video segments in an m3u file are dynamically encrypted according to an encryption key and the dynamic vector, so that even if video transmission information is intercepted in the transmission process, the specific address of each segmented video stream cannot be known and downloading and playing cannot be performed due to the fact that the vector generation rule cannot be obtained, the safety of watching back and playing of cloud data of an intelligent camera to a control end is greatly improved, and the personal privacy leakage caused by the interception of a third party is avoided. The invention encrypts the playing address of the video list on the basis of not changing the original video stream coding, thereby ensuring the safety of the video in the transmission process.
Drawings
Fig. 1 is a flowchart of a video encryption transmission method of an intelligent camera according to the present invention;
fig. 2 is a flowchart of a cloud according to a first embodiment of the present invention;
fig. 3 is a flowchart of a control end according to a first embodiment of the present invention.
Detailed Description
In order to explain technical contents, objects and effects of the present invention in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
Referring to fig. 1, a video encryption transmission method for an intelligent camera includes:
the cloud end segments a video to be transmitted to obtain video segments, and generates an initial m3u file according to the address corresponding to each video segment;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video segment through the encryption key and the vector corresponding to the current video segment to obtain an address ciphertext of the current video segment, wherein the vector corresponding to the first video segment is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
From the above description, the beneficial effects of the present invention are: the playing address of the video list is encrypted on the basis of not changing the original video stream coding, and the safety of the video in the transmission process is ensured.
Further, the cloud segments the video to be transmitted to obtain a video segment, and the method further includes:
the video segments are encrypted separately.
As can be seen from the above description, the security of the video clip transmission is ensured.
Further, the determining, according to the address ciphertext of the current video segment, a vector corresponding to a next video segment specifically is:
and intercepting the front M bits of data of the address ciphertext of the current video segment to obtain a vector corresponding to the next video segment.
As can be seen from the above description, different dynamic vector generation rules can be set according to the requirements.
Further, after the encoding the encryption key and sending the encoded encryption key and the new m3u file to the control end, the method further includes:
after receiving the encoded encryption key and the new m3u file, the control end decodes the encoded encryption key to obtain an encryption key;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
taking the initial vector as a vector corresponding to a first video segment in the new m3u file;
determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments;
according to the encryption key and the vector corresponding to each video segment, respectively decrypting the address ciphertext of each video segment in the new m3u file to obtain the address of each video segment;
downloading each video clip according to the address of each video clip;
and merging the video clips to obtain the video to be transmitted.
According to the description, the decryption mode of the control end is matched with the encryption mode of the cloud end, so that the video to be transmitted can be obtained.
Further, the determining, according to the address ciphertext of the ith video segment in the new m3u file, the vector corresponding to the (i + 1) th video segment is specifically:
and intercepting the front M bit data of the address ciphertext of the ith video segment in the new M3u file to obtain a vector corresponding to the (i + 1) th video segment in the new M3u file.
As can be seen from the above description, the control end knows the generation rule of the motion vector.
The invention also proposes a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method as described above.
Example one
Referring to fig. 2-3, a first embodiment of the present invention is: a video encryption transmission method of an intelligent camera is suitable for video encryption transmission from a cloud end of the intelligent camera to a control end in an Internet of things system, and comprises the following steps as shown in figure 2:
s101: the cloud end segments a video to be transmitted to obtain video segments, and generates an initial m3u file according to the corresponding address of each video segment.
Specifically, through the working principle of HLS, the entire video stream is split into individual small downloadable video segments based on HTTP files, generally TS video streams, and video segments in other formats can also be used. An initial M3U (or M3U8, M3U8 being a Unicode version of M3U, encoded with UTF-8) playlist file containing video stream clip information is also generated for recording the available media stream data.
In this embodiment, it is assumed that N video clips are obtained after segmentation, that is, the initial m3u file contains addresses of the N video clips.
Wherein, the address of the video clip is a URL address. Further, the URL address of each video clip is encoded, that is, the encoded URL address is stored in the original m3u file.
S102: and generating an encryption key according to the session ID corresponding to the control end. Namely, a dynamic encryption key is generated based on the session ID of the currently logged-in control end.
S103: and generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end.
In this embodiment, the device information of the intelligent camera is the unique device ID of the intelligent camera, that is, the initial vector IV is generated according to the device ID of the camera for shooting the video and the session ID corresponding to the control end. The initial vector IV is used to combine with a key to form a key seed as an input to an encryption algorithm to generate an encrypted byte stream to encrypt data.
S104: and taking the initial vector as a vector corresponding to the first video clip in the initial m3u file.
S105: let i =1.
S106: and encrypting the address of the ith video clip in the initial m3u file through the encryption key and the vector corresponding to the ith video clip to obtain the address ciphertext of the ith video clip.
S107: and judging whether i = N is true, wherein N is the total number of the video segments, if so, indicating that address ciphertexts of all the video segments are obtained, executing step S110, otherwise, indicating that addresses of all the video segments in the initial m3u file are not traversed, and executing step S108.
S108: and determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment.
Specifically, the first M bits of data of the address ciphertext of the ith video segment are intercepted as a vector corresponding to the (i + 1) th video segment. Preferably, M =16. Intercepting the first 16 bits of the address ciphertext of the first video segment as a vector corresponding to the second video segment; intercepting the first 16 bits of the address ciphertext of the second video segment as a vector corresponding to the third video segment; and so on.
S109: let i = i +1, and then proceed to step S106.
S110: and generating a new m3u file according to the address ciphertext of each video segment.
S111: and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
Specifically, after the encryption key is encoded to a certain extent, the encoded encryption key and the new m3u file are returned to the control end (i.e., the client) through different network request packets.
Further, each video segment obtained by segmentation in step S101 is encrypted, that is, the original file of the video stream referenced by each address in the initial m3u file is encrypted, for example, AES-128 encryption, or other encryption, or header encryption is performed.
In this embodiment, by dynamically encrypting the segmented video information addresses in the m3u file, a client requests to obtain a standard m3u file in the video transmission process, but the URL addresses of the segmented video streams in the m3u file are encrypted ciphertexts, and the specific addresses of each segmented video stream cannot be known and cannot be downloaded and played without obtaining an encryption key and a generation rule of a dynamic vector. And the encryption of the commonly used segmented video is matched, so that the complete process of cracking, downloading and playing is generally difficult to complete.
Further, after step S111, the control end obtains a message returned by the cloud through a network request, analyzes the message, extracts the encoded encryption key and the new m3u file, dynamically generates the initial vector IV according to the same initial vector IV generation method, decrypts the new m3u file to obtain the correct address set of the segmented video stream, then downloads and decrypts the segmented video stream, and finally merges all the segmented video streams into a complete video for playing or caching to the local.
Specifically, as shown in fig. 3, the method comprises the following steps:
s201: and decoding the encoded encryption key to obtain the encryption key.
S202: generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end; namely, an initial vector IV is generated according to the equipment ID of the intelligent camera for shooting the video and the session ID corresponding to the control end.
S203: and taking the initial vector as a vector corresponding to the first video clip in the new m3u file.
S204: and determining a vector corresponding to the i +1 th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments.
Specifically, the first M bits of data of the address ciphertext of the ith video segment are intercepted as a vector corresponding to the (i + 1) th video segment. Preferably, M =16.
S205: and respectively decrypting the address ciphertext of each video clip in the new m3u file according to the encryption key and the vector corresponding to each video clip to obtain the address of each video clip. Namely, according to the encryption key and the vector corresponding to the ith video clip, the address ciphertext of the ith video clip in the new m3u file is decrypted to obtain the address of the ith video clip, i =1,2, … …, N.
Namely, the address ciphertext in the new m3u file is decrypted according to the reverse operation of the address encryption, and the initial m3u file is restored.
S206: downloading each video clip according to the address of each video clip; namely, the control end sequentially analyzes the segmented video addresses in the m3u file according to the sequence, and then requests the cloud end for video downloading.
Further, if the cloud end encrypts each video segment, the control end also needs to decrypt the downloaded video data.
S207: and merging the video clips to obtain the video to be transmitted. Namely, the video is played according to the standard HLS protocol processing, and the segmented videos can be merged into a complete video media file to be cached locally.
In this embodiment, each control end App or client needs to integrate an m3u file decryption plug-in of a manufacturer, and the decryption mode matches with the encryption mode of the cloud, so that video information can be transmitted from the cloud to the control end or the client more safely.
In this embodiment, based on the currently popular HLS protocol for video transmission and playing, the file content of the playlist m3u of the video is dynamically encrypted on the basis of encrypting the segment video stream after the video is subjected to the slicing processing. The method has the advantages that the playing address of the video list is encrypted on the basis that the original video stream coding is not changed, the safety of the video in the transmission process is guaranteed, even if the video transmission information is intercepted in the transmission process, downloading and playing cannot be carried out, the safety of watching back and playing from the cloud data of the intelligent camera to the control end is greatly improved, and the leakage of personal privacy caused by interception by a third party is avoided.
Example two
This embodiment is a computer-readable storage medium corresponding to the above-described embodiments, on which a computer program is stored, which program, when executed by a processor, performs the steps of:
the cloud end segments a video to be transmitted to obtain video segments, and generates an initial m3u file according to the address corresponding to each video segment;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video segment through the encryption key and the vector corresponding to the current video segment to obtain an address ciphertext of the current video segment, wherein the vector corresponding to the first video segment is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
Further, the cloud segments the video to be transmitted to obtain a video segment, and the method further includes:
the video segments are encrypted separately.
Further, the determining, according to the address ciphertext of the current video segment, a vector corresponding to a next video segment is specifically:
and intercepting the front M bits of data of the address ciphertext of the current video segment to obtain a vector corresponding to the next video segment.
Further, after the encoding the encryption key and sending the encoded encryption key and the new m3u file to the control end, the method further includes:
after receiving the encoded encryption key and the new m3u file, the control end decodes the encoded encryption key to obtain an encryption key;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
taking the initial vector as a vector corresponding to a first video segment in the new m3u file;
determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments;
according to the encryption key and the vector corresponding to each video segment, respectively decrypting the address ciphertext of each video segment in the new m3u file to obtain the address of each video segment;
downloading each video clip according to the address of each video clip;
and merging the video clips to obtain the video to be transmitted.
Further, the determining, according to the address ciphertext of the ith video segment in the new m3u file, the vector corresponding to the (i + 1) th video segment is specifically:
and intercepting the front M bits of data of the address ciphertext of the ith video clip in the new M3u file to obtain a vector corresponding to the (i + 1) th video clip in the new M3u file.
In summary, according to the video encryption transmission method and the computer-readable storage medium for the intelligent camera provided by the present invention, based on the HLS protocol, on the basis of performing the fragmentation processing on the video, the dynamic vector is generated according to the preset vector generation rule, and the addresses of the video segments in the m3u file are dynamically encrypted according to the encryption key and the dynamic vector, so that even if the video transmission information is intercepted during the transmission process, since the vector generation rule cannot be obtained, the specific address of each segmented video stream cannot be known, and downloading and playing cannot be performed, thereby greatly improving the security of the intelligent camera for reviewing and playing the cloud data to the control end, and avoiding the leakage of personal privacy caused by the interception by a third party. The invention encrypts the playing address of the video list on the basis of not changing the original video stream coding, thereby ensuring the safety of the video in the transmission process.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.

Claims (10)

1. A video encryption transmission method of an intelligent camera is characterized by comprising the following steps:
the cloud end segments the video to be transmitted to obtain video clips, and generates an initial m3u file according to the address corresponding to each video clip;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video clip through the encryption key and the vector corresponding to the current video clip to obtain an address ciphertext of the current video clip, wherein the vector corresponding to the first video clip is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
2. The video encryption transmission method for the intelligent camera according to claim 1, wherein the cloud segments the video to be transmitted to obtain video segments, and further comprises:
the video segments are encrypted separately.
3. The video encryption transmission method for the intelligent camera according to claim 1, wherein the determining, according to the address ciphertext of the current video segment, the vector corresponding to the next video segment specifically is:
and intercepting the front M bits of data of the address ciphertext of the current video segment to obtain a vector corresponding to the next video segment.
4. The video encryption transmission method for an intelligent camera according to claim 1, wherein after the encoding the encryption key and sending the encoded encryption key and the new m3u file to the control end, the method further comprises:
after receiving the encoded encryption key and the new m3u file, the control end decodes the encoded encryption key to obtain an encryption key;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
taking the initial vector as a vector corresponding to a first video segment in the new m3u file;
determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments;
according to the encryption key and the vector corresponding to each video segment, respectively decrypting the address ciphertext of each video segment in the new m3u file to obtain the address of each video segment;
downloading each video clip according to the address of each video clip;
and merging the video clips to obtain the video to be transmitted.
5. The method for video encryption transmission of an intelligent camera according to claim 4, wherein the determining, according to the address ciphertext of the ith video segment in the new m3u file, the vector corresponding to the (i + 1) th video segment specifically is:
and intercepting the front M bit data of the address ciphertext of the ith video segment in the new M3u file to obtain a vector corresponding to the (i + 1) th video segment in the new M3u file.
6. A computer-readable storage medium on which a computer program is stored, which program, when executed by a processor, performs the steps of:
the cloud end segments a video to be transmitted to obtain video segments, and generates an initial m3u file according to the address corresponding to each video segment;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video segment through the encryption key and the vector corresponding to the current video segment to obtain an address ciphertext of the current video segment, wherein the vector corresponding to the first video segment is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
7. The computer-readable storage medium of claim 6, wherein the cloud segments the video to be transmitted, and after obtaining the video segment, further comprises:
the video segments are encrypted separately.
8. The computer-readable storage medium according to claim 6, wherein the determining, according to the address ciphertext of the current video segment, the vector corresponding to the next video segment is specifically:
and intercepting the front M bits of data of the address ciphertext of the current video segment to obtain a vector corresponding to the next video segment.
9. The computer-readable storage medium according to claim 6, wherein after the encoding the encryption key and sending the encoded encryption key and the new m3u file to the control end, further comprising:
after receiving the encoded encryption key and the new m3u file, the control end decodes the encoded encryption key to obtain an encryption key;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
taking the initial vector as a vector corresponding to a first video segment in the new m3u file;
determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments;
according to the encryption key and the vector corresponding to each video segment, respectively decrypting the address ciphertext of each video segment in the new m3u file to obtain the address of each video segment;
downloading each video clip according to the address of each video clip;
and merging the video clips to obtain the video to be transmitted.
10. The computer-readable storage medium according to claim 9, wherein the determining, according to the address ciphertext of the ith video segment in the new m3u file, the vector corresponding to the (i + 1) th video segment is specifically:
and intercepting the front M bit data of the address ciphertext of the ith video segment in the new M3u file to obtain a vector corresponding to the (i + 1) th video segment in the new M3u file.
CN202011601824.6A 2020-12-30 2020-12-30 Video encryption transmission method of intelligent camera and computer readable storage medium Active CN112752122B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011601824.6A CN112752122B (en) 2020-12-30 2020-12-30 Video encryption transmission method of intelligent camera and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011601824.6A CN112752122B (en) 2020-12-30 2020-12-30 Video encryption transmission method of intelligent camera and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112752122A CN112752122A (en) 2021-05-04
CN112752122B true CN112752122B (en) 2022-11-11

Family

ID=75647133

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011601824.6A Active CN112752122B (en) 2020-12-30 2020-12-30 Video encryption transmission method of intelligent camera and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112752122B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114866722A (en) * 2022-04-01 2022-08-05 深圳市爱为物联科技有限公司 Security protection camera media data encryption technology
CN118368392B (en) * 2024-05-21 2025-01-17 深圳迪奇普科技有限公司 Remote monitoring method, device and equipment for camera and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3073752A1 (en) * 2015-03-23 2016-09-28 Thales Method for generating an initialisation vector for the encryption of video content

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6333983B1 (en) * 1997-12-16 2001-12-25 International Business Machines Corporation Method and apparatus for performing strong encryption or decryption data using special encryption functions
US20080084995A1 (en) * 2006-10-06 2008-04-10 Stephane Rodgers Method and system for variable and changing keys in a code encryption system
KR101428875B1 (en) * 2011-11-30 2014-08-12 주식회사 알티캐스트 System and method for processing security based on http live streaming
CN104683093B (en) * 2013-11-27 2018-01-26 财团法人资讯工业策进会 Block encryption device, block encryption method, block decryption device, and block decryption method capable of integrity verification
CN108337536A (en) * 2017-01-20 2018-07-27 创盛视联数码科技(北京)有限公司 The method of video-encryption
CN107659829B (en) * 2017-11-06 2020-05-22 网宿科技股份有限公司 A method and system for video encryption
CN108111876A (en) * 2017-12-21 2018-06-01 北京四达时代软件技术股份有限公司 A kind of LAN video contents of streaming media method for security protection, terminal and server

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3073752A1 (en) * 2015-03-23 2016-09-28 Thales Method for generating an initialisation vector for the encryption of video content

Also Published As

Publication number Publication date
CN112752122A (en) 2021-05-04

Similar Documents

Publication Publication Date Title
US20230214459A1 (en) Digital rights management for http-based media streaming
US11432039B2 (en) Systems and methods for data processing, storage, and retrieval from a server
US8949592B2 (en) System and methods for providing live streaming content using digital rights management-based key management
CN107707504B (en) Streaming media playing method and system, server and client
US20040199771A1 (en) Method for tracing a security breach in highly distributed content
CN108881205B (en) HLS streaming media safe playing system and playing method
US20080063195A1 (en) Method and system for encrypting or decrypting wmv streaming media
CN111556340B (en) Safe cross-platform video stream playing method
CN105939484A (en) Audio/video encrypted playing method and system thereof
CN106375834B (en) A kind of offline playback method of online encrypted slice video and device based on iOS operating system
CN106973310A (en) The player method of Streaming Media, EPG server and CDN server in a kind of IPTV system
CN109120998A (en) media data transmission method, device and storage medium
CN112752122B (en) Video encryption transmission method of intelligent camera and computer readable storage medium
CN112738560A (en) Video data transmission method, receiving method, server and client
KR20050009227A (en) Individual video encryption system and method
GB2417652A (en) Generating a content decryption key using a nonce and channel key data in an endpoint device
CN119255018A (en) A media stream encryption transmission method and a media stream transmission system
CN112532384B (en) Method for quickly encrypting and decrypting transmission key based on packet key mode
EP2713576B1 (en) Method and device for processing streaming media content
CN117729379A (en) Video playing method and device and electronic equipment
CN114040229B (en) Video encryption and decryption method and device
CN116800470A (en) Method and system for realizing mobile terminal H5 cryptographic transformation based on primary bridging
CN115459949A (en) Data transmission method and device
CN114189706B (en) Media playing method, system, device, computer equipment and storage medium
Ichibane et al. Private video streaming service using leveled somewhat homomorphic encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant