CN112752122B - Video encryption transmission method of intelligent camera and computer readable storage medium - Google Patents
Video encryption transmission method of intelligent camera and computer readable storage medium Download PDFInfo
- Publication number
- CN112752122B CN112752122B CN202011601824.6A CN202011601824A CN112752122B CN 112752122 B CN112752122 B CN 112752122B CN 202011601824 A CN202011601824 A CN 202011601824A CN 112752122 B CN112752122 B CN 112752122B
- Authority
- CN
- China
- Prior art keywords
- video
- video segment
- file
- address
- encryption key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 43
- 238000000034 method Methods 0.000 title claims abstract description 30
- 238000004590 computer program Methods 0.000 claims description 4
- 230000011218 segmentation Effects 0.000 description 6
- 239000012634 fragment Substances 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000005336 cracking Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000013467 fragmentation Methods 0.000 description 1
- 238000006062 fragmentation reaction Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/44—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
- H04N21/4408—Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/18—Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses a video encryption transmission method of an intelligent camera and a computer readable storage medium, wherein the method comprises the following steps: the cloud end segments a video to be transmitted, and generates an initial m3u file according to the address corresponding to each video segment; generating an encryption key; generating an initial vector; traversing addresses in the m3u file, and taking a video clip corresponding to the currently traversed address as a current video clip; encrypting the address of the current video segment through the encryption key and the vector corresponding to the current video segment to obtain an address ciphertext of the current video segment; determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment; after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment; and encoding the encryption key, and sending the encoded encryption key and the new m3u file to the control end. The invention can improve the safety of video transmission from the cloud end of the intelligent camera to the control end.
Description
Technical Field
The invention relates to the technical field of secure transmission, in particular to a video encryption transmission method of an intelligent camera and a computer readable storage medium.
Background
Along with the development of the internet of things in recent years, the application of an intelligent video monitoring camera is more and more extensive, each large internet of things equipment manufacturer has own intelligent camera equipment, and videos shot by the camera can be transmitted to a cloud end for storage in the shooting process. The video recording is played back and viewed through a mobile control terminal App or a PC control terminal App and a Web mode. The transmission process from the cloud video to the control end needs to ensure the safety of the video and the efficiency of video transmission. Some manufacturers hide the video URL, but the security is not enough, and some manufacturers directly encrypt the video head, disguise the video for transmission, but can sniff and capture the video head by some tools; some video is directly encrypted, so that the video transmission and playing efficiency is very low, and hidden dangers also exist in the key transmission process.
The more popular transport means used today is video segmentation transport based on HLS protocol. Because the HLS protocol is a download-oriented protocol and can pass through any firewall or proxy server that allows HTTP data to pass through, video is fragmented prior to transmission. Due to the inherent advantages, the support degree is high, the technology is simple, and mainstream camera manufacturers adopt the mode. Due to the openness of the protocol, video transmission aiming at the HLS protocol is encrypted after video segmentation, and then can be played after segmentation decoding and merging are carried out at a client. The sectional encryption transmission mode ensures that the efficiency of downloading the buffered video by the control end App also increases certain safety.
At present, a transmission mode based on an HLS protocol generally adopts an AES-128 mode to segment and encrypt a video, transmission efficiency and safety are improved to a certain extent, but generally m3u8 files and network request data packets returned by the HLS are analyzed, fragment downloading information and encryption keys after the whole video is segmented can be obtained, then video fragment information is downloaded and decrypted and combined, and the whole complete video can also be intercepted. The entire segmentation, encryption and decryption process can be done by the ffmpeg tool. Therefore, the transmission method based on the HLS protocol cannot guarantee high security at present.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the video encryption transmission method of the intelligent camera and the computer readable storage medium can improve the security of video transmission from the cloud end of the intelligent camera to the control end.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: a video encryption transmission method of an intelligent camera comprises the following steps:
the cloud end segments the video to be transmitted to obtain video clips, and generates an initial m3u file according to the address corresponding to each video clip;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video clip through the encryption key and the vector corresponding to the current video clip to obtain an address ciphertext of the current video clip, wherein the vector corresponding to the first video clip is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and coding the encryption key, and sending the coded encryption key and the new m3u file to a control end.
The invention also proposes a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method as described above.
The invention has the beneficial effects that: based on an HLS protocol, on the basis of performing fragment processing on a video, a dynamic vector is generated according to a preset vector generation rule, and the addresses of all video segments in an m3u file are dynamically encrypted according to an encryption key and the dynamic vector, so that even if video transmission information is intercepted in the transmission process, the specific address of each segmented video stream cannot be known and downloading and playing cannot be performed due to the fact that the vector generation rule cannot be obtained, the safety of watching back and playing of cloud data of an intelligent camera to a control end is greatly improved, and the personal privacy leakage caused by the interception of a third party is avoided. The invention encrypts the playing address of the video list on the basis of not changing the original video stream coding, thereby ensuring the safety of the video in the transmission process.
Drawings
Fig. 1 is a flowchart of a video encryption transmission method of an intelligent camera according to the present invention;
fig. 2 is a flowchart of a cloud according to a first embodiment of the present invention;
fig. 3 is a flowchart of a control end according to a first embodiment of the present invention.
Detailed Description
In order to explain technical contents, objects and effects of the present invention in detail, the following detailed description is given with reference to the accompanying drawings in conjunction with the embodiments.
Referring to fig. 1, a video encryption transmission method for an intelligent camera includes:
the cloud end segments a video to be transmitted to obtain video segments, and generates an initial m3u file according to the address corresponding to each video segment;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video segment through the encryption key and the vector corresponding to the current video segment to obtain an address ciphertext of the current video segment, wherein the vector corresponding to the first video segment is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
From the above description, the beneficial effects of the present invention are: the playing address of the video list is encrypted on the basis of not changing the original video stream coding, and the safety of the video in the transmission process is ensured.
Further, the cloud segments the video to be transmitted to obtain a video segment, and the method further includes:
the video segments are encrypted separately.
As can be seen from the above description, the security of the video clip transmission is ensured.
Further, the determining, according to the address ciphertext of the current video segment, a vector corresponding to a next video segment specifically is:
and intercepting the front M bits of data of the address ciphertext of the current video segment to obtain a vector corresponding to the next video segment.
As can be seen from the above description, different dynamic vector generation rules can be set according to the requirements.
Further, after the encoding the encryption key and sending the encoded encryption key and the new m3u file to the control end, the method further includes:
after receiving the encoded encryption key and the new m3u file, the control end decodes the encoded encryption key to obtain an encryption key;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
taking the initial vector as a vector corresponding to a first video segment in the new m3u file;
determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments;
according to the encryption key and the vector corresponding to each video segment, respectively decrypting the address ciphertext of each video segment in the new m3u file to obtain the address of each video segment;
downloading each video clip according to the address of each video clip;
and merging the video clips to obtain the video to be transmitted.
According to the description, the decryption mode of the control end is matched with the encryption mode of the cloud end, so that the video to be transmitted can be obtained.
Further, the determining, according to the address ciphertext of the ith video segment in the new m3u file, the vector corresponding to the (i + 1) th video segment is specifically:
and intercepting the front M bit data of the address ciphertext of the ith video segment in the new M3u file to obtain a vector corresponding to the (i + 1) th video segment in the new M3u file.
As can be seen from the above description, the control end knows the generation rule of the motion vector.
The invention also proposes a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method as described above.
Example one
Referring to fig. 2-3, a first embodiment of the present invention is: a video encryption transmission method of an intelligent camera is suitable for video encryption transmission from a cloud end of the intelligent camera to a control end in an Internet of things system, and comprises the following steps as shown in figure 2:
s101: the cloud end segments a video to be transmitted to obtain video segments, and generates an initial m3u file according to the corresponding address of each video segment.
Specifically, through the working principle of HLS, the entire video stream is split into individual small downloadable video segments based on HTTP files, generally TS video streams, and video segments in other formats can also be used. An initial M3U (or M3U8, M3U8 being a Unicode version of M3U, encoded with UTF-8) playlist file containing video stream clip information is also generated for recording the available media stream data.
In this embodiment, it is assumed that N video clips are obtained after segmentation, that is, the initial m3u file contains addresses of the N video clips.
Wherein, the address of the video clip is a URL address. Further, the URL address of each video clip is encoded, that is, the encoded URL address is stored in the original m3u file.
S102: and generating an encryption key according to the session ID corresponding to the control end. Namely, a dynamic encryption key is generated based on the session ID of the currently logged-in control end.
S103: and generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end.
In this embodiment, the device information of the intelligent camera is the unique device ID of the intelligent camera, that is, the initial vector IV is generated according to the device ID of the camera for shooting the video and the session ID corresponding to the control end. The initial vector IV is used to combine with a key to form a key seed as an input to an encryption algorithm to generate an encrypted byte stream to encrypt data.
S104: and taking the initial vector as a vector corresponding to the first video clip in the initial m3u file.
S105: let i =1.
S106: and encrypting the address of the ith video clip in the initial m3u file through the encryption key and the vector corresponding to the ith video clip to obtain the address ciphertext of the ith video clip.
S107: and judging whether i = N is true, wherein N is the total number of the video segments, if so, indicating that address ciphertexts of all the video segments are obtained, executing step S110, otherwise, indicating that addresses of all the video segments in the initial m3u file are not traversed, and executing step S108.
S108: and determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment.
Specifically, the first M bits of data of the address ciphertext of the ith video segment are intercepted as a vector corresponding to the (i + 1) th video segment. Preferably, M =16. Intercepting the first 16 bits of the address ciphertext of the first video segment as a vector corresponding to the second video segment; intercepting the first 16 bits of the address ciphertext of the second video segment as a vector corresponding to the third video segment; and so on.
S109: let i = i +1, and then proceed to step S106.
S110: and generating a new m3u file according to the address ciphertext of each video segment.
S111: and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
Specifically, after the encryption key is encoded to a certain extent, the encoded encryption key and the new m3u file are returned to the control end (i.e., the client) through different network request packets.
Further, each video segment obtained by segmentation in step S101 is encrypted, that is, the original file of the video stream referenced by each address in the initial m3u file is encrypted, for example, AES-128 encryption, or other encryption, or header encryption is performed.
In this embodiment, by dynamically encrypting the segmented video information addresses in the m3u file, a client requests to obtain a standard m3u file in the video transmission process, but the URL addresses of the segmented video streams in the m3u file are encrypted ciphertexts, and the specific addresses of each segmented video stream cannot be known and cannot be downloaded and played without obtaining an encryption key and a generation rule of a dynamic vector. And the encryption of the commonly used segmented video is matched, so that the complete process of cracking, downloading and playing is generally difficult to complete.
Further, after step S111, the control end obtains a message returned by the cloud through a network request, analyzes the message, extracts the encoded encryption key and the new m3u file, dynamically generates the initial vector IV according to the same initial vector IV generation method, decrypts the new m3u file to obtain the correct address set of the segmented video stream, then downloads and decrypts the segmented video stream, and finally merges all the segmented video streams into a complete video for playing or caching to the local.
Specifically, as shown in fig. 3, the method comprises the following steps:
s201: and decoding the encoded encryption key to obtain the encryption key.
S202: generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end; namely, an initial vector IV is generated according to the equipment ID of the intelligent camera for shooting the video and the session ID corresponding to the control end.
S203: and taking the initial vector as a vector corresponding to the first video clip in the new m3u file.
S204: and determining a vector corresponding to the i +1 th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments.
Specifically, the first M bits of data of the address ciphertext of the ith video segment are intercepted as a vector corresponding to the (i + 1) th video segment. Preferably, M =16.
S205: and respectively decrypting the address ciphertext of each video clip in the new m3u file according to the encryption key and the vector corresponding to each video clip to obtain the address of each video clip. Namely, according to the encryption key and the vector corresponding to the ith video clip, the address ciphertext of the ith video clip in the new m3u file is decrypted to obtain the address of the ith video clip, i =1,2, … …, N.
Namely, the address ciphertext in the new m3u file is decrypted according to the reverse operation of the address encryption, and the initial m3u file is restored.
S206: downloading each video clip according to the address of each video clip; namely, the control end sequentially analyzes the segmented video addresses in the m3u file according to the sequence, and then requests the cloud end for video downloading.
Further, if the cloud end encrypts each video segment, the control end also needs to decrypt the downloaded video data.
S207: and merging the video clips to obtain the video to be transmitted. Namely, the video is played according to the standard HLS protocol processing, and the segmented videos can be merged into a complete video media file to be cached locally.
In this embodiment, each control end App or client needs to integrate an m3u file decryption plug-in of a manufacturer, and the decryption mode matches with the encryption mode of the cloud, so that video information can be transmitted from the cloud to the control end or the client more safely.
In this embodiment, based on the currently popular HLS protocol for video transmission and playing, the file content of the playlist m3u of the video is dynamically encrypted on the basis of encrypting the segment video stream after the video is subjected to the slicing processing. The method has the advantages that the playing address of the video list is encrypted on the basis that the original video stream coding is not changed, the safety of the video in the transmission process is guaranteed, even if the video transmission information is intercepted in the transmission process, downloading and playing cannot be carried out, the safety of watching back and playing from the cloud data of the intelligent camera to the control end is greatly improved, and the leakage of personal privacy caused by interception by a third party is avoided.
Example two
This embodiment is a computer-readable storage medium corresponding to the above-described embodiments, on which a computer program is stored, which program, when executed by a processor, performs the steps of:
the cloud end segments a video to be transmitted to obtain video segments, and generates an initial m3u file according to the address corresponding to each video segment;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video segment through the encryption key and the vector corresponding to the current video segment to obtain an address ciphertext of the current video segment, wherein the vector corresponding to the first video segment is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
Further, the cloud segments the video to be transmitted to obtain a video segment, and the method further includes:
the video segments are encrypted separately.
Further, the determining, according to the address ciphertext of the current video segment, a vector corresponding to a next video segment is specifically:
and intercepting the front M bits of data of the address ciphertext of the current video segment to obtain a vector corresponding to the next video segment.
Further, after the encoding the encryption key and sending the encoded encryption key and the new m3u file to the control end, the method further includes:
after receiving the encoded encryption key and the new m3u file, the control end decodes the encoded encryption key to obtain an encryption key;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
taking the initial vector as a vector corresponding to a first video segment in the new m3u file;
determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments;
according to the encryption key and the vector corresponding to each video segment, respectively decrypting the address ciphertext of each video segment in the new m3u file to obtain the address of each video segment;
downloading each video clip according to the address of each video clip;
and merging the video clips to obtain the video to be transmitted.
Further, the determining, according to the address ciphertext of the ith video segment in the new m3u file, the vector corresponding to the (i + 1) th video segment is specifically:
and intercepting the front M bits of data of the address ciphertext of the ith video clip in the new M3u file to obtain a vector corresponding to the (i + 1) th video clip in the new M3u file.
In summary, according to the video encryption transmission method and the computer-readable storage medium for the intelligent camera provided by the present invention, based on the HLS protocol, on the basis of performing the fragmentation processing on the video, the dynamic vector is generated according to the preset vector generation rule, and the addresses of the video segments in the m3u file are dynamically encrypted according to the encryption key and the dynamic vector, so that even if the video transmission information is intercepted during the transmission process, since the vector generation rule cannot be obtained, the specific address of each segmented video stream cannot be known, and downloading and playing cannot be performed, thereby greatly improving the security of the intelligent camera for reviewing and playing the cloud data to the control end, and avoiding the leakage of personal privacy caused by the interception by a third party. The invention encrypts the playing address of the video list on the basis of not changing the original video stream coding, thereby ensuring the safety of the video in the transmission process.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all equivalent changes made by using the contents of the present specification and the drawings, or applied directly or indirectly to the related technical fields, are included in the scope of the present invention.
Claims (10)
1. A video encryption transmission method of an intelligent camera is characterized by comprising the following steps:
the cloud end segments the video to be transmitted to obtain video clips, and generates an initial m3u file according to the address corresponding to each video clip;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video clip through the encryption key and the vector corresponding to the current video clip to obtain an address ciphertext of the current video clip, wherein the vector corresponding to the first video clip is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
2. The video encryption transmission method for the intelligent camera according to claim 1, wherein the cloud segments the video to be transmitted to obtain video segments, and further comprises:
the video segments are encrypted separately.
3. The video encryption transmission method for the intelligent camera according to claim 1, wherein the determining, according to the address ciphertext of the current video segment, the vector corresponding to the next video segment specifically is:
and intercepting the front M bits of data of the address ciphertext of the current video segment to obtain a vector corresponding to the next video segment.
4. The video encryption transmission method for an intelligent camera according to claim 1, wherein after the encoding the encryption key and sending the encoded encryption key and the new m3u file to the control end, the method further comprises:
after receiving the encoded encryption key and the new m3u file, the control end decodes the encoded encryption key to obtain an encryption key;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
taking the initial vector as a vector corresponding to a first video segment in the new m3u file;
determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments;
according to the encryption key and the vector corresponding to each video segment, respectively decrypting the address ciphertext of each video segment in the new m3u file to obtain the address of each video segment;
downloading each video clip according to the address of each video clip;
and merging the video clips to obtain the video to be transmitted.
5. The method for video encryption transmission of an intelligent camera according to claim 4, wherein the determining, according to the address ciphertext of the ith video segment in the new m3u file, the vector corresponding to the (i + 1) th video segment specifically is:
and intercepting the front M bit data of the address ciphertext of the ith video segment in the new M3u file to obtain a vector corresponding to the (i + 1) th video segment in the new M3u file.
6. A computer-readable storage medium on which a computer program is stored, which program, when executed by a processor, performs the steps of:
the cloud end segments a video to be transmitted to obtain video segments, and generates an initial m3u file according to the address corresponding to each video segment;
generating an encryption key according to the session ID corresponding to the control end;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
traversing addresses corresponding to the video clips in the initial m3u file, and taking the video clip corresponding to the currently traversed address as a current video clip;
encrypting the address of the current video segment through the encryption key and the vector corresponding to the current video segment to obtain an address ciphertext of the current video segment, wherein the vector corresponding to the first video segment is the initial vector;
determining a vector corresponding to the next video segment according to the address ciphertext of the current video segment;
after traversing is finished, generating a new m3u file according to the address ciphertext of each video segment;
and encoding the encryption key, and sending the encoded encryption key and the new m3u file to a control end.
7. The computer-readable storage medium of claim 6, wherein the cloud segments the video to be transmitted, and after obtaining the video segment, further comprises:
the video segments are encrypted separately.
8. The computer-readable storage medium according to claim 6, wherein the determining, according to the address ciphertext of the current video segment, the vector corresponding to the next video segment is specifically:
and intercepting the front M bits of data of the address ciphertext of the current video segment to obtain a vector corresponding to the next video segment.
9. The computer-readable storage medium according to claim 6, wherein after the encoding the encryption key and sending the encoded encryption key and the new m3u file to the control end, further comprising:
after receiving the encoded encryption key and the new m3u file, the control end decodes the encoded encryption key to obtain an encryption key;
generating an initial vector according to the equipment information of the intelligent camera and the session ID corresponding to the control end;
taking the initial vector as a vector corresponding to a first video segment in the new m3u file;
determining a vector corresponding to the (i + 1) th video segment according to the address ciphertext of the ith video segment in the new m3u file, wherein i =1,2, … … and N-1,N are the total number of the video segments;
according to the encryption key and the vector corresponding to each video segment, respectively decrypting the address ciphertext of each video segment in the new m3u file to obtain the address of each video segment;
downloading each video clip according to the address of each video clip;
and merging the video clips to obtain the video to be transmitted.
10. The computer-readable storage medium according to claim 9, wherein the determining, according to the address ciphertext of the ith video segment in the new m3u file, the vector corresponding to the (i + 1) th video segment is specifically:
and intercepting the front M bit data of the address ciphertext of the ith video segment in the new M3u file to obtain a vector corresponding to the (i + 1) th video segment in the new M3u file.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011601824.6A CN112752122B (en) | 2020-12-30 | 2020-12-30 | Video encryption transmission method of intelligent camera and computer readable storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202011601824.6A CN112752122B (en) | 2020-12-30 | 2020-12-30 | Video encryption transmission method of intelligent camera and computer readable storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN112752122A CN112752122A (en) | 2021-05-04 |
| CN112752122B true CN112752122B (en) | 2022-11-11 |
Family
ID=75647133
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202011601824.6A Active CN112752122B (en) | 2020-12-30 | 2020-12-30 | Video encryption transmission method of intelligent camera and computer readable storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN112752122B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114866722A (en) * | 2022-04-01 | 2022-08-05 | 深圳市爱为物联科技有限公司 | Security protection camera media data encryption technology |
| CN118368392B (en) * | 2024-05-21 | 2025-01-17 | 深圳迪奇普科技有限公司 | Remote monitoring method, device and equipment for camera and storage medium |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3073752A1 (en) * | 2015-03-23 | 2016-09-28 | Thales | Method for generating an initialisation vector for the encryption of video content |
Family Cites Families (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6333983B1 (en) * | 1997-12-16 | 2001-12-25 | International Business Machines Corporation | Method and apparatus for performing strong encryption or decryption data using special encryption functions |
| US20080084995A1 (en) * | 2006-10-06 | 2008-04-10 | Stephane Rodgers | Method and system for variable and changing keys in a code encryption system |
| KR101428875B1 (en) * | 2011-11-30 | 2014-08-12 | 주식회사 알티캐스트 | System and method for processing security based on http live streaming |
| CN104683093B (en) * | 2013-11-27 | 2018-01-26 | 财团法人资讯工业策进会 | Block encryption device, block encryption method, block decryption device, and block decryption method capable of integrity verification |
| CN108337536A (en) * | 2017-01-20 | 2018-07-27 | 创盛视联数码科技(北京)有限公司 | The method of video-encryption |
| CN107659829B (en) * | 2017-11-06 | 2020-05-22 | 网宿科技股份有限公司 | A method and system for video encryption |
| CN108111876A (en) * | 2017-12-21 | 2018-06-01 | 北京四达时代软件技术股份有限公司 | A kind of LAN video contents of streaming media method for security protection, terminal and server |
-
2020
- 2020-12-30 CN CN202011601824.6A patent/CN112752122B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3073752A1 (en) * | 2015-03-23 | 2016-09-28 | Thales | Method for generating an initialisation vector for the encryption of video content |
Also Published As
| Publication number | Publication date |
|---|---|
| CN112752122A (en) | 2021-05-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20230214459A1 (en) | Digital rights management for http-based media streaming | |
| US11432039B2 (en) | Systems and methods for data processing, storage, and retrieval from a server | |
| US8949592B2 (en) | System and methods for providing live streaming content using digital rights management-based key management | |
| CN107707504B (en) | Streaming media playing method and system, server and client | |
| US20040199771A1 (en) | Method for tracing a security breach in highly distributed content | |
| CN108881205B (en) | HLS streaming media safe playing system and playing method | |
| US20080063195A1 (en) | Method and system for encrypting or decrypting wmv streaming media | |
| CN111556340B (en) | Safe cross-platform video stream playing method | |
| CN105939484A (en) | Audio/video encrypted playing method and system thereof | |
| CN106375834B (en) | A kind of offline playback method of online encrypted slice video and device based on iOS operating system | |
| CN106973310A (en) | The player method of Streaming Media, EPG server and CDN server in a kind of IPTV system | |
| CN109120998A (en) | media data transmission method, device and storage medium | |
| CN112752122B (en) | Video encryption transmission method of intelligent camera and computer readable storage medium | |
| CN112738560A (en) | Video data transmission method, receiving method, server and client | |
| KR20050009227A (en) | Individual video encryption system and method | |
| GB2417652A (en) | Generating a content decryption key using a nonce and channel key data in an endpoint device | |
| CN119255018A (en) | A media stream encryption transmission method and a media stream transmission system | |
| CN112532384B (en) | Method for quickly encrypting and decrypting transmission key based on packet key mode | |
| EP2713576B1 (en) | Method and device for processing streaming media content | |
| CN117729379A (en) | Video playing method and device and electronic equipment | |
| CN114040229B (en) | Video encryption and decryption method and device | |
| CN116800470A (en) | Method and system for realizing mobile terminal H5 cryptographic transformation based on primary bridging | |
| CN115459949A (en) | Data transmission method and device | |
| CN114189706B (en) | Media playing method, system, device, computer equipment and storage medium | |
| Ichibane et al. | Private video streaming service using leveled somewhat homomorphic encryption |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |