[go: up one dir, main page]

CN107979593B - Encryption video security method based on shared channel ring - Google Patents

Encryption video security method based on shared channel ring Download PDF

Info

Publication number
CN107979593B
CN107979593B CN201711159842.1A CN201711159842A CN107979593B CN 107979593 B CN107979593 B CN 107979593B CN 201711159842 A CN201711159842 A CN 201711159842A CN 107979593 B CN107979593 B CN 107979593B
Authority
CN
China
Prior art keywords
user
encryption
video file
video
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711159842.1A
Other languages
Chinese (zh)
Other versions
CN107979593A (en
Inventor
姚伟强
周基初
张宇
郑凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Yamooc Information Technology Co ltd
Original Assignee
Hefei Yamooc Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Yamooc Information Technology Co ltd filed Critical Hefei Yamooc Information Technology Co ltd
Priority to CN201711159842.1A priority Critical patent/CN107979593B/en
Publication of CN107979593A publication Critical patent/CN107979593A/en
Application granted granted Critical
Publication of CN107979593B publication Critical patent/CN107979593B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/42Loop networks
    • H04L12/437Ring fault isolation or reconfiguration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1061Peer-to-peer [P2P] networks using node-based peer discovery mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses an encrypted video security method based on a shared channel ring, when a user acquires a video file which is received by a person who only wants to be in a specific range, the video is encrypted and then stored in a cloud-based memory, a ring network is formed by connecting a specific receiver and user equipment, the risk that the video information is stolen by the outside is reduced by reducing the dependence of an end user on a central system, corresponding end points and encryption method information are sent to equipment of an accessor which is allowed to be shared in the ring, the accessor which is allowed to be shared can access the encrypted video information through the end points and check and download the encrypted video information, the downloaded encrypted video is decompressed through the received video encryption information, and the accessor which is forced to enter the shared channel ring can be shielded and cannot check the end points and the video encryption information, the invention ensures that the encrypted video can be safely transmitted in a specific range by various protection methods.

Description

Encryption video security method based on shared channel ring
Technical Field
The invention belongs to the field of video security methods, and particularly relates to an encryption video security method based on a shared channel ring.
Background
In current transmission networks, a ring network structure has been widely used with its good self-healing survival capability, which can ensure that a signal transmitted on one device can be seen by other devices on the ring, but most of the time, not all the data in the shared channel ring is allowed to be viewed by all the people.
The user stores the encrypted video through a local device or stores the encrypted video remotely, the user can share the video file by inputting the video into a certain receiving endpoint or uploading the video to a website, sending an email and the like, but sometimes only part of people in a sharing channel can see the uploaded encrypted file, and in order to ensure that the uploaded encrypted video file in the sharing channel can only be seen by the appointed people and cannot be invaded and unlocked by other people, the invention provides the encrypted video security method based on the sharing channel ring.
Disclosure of Invention
The invention aims to provide a video encryption method based on a shared channel ring.
The purpose of the invention can be realized by the following technical scheme:
an encryption video security method based on a shared channel ring ensures that an encryption video is spread in a specific range by establishing the shared channel ring and randomly using a plurality of encryption methods;
in 1, a user acquires a video file to be shared;
in 2, encrypting the video file selected to be shared;
in 3, after the video file is encrypted, uploading the encrypted video file to a cloud-based storage;
in 4, the user can select specific visitors to allow the visitors to receive the encryption method information of the encrypted video file uploaded by the user;
in step 5, the user connects the selected specific visitor to create a ring network, that is, the user and the network devices of the selected visitor are connected one by one to form a continuous closed loop;
at 6, the user assigns at least one endpoint to the visitor who is permitted to share, the endpoint being a location or link where the recipient can receive the shared file;
in 7, the sharing channel ring is authorized to activate the accessor subjected to the sharing permission, the accessor subjected to the sharing permission can receive the endpoint distributed by the user and the encryption method information of the video file, and the accessor not subjected to the sharing permission is shielded and cannot see the shared encryption video file information and the encryption method information of the encryption video file uploaded by the user;
in step 8, the visitor who is permitted to share receives the endpoint and the encryption method information allocated by the user, and the visitor who is permitted to share accesses the encrypted video file uploaded by the user through the endpoint, views and downloads the encrypted video file uploaded by the user, and decrypts and views the received video file information through the corresponding decryption method.
Furthermore, the encryption method is multiple, and during encryption, the system randomly adopts one of the encryption methods to encrypt the video file;
further, the selected visitors may be colleagues, friends, or social circles having the same expectation on the shared content, and the user may identify information of the visitor to be subjected to sharing permission by a name preset when creating the sharing channel;
furthermore, the user and the network equipment of the selected visitor are connected through one or two of the concentrator and the switch to form not less than two closed loops, one is directly used, and the other is used as a standby loop, so that the condition that normal communication cannot be performed due to the fact that one node in the closed loops is damaged is prevented;
further, the end point is a mobile number, an email address, a URI (Uniform resource locator, also called a web address, which is an address of a standard resource on the Internet)
The invention has the beneficial effects that: the invention discloses an encrypted video security method based on a shared channel ring, when a user acquires a video file which is received by a person who only wants to be in a specific range, the video is encrypted and then stored in a cloud-based memory, a ring network is formed by connecting a specific receiver and user equipment, the risk that the video information is stolen by the outside is reduced by reducing the dependence of an end user on a central system, corresponding end points and encryption method information are sent to equipment of an accessor which is allowed to be shared in the ring, the accessor which is allowed to be shared can access the encrypted video information through the end points and check and download the encrypted video information, the downloaded encrypted video is decompressed through the received video encryption information, and the accessor which is forced to enter the shared channel ring can be shielded and cannot check the end points and the video encryption information, the invention ensures that the encrypted video can be safely transmitted in a specific range by various protection methods.
Drawings
The invention is described in further detail below with reference to the figures and specific embodiments.
FIG. 1 is a schematic of the process of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the present invention provides an encrypted video security method based on a shared channel ring, in 1, a user may obtain a video file to be shared by any one of a plurality of methods, such as shooting, third party receiving, etc.;
in 2, the video file selected for sharing can be encrypted, and the video file selected for sharing is protected by a first set, as an embodiment, the encryption method can be multiple, and the system randomly adopts one of the encryption methods to encrypt the video file during encryption;
in step 3, after the video file is encrypted, the encrypted video file is uploaded to a cloud-based memory, so that a user and a visitor who is permitted to share the encrypted video file can conveniently view the encrypted video file;
in 4, the user may select specific visitors to allow the visitors to receive the encryption method information of the encrypted video file uploaded by the user, as an embodiment, the selected visitors may be colleagues, friends, or social circles having the same expectation on shared content, and as an embodiment, the user may identify information of the visitors to be subjected to sharing permission by a name preset when creating a sharing channel;
in 5, the user connects the selected specific visitor to create a ring network, that is, the user connects the network devices of the selected visitor one by one to form a continuous closed loop, as an embodiment, the network devices of the user and the selected visitor are connected through one or two of a hub and a switch to form no less than two closed loops, one is directly used, and the other is used as a standby loop, so that the situation that normal communication cannot be performed due to the damage of one node in the closed loop is prevented;
in 6, the user may assign at least one endpoint to the visitor who is permitted to share, where the endpoint is a location or a link where the recipient can receive the shared file, and the endpoint may be a mobile number, an email address, a URI (uniform resource locator, also called a web address, which is an address of a standard resource on the internet);
in 7, the sharing channel ring is authorized to activate the accessor subjected to the sharing permission, the accessor subjected to the sharing permission can receive the endpoint distributed by the user and the encryption method information of the video file, and the accessor not subjected to the sharing permission is shielded and cannot see the shared encryption video file information and the encryption method information of the encryption video file uploaded by the user;
in step 8, the visitor who is permitted to share receives the endpoint and the encryption method information allocated by the user, and the visitor who is permitted to share can access the encrypted video file uploaded by the user through the endpoint, view and download the encrypted video file uploaded by the user, and decrypt and view the received video file information through the corresponding decryption method.
The invention discloses an encrypted video security method based on a shared channel ring, when a user acquires a video file which is received by a person who only wants to be in a specific range, the video is encrypted and then stored in a cloud-based memory, a ring network is formed by connecting a specific receiver and user equipment, the risk that the video information is stolen by the outside is reduced by reducing the dependence of an end user on a central system, corresponding end points and encryption method information are sent to equipment of an accessor which is allowed to be shared in the ring, the accessor which is allowed to be shared can access the encrypted video information through the end points and check and download the encrypted video information, the downloaded encrypted video is decompressed through the received video encryption information, and the accessor which is forced to enter the shared channel ring can be shielded and cannot check the end points and the video encryption information, the invention ensures that the encrypted video can be safely transmitted in a specific range by various protection methods.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.

Claims (4)

1. A encryption video security method based on a shared channel ring is characterized in that the encryption video is ensured to be transmitted in a specific range by establishing the shared channel ring and randomly using a plurality of encryption methods;
in step 1, a user acquires a video file to be shared;
in step 2, encrypting the video file selected for sharing;
in step 3, after the video file is encrypted, uploading the encrypted video file to a cloud-based storage;
in step 4, the user can select specific visitors to allow the visitors to receive the encryption method information of the encrypted video file uploaded by the user;
in step 5, the user connects the selected specific visitor to create a ring network, i.e. the user and the network devices of the selected visitor are connected one by one to form a continuous closed loop;
specifically, the user and the network equipment of the selected visitor are connected through one or two of the concentrator and the switch to form not less than two closed loops, one is directly used, and the other is used as a standby loop, so that the situation that normal communication cannot be performed due to the fact that one node in the closed loops is damaged is prevented;
in step 6, the user assigns at least one endpoint to a visitor who is permitted to share, the endpoint being a location or link where the recipient can receive the shared file;
in step 7, the sharing-permitted accessor in the sharing channel ring is authorized and activated, the sharing-permitted accessor can receive the endpoint distributed by the user and the encryption method information of the video file, and the accessor which is not subjected to the sharing permission is shielded and cannot see the shared encryption video file information and the encryption method information of the encryption video file uploaded by the user;
in step 8, the visitor who is permitted to share receives the endpoint and the encryption method information allocated by the user, and the visitor who is permitted to share accesses the encrypted video file uploaded by the user through the endpoint, views and downloads the encrypted video file uploaded by the user, and decrypts and views the received video file information through the corresponding decryption method.
2. The method as claimed in claim 1, wherein the encryption method is multiple, and the system randomly uses one of the encryption methods to encrypt the video file during encryption.
3. The method for securing encrypted video according to claim 1, wherein the visitors selected in step 4 can be colleagues, friends or social circles with the same desire for sharing content, and the user can identify the information of the visitors to be subjected to the sharing permission by a name preset when creating the sharing channel.
4. The method according to claim 1, wherein the end point is a mobile number, an email address, or a URI.
CN201711159842.1A 2017-11-20 2017-11-20 Encryption video security method based on shared channel ring Active CN107979593B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711159842.1A CN107979593B (en) 2017-11-20 2017-11-20 Encryption video security method based on shared channel ring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711159842.1A CN107979593B (en) 2017-11-20 2017-11-20 Encryption video security method based on shared channel ring

Publications (2)

Publication Number Publication Date
CN107979593A CN107979593A (en) 2018-05-01
CN107979593B true CN107979593B (en) 2021-04-06

Family

ID=62010468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711159842.1A Active CN107979593B (en) 2017-11-20 2017-11-20 Encryption video security method based on shared channel ring

Country Status (1)

Country Link
CN (1) CN107979593B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101188569A (en) * 2006-11-16 2008-05-28 饶大平 Method for constructing data quanta space in network and distributed file storage system
US7958356B1 (en) * 2006-09-29 2011-06-07 Netapp, Inc. System and method for establishing a shared secret among nodes of a security appliance
CN103297484A (en) * 2012-03-05 2013-09-11 腾讯科技(深圳)有限公司 Resource sharing method and device
WO2014105536A1 (en) * 2012-12-31 2014-07-03 Google Inc. Customizing shared web resource snapshots
CN104885093A (en) * 2012-12-12 2015-09-02 思杰系统有限公司 Encryption-based data access management
CN107248913A (en) * 2017-07-28 2017-10-13 浙江九州量子信息技术股份有限公司 A kind of quantum key synchronization system and method based on dynamic group net fault detect

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7958356B1 (en) * 2006-09-29 2011-06-07 Netapp, Inc. System and method for establishing a shared secret among nodes of a security appliance
CN101188569A (en) * 2006-11-16 2008-05-28 饶大平 Method for constructing data quanta space in network and distributed file storage system
CN103297484A (en) * 2012-03-05 2013-09-11 腾讯科技(深圳)有限公司 Resource sharing method and device
CN104885093A (en) * 2012-12-12 2015-09-02 思杰系统有限公司 Encryption-based data access management
WO2014105536A1 (en) * 2012-12-31 2014-07-03 Google Inc. Customizing shared web resource snapshots
CN107248913A (en) * 2017-07-28 2017-10-13 浙江九州量子信息技术股份有限公司 A kind of quantum key synchronization system and method based on dynamic group net fault detect

Also Published As

Publication number Publication date
CN107979593A (en) 2018-05-01

Similar Documents

Publication Publication Date Title
US11991788B2 (en) Methods and apparatus for HyperSecure last mile communication
AU2021258074B2 (en) Methods and apparatus for hypersecure last mile communication
US10581599B2 (en) Cloud storage method and system
DE102018101812B4 (en) Securely transfer user information between applications
US9485096B2 (en) Encryption / decryption of data with non-persistent, non-shared passkey
CN108881195A (en) Data safety sharing method and device based on cloud environment
US20140281520A1 (en) Secure cloud data sharing
US9742738B2 (en) Method and apparatus for enforcing storage encryption for data stored in a cloud
CN104917723B (en) For realizing the shared methods, devices and systems of encryption file security
CN104506483A (en) Method for encrypting and decrypting information and managing secret key as well as terminal and network server
CN103067158A (en) Encryption and decryption method, terminal device, gateway device and key management system
CN104917759A (en) Third-party-based safety file storage and sharing system and method
CN104065680A (en) Information processing method and apparatus, information retrieval method and apparatus, user terminal and server
SE539602C2 (en) Generating a symmetric encryption key
CN105722072A (en) Business authorization method, device, system and router
US9160739B2 (en) Secure data transmission system
CN104618397B (en) A kind of encryption method and encryption system for instant message applications
CN105429994A (en) Smart phone privacy protection method based on distributed cloud storage
US10574441B2 (en) Management of cryptographic keys
CN107979593B (en) Encryption video security method based on shared channel ring
US11438317B2 (en) Device identification encryption
CN107509181A (en) A kind of encryption method of SMS
CN110611668A (en) Freely-configurable Internet of things monitoring method and device, storage medium and equipment
KR101588587B1 (en) Subscriber information processing module and processing method for anonymous bulletin board service
WO2014180214A1 (en) Information management device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant