CN107979593B - Encryption video security method based on shared channel ring - Google Patents
Encryption video security method based on shared channel ring Download PDFInfo
- Publication number
- CN107979593B CN107979593B CN201711159842.1A CN201711159842A CN107979593B CN 107979593 B CN107979593 B CN 107979593B CN 201711159842 A CN201711159842 A CN 201711159842A CN 107979593 B CN107979593 B CN 107979593B
- Authority
- CN
- China
- Prior art keywords
- user
- encryption
- video file
- video
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000007792 addition Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/437—Ring fault isolation or reconfiguration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention discloses an encrypted video security method based on a shared channel ring, when a user acquires a video file which is received by a person who only wants to be in a specific range, the video is encrypted and then stored in a cloud-based memory, a ring network is formed by connecting a specific receiver and user equipment, the risk that the video information is stolen by the outside is reduced by reducing the dependence of an end user on a central system, corresponding end points and encryption method information are sent to equipment of an accessor which is allowed to be shared in the ring, the accessor which is allowed to be shared can access the encrypted video information through the end points and check and download the encrypted video information, the downloaded encrypted video is decompressed through the received video encryption information, and the accessor which is forced to enter the shared channel ring can be shielded and cannot check the end points and the video encryption information, the invention ensures that the encrypted video can be safely transmitted in a specific range by various protection methods.
Description
Technical Field
The invention belongs to the field of video security methods, and particularly relates to an encryption video security method based on a shared channel ring.
Background
In current transmission networks, a ring network structure has been widely used with its good self-healing survival capability, which can ensure that a signal transmitted on one device can be seen by other devices on the ring, but most of the time, not all the data in the shared channel ring is allowed to be viewed by all the people.
The user stores the encrypted video through a local device or stores the encrypted video remotely, the user can share the video file by inputting the video into a certain receiving endpoint or uploading the video to a website, sending an email and the like, but sometimes only part of people in a sharing channel can see the uploaded encrypted file, and in order to ensure that the uploaded encrypted video file in the sharing channel can only be seen by the appointed people and cannot be invaded and unlocked by other people, the invention provides the encrypted video security method based on the sharing channel ring.
Disclosure of Invention
The invention aims to provide a video encryption method based on a shared channel ring.
The purpose of the invention can be realized by the following technical scheme:
an encryption video security method based on a shared channel ring ensures that an encryption video is spread in a specific range by establishing the shared channel ring and randomly using a plurality of encryption methods;
in 1, a user acquires a video file to be shared;
in 2, encrypting the video file selected to be shared;
in 3, after the video file is encrypted, uploading the encrypted video file to a cloud-based storage;
in 4, the user can select specific visitors to allow the visitors to receive the encryption method information of the encrypted video file uploaded by the user;
in step 5, the user connects the selected specific visitor to create a ring network, that is, the user and the network devices of the selected visitor are connected one by one to form a continuous closed loop;
at 6, the user assigns at least one endpoint to the visitor who is permitted to share, the endpoint being a location or link where the recipient can receive the shared file;
in 7, the sharing channel ring is authorized to activate the accessor subjected to the sharing permission, the accessor subjected to the sharing permission can receive the endpoint distributed by the user and the encryption method information of the video file, and the accessor not subjected to the sharing permission is shielded and cannot see the shared encryption video file information and the encryption method information of the encryption video file uploaded by the user;
in step 8, the visitor who is permitted to share receives the endpoint and the encryption method information allocated by the user, and the visitor who is permitted to share accesses the encrypted video file uploaded by the user through the endpoint, views and downloads the encrypted video file uploaded by the user, and decrypts and views the received video file information through the corresponding decryption method.
Furthermore, the encryption method is multiple, and during encryption, the system randomly adopts one of the encryption methods to encrypt the video file;
further, the selected visitors may be colleagues, friends, or social circles having the same expectation on the shared content, and the user may identify information of the visitor to be subjected to sharing permission by a name preset when creating the sharing channel;
furthermore, the user and the network equipment of the selected visitor are connected through one or two of the concentrator and the switch to form not less than two closed loops, one is directly used, and the other is used as a standby loop, so that the condition that normal communication cannot be performed due to the fact that one node in the closed loops is damaged is prevented;
further, the end point is a mobile number, an email address, a URI (Uniform resource locator, also called a web address, which is an address of a standard resource on the Internet)
The invention has the beneficial effects that: the invention discloses an encrypted video security method based on a shared channel ring, when a user acquires a video file which is received by a person who only wants to be in a specific range, the video is encrypted and then stored in a cloud-based memory, a ring network is formed by connecting a specific receiver and user equipment, the risk that the video information is stolen by the outside is reduced by reducing the dependence of an end user on a central system, corresponding end points and encryption method information are sent to equipment of an accessor which is allowed to be shared in the ring, the accessor which is allowed to be shared can access the encrypted video information through the end points and check and download the encrypted video information, the downloaded encrypted video is decompressed through the received video encryption information, and the accessor which is forced to enter the shared channel ring can be shielded and cannot check the end points and the video encryption information, the invention ensures that the encrypted video can be safely transmitted in a specific range by various protection methods.
Drawings
The invention is described in further detail below with reference to the figures and specific embodiments.
FIG. 1 is a schematic of the process of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, the present invention provides an encrypted video security method based on a shared channel ring, in 1, a user may obtain a video file to be shared by any one of a plurality of methods, such as shooting, third party receiving, etc.;
in 2, the video file selected for sharing can be encrypted, and the video file selected for sharing is protected by a first set, as an embodiment, the encryption method can be multiple, and the system randomly adopts one of the encryption methods to encrypt the video file during encryption;
in step 3, after the video file is encrypted, the encrypted video file is uploaded to a cloud-based memory, so that a user and a visitor who is permitted to share the encrypted video file can conveniently view the encrypted video file;
in 4, the user may select specific visitors to allow the visitors to receive the encryption method information of the encrypted video file uploaded by the user, as an embodiment, the selected visitors may be colleagues, friends, or social circles having the same expectation on shared content, and as an embodiment, the user may identify information of the visitors to be subjected to sharing permission by a name preset when creating a sharing channel;
in 5, the user connects the selected specific visitor to create a ring network, that is, the user connects the network devices of the selected visitor one by one to form a continuous closed loop, as an embodiment, the network devices of the user and the selected visitor are connected through one or two of a hub and a switch to form no less than two closed loops, one is directly used, and the other is used as a standby loop, so that the situation that normal communication cannot be performed due to the damage of one node in the closed loop is prevented;
in 6, the user may assign at least one endpoint to the visitor who is permitted to share, where the endpoint is a location or a link where the recipient can receive the shared file, and the endpoint may be a mobile number, an email address, a URI (uniform resource locator, also called a web address, which is an address of a standard resource on the internet);
in 7, the sharing channel ring is authorized to activate the accessor subjected to the sharing permission, the accessor subjected to the sharing permission can receive the endpoint distributed by the user and the encryption method information of the video file, and the accessor not subjected to the sharing permission is shielded and cannot see the shared encryption video file information and the encryption method information of the encryption video file uploaded by the user;
in step 8, the visitor who is permitted to share receives the endpoint and the encryption method information allocated by the user, and the visitor who is permitted to share can access the encrypted video file uploaded by the user through the endpoint, view and download the encrypted video file uploaded by the user, and decrypt and view the received video file information through the corresponding decryption method.
The invention discloses an encrypted video security method based on a shared channel ring, when a user acquires a video file which is received by a person who only wants to be in a specific range, the video is encrypted and then stored in a cloud-based memory, a ring network is formed by connecting a specific receiver and user equipment, the risk that the video information is stolen by the outside is reduced by reducing the dependence of an end user on a central system, corresponding end points and encryption method information are sent to equipment of an accessor which is allowed to be shared in the ring, the accessor which is allowed to be shared can access the encrypted video information through the end points and check and download the encrypted video information, the downloaded encrypted video is decompressed through the received video encryption information, and the accessor which is forced to enter the shared channel ring can be shielded and cannot check the end points and the video encryption information, the invention ensures that the encrypted video can be safely transmitted in a specific range by various protection methods.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing is merely exemplary and illustrative of the present invention and various modifications, additions and substitutions may be made by those skilled in the art to the specific embodiments described without departing from the scope of the invention as defined in the following claims.
Claims (4)
1. A encryption video security method based on a shared channel ring is characterized in that the encryption video is ensured to be transmitted in a specific range by establishing the shared channel ring and randomly using a plurality of encryption methods;
in step 1, a user acquires a video file to be shared;
in step 2, encrypting the video file selected for sharing;
in step 3, after the video file is encrypted, uploading the encrypted video file to a cloud-based storage;
in step 4, the user can select specific visitors to allow the visitors to receive the encryption method information of the encrypted video file uploaded by the user;
in step 5, the user connects the selected specific visitor to create a ring network, i.e. the user and the network devices of the selected visitor are connected one by one to form a continuous closed loop;
specifically, the user and the network equipment of the selected visitor are connected through one or two of the concentrator and the switch to form not less than two closed loops, one is directly used, and the other is used as a standby loop, so that the situation that normal communication cannot be performed due to the fact that one node in the closed loops is damaged is prevented;
in step 6, the user assigns at least one endpoint to a visitor who is permitted to share, the endpoint being a location or link where the recipient can receive the shared file;
in step 7, the sharing-permitted accessor in the sharing channel ring is authorized and activated, the sharing-permitted accessor can receive the endpoint distributed by the user and the encryption method information of the video file, and the accessor which is not subjected to the sharing permission is shielded and cannot see the shared encryption video file information and the encryption method information of the encryption video file uploaded by the user;
in step 8, the visitor who is permitted to share receives the endpoint and the encryption method information allocated by the user, and the visitor who is permitted to share accesses the encrypted video file uploaded by the user through the endpoint, views and downloads the encrypted video file uploaded by the user, and decrypts and views the received video file information through the corresponding decryption method.
2. The method as claimed in claim 1, wherein the encryption method is multiple, and the system randomly uses one of the encryption methods to encrypt the video file during encryption.
3. The method for securing encrypted video according to claim 1, wherein the visitors selected in step 4 can be colleagues, friends or social circles with the same desire for sharing content, and the user can identify the information of the visitors to be subjected to the sharing permission by a name preset when creating the sharing channel.
4. The method according to claim 1, wherein the end point is a mobile number, an email address, or a URI.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711159842.1A CN107979593B (en) | 2017-11-20 | 2017-11-20 | Encryption video security method based on shared channel ring |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711159842.1A CN107979593B (en) | 2017-11-20 | 2017-11-20 | Encryption video security method based on shared channel ring |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107979593A CN107979593A (en) | 2018-05-01 |
CN107979593B true CN107979593B (en) | 2021-04-06 |
Family
ID=62010468
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711159842.1A Active CN107979593B (en) | 2017-11-20 | 2017-11-20 | Encryption video security method based on shared channel ring |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107979593B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101188569A (en) * | 2006-11-16 | 2008-05-28 | 饶大平 | Method for constructing data quanta space in network and distributed file storage system |
US7958356B1 (en) * | 2006-09-29 | 2011-06-07 | Netapp, Inc. | System and method for establishing a shared secret among nodes of a security appliance |
CN103297484A (en) * | 2012-03-05 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Resource sharing method and device |
WO2014105536A1 (en) * | 2012-12-31 | 2014-07-03 | Google Inc. | Customizing shared web resource snapshots |
CN104885093A (en) * | 2012-12-12 | 2015-09-02 | 思杰系统有限公司 | Encryption-based data access management |
CN107248913A (en) * | 2017-07-28 | 2017-10-13 | 浙江九州量子信息技术股份有限公司 | A kind of quantum key synchronization system and method based on dynamic group net fault detect |
-
2017
- 2017-11-20 CN CN201711159842.1A patent/CN107979593B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7958356B1 (en) * | 2006-09-29 | 2011-06-07 | Netapp, Inc. | System and method for establishing a shared secret among nodes of a security appliance |
CN101188569A (en) * | 2006-11-16 | 2008-05-28 | 饶大平 | Method for constructing data quanta space in network and distributed file storage system |
CN103297484A (en) * | 2012-03-05 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Resource sharing method and device |
CN104885093A (en) * | 2012-12-12 | 2015-09-02 | 思杰系统有限公司 | Encryption-based data access management |
WO2014105536A1 (en) * | 2012-12-31 | 2014-07-03 | Google Inc. | Customizing shared web resource snapshots |
CN107248913A (en) * | 2017-07-28 | 2017-10-13 | 浙江九州量子信息技术股份有限公司 | A kind of quantum key synchronization system and method based on dynamic group net fault detect |
Also Published As
Publication number | Publication date |
---|---|
CN107979593A (en) | 2018-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11991788B2 (en) | Methods and apparatus for HyperSecure last mile communication | |
AU2021258074B2 (en) | Methods and apparatus for hypersecure last mile communication | |
US10581599B2 (en) | Cloud storage method and system | |
DE102018101812B4 (en) | Securely transfer user information between applications | |
US9485096B2 (en) | Encryption / decryption of data with non-persistent, non-shared passkey | |
CN108881195A (en) | Data safety sharing method and device based on cloud environment | |
US20140281520A1 (en) | Secure cloud data sharing | |
US9742738B2 (en) | Method and apparatus for enforcing storage encryption for data stored in a cloud | |
CN104917723B (en) | For realizing the shared methods, devices and systems of encryption file security | |
CN104506483A (en) | Method for encrypting and decrypting information and managing secret key as well as terminal and network server | |
CN103067158A (en) | Encryption and decryption method, terminal device, gateway device and key management system | |
CN104917759A (en) | Third-party-based safety file storage and sharing system and method | |
CN104065680A (en) | Information processing method and apparatus, information retrieval method and apparatus, user terminal and server | |
SE539602C2 (en) | Generating a symmetric encryption key | |
CN105722072A (en) | Business authorization method, device, system and router | |
US9160739B2 (en) | Secure data transmission system | |
CN104618397B (en) | A kind of encryption method and encryption system for instant message applications | |
CN105429994A (en) | Smart phone privacy protection method based on distributed cloud storage | |
US10574441B2 (en) | Management of cryptographic keys | |
CN107979593B (en) | Encryption video security method based on shared channel ring | |
US11438317B2 (en) | Device identification encryption | |
CN107509181A (en) | A kind of encryption method of SMS | |
CN110611668A (en) | Freely-configurable Internet of things monitoring method and device, storage medium and equipment | |
KR101588587B1 (en) | Subscriber information processing module and processing method for anonymous bulletin board service | |
WO2014180214A1 (en) | Information management device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |