The copy-right protection method and its system of media fileTechnical field
The present invention relates to field of information security technology, particularly relates to a kind of protection copyright method of media file and its beSystem.
Background technique
With the continuous development of informationized society, the safety problem of information is more paid attention to.Nowadays social informationFlowing mode is simple, and for some need information to be protected, such as the copyright protection of media file, there are no establish perfect safetyProtection system.People easily can steal above-mentioned need information to be protected with copy mode very and propagate, even legalIdentity personnel's active overseas publicity.This not only damages businessman, enterprise, personal even national interests, is also unfavorable for goodThe formation of social weathering.
The media file copyright protection that the present invention is increasingly taken seriously at present for society is illustrated.Existing copyrightProtected mode mostly uses charge method to protect copyright greatly, but can not prevent the people of purchase copyright from obtaining media textPirate recordings is carried out after part to propagate again.Such as QQ music, KuGoo music is all made of member's mode just can be with downloads of media file, and notTemporary Authorization is used as member, once user is that member can download complete media files, is propagated (such as downloading songAfter be shared in Dropbox for others download).Use watermark mode also, piracy is shown when media file is copied, but logicalCrossing professional tool but can easily remove watermark.More there is the media file required for special copyright, is only provided in what line was listened toMode, to prevent from being downloaded propagation, but this still can not stop the pirate recordings from other software.
For another example, it has been disclosed that application No. is 200610062936.2, it is entitled that " the digital version copyright of media network application is protectedMaintaining method and system " patent application, specifically disclose: media file owner is by the encrypting module of client to its mediaFile is encrypted, and encrypted media file is then uploaded to data server by network;By media owner to instituteState the use right management of encrypted media file.The encryption and authorization for completing media file in client by media owner, reduceSystem server load, improves encryption efficiency, and be easily achieved the update of algorithm, has preferable flexibility and easilyThe property used.The program uses encrypted media file to store, immediately single cipher mode i.e., although pair of encryption and authorizationMedia owner is liked, but still not can guarantee the pirate recordings of media file, such as the recording of KK video recorder, audio recording software is turned overRecord tool can not find pirate recordings person once by pirate recordings, that is, cannot achieve the illegal route of transmission of tracking media file.
Therefore, it is necessary to provide a kind of media file copyright protection mode for being able to solve the above problem.
Summary of the invention
The technical problems to be solved by the present invention are: providing the copy-right protection method and its system of a kind of media file, energyEnough ensure that media file is propagated in authorization path, while capableing of the pirate recordings source of convenient, accurate located media file again.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention are as follows:
A kind of copy-right protection method of media file, comprising:
Personal account information according to user is random respectively to be generated and the user uniquely corresponding encryption key and identityIdentifier;
One user triggers the download instruction to a media file;
Server-side encrypts a media file using the corresponding encryption key of a user;
A media file is written into the corresponding identification identifier of one user by Steganography.
Another technical solution provided by the invention are as follows:
A kind of protection copyright system of media file, including server-side and the first program;First program is being servicedThe processor at end can be realized following steps when calling:
Personal account information according to user is random respectively to be generated and the user uniquely corresponding encryption key and identityIdentifier;
It is close using the corresponding encryption of a user after the download instruction to a media file for receiving user triggeringKey encrypts a media file;
A media file is written into the corresponding identification identifier of one user by Steganography.
The beneficial effects of the present invention are: guarantee one key of a people, using with the unique corresponding encryption key of authorized userEncrypt the media file to be downloaded of the user, in local, can only be download the media file authorized user using its encryption it is closeKey could open the media file, so that it is guaranteed that media file is propagated in authorization approach;Further, it is downloaded in authorized userWhile media file, the identification identifier of the user is also written by media file by Steganography, even if passing through pirate recordings meansIt is propagated, the source of malicious dissemination can be tracked, by extracting the identification identifier hidden in pirate recordings file also to safeguard copyrightThe legitimate rights and interests of owner, while improving the protection abilities of the media file required special copyright.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the copy-right protection method of media file of the present invention;
Fig. 2 is the flow diagram of the copy-right protection method of the media file of the embodiment of the present invention one;
Fig. 3 is the process in the embodiment of the present invention one to this specific embodiment that downloads of media file is verifiedSchematic diagram;
Fig. 4 is that the media file in the embodiment of the present invention one according to pirate recordings tracks its propagation this specific embodiment of sourceFlow diagram;
Fig. 5 is the ciphering process schematic diagram of one media file of the embodiment of the present invention.
Specific embodiment
To explain the technical content, the achieved purpose and the effect of the present invention in detail, below in conjunction with embodiment and cooperate attachedFigure is explained.
The most critical design of the present invention is: can only be that the authorized user of downloads of media file utilizes its encryption in localKey could open the media file, realize the restriction of propagation path;The identification identifier for downloading user is write by SteganographyEnter file to be downloaded, realizes that the positioning in source is propagated in pirate recordings.
Explanation of technical terms of the present invention:
Fig. 1 is please referred to, the present invention provides a kind of copy-right protection method of media file, comprising:
Personal account information according to user is random respectively to be generated and the user uniquely corresponding encryption key and identityIdentifier;
One user triggers the download instruction to a media file;
Server-side encrypts a media file using the corresponding encryption key of a user;
A media file is written into the corresponding identification identifier of one user by Steganography.
As can be seen from the above description, the beneficial effects of the present invention are: using encryption technology of being association of activity and inertia, guarantee that a people one is closeKey, only if it were not for the authorized user of downloading this document can not open, guarantees route of transmission even if media file is downloaded with thisLegitimacy;Meanwhile even if sound encryption technology is cracked, media file success can also pass through steganography pair by pirate recordingsPirate recordings file is analyzed and finds disseminator, thus realize the tracking of media file route of transmission, and then service companies interests,Trace person liable.Realization of the invention would be even more beneficial to be managed media file, while more help safeguard media file versionPower, maximum possible ensure that the interests of copyright owner are not damaged.
Before the encryption, further includes:
After server-side receives the download instruction of the user triggering, judge whether a user has described in correspondenceThe download instruction of one media file;If so, executing the encrypting step.
Seen from the above description, further include whether verifying user has download permission, it is ensured that media file is by legalChannel obtains.
Further, further includes:
According to the authorization of user, its encryption key is stored in client local.
Seen from the above description, encryption key can also be stored securely in local by the authorized user for successfully logging in client,In order to which under weak net or offline condition, same energy successful decryption file is brought with easily enjoying media file anywhere or anytimeHearing experience.
Further, the method also includes:
Client receives the open instructions of a corresponding media file;
Client is attempted to obtain the corresponding encryption key of user for triggering the open instructions;
If obtaining failure, forbid opening a media file;
If obtaining successfully, a media file described in acquired encryption key decryption is used;
If successful decryption, a media file is opened;If decryption failure, forbids opening a media file.
Seen from the above description, due to there was only the corresponding encryption key ability successful decryption user downloading of authorized userMedia file, therefore, the open instructions of only user triggering, which could be opened successfully, has been downloaded to local above-mentioned media file,The above-mentioned media file downloaded is operated to effectively prevent unauthorized user, while also can effectively prevent authorized userThe media file for needing to carry out copyright protection is illegally propagated using its permission.
Further, the client is attempted to obtain the corresponding encryption key of user for triggering the open instructions, specificallyAre as follows:
After client receives the open instructions of a corresponding media file, network with server-side, request triggeringThe corresponding encryption key of the user of the open instructions;
If networking failure, it tries from the local corresponding encryption key of user for obtaining the triggering open instructions.
Seen from the above description, encryption key preferentially is obtained from server-side, to guarantee the safety of encryption key;Simultaneously againThe manner of decryption in the case of networking failure is provided, manner of decryption is more flexible, while also providing more more options for user, is conducive to excellentChange user experience.
Further, the encryption key is globally unique identifier;The identification identifier is 256 comprising to applicationThe identification identifier of the personal account information at family;It is described to be encrypted as 256 cipher mode of DES.
Seen from the above description, the uniqueness and safety of encryption key and identification identifier be will ensure that, and ensuredThe high reliability of cipher mode.
Further, a media file is audio-video document;It is described by Steganography that one user is correspondingA media file is written in identification identifier, specifically:
If a media file is video file, use audio stream Steganography by the corresponding identity mark of a userKnow symbol and a media file is written;
If a media file is audio file, use file stream Steganography by the corresponding identity mark of a userKnow symbol and a media file is written.
Seen from the above description, it can be not used under the premise of not changing audio-video document structure by changing fileSpace writes information into file stream;Or the feature limited using frequency range sensitivity of the mankind to audio, by changingBecoming audio frequency will be not detectable in identification identifier write-in audio-video document;Here, will also be directed to the file of different-formatType is respectively adopted different steganography modes, steganography is realized in a manner of more convenient and fast.It can realize that user's watermark stores as a result,Even if can also be determined by the parsing to pirate recordings file by pirate recordings and be propagated source.
Further, further includes:
Obtain a media file;
It extracts in an acquired media file using the identification identifier of Steganography write-in;
Corresponding user is determined according to extracted identification identifier.
Seen from the above description, it if file is cracked in cipher mode, or is propagated after pirate recordings, extraction can be passed throughThe identification identifier of steganography tracks the object illegally propagated in the file illegally propagated, and realizes and propagates the accurate of sourcePositioning.
Another technical solution provided by the invention are as follows:
A kind of copyright protecting system of media file, including server-side and the first program;First program is being servicedThe processor at end can be realized following steps when calling:
Personal account information according to user is random respectively to be generated and the user uniquely corresponding encryption key and identityIdentifier;
It is close using the corresponding encryption of a user after the download instruction to a media file for receiving user triggeringKey encrypts a media file;
A media file is written into the corresponding identification identifier of one user by Steganography.
It further, further include client and the second program;Second program by the processor of client when being calledIt can be realized following steps:
Client receives the open instructions of a corresponding media file;
Client is attempted to obtain the corresponding encryption key of user for triggering the open instructions;
If obtaining failure, forbid opening a media file;
If obtaining successfully, a media file described in acquired encryption key decryption is used;
If successful decryption, a media file is opened;If decryption failure, forbids opening a media file.
Further, client is in the corresponding encryption key of user for realizing the step trial acquisition triggering open instructionsWhen, specifically:
After client receives the open instructions of a corresponding media file, network with server-side, request triggeringThe corresponding encryption key of the user of the open instructions;
If networking failure, it tries from the local corresponding encryption key of user for obtaining the triggering open instructions.
Further, the encryption key is globally unique identifier;The identification identifier is 256 comprising to applicationThe identification identifier of the personal account information at family;It is described to be encrypted as 256 cipher mode of DES.
Further, a media file is audio-video document;Server-side is realizing that the Steganography that passes through will be describedWhen a step for media file is written in the corresponding identification identifier of one user, specifically:
If a media file is video file, use audio stream Steganography by the corresponding identity mark of a userKnow symbol and a media file is written;
If a media file is audio file, use file stream Steganography by the corresponding identity mark of a userKnow symbol and a media file is written.
It further, further include third program, the third program can be realized following step when being called by processorIt is rapid:
Obtain a media file;
It extracts in an acquired media file using the identification identifier of Steganography write-in;
Corresponding user is determined according to extracted identification identifier.
Embodiment one
- Fig. 5 referring to figure 2., the present embodiment provides a kind of copy-right protection methods of media file, can effectively prevent by versionThe media file of power protection is propagated wantonly, it is ensured that it spreads in authorization approach, and illegal pirate recordings can be accurately positioned simultaneouslySource.
The method of the present embodiment can specifically include following steps:
S1: personal account information according to user is random respectively to be generated and the user uniquely corresponding encryption key and bodyPart identifier.
Specifically, user during applying for the registration of to server-side, is filling in crucial personal account information, is such as havingAfter the phone number of unique identification, server-side by the personal account information according to the user generate at random one it is unique with the userCorresponding encryption key encrypts media file for subsequent;One key of a people is realized with this, and key has uniquelyProperty.Preferably, the encryption key is globally unique identifier GUID, specifically, the encryption key can be according to the userPersonal account information, such as phone number adds nonrandom time parameter using the corresponding special algorithm of GUID, random rawThe numeric identifier for being 128 at the binary length that a recurrence probability is 0% is as encryption key.
In user registration course, personal account information that will also be crucial according to it generate simultaneously one equally with the userUnique corresponding and effective identification identifier, enters for subsequent steganography in the media file that the user is downloaded.Preferably, the bodyPart identifier is 256, includes user's registration identity information, which can be phone number, even identity cardEqual certificate informations.
The specific ciphering process of media file will be described in detail by taking user's A downloads of media file a as an example below:
Download instruction of S2: the user A triggering to media file a.
Download instruction in the present embodiment then refers to downloading media text for only supporting the media file played onlinePart it is data cached to local.That is, either user wants complete downloads of media file to local, or by slowIt deposits mode and opens media file online, all within protection scope of the present invention.
User A can be authorized user, and authorized user is had downloading or opened in particular range online (such as with cache wayMember prefecture) media file permission;Be also possible to unauthorized user, although unauthorized user do not have downloading it is above-mentioned specificThe permission of the media file of range, but can have the permission of downloading other specified media file (shared resources).Due to non-The usually not special copyright protection requirement of the corresponding media file for supporting downloading of authorized user, is the money of opening and shares mostlySource, therefore generally do not need to carry out special protection to it.In the present embodiment, mainly for the corresponding particular range of authorized userInterior media file carries out copyright protection.But it should be recognized that if the file of shared resource route of transmission in need and turning overThe demand of source positioning is recorded, the present embodiment is equally applicable.
For example, multimedia player such as QQ music/KuGoo music has membership system, will be possessed according to different membership gradesThe permission of how much songs downloading, and possess the online test listening (need to network and verify identity) of specified song or download bent packetPermission.The utilization of the present embodiment is protected to the specified song in the latter with special copyright.With this prevent user atIt is locally stored to be stored in after member's downloading, exists and carry out resource-sharing using Baidu's Dropbox etc., copyright song is caused to be spread uncheckedThe case where endangering.
S3: the identity of the user A is verified;
After server-side receives the download instruction of the correspondence media file a of user A triggering, wherein if media file a branchDownloading is held, then the download instruction is corresponding downloads complete media file a, described if media file a only supports to play onlineDownload instruction corresponds to the data cached to local of downloads of media file a.Authentication is carried out to the user first, whether judges itThe permission for having downloading or online test listening media file a;If having corresponding authority, S4 is executed;If it is not, not having corresponding powerLimit, then prompted, and forbids downloading or online broadcasting media file a.
S4: server-side encrypts media file a using the corresponding encryption key of user A.
Server-side verify the user really have downloading or line play permission after, will use the user it is corresponding plusKey, that is, use GUID as encryption key to media file a (here, corresponding when downloading is complete media file sheetBody, corresponding when playing online is the data cached of media file, and in order to describe conveniently, following unifications are general using media fileInclude) it is encrypted.It is preferred that encrypted to media file using 256 cipher mode of DES because DES 256 belong to it is most complicatedEncryption, will ensure that media file is not easy to be cracked.
Use GUID relevant to individual subscriber as encryption key, compared to set encryption key is directlyed adopt, noIt only realizes related to individual, increases and crack difficulty;Meanwhile the realization process of scheme is equivalent to secondary ciphering process (algorithmEncryption generates GUID, then uses GUID as encryption key encrypted media file again), cipher mode is difficult to speculate, realizes and encryptsReliability is obviously improved.
After static encryption mode through the above steps encrypts media file, it can be ensured that only download the mediaThe authorized user (i.e. user A) of file uses its encryption key that could open the media file, and (media file a) prevents matchmaker with thisThe case where body file is illegally propagated again after legal downloading, because even not having the use of key (encryption key) after sharingFamily still cannot open the media file.It is thus achieved that the limitation for the media file route of transmission that special copyright requires, it is ensured thatThis kind of media file is propagated within the scope of authority.
S5: the corresponding identification identifier of user A is written by media file a by Steganography.
Further, the static encryption mode for not only carrying out above-mentioned steps S3 to the media file to be downloaded of user carries outEncryption, but also will be tracked using dynamic encryption technology by the propagation source of the media file of pirate recordings.
Specifically, using audio stream Steganography (i.e. audio write-in side if the media file of user's downloading is video fileFormula) media file to be downloaded of the user is written into the corresponding identification identifier of the user;
It, will using file stream Steganography (i.e. file stream writing mode) if the media file of user's downloading is audio fileThe media file to be downloaded of the user is written in the corresponding identification identifier of the user.
Steganography refers to above-mentioned identification identifier information carrying out the data formed after professional treatment, writes into textIn part.When not destroying file, do not influence to be inserted into above-mentioned data in file gap under the quality conditions of whole file,Data can be exposed under specific circumstances.Such as: regard prepared Chinese ink using Sprite in paper, writes on paper, then pass through carbonThe roasting word that can be shown above, reason are the same.
Can be realized: 1. do not destroy in media file structure, change file unused storage space, write information into file streamIn.2. user information is written by changing audio frequency since frequency range sensitivity of the mankind to audio is limited.
It will be written and be downloaded in such a way that people are imperceptible with the associated identification identifier of downloading person by steganographyMedia file stream in, belong to a kind of storage mode of invisible watermark.Even if being propagated after carrying out pirate recordings by illegal person software,Also corresponding identification identifier can be extracted in the audio stream according to pirate recordings file, and then tracks the source for carrying out malicious dissemination.
The ciphering process of the present embodiment as shown in figure 5, due to static encryption mode before implementation, have been able to ensure onlyThere is the authorization downloading user of media file that could download and open corresponding media file, just ensure that media file acquiring wayLegitimacy;Cooperate subsequent dynamic encryption mode (identity steganography) use, just can ensure that according to pirate recordings file quickly andPrecise positioning to user be the source illegally propagated.
In a specific embodiment of the present embodiment, user is described in detail by client to complete downloads of mediaFile to local media file verification process.The client is user operation terminal, such as mobile phone, plate, computer intelligenceIt can terminal.
As shown in Figure 3, comprising:
S6: client receives the open instructions of corresponding media file a;
S7: the user that client sends the acquisition triggering open instructions to the server-side for communicating with connection is corresponding to be addedThe request of key;
If obtaining failure, forbid opening media file a;Nonregistered user is filtered out with this;
If obtaining successfully, encryption key decryption media file a acquired in client use;
If successful decryption, prove to trigger the instruction is that (the downloading person user A of only media file a just possesses user AThe encryption key of media file a can be decrypted), open media file a;
If decryption failure is forbidden opening media file a, for the behavior for forbidding operating media file, all willIt carries out that its operation is prompted not have corresponding authority.
Above-mentioned steps are that user requests to open the case where being completely downloaded to the media file of client local;And for oneThe media file that a little special copyrights require, or even do not allow to download, only allow to play online, authentication in this caseFormula has corresponding record in following specific embodiments of the present embodiment.
It, will on the basis of the above, for the matchmaker for only allowing to play online in this specific embodiment of the present embodimentThe verification process of body file is described in detail:
The corresponding download instruction that user A is triggered in above-mentioned S2 is the data cached to client sheet of downloads of media file aGround;Equally exist, is that encryption and steganography are carried out to the data cached of the media file a in downloading process.
SS6: client receives the open instructions of corresponding media file a;
SS7: client triggers the corresponding encryption of the user of the open instructions to sending to obtain with server-side that it is networkedThe request of key;
If obtaining failure, forbid opening media file a;
If obtaining successfully, encryption key decryption acquired in client use is cached to local media file in advancea;
If successful decryption, media file a is opened, realizes online play;
If decryption failure is forbidden opening media file a.
Above-mentioned specific embodiment can be realized in weak net/good experience without guarantee user off the net.
It in another specific embodiment of the present embodiment, will also solve that media file can not be opened under offline condition simultaneouslyThe problem of.
Its encryption key is stored temporarily in client local under the authorization of user by present embodiment.
After client sends acquisition encryption key failure to server-side in S7 and SS7, if since network cause causesFailure, such as weak net/without net situation;Then under the authorization of user A (settable verification step, further increase safety), directlyIt connects from the encryption key that client local obtains user A and media file a is decrypted.Preferably, in order to ensure media fileSafety, be verified preferential using the mode for obtaining key from server-side.
In the present embodiment, when needing the media file according to pirate recordings to track it to propagate source, as shown in figure 4, can be withIt is realized by following step:
S8: the media file of a pirate recordings is obtained, such as media file a ', it is assumed that it is obtained by pirate recordings media file a;
S9: the identification identifier in media file a ' flow data is extracted;
S10: corresponding user A is determined according to extracted identification identifier.
By above-mentioned, the user of malicious dissemination can be realized quickly and accurately navigated to.
It is below the several specific with scene of corresponding above-described embodiment.
Scene one
After the song that QQ music/KuGoo music member downloading only opens member, just it is stored in and is locally stored, use hundredIt spends Dropbox etc. and carries out resource-sharing, copyright song is caused to be spread unchecked.
The present embodiment is using mode (static technique: common file encryption of being association of activity and inertia;Dynamic technique: work as file encryptionWhen by pirate recordings, for recording the information of pirate recordings person.Static technique fights the file not propagation under authorization;Dynamic technique confrontationUse the recording of third party's pirate recordings software.) using a people one encryption principle.I.e. an account is randomly assigned not repeat by serverGUID regards secret key, is bundled with account, encrypted media file.(cannot not there is no key by arbitrarily propagating i.e. after file downloadIt can not hear song).
Scene two
QQ music/KuGoo music obtains bent packet using member's mode, to the song for having special copyright, only allows to listen online,Need to network verify identity after can just listen to.In some environment, such as: foreign airport vulnerable network environment is can not to hearThis kind of song.
The present embodiment encrypts principle using mode of being association of activity and inertia, using a people one.As described in scene one, i.e., file underIt is downloaded to local, in weak net/without net, secret key can be stored temporarily in local, can be realized and listen to music in the absence of a network.
Scene three
QQ music/KuGoo music obtains bent packet using member's mode, and member is shared in Dropbox after downloading a large amount of songs, for otherPeople's downloading influences official's sale.
The present embodiment (is not being influenced media file quality, user's special identifier is written to media using steganographyIn file stream), the disseminator of the resource is quickly found out by analysis tool.
Scene four
Media companies' publication film plays in special website, is used by a person the recorded videos such as KK video recorder, passes after recordingIt is multicast to online.
The present embodiment (is not being influenced media file quality, user's special identifier is written to audio using steganographyIn stream), the disseminator of the resource is found by analysis tool.
Embodiment two
The present embodiment corresponding embodiment one provides a kind of protection system of media file, including server-side and the first program;First program can be realized following steps when being called by the processor of server-side:
Personal account information according to user is random respectively to be generated and the user uniquely corresponding encryption key and identityIdentifier;
It is close using the corresponding encryption of a user after the download instruction to a media file for receiving user triggeringKey encrypts a media file;
A media file is written into the corresponding identification identifier of one user by Steganography.
The protection system further includes client and the second program, and second program is by the processor calling of clientWhen can be realized following steps:
Client receives the open instructions of a corresponding media file;
Client is attempted to obtain the corresponding encryption key of user for triggering the open instructions;
If obtaining failure, forbid opening a media file;
If obtaining successfully, a media file described in acquired encryption key decryption is used;
If successful decryption, a media file is opened;If decryption failure, forbids opening a media file.
Wherein, client is when realizing that step attempts to obtain the corresponding encryption key of user for triggering the open instructions,Specifically:
After client receives the open instructions of a corresponding media file, network with server-side, request triggeringThe corresponding encryption key of the user of the open instructions;
If networking failure, it tries from the local corresponding encryption key of user for obtaining the triggering open instructions.
In the present embodiment, the encryption key is globally unique identifier;It includes pair that the identification identifier, which is 256,Using the identification identifier of the personal account information at family;It is described to be encrypted as 256 cipher mode of DES.
In a specific embodiment of the present embodiment, a media file is audio-video document;Server-side is being realizedWhen a described the step for media file is written in the corresponding identification identifier of one user by Steganography, specificallyAre as follows:
If a media file is video file, use audio stream Steganography by the corresponding identity mark of a userKnow symbol and a media file is written;
If a media file is audio file, use file stream Steganography by the corresponding identity mark of a userKnow symbol and a media file is written.
It further include third program in another specific embodiment of the present embodiment, the third program is by processorWhen calling, it can be realized following steps:
Obtain a media file;
It extracts in an acquired media file using the identification identifier of Steganography write-in;
Corresponding user is determined according to extracted identification identifier.
It corresponds to those of ordinary skill in the art will appreciate that realizing all or part of the process in above-mentioned technical proposal, being canIt is realized with instructing relevant hardware by computer program, the program can be stored in one and computer-readable depositIn storage media, the program is when being executed, it may include such as the process of above-mentioned each method.
In conclusion the copy-right protection method and its system of a kind of media file provided by the invention, using random GUIDThe cipher mode storage combined with DES256, realizes secondary encryption, it is ensured that the safety of media file, even if by under illegalIt carries, can not also be cracked easily;Using the cipher mode being association of activity and inertia, it can be ensured that media file is propagated in legal means,Even if also can fast and accurately navigate to the information of pirate recordings person according to dynamic encryption mode by illegal pirate recordings;Further, togetherWhen provide and normally open the function of media file under offline condition, guarantee the good experience of user with this.
The above description is only an embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hairEquivalents made by bright specification and accompanying drawing content are applied directly or indirectly in relevant technical field, similarly includeIn scope of patent protection of the invention.