CN103078861A - Network terminal playing control method based on AES (Advanced Encryption Standard) and material verification - Google Patents

Network terminal playing control method based on AES (Advanced Encryption Standard) and material verification Download PDF

Info

Publication number
CN103078861A
CN103078861A CN2013100038095A CN201310003809A CN103078861A CN 103078861 A CN103078861 A CN 103078861A CN 2013100038095 A CN2013100038095 A CN 2013100038095A CN 201310003809 A CN201310003809 A CN 201310003809A CN 103078861 A CN103078861 A CN 103078861A
Authority
CN
China
Prior art keywords
bytes
file
value
byte
network terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013100038095A
Other languages
Chinese (zh)
Other versions
CN103078861B (en
Inventor
吴长太
曹礼玉
胡光杰
廖燕梅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hengonda Technology Co., Ltd.
Original Assignee
Fujian Sunnada Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Sunnada Communication Co Ltd filed Critical Fujian Sunnada Communication Co Ltd
Priority to CN201310003809.5A priority Critical patent/CN103078861B/en
Publication of CN103078861A publication Critical patent/CN103078861A/en
Application granted granted Critical
Publication of CN103078861B publication Critical patent/CN103078861B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides a network terminal playing control method based on an AES (Advanced Encryption Standard) and material verification. Specific to the aim of ensuring the integrity and the uniqueness of playlists and material files, a network terminal is required to decrypt and verify whether the playlists and played materials are transmitted by a platform side or not before using the playlists every time, and is only used for playing the material files transmitted by the platform side. Small materials such as html (htm) files, playlist xml files and txt text files can be verified and operated fully; and if verification and full-text operation are applied to large materials such as picture files and video files, the processing time of the network terminal is occupied to a large extent, and the overall playing performance of the network terminal is lowered. According to the method, large materials are processed by adopting a method for extracting certain positions of the materials and calculating verification values with a CRC32 (Cyclic Redundancy Check 32) algorithm, so that the encryption and decryption time of the network terminal can be shortened, and the integrity and the uniqueness of the material files can be ensured.

Description

A kind of network terminal control method for playing back based on AES and material checking
Technical field
The present invention relates to the communication apparatus technical field, relate in particular to a kind of network terminal control method for playing back based on AES and material checking.
Background technology
Present media termination divides by the place and mainly comprises: vehicle-mounted media terminal and building media termination, they have common characteristics: be exactly to carry out broadcast and the transmission of media in the public place that flows.Therefore drop into the merchant for terminal equipment, for fail safe, uniqueness and the independence of guaranteeing device plays all has larger requirement.Show and the analysis of trade information that according to present related data different vendor is not quite similar to the media content data cipher mode, what have does not encrypt fully, and media data occurs with form expressly on terminal fully; And the too complicated means of the use that has are encrypted, and increase development cost, increase overhead.The present patent application file is considered based on total system, especially for the relatively nervous embedded system of hardware resources, has proposed a kind of novel encryption and verification algorithm.This algorithm is divided into the dual mode processing with the data of media bearer, and a kind of is full text to be carried out AES encrypt, and another kind is that the AES encryption is done at certain position in the extraction data.The effective combination of the two on the operational efficiency of the fail safe of data content and system, is found a metastable balance point, also is well positioned to meet Information Security that the current device merchant proposes and the requirement of uniqueness.
Have now and disclose a kind of " mobile terminal apparatus electronic file storage organization and management method " in the technology; see that publication number is: CN101183374; open day be: the Chinese patent of 2008.05.21; this invention relates to the field of the wireless mode management document of mobile terminal device; at present computer documents management is not suitable for mobile terminal device with storage mode; also incompatible; this invention has been adopted a series of software and hardware technologies for overcoming these problems; by the material format conversion; fill memory block; the padding data position; generate catalogue and label; fill copyright data; the compressed text data; encrypted electronic content; the final generation comprises initial data; bibliographic structure; the compression of copyright information and the file destination of encipherment protection are the UMD file; copy to portable terminal; at user terminal edition interface is set; this invention is simple in structure, but operating procedure is few, has improved compatibility; flexibility; fail safe and extensibility.Just to the managing of e-file, e-file is carried out the operation of material format conversion in this invention; Do not relate to the problem on fail safe and the terminal equipment operational efficiency.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of network terminal control method for playing back based on AES and material checking, and it shortens the processing time of the network terminal to a great extent, also can guarantee integrality and the uniqueness of material file.
The present invention is achieved in that a kind of network terminal control method for playing back based on AES and material checking, comprises the steps:
Step 1, the employed html file of ad content, txt text and playlist xml file that the network terminal is play carry out the aes algorithm encryption by the platform end, the material that the ad content of network terminal broadcast is quoted is uploaded by the platform end, and appended the cryptographic check code at each material end;
Step 2, platform end be by issuing download command to the network terminal, and inform that the network terminal downloads the path at required ftp server place,
Step 3, the network terminal obtain after described path resolves, and start the FTP thread and download html file, txt text and the playlist xml file after aes algorithm is encrypted and carry out the end and append each material after the cryptographic check code is processed; The network terminal is decrypted html file, txt text and playlist xml file after encrypting, and each material of quoting in the ad content is verified when broadcasting advertisement content;
Step 4, when deciphering html file, txt text and playlist xml file, any file decryption is wrong or the checking material is wrong, then the network terminal will forbid playing this wrong file or wrong material; And reporting the platform end, corresponding wrong file or material are downloaded in request again.
The present invention has following advantage: the present invention adopts the AES of html file, txt text and playlist xml file to encrypt and the material checking, neither affects the normal play of ad content, also can satisfy operational demand.The more important thing is the cipher mode that exists compared to existing market, more standardization, easy to operate, and be more applicable for integrality and the uniqueness of network mode releasing advertisements content, when guaranteed performance improves, reduced largely and used the cost of encrypting in the product, improve product market competitiveness, and shorten to a great extent the processing time of the network terminal, also can guarantee integrality and the uniqueness of material file.
Description of drawings
Fig. 1 platform end is encrypted the schematic flow sheet of html file, txt text and playlist xml file.
Fig. 2 platform end appends the schematic flow sheet of cryptographic check code to each material end of picture file, video file.
The schematic flow sheet of Fig. 3 network terminal decryption verification html file, txt text and playlist xml file.
The schematic flow sheet of Fig. 4 network terminal decryption verification picture file, video file.
Embodiment
See also Fig. 1 to shown in Figure 4, a kind of network terminal control method for playing back based on AES and material checking of the present invention comprises the steps:
Step 1, the employed html file of ad content (or htm file), txt text and playlist xml file that the network terminal is play carry out the aes algorithm encryption by the platform end, the material that the ad content of network terminal broadcast is quoted is uploaded by the platform end, and appended the cryptographic check code at each material end;
Wherein, the described employed html file of ad content, txt text and the playlist xml file that the network terminal is play carries out aes algorithm by the platform end to be encrypted, and specifically comprises the steps:
Step 10, obtain the employed html file of ad content, txt text and playlist xml file at the platform end; These three files are operated by step 11 to step 18 one by one:
The length of step 11, calculation document obtains the file length value of the HEX form of 4 bytes, and inadequate 4 bytes of the length of file length value mend 0 in front; Surpass 4 bytes, remove the high byte that exceeds, keep the value of low 4 bytes;
The verification of step 12, calculation document and, obtain the checksum value of the HEX form of 4 bytes, checksum value is that all bytes with whole file obtain by accumulation calculating, inadequate 4 bytes of checksum value length mend 0 in front; Surpass 4 bytes, remove the high byte that exceeds, keep the value of low 4 bytes;
Step 13, obtain the alignment check value of file, obtain the alignment check value of the HEX form of 2 bytes, the alignment check value is by the first byte of checksum value and low 42 bytes that form of the second byte in high 4 and the step 12 of the first byte of step 11 File length value and the second byte;
Step 14, the threshold value A of the file length value in the step 11 and predefined 4 bytes of platform end (this threshold value A is 4 byte values of platform end and network terminal agreement) is carried out XOR (XOR) computing, operation result is changed into ASCII value B, this B is the character string of 8 bytes again;
Step 15, are 4 byte values of platform end and network terminal agreement with this threshold value of threshold value C(C of the checksum value in the step 12 and predefined 4 bytes of platform end) carry out XOR (XOR) computing, again operation result is changed into ASCII value D, this D is the character string of 8 bytes;
Step 16, the alignment check value in the step 13 is changed into ASCII value E, this E is the character string of 4 bytes;
Step 17, character string B, the D, the E that obtain in step 14, step 15, the step 16, form the character string F of 20 bytes with the BED order;
Step 18, the character string F in the step 17 is appended to the end of this document, and encrypts this document with aes algorithm.
The material that the ad content of network terminal broadcast is quoted is uploaded by the platform end, and appended the cryptographic check code at each material end, specifically comprise the steps:
Step 21, according to the material type that the platform end is uploaded, finding out needs material, i.e. picture file and video file; This picture file and video file are all operated by step 22 to step 29:
The length of step 22, calculation document; Obtain the file length value of the HEX form of 4 bytes, inadequate 4 bytes of the length of file length value mend 0 in front; Surpass 4 bytes, remove the high byte that exceeds, keep the value of low 4 bytes;
The CRC32 verification of step 23, calculation document; Obtain the check value of the HEX form of 2 bytes, this test value is to get this document front 1K byte to do the CRC32 verification with last 1K byte;
Step 24, obtain the alignment check value, obtain the alignment check value of the HEX form of 2 bytes; This alignment check value is by the first byte of CRC32 check value and low 42 bytes that form of the second byte in high 4 and the step 23 of the first byte of step 22 File length value and the second byte;
Step 25, the threshold value A of the file length value in the step 22 and described 4 bytes is carried out XOR, again operation result is changed into ASCII value H, this H is the character string of 8 bytes;
Step 26, the threshold value C of the check value in the step 23 and described 4 bytes is carried out XOR, again operation result is changed into ASCII value I, this I is the character string of 8 bytes;
Step 27, the alignment check value in the step 24 is changed into ASCII value J, this J is the character string of 4 bytes;
Step 28, character string H, the I, the J that obtain in step 25, step 26, the step 27, form the character string K of 20 bytes with the HJI order;
Step 29, the character string K in the step 28 is made aes algorithm encrypt, then be appended to the end of this document.
Step 2, platform end be by issuing download command to the network terminal, and inform that the network terminal downloads the path at required ftp server place,
Step 3, the network terminal obtain after described path resolves, and start the FTP thread and download html file, txt text and the playlist xml file after aes algorithm is encrypted and carry out the end and append each material after the cryptographic check code is processed; (this playlist xml file is the strategy file of network terminal control media play, this document has recorded material path and other property values of the time span of material broadcast and strategy that task is switched etc. of quoting in the network terminal playing process, the network terminal is when downloading the material process and calling playlist xml file broadcast media task, all needing to decipher first playlist xml file and verification identifying code) network terminal is when broadcasting advertisement content, to the html file after encrypting, txt text and playlist xml file are decrypted, and each material of quoting in the ad content is verified;
Step 4, when deciphering html file, txt text and playlist xml file, any file decryption is wrong or the checking material is wrong, then the network terminal will forbid playing this wrong file or wrong material; And reporting the platform end, corresponding wrong file or material are downloaded in request again.
Wherein, the described network terminal is decrypted html file, txt text and playlist xml file after encrypting when broadcasting advertisement content, specifically comprises the steps:
Step 31, the network terminal obtain each file of download, and judge whether each file type of downloading is html file, txt text or playlist xml file; That each file that then will download operates according to step 32 to step 38 one by one, and is no, then do not operate;
Step 32, the file of downloading with aes algorithm deciphering;
Step 33, extraction this document end 20 bytes, and resolve into three parts, first is 8 bytes in front in 20 bytes, and this character string is changed into the value L of the HEX form of 4 bytes; Second portion is middle 4 bytes in 20 bytes, and the character string of middle 4 bytes is changed into the value M of the HEX form of 2 bytes; Third part is last 8 bytes in 20 bytes, and character string that will these last 8 bytes changes into the value N of the HEX form of 4 bytes;
Step 34, the L that obtains in the step 33 and the threshold value A of described 4 bytes are carried out XOR, obtain as a result O; The N that obtains in the step 33 and the threshold value C of described 4 bytes are carried out XOR, obtain as a result P;
The first byte and the second byte high 4 and extract the first byte and the second byte among the P low 4 among the O forms the Q value of 2 bytes in step 35, the extraction step 34;
Whether step 36, comparison M value and Q value equate, if equate, then continue step 37; If unequal, then forbid broadcasting advertisement content, and report the alignment verification of platform end file to make mistakes that request re-issues this document;
Step 37, remove 20 bytes of end of file after, calculate length R and verification and the S of this document;
Whether R equals O in step 38, the determining step 37, and whether S equals P; The two all equates, then continues the material checking, if one of them does not wait or the two is all unequal, then forbids broadcasting advertisement content, and reports the bad checksum of platform end file, asks to re-issue this document.
The network terminal generally speaking hardware resource is all relatively nervous, especially processes relatively large material file, such as video file and picture file.Therefore, calculate the check value of picture and video, just do not adopt the in full cumulative and algorithm of byte, but directly obtain this document head 1K byte and last 1K byte, then make CRC32 algorithm calculation check value.So just can shorten to a great extent the CPU processing time, improve running efficiency of system.In the present invention, each material of quoting in the ad content is verified, comprised the steps: that specifically step 41, the file relative path that provides according to play list file obtain material in this locality, i.e. picture file or video file;
The character string of step 42,20 bytes in extraction document end, and decipher first with aes algorithm, then resolve into three parts, first is 8 bytes in front in 20 bytes, and this character string is changed into the value T of the HEX form of 4 bytes; Second portion is middle 4 bytes in 20 bytes, and the character string of middle 4 bytes is changed into the value U of the HEX form of 2 bytes; Third part is last 8 bytes in 20 bytes, and the character string of last 8 bytes is changed into the value V of the HEX form of 4 bytes;
Step 43, the T that obtains in the step 42 and the threshold value A of described 4 bytes are carried out XOR, obtain as a result W; The V that obtains in the step 42 and the threshold value C of described 4 bytes are carried out XOR, obtain as a result X;
The first byte and the second byte high 4 and extract the first byte and the second byte among the X low 4 among the W forms the Y value of 2 bytes in step 44, the extraction step 43;
Whether step 45, comparison U value and Y value equate, if equate, then continue step 46; If unequal, then forbid broadcasting advertisement content, and report the alignment verification of platform end picture file or video file to make mistakes that request re-issues this document;
Step 46, remove 20 bytes of end of file after, calculate length Z and the CRC32 check value AB of this document, this check value AB does the CRC32 computing and obtains for getting file header 1K byte and end 1K byte;
Whether Z equals W in step 47, the determining step 46, and whether AB equals X; The two is all equal, then, and broadcasting advertisement content; If one of them does not wait or the two is all unequal, then forbid broadcasting advertisement content, and report platform end picture file or video file bad checksum that request re-issues this document.
Here it is worth mentioning that:
1, platform end encrypted authentication html(or htm) file, txt text, playlist xml file,
The platform end is according to the file of uploading, determine whether html(or htm) file, txt text, playlist xml file, in the situation of these files, the file structure that final operation obtains is respectively such as table 1:html(or htm) file structure, table 2:txt text structure, table 3 playlist xml file structure:
Table 1
The html file 8 byte file length 4 byte-aligned test values 8 byte file verifications and
Table 2
The txt text 8 byte file length 4 byte-aligned test values 8 byte file verifications and
Table 3
Playlist xml file 8 byte file length 4 byte-aligned test values 8 byte file verifications and
Wherein: 8 byte file length namely are the ascii strings of 8 bytes, are character string B;
4 byte-aligned test values also are ascii strings, are character string E;
8 byte file verifications and also be ascii string are character string D.
2, platform end encrypted authentication picture file, video file
The platform end determines whether picture file, video file according to the file of uploading, and is in the situation of these files, and the file structure that final operation obtains is respectively such as table 4: picture file structure, table 5: video file structure.
Table 4
Picture file 8 byte file length 4 byte-aligned test values 8 byte CRC32 check values
Table 5
Video file 8 byte file length 4 byte-aligned test values 8 byte CRC32 check values
Wherein: 8 byte file length namely are the ascii strings of 8 bytes, are character string H;
The alignment test value of 4 bytes also is ascii string, is character string J;
8 byte CRC32 check values also are ascii strings, are character string I.
In a word, consider based on total system, especially for the relatively nervous embedded system of hardware resources, proposed a kind of novel encryption and verification algorithm.This algorithm is divided into the dual mode processing with the data of media bearer, and a kind of is full text to be carried out AES encrypt, and another kind is that the AES encryption is done at certain position in the extraction data.The effective combination of the two on the operational efficiency of the fail safe of data content and system, is found a metastable balance point, also is well positioned to meet Information Security that the current device merchant proposes and the requirement of uniqueness.And it has reduced the cost that uses encryption in the product largely, improves product market competitiveness, and shortens to a great extent the processing time of the network terminal, also can guarantee integrality and the uniqueness of material file.
The above only is preferred embodiment of the present invention, and all equalizations of doing according to the present patent application claim change and modify, and all should belong to covering scope of the present invention.

Claims (5)

1. the network terminal control method for playing back based on AES and material checking is characterized in that, comprises the steps:
Step 1, the employed html file of ad content, txt text and playlist xml file that the network terminal is play carry out the aes algorithm encryption by the platform end, the material that the ad content of network terminal broadcast is quoted is uploaded by the platform end, and appended the cryptographic check code at each material end;
Step 2, platform end be by issuing download command to the network terminal, and inform that the network terminal downloads the path at required ftp server place,
Step 3, the network terminal obtain after described path resolves, and start the FTP thread and download html file, txt text and the playlist xml file after aes algorithm is encrypted and carry out the end and append each material after the cryptographic check code is processed; The network terminal is decrypted html file, txt text and playlist xml file after encrypting, and each material of quoting in the ad content is verified when broadcasting advertisement content;
Step 4, when deciphering html file, txt text and playlist xml file, any file decryption is wrong or the checking material is wrong, then the network terminal will forbid playing this wrong file or wrong material; And reporting the platform end, corresponding wrong file or material are downloaded in request again.
2. a kind of network terminal control method for playing back based on the checking of AES and material according to claim 1, it is characterized in that: the described employed html file of ad content, txt text and the playlist xml file that the network terminal is play carries out aes algorithm by the platform end to be encrypted, and specifically comprises the steps:
Step 10, obtain the employed html file of ad content, txt text and playlist xml file at the platform end; These three files are operated by step 11 to step 18 one by one:
The length of step 11, calculation document obtains the file length value of the HEX form of 4 bytes, and inadequate 4 bytes of the length of file length value mend 0 in front; Surpass 4 bytes, remove the high byte that exceeds, keep the value of low 4 bytes;
The verification of step 12, calculation document and, obtain the checksum value of the HEX form of 4 bytes, checksum value is that all bytes with whole file obtain by accumulation calculating, inadequate 4 bytes of checksum value length mend 0 in front; Surpass 4 bytes, remove the high byte that exceeds, keep the value of low 4 bytes;
Step 13, obtain the alignment check value of file, obtain the alignment check value of the HEX form of 2 bytes, the alignment check value is by the first byte of checksum value and low 42 bytes that form of the second byte in high 4 and the step 12 of the first byte of step 11 File length value and the second byte;
Step 14, the threshold value A of the file length value in the step 11 and predefined 4 bytes of platform end is carried out XOR, operation result is changed into ASCII value B again, this B is the character string of 8 bytes;
Step 15, the threshold value C of the checksum value in the step 12 and predefined 4 bytes of platform end is carried out XOR, again operation result is changed into ASCII value D, this D is the character string of 8 bytes;
Step 16, the alignment check value in the step 13 is changed into ASCII value E, this E is the character string of 4 bytes;
Step 17, character string B, the D, the E that obtain in step 14, step 15, the step 16, form the character string F of 20 bytes with the BED order;
Step 18, the character string F in the step 17 is appended to the end of this document, and encrypts this document with aes algorithm.
3. a kind of network terminal control method for playing back based on the checking of AES and material according to claim 2, it is characterized in that: the material that the ad content of network terminal broadcast is quoted is uploaded by the platform end, and append the cryptographic check code at each material end, specifically comprise the steps:
Step 21, according to the material type that the platform end is uploaded, finding out needs material, i.e. picture file and video file; This picture file and video file are all operated by step 22 to step 29:
The length of step 22, calculation document; Obtain the file length value of the HEX form of 4 bytes, inadequate 4 bytes of the length of file length value mend 0 in front; Surpass 4 bytes, remove the high byte that exceeds, keep the value of low 4 bytes;
The CRC32 verification of step 23, calculation document; Obtain the check value of the HEX form of 2 bytes, this test value is to get this document front 1K byte to do the CRC32 verification with last 1K byte;
Step 24, obtain the alignment check value, obtain the alignment check value of the HEX form of 2 bytes; This alignment check value is by the first byte of CRC32 check value and low 42 bytes that form of the second byte in high 4 and the step 23 of the first byte of step 22 File length value and the second byte;
Step 25, the threshold value A of the file length value in the step 22 and described 4 bytes is carried out XOR, again operation result is changed into ASCII value H, this H is the character string of 8 bytes;
Step 26, the threshold value C of the check value in the step 23 and described 4 bytes is carried out XOR, again operation result is changed into ASCII value I, this I is the character string of 8 bytes;
Step 27, the alignment check value in the step 24 is changed into ASCII value J, this J is the character string of 4 bytes;
Step 28, character string H, the I, the J that obtain in step 25, step 26, the step 27, form the character string K of 20 bytes with the HJI order;
Step 29, the character string K in the step 28 is made aes algorithm encrypt, then be appended to the end of this document.
4. a kind of network terminal control method for playing back based on the checking of AES and material according to claim 2, it is characterized in that: the described network terminal is when broadcasting advertisement content, html file, txt text and playlist xml file after encrypting are decrypted, specifically comprise the steps:
Step 31, the network terminal obtain each file of download, and judge whether each file type of downloading is html file, txt text or playlist xml file; That each file that then will download operates according to step 32 to step 38 one by one, and is no, then do not operate;
Step 32, the file of downloading with aes algorithm deciphering;
Step 33, extraction this document end 20 bytes, and resolve into three parts, first is 8 bytes in front in 20 bytes, and this character string is changed into the value L of the HEX form of 4 bytes; Second portion is middle 4 bytes in 20 bytes, and the character string of middle 4 bytes is changed into the value M of the HEX form of 2 bytes; Third part is last 8 bytes in 20 bytes, and character string that will these last 8 bytes changes into the value N of the HEX form of 4 bytes;
Step 34, the L that obtains in the step 33 and the threshold value A of described 4 bytes are carried out XOR, obtain as a result O; The N that obtains in the step 33 and the threshold value C of described 4 bytes are carried out XOR, obtain as a result P;
The first byte and the second byte high 4 and extract the first byte and the second byte among the P low 4 among the O forms the Q value of 2 bytes in step 35, the extraction step 34;
Whether step 36, comparison M value and Q value equate, if equate, then continue step 37; If unequal, then forbid broadcasting advertisement content, and report the alignment verification of platform end file to make mistakes that request re-issues this document;
Step 37, remove 20 bytes of end of file after, calculate length R and verification and the S of this document;
Whether R equals O in step 38, the determining step 37, and whether S equals P; The two all equates, then continues the material checking, if one of them does not wait or the two is all unequal, then forbids broadcasting advertisement content, and reports the bad checksum of platform end file, asks to re-issue this document.
5. a kind of network terminal control method for playing back based on the checking of AES and material according to claim 2, it is characterized in that: each material of quoting in the ad content is verified, comprise the steps: that specifically step 41, the file relative path that provides according to play list file obtain material in this locality, i.e. picture file or video file;
The character string of step 42,20 bytes in extraction document end, and decipher first with aes algorithm, then resolve into three parts, first is 8 bytes in front in 20 bytes, and this character string is changed into the value T of the HEX form of 4 bytes; Second portion is middle 4 bytes in 20 bytes, and the character string of middle 4 bytes is changed into the value U of the HEX form of 2 bytes; Third part is last 8 bytes in 20 bytes, and the character string of last 8 bytes is changed into the value V of the HEX form of 4 bytes;
Step 43, the T that obtains in the step 42 and the threshold value A of described 4 bytes are carried out XOR, obtain as a result W; The V that obtains in the step 42 and the threshold value C of described 4 bytes are carried out XOR, obtain as a result X;
The first byte and the second byte high 4 and extract the first byte and the second byte among the X low 4 among the W forms the Y value of 2 bytes in step 44, the extraction step 43;
Whether step 45, comparison U value and Y value equate, if equate, then continue step 46; If unequal, then forbid broadcasting advertisement content, and report the alignment verification of platform end picture file or video file to make mistakes that request re-issues this document;
Step 46, remove 20 bytes of end of file after, calculate length Z and the CRC32 check value AB of this document, this check value AB does the CRC32 computing and obtains for getting file header 1K byte and end 1K byte;
Whether Z equals W in step 47, the determining step 46, and whether AB equals X; The two is all equal, then, and broadcasting advertisement content; If one of them does not wait or the two is all unequal, then forbid broadcasting advertisement content, and report platform end picture file or video file bad checksum that request re-issues this document.
CN201310003809.5A 2013-01-06 2013-01-06 A kind of network terminal control method for playing back verified based on AES and material Active CN103078861B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310003809.5A CN103078861B (en) 2013-01-06 2013-01-06 A kind of network terminal control method for playing back verified based on AES and material

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310003809.5A CN103078861B (en) 2013-01-06 2013-01-06 A kind of network terminal control method for playing back verified based on AES and material

Publications (2)

Publication Number Publication Date
CN103078861A true CN103078861A (en) 2013-05-01
CN103078861B CN103078861B (en) 2015-11-25

Family

ID=48155265

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310003809.5A Active CN103078861B (en) 2013-01-06 2013-01-06 A kind of network terminal control method for playing back verified based on AES and material

Country Status (1)

Country Link
CN (1) CN103078861B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108280356A (en) * 2018-01-17 2018-07-13 吉浦斯信息咨询(深圳)有限公司 File encryption-decryption method, device, processing terminal and computer readable storage medium
CN109474563A (en) * 2017-09-08 2019-03-15 阿里巴巴集团控股有限公司 Processing, providing method, client and the server of file stream
CN110730188A (en) * 2019-10-23 2020-01-24 深圳市中仁信息科技有限公司 Method for encrypting, storing and transmitting static pictures

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030065656A1 (en) * 2001-08-31 2003-04-03 Peerify Technology, Llc Data storage system and method by shredding and deshredding
CN101222624A (en) * 2007-12-07 2008-07-16 四川长虹电器股份有限公司 Multimedia data encryption method based on AVI format
CN101547184A (en) * 2008-03-24 2009-09-30 突触计算机系统(上海)有限公司 Method and device for authenticating data block transmitted in network
CN101615411A (en) * 2009-07-22 2009-12-30 福州星网视易信息系统有限公司 The playlist of networked information delivery system and the encryption method of media task
CN102469345A (en) * 2010-11-19 2012-05-23 康佳集团股份有限公司 Method for encrypting and decrypting multimedia-media data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030065656A1 (en) * 2001-08-31 2003-04-03 Peerify Technology, Llc Data storage system and method by shredding and deshredding
CN101222624A (en) * 2007-12-07 2008-07-16 四川长虹电器股份有限公司 Multimedia data encryption method based on AVI format
CN101547184A (en) * 2008-03-24 2009-09-30 突触计算机系统(上海)有限公司 Method and device for authenticating data block transmitted in network
CN101615411A (en) * 2009-07-22 2009-12-30 福州星网视易信息系统有限公司 The playlist of networked information delivery system and the encryption method of media task
CN102469345A (en) * 2010-11-19 2012-05-23 康佳集团股份有限公司 Method for encrypting and decrypting multimedia-media data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474563A (en) * 2017-09-08 2019-03-15 阿里巴巴集团控股有限公司 Processing, providing method, client and the server of file stream
CN108280356A (en) * 2018-01-17 2018-07-13 吉浦斯信息咨询(深圳)有限公司 File encryption-decryption method, device, processing terminal and computer readable storage medium
CN110730188A (en) * 2019-10-23 2020-01-24 深圳市中仁信息科技有限公司 Method for encrypting, storing and transmitting static pictures

Also Published As

Publication number Publication date
CN103078861B (en) 2015-11-25

Similar Documents

Publication Publication Date Title
US11366878B2 (en) Method and apparatus for delivering encoded content
CN103457718B (en) The part ciphertext of variable-length segmentation and fixing block encryption is used to upgrade
EP1953998B1 (en) Methods and Apparatuses for Providing and Using Content Allowing Integrity Verification
CN105706099B (en) Software renewing apparatus
JP2016515235A5 (en)
CN104732159B (en) A kind of document handling method and device
CN109391936A (en) A kind of method of OTA upgrade package encryption downloading
CN106506453B (en) Power big data transmission method and system based on quick matching and integrity detection
CN110210270B (en) Two-dimensional code information security reinforcement method and system and two-dimensional code image analysis method and system
CN106789075B (en) POS digital signature anti-cutting system
KR20120053398A (en) Validation system and verification method including signature device and verification device to verify contents
KR20150131239A (en) Advertising download verification
CN103475477A (en) Safe authorized access method
CN106557707A (en) A kind of method and system for processing document data
CN112332975A (en) Internet of things equipment secure communication method and system
CN109495459A (en) Media data encryption method, system, equipment and storage medium
CN111339201A (en) Evaluation method and system based on block chain
CN103078861B (en) A kind of network terminal control method for playing back verified based on AES and material
JP2016522435A5 (en)
CN105262752A (en) Data processing method and device of virtual key, mobile terminal and server
CN102316164A (en) Cloud storage user side equipment and data processing method thereof
CN108141615A (en) MPEG transports frame synchronization
US20090168994A1 (en) Method for providing stronger encryption using conventional ciphers
CN108173906A (en) Installation kit method for down loading, device, storage medium and electronic equipment
CN111476014A (en) Verification method and related device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: FUJIAN SANYUANDA SOFTWARE CO., LTD.

Free format text: FORMER OWNER: FUJIAN SUNNADA COMMUNICATION CO., LTD.

Effective date: 20150226

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20150226

Address after: Wufeng Street software Avenue Gulou District of Fuzhou city in Fujian province 350000 No. 89 Fuzhou software industrial park two 7 floor third floor

Applicant after: Fujian Sanyuanda Software Co., Ltd.

Address before: No. 7 building two Wufeng Street software Avenue Gulou District of Fuzhou city in Fujian province 350000 No. 89 Fuzhou Software Industrial Park

Applicant before: Fujian Sunnada Communication Co., Ltd.

C14 Grant of patent or utility model
GR01 Patent grant
C56 Change in the name or address of the patentee
CP03 Change of name, title or address

Address after: 350000, No. 16, building G, zone four, Fuzhou Software Park, 89 software Avenue, Gulou District, Fujian, Fuzhou

Patentee after: Hengonda Technology Co., Ltd.

Address before: Wufeng Street software Avenue Gulou District of Fuzhou city in Fujian province 350000 No. 89 Fuzhou software industrial park two 7 floor third floor

Patentee before: Fujian Sanyuanda Software Co., Ltd.