[go: up one dir, main page]

CN113518244B - Digital television signal data transmission method and device based on substitute text combination - Google Patents

Digital television signal data transmission method and device based on substitute text combination Download PDF

Info

Publication number
CN113518244B
CN113518244B CN202111077524.7A CN202111077524A CN113518244B CN 113518244 B CN113518244 B CN 113518244B CN 202111077524 A CN202111077524 A CN 202111077524A CN 113518244 B CN113518244 B CN 113518244B
Authority
CN
China
Prior art keywords
private key
digital television
television signal
ith
combination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111077524.7A
Other languages
Chinese (zh)
Other versions
CN113518244A (en
Inventor
李海东
廖佳秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Justek Technology Co ltd
Original Assignee
Shenzhen Justek Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Justek Technology Co ltd filed Critical Shenzhen Justek Technology Co ltd
Priority to CN202111077524.7A priority Critical patent/CN113518244B/en
Publication of CN113518244A publication Critical patent/CN113518244A/en
Application granted granted Critical
Publication of CN113518244B publication Critical patent/CN113518244B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Multimedia (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application discloses a digital television signal data sending method and device based on a substitute text combination, which are used for obtaining preset digital television signal data and calling a preset key pair; carrying out encryption processing to obtain encrypted data, and sending the encrypted data; if the signal receiving ends are all authorized terminals, acquiring n characteristic data sets; respectively carrying out Hash calculation to obtain n Hash values; carrying out coincident character segment discovery processing to obtain n coincident character segments respectively corresponding to the n hash values; the method comprises the steps of performing n batches of splitting processing on a private key to correspondingly obtain n private key section combinations; performing substitute text combination generation processing to generate n substitute text combinations corresponding to the n private key section combinations; and the ith splitting method, the ith substitute text combination and the ith truncation method are sent to the ith digital television signal receiving end, so that the safety and the information safety of the secret key are improved, and the fine control of the authority is realized.

Description

Digital television signal data transmission method and device based on substitute text combination
Technical Field
The present application relates to the field of digital television, and in particular, to a method and an apparatus for transmitting digital television signal data based on a substitute text combination.
Background
The digital television programs include pay programs, which can be viewed only after being authorized by a digital television signal transmitting terminal. This authorization for pay programs can be implemented as follows: and encrypting the television program to obtain a ciphertext, transmitting the ciphertext to the digital television signal receiving terminal, and if the payment is made, sending a secret key to the digital television signal receiving terminal, so that the digital television signal receiving terminal can decrypt and play the pay program. However, the key of the conventional scheme has the problems of key security and difficulty in fine control of the authority.
Disclosure of Invention
The application provides a digital television signal data transmission method based on substitute text combination, which is applied to a digital television signal transmitting end and comprises the following steps:
s1, acquiring preset digital television signal data and calling a preset key pair; wherein the key pair comprises a public key and a private key;
s2, encrypting the digital television signal data by adopting the public key to obtain encrypted data, sending the encrypted data to preset n digital television signal receiving ends, and judging whether the n digital television signal receiving ends are all authorized terminals; wherein n is an integer greater than 1;
s3, if the n digital television signal receiving ends are all authorization terminals, acquiring n characteristic data sets respectively corresponding to the n digital television signal receiving ends; each characteristic data set consists of an equipment code and authorized time, and different digital television signal receiving ends have different equipment codes;
s4, respectively performing hash calculation on the n characteristic data groups by adopting a preset hash algorithm to obtain n hash values;
s5, carrying out coincident character segment finding processing to find out coincident character segments between the hash values and the private key, thereby obtaining n coincident character segments corresponding to the n hash values respectively; wherein the first hash value corresponds to the first coincident character segment, the second hash value corresponds to the second coincident character segment, …, and the nth hash value corresponds to the nth coincident character segment;
s6, according to preset n splitting methods, n batches of splitting processing are carried out on the private key, so that n private key section combinations are correspondingly obtained; each private key section combination comprises m private key sections, the first private key section combination comprises a first coincident character segment, the second private key section combination comprises a second coincident character segment, …, and the nth private key section combination comprises an nth coincident character segment; m is an integer greater than 2;
s7, performing substitute text combination generation processing to generate n substitute text combinations corresponding to the n private key section combinations; wherein each combination of the substitutes comprises m-1 substitutes; after performing hash calculation and respectively performing truncation processing according to a preset ith truncation method on m-1 substitutional texts in the ith substitutional text combination, generating an ith private key section combination except the ith coincident character section, wherein i is an integer greater than or equal to 1 and less than or equal to n;
and S8, sending the ith splitting method, the ith alternative text combination and the ith truncation method to the ith digital television signal receiving terminal.
Further, the step S2 of encrypting the digital television signal data by using the public key to obtain encrypted data, sending the encrypted data to preset n digital television signal receiving terminals, and determining whether the n digital television signal receiving terminals are all authorized terminals includes:
s201, encrypting the digital television signal data by adopting the public key to obtain encrypted data;
s202, sending the encrypted data to a preset n digital television signal receiving end through a preset first network; the nodes in the first network comprise a digital television signal sending end and a digital television signal receiving end, and only the digital television signal sending end can send data;
s203, judging whether the n digital television signal receiving ends are all authorized terminals;
the step S8 of sending the ith splitting method, the ith alternative text combination, and the ith truncation method to the ith digital television signal receiving end includes:
s801, sending an ith splitting method, an ith substitute text combination and an ith truncation method to an ith digital television signal receiving end through a preset second network; the nodes in the second network comprise a digital television signal sending end and a digital television signal receiving end, and the digital television signal sending end and the digital television signal receiving end can perform bidirectional communication.
Further, the private key is a character string with a specified number of bits, and the length of the hash value output by the hash algorithm is equal to the specified number of bits.
Further, the step S5 of performing a coincident character segment finding process to find a coincident character segment between the hash value and the private key, so as to obtain n coincident character segments corresponding to the n hash values respectively includes:
s501, performing parity comparison processing to compare each bit of characters of the hash value with each bit of characters of the private key one by one to obtain the same characters;
s502, connecting adjacent same characters to obtain a plurality of same character sequences;
s503, selecting the longest identical character sequence from the plurality of identical character sequences;
s504, judging whether the number of bits of the longest identical character sequence is more than or equal to 10 and less than or equal to half of the number of the specified bits;
and S505, if the number of bits of the longest identical character sequence is more than or equal to 10 and less than or equal to half of the designated number of bits, marking the longest identical character sequence as an overlapping character segment.
Further, the step S7 of performing a substitute sentence combination generation process to generate n substitute sentence combinations corresponding to the n private key section combinations includes:
s701, generating m-1 trial texts by adopting a random method, and performing hash calculation on the m-1 trial texts respectively to obtain m-1 trial hash values;
s702, intercepting a first bit to a t bit character of a first trial hash value to obtain a first trial string, intercepting a first bit to a t bit character of a second trial hash value to obtain a second trial string, …, and intercepting a first bit to a t bit character of an m-1 trial hash value to obtain an m-1 trial string; wherein t is an integer greater than or equal to 10;
s703, recording the ith superposed character segment in the ith private key segment combination as the mth private key segment;
s704, judging whether the first trial character string is equal to a first private key section in the ith private key section combination or not, simultaneously judging whether the second trial character string is equal to a second private key section in the ith private key section combination or not, …, and simultaneously judging whether the m-1 th trial character string is equal to the m-1 th private key section in the ith private key section combination or not;
s705, if the first trial string is equal to the first private key section in the ith private key section combination, and the second trial string is equal to the second private key section in the ith private key section combination, …, and the m-1 trial string is equal to the m-1 private key section in the ith private key section combination, then marking the m-1 trial text as the ith substitute text combination corresponding to the ith private key section combination.
The application provides a digital television signal data transmitting device based on substitute text combination, is applied to digital television signal transmitting terminal, includes:
the key pair acquiring unit is used for acquiring preset digital television signal data and acquiring a preset key pair; wherein the key pair comprises a public key and a private key;
the encryption processing unit is used for encrypting the digital television signal data by adopting the public key to obtain encrypted data, sending the encrypted data to preset n digital television signal receiving ends and judging whether the n digital television signal receiving ends are all authorized terminals; wherein n is an integer greater than 1;
a feature data set obtaining unit, configured to obtain n feature data sets respectively corresponding to the n digital television signal receiving ends if the n digital television signal receiving ends are all authorized terminals; each characteristic data set consists of an equipment code and authorized time, and different digital television signal receiving ends have different equipment codes;
the hash calculation unit is used for performing hash calculation on the n characteristic data groups respectively by adopting a preset hash algorithm to obtain n hash values;
a coincident character segment finding unit configured to perform a coincident character segment finding process to find a coincident character segment between the hash value and the private key, thereby obtaining n coincident character segments corresponding to the n hash values, respectively; wherein the first hash value corresponds to the first coincident character segment, the second hash value corresponds to the second coincident character segment, …, and the nth hash value corresponds to the nth coincident character segment;
the batch splitting unit is used for carrying out n batches of splitting processing on the private key according to preset n splitting methods so as to correspondingly obtain n private key section combinations; each private key section combination comprises m private key sections, the first private key section combination comprises a first coincident character segment, the second private key section combination comprises a second coincident character segment, …, and the nth private key section combination comprises an nth coincident character segment; m is an integer greater than 2;
the substitute sentence combination generating unit is used for carrying out substitute sentence combination generating processing so as to generate n substitute sentence combinations corresponding to the n private key section combinations; wherein each combination of the substitutes comprises m-1 substitutes; after performing hash calculation and respectively performing truncation processing according to a preset ith truncation method on m-1 substitutional texts in the ith substitutional text combination, generating an ith private key section combination except the ith coincident character section, wherein i is an integer greater than or equal to 1 and less than or equal to n;
and the substitute text combination sending unit is used for sending the ith splitting method, the ith substitute text combination and the ith truncation method to the ith digital television signal receiving end.
The present application provides a computer device comprising a memory storing a computer program and a processor implementing the steps of any of the above methods when the processor executes the computer program.
The present application provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of any of the above.
The method, the device, the computer equipment and the storage medium for sending the digital television signal data based on the surrogate text combination acquire the preset digital television signal data and call the preset key pair; carrying out encryption processing to obtain encrypted data, and sending the encrypted data; if the signal receiving ends are all authorized terminals, acquiring n characteristic data sets; respectively carrying out Hash calculation to obtain n Hash values; carrying out coincident character segment discovery processing to obtain n coincident character segments respectively corresponding to the n hash values; n batches of splitting processing are carried out on the private key to correspondingly obtain n private key section combinations; performing substitute sentence combination generation processing to generate n substitute sentence combinations corresponding to the n private key section combinations; and the ith splitting method, the ith substitute text combination and the ith truncation method are sent to the ith digital television signal receiving end, so that the safety and the information safety of the secret key are improved, and the fine control of the authority is realized.
Specifically, only unified encryption is needed for digital television signal data, but different keys are obtained for different digital television signal receiving ends, so that the purpose of decrypting the same ciphertext by multiple keys and obtaining the same plaintext is achieved. Therefore, in the process, one digital television signal receiving end corresponds to a specific key, and other digital television signal receiving ends cannot use the key, so that the fine control of the authority is realized.
The key received by the digital television signal receiving end is actually the ith splitting method, the ith substitution combination and the ith truncation method, and is a key in another form as a whole, which is different from the public key and the private key adopted in the asymmetric encryption adopted in the scheme of the application at the beginning of implementation.
Drawings
Fig. 1 is a schematic flowchart of a digital television signal data transmission method based on a combination of alternatives according to an embodiment of the present application;
fig. 2 is a schematic block diagram illustrating a structure of a digital television signal data transmitting apparatus based on a combination of alternatives according to an embodiment of the present application;
fig. 3 is a block diagram illustrating a structure of a computer device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Referring to fig. 1, an embodiment of the present application provides a method for sending digital television signal data based on a substitute combination, which is applied to a digital television signal sending end, and includes:
s1, acquiring preset digital television signal data and calling a preset key pair; wherein the key pair comprises a public key and a private key;
s2, encrypting the digital television signal data by adopting the public key to obtain encrypted data, sending the encrypted data to preset n digital television signal receiving ends, and judging whether the n digital television signal receiving ends are all authorized terminals; wherein n is an integer greater than 1;
s3, if the n digital television signal receiving ends are all authorization terminals, acquiring n characteristic data sets respectively corresponding to the n digital television signal receiving ends; each characteristic data set consists of an equipment code and authorized time, and different digital television signal receiving ends have different equipment codes;
s4, respectively performing hash calculation on the n characteristic data groups by adopting a preset hash algorithm to obtain n hash values;
s5, carrying out coincident character segment finding processing to find out coincident character segments between the hash values and the private key, thereby obtaining n coincident character segments corresponding to the n hash values respectively; wherein the first hash value corresponds to the first coincident character segment, the second hash value corresponds to the second coincident character segment, …, and the nth hash value corresponds to the nth coincident character segment;
s6, according to preset n splitting methods, n batches of splitting processing are carried out on the private key, so that n private key section combinations are correspondingly obtained; each private key section combination comprises m private key sections, the first private key section combination comprises a first coincident character segment, the second private key section combination comprises a second coincident character segment, …, and the nth private key section combination comprises an nth coincident character segment; m is an integer greater than 2;
s7, performing substitute text combination generation processing to generate n substitute text combinations corresponding to the n private key section combinations; wherein each combination of the substitutes comprises m-1 substitutes; after performing hash calculation and respectively performing truncation processing according to a preset ith truncation method on m-1 substitutional texts in the ith substitutional text combination, generating an ith private key section combination except the ith coincident character section, wherein i is an integer greater than or equal to 1 and less than or equal to n;
and S8, sending the ith splitting method, the ith alternative text combination and the ith truncation method to the ith digital television signal receiving terminal.
The present application first illustrates the implementation of the specific embodiments by a single specific example:
suppose that the digital television signal data is X, the private key in the key pair is ABCDEF, and the characteristic data group corresponding to the first digital television signal receiving end is Y. And carrying out hash calculation on Y to obtain the result of abCdef, carrying out coincidence character segment discovery processing to discover a coincidence character segment C between the hash value and the private key, and then carrying out splitting processing on the private key to obtain private key sections A, B, C, D, E and F (of course, any other feasible splitting method can be adopted, but the coincidence character segment C must be split). Find a combination of five alternatives (here, the number of the alternatives is five, which is related to the number of the split private key sections, and in practical applications, for example, for a 256-bit private key, it can be implemented by splitting it into 26 private key sections, each private key section is about 10 bits, and the corresponding number of the alternatives will be 25).
The alternative stationery in the combination of these alternative texts has the following characteristics: m-1 substitutional texts in the ith substitutional text combination are subjected to hash calculation and are respectively subjected to truncation processing according to a preset ith truncation method, and then the ith private key section combination except the ith coincident character section can be generated. For example, the first alternative is "ha", which uses 1011011011 for the first ten bits of the hash calculation of SHA256 and 1011011011 for the exact private key section a, then "ha" may be the first alternative, with the corresponding truncation being to truncate the first ten bits to correspond to the first private key section. Similarly, the remaining four surrogates can be found.
It should be noted that finding the substitute text at this time needs to be implemented by trial and error calculation, which requires a certain amount of calculation power and time, but actually requires little calculation power and time, and is negligible. Specifically, the method comprises the following steps:
taking SHA 256's hash algorithm as an example, assuming that the private key is 256 bits, it is broken into 26 private key sections (split in an approximately equally-divided manner, each private key section is approximately 10 bits), wherein one private key section is a coincident character segment, 25 private key sections are left, and therefore 25 alternatives need to be found, and finding one alternative requires about 2 times to the power of 10 hash calculations, which is about 1024 times, and about 1024 times to 25 alternatives, which is about 25600 times. This is the number of trial and error calculations required on the premise that there is one authorized terminal, and assuming that there are 1 hundred million authorized terminals, the total number is 25600 hundred million. The time for performing the hash calculation, for example, the mining machine of the block chain, can simply perform the hash calculation of thirteen times of 1.4 times 10 per second, which is about 14 trillion times per second, so that the time and the calculation power consumed when the application performs the trial calculation to find the matching combination of the substitute texts are negligible.
When the calculation is attempted, the output cannot be directionally changed by controlling the input although the input and the output of the hash calculation have unique correlation characteristics, and therefore, the output is uncertain for a certain input which is not subjected to the hash calculation. Therefore, if two different inputs are prepared randomly for two times of trial hash calculation to obtain a substitute text with the first bit of the hash value being 1, the probability that the first bit of the hash value is 1 is 0.75; with an arbitrary input, the first 10 bits of the hash value are substituted for the predetermined string with a probability of 10 times of 0.5, and generally about 1024 hash calculations of 10 times of 2 are required to ensure that the specific hash value is calculated, which is also the source of the aforementioned data.
Thus, in the example above, where the private key is ABCDEF, a combination of alternatives is found, the first ten digits of the hash value of the first alternative being equal to private key section a, the tenth through twentieth digits of the hash value of the second alternative being equal to private key section B, and so on. The private key at this point is effectively a 60-bit binary string. For a common 256-bit private key, the number of the substitutes is only increased to 25.
After the substitute text combination is found out, the first splitting method, the first substitute text combination and the first truncation method are sent to the first digital television signal receiving end, and then the first digital television signal receiving end can obtain a correct private key according to the information and decrypt the encrypted data to obtain digital television signal data. However, even if the information is intercepted, other receiving terminals, including unauthorized receiving terminals, cannot generate the correct private key, one reason for this is that other receiving terminals cannot know the feature data set formed by one device code and the authorization time. In addition, the first truncation method and the ith truncation method are just a naming method, and for the same substitute combination, the truncation methods of different substitutes may also be different, for example, the first ten bits of the hash value of the first substitute are truncated as the first private key section (this is the first truncation method corresponding to the first substitute); intercepting the first ten bits of the hash value of the second surrogate as the second private key section (this is the first interception method corresponding to the second surrogate, and the interception method at this time is the same as the interception method of the first surrogate); alternatively, the tenth bit to the twentieth bit of the hash value of the second substitute document may be truncated as the second private key section (this is another first truncation method corresponding to the second substitute document, and the truncation method in this case is different from the truncation method of the first substitute document).
For the second digital television signal receiver and other digital television signal receivers, the data transmission process is the same as that of the first digital television signal receiver, but since the overlapping character segments are different (which is almost inevitable because the characteristic data sets are inevitably different), the combination of the alternative texts is almost inevitable. Therefore, the same ciphertext can be decrypted by adopting different keys, which is beneficial to the authority control of the authorized terminal. This is the reason why the present application needs to describe multiple terminals simultaneously, so the characteristics of the present application need to be embodied only for more than two digital television signal receiving terminals, and the present application also needs to be implemented.
The process of generating the correct private key by the digital television according to the acquired information is actually to perform hash calculation on all the substitute texts in the substitute text combination to obtain a plurality of hash values, perform truncation (which is implemented according to the received ith truncation method) to obtain a plurality of character strings, combine the plurality of character strings to obtain the missing private key (due to the fact that truncation and the corresponding mode are determined, only a vacancy of a specified position is necessarily left after the plurality of character strings are combined), acquire the own device code and authorization time, perform hash calculation to obtain a characteristic hash value, compare the characteristic hash value with the missing private key (for example, the number of bits of the hash value adopted in the present application is the same as the number of bits of the private key, for example, the SHA256 algorithm and the 256 private key are adopted), and then find out the character segment corresponding to the missing position (this is actually an overlapped character segment), and filling the character segment into the vacancy of the vacant private key to obtain the correct private key.
Through the explanation, the method and the device can improve certain data security, but more importantly, can realize fine control of the terminal authority.
Obtaining preset digital television signal data and calling a preset key pair in the steps S1-S4; wherein the key pair comprises a public key and a private key; encrypting the digital television signal data by adopting the public key to obtain encrypted data, sending the encrypted data to preset n digital television signal receiving ends, and judging whether the n digital television signal receiving ends are all authorized terminals; wherein n is an integer greater than 1; if the n digital television signal receiving ends are all authorization terminals, acquiring n characteristic data sets respectively corresponding to the n digital television signal receiving ends; each characteristic data set consists of an equipment code and authorized time, and different digital television signal receiving ends have different equipment codes; and respectively carrying out hash calculation on the n characteristic data groups by adopting a preset hash algorithm so as to obtain n hash values.
The present application is directed to digital television signal data, and thus digital signals, presented as binary data. In addition, the asymmetric encryption technology is adopted, and a key pair comprising a public key and a private key is required, wherein the public key is used for encryption, and the private key is used for decryption.
Furthermore, the usage of the asymmetric encryption technology of the present application is different from that of the general asymmetric encryption technology. The common asymmetric encryption technology is that the opposite side generally holds a private key, the own side encrypts a plaintext by using the public key, and then sends a ciphertext to the opposite side, and the opposite side can decrypt the plaintext by using the held private key. In the application, the public key and the private key are both stored in the own party, the own party encrypts the plaintext by adopting the public key, but the other party still does not have the private key, so that the private key needs to be transmitted to the other party. The digital television signal data encryption method aims at a plurality of opposite sides, a plurality of digital television signal receiving ends exist, and once the only private key is directly transmitted, the meaning of digital television signal data encryption does not exist once the private key is leaked in the transmission process. Therefore, the present application adopts a special scheme, such that the encrypted data transmitted to each digital television signal receiving end is the same, but the keys transmitted to each digital television signal receiving end are different, but the keys can be used for decrypting the encrypted data, which is a feature of the present application. The specific implementation process has been described above, and is not described herein.
The asymmetric encryption technique employed may be any feasible technique, and the private key employed may be any number of bits of private key, such as 256 bits of private key, 1024 bits of private key, and preferably 256 bits of private key.
In the television data transmission network, a unidirectional transmission network exists, which is a traditional television data transmission mode, and the application can adopt the transmission network to transmit the encrypted data. Since such a transmission network has the characteristic of indiscriminate broadcasting, that is, any terminal in the network can receive the transmitted data unconditionally, it is difficult to define that some authorized terminals can receive the encrypted data and some other unauthorized terminals cannot receive the encrypted data from the encrypted data. Therefore, no matter what kind of terminal, it can unconditionally obtain the encrypted data, but an unauthorized terminal will not obtain the key transmitted by the digital television signal transmitting end and therefore cannot decrypt. Correspondingly, the key transmitted to the authorized terminal may be transmitted via another network, for example, a bidirectional transmission network. Therefore, the encrypted data can be transmitted first, and the corresponding key can be transmitted after confirming which terminals are authorized terminals.
Further, the step S2 of encrypting the digital television signal data by using the public key to obtain encrypted data, sending the encrypted data to preset n digital television signal receiving terminals, and determining whether the n digital television signal receiving terminals are all authorized terminals includes:
s201, encrypting the digital television signal data by adopting the public key to obtain encrypted data;
s202, sending the encrypted data to a preset n digital television signal receiving end through a preset first network; the nodes in the first network comprise a digital television signal sending end and a digital television signal receiving end, and only the digital television signal sending end can send data;
s203, judging whether the n digital television signal receiving ends are all authorized terminals;
the step S8 of sending the ith splitting method, the ith alternative text combination, and the ith truncation method to the ith digital television signal receiving end includes:
s801, sending an ith splitting method, an ith substitute text combination and an ith truncation method to an ith digital television signal receiving end through a preset second network; the nodes in the second network comprise a digital television signal sending end and a digital television signal receiving end, and the digital television signal sending end and the digital television signal receiving end can perform bidirectional communication.
Therefore, the encrypted data is transmitted in the first network of unidirectional transmission, and the corresponding keys, namely the ith splitting method, the ith alternative text combination and the ith truncation method (note that the ith superposition character section is not transmitted through the second network, because the ith digital television signal receiving end can calculate the ith superposition character section, and the ith superposition character section is not transmitted through the second network, the data security is ensured), are transmitted through the second network of bidirectional communication, so that the overall data security is improved, and the fine control of the authority is facilitated.
Further, the private key is a character string with a specified number of bits, and the length of the hash value output by the hash algorithm is equal to the specified number of bits. Preferably, the specified number of bits is 256 bits, and the hash value output by the hash algorithm is also 256 bits.
Performing a coincident character segment finding process to find a coincident character segment between the hash value and the private key, thereby obtaining n coincident character segments corresponding to the n hash values, respectively, as described in the above steps S5-S8; wherein the first hash value corresponds to the first coincident character segment, the second hash value corresponds to the second coincident character segment, …, and the nth hash value corresponds to the nth coincident character segment; according to preset n splitting methods, n batches of the private keys are split to correspondingly obtain n private key section combinations; each private key section combination comprises m private key sections, the first private key section combination comprises a first coincident character segment, the second private key section combination comprises a second coincident character segment, …, and the nth private key section combination comprises an nth coincident character segment; m is an integer greater than 2; performing substitute sentence combination generation processing to generate n substitute sentence combinations corresponding to the n private key section combinations; wherein each combination of the substitutes comprises m-1 substitutes; after performing hash calculation and respectively performing truncation processing according to a preset ith truncation method on m-1 substitutional texts in the ith substitutional text combination, generating an ith private key section combination except the ith coincident character section, wherein i is an integer greater than or equal to 1 and less than or equal to n; and sending the ith splitting method, the ith substitute text combination and the ith truncation method to the ith digital television signal receiving end.
The process of finding the overlapped character segments refers to finding out the same characters between the hash value and the private key, and different digital television signal receiving ends can calculate the same characters by themselves because the hash value is obtained by carrying out hash calculation on the characteristic data set. The method and the device have the advantages that the overlapped character segments are found, so that the private key can be split, and the character segments outside the overlapped character segments are presented in a private key section mode and are respectively hidden in a plurality of alternative texts.
For example, for a hash value, assuming that the 31 st bit character to 43 th bit character of the hash value are 12 bit characters, which are identical to the 31 st bit character to 43 th bit character of the private key, the 12 bit characters constitute a coincident character field. Since the n hash values are different from each other, the n coincident character segments are also generally different, and the character lengths of the n coincident character segments may also be different.
And then the private key is split. The splitting of the private key has the requirement that the coincident character segments have to be split, for example, when the first splitting process is performed, the 256-bit private key (assuming that the private key is 256 bits) is split into 26 segments, one of which has to be identical to the first coincident character segment. When splitting, m private key sections need to be split, but the character length of each private key section may not be equal.
Further, the step S5 of performing a coincident character segment finding process to find a coincident character segment between the hash value and the private key, so as to obtain n coincident character segments corresponding to the n hash values respectively includes:
s501, performing parity comparison processing to compare each bit of characters of the hash value with each bit of characters of the private key one by one to obtain the same characters;
s502, connecting adjacent same characters to obtain a plurality of same character sequences;
s503, selecting the longest identical character sequence from the plurality of identical character sequences;
s504, judging whether the number of bits of the longest identical character sequence is more than or equal to 10 and less than or equal to half of the number of the specified bits;
and S505, if the number of bits of the longest identical character sequence is more than or equal to 10 and less than or equal to half of the designated number of bits, marking the longest identical character sequence as an overlapping character segment.
Resulting in the longest coincident character segment to relieve computational stress in other steps. However, overlapping character segments or being too long may reduce data security and may be brute-force cracked. Therefore, the coincident character segment should not be too long, but not too short, and is embodied in a specific execution process, that is, it is determined whether the number of bits of the longest identical character sequence is greater than or equal to 10 and less than or equal to half of the designated number of bits, and if the number of bits of the longest identical character sequence is greater than or equal to 10 and less than or equal to half of the designated number of bits, the coincident character segment is considered to be more appropriate.
Then, carrying out substitute text combination generation processing to generate n substitute text combinations corresponding to the n private key section combinations; wherein each combination of the substitutes comprises m-1 substitutes; m-1 substitutional texts in the ith substitutional text combination are subjected to hash calculation and are respectively subjected to truncation processing according to a preset ith truncation method, the ith private key section combination except the ith coincident character section can be generated, and i is an integer greater than or equal to 1 and less than or equal to n. The surrogates can be presented in any form, even just one character 0, since the hash algorithm has no restrictions on the input. The method for generating the substitute text can adopt a random generation mode, but the private key section combination except the overlapped character sections can be generated according to the substitute text combination, which also means that a hash result obtained after hash calculation is carried out on one substitute text must include the corresponding private key section.
Further, the step S7 of performing a substitute sentence combination generation process to generate n substitute sentence combinations corresponding to the n private key section combinations includes:
s701, generating m-1 trial texts by adopting a random method, and performing hash calculation on the m-1 trial texts respectively to obtain m-1 trial hash values;
s702, intercepting a first bit to a t bit character of a first trial hash value to obtain a first trial string, intercepting a first bit to a t bit character of a second trial hash value to obtain a second trial string, …, and intercepting a first bit to a t bit character of an m-1 trial hash value to obtain an m-1 trial string; wherein t is an integer greater than or equal to 10;
s703, recording the ith superposed character segment in the ith private key segment combination as the mth private key segment;
s704, judging whether the first trial character string is equal to a first private key section in the ith private key section combination or not, simultaneously judging whether the second trial character string is equal to a second private key section in the ith private key section combination or not, …, and simultaneously judging whether the m-1 th trial character string is equal to the m-1 th private key section in the ith private key section combination or not;
s705, if the first trial string is equal to the first private key section in the ith private key section combination, and the second trial string is equal to the second private key section in the ith private key section combination, …, and the m-1 trial string is equal to the m-1 private key section in the ith private key section combination, then marking the m-1 trial text as the ith substitute text combination corresponding to the ith private key section combination.
Thereby realizing the generation of the combination of the substitutional texts. Although the generation of the ith combination of alternatives is described above, i can be one to n, and thus any combination of alternatives can be generated through the above steps. Therefore, the combination of alternatives can be generated by a random method, but the judgment of the steps is needed if the combination is in accordance with the requirement. If some trial texts can not meet the requirements, new trial texts need to be generated again to replace the trial texts which can not meet the requirements until m-1 trial texts meet the requirements, which indicates that a complete ith combination of substitute texts is generated.
And finally, sending the ith splitting method, the ith alternative text combination and the ith truncation method to the ith digital television signal receiving end. The ith digital television signal receiving terminal sends the key to the ith digital television signal receiving terminal by the received key (i.e. the ith splitting method, the ith alternative text combination and the ith truncation method), finds out the private key, i.e. hash calculation is carried out on all the alternative texts in the alternative text combination to obtain a plurality of hash values, truncation is carried out (which is realized according to the received ith truncation method) to obtain a plurality of character strings, the plurality of character strings are combined to obtain the missing private key (as the truncation and the corresponding mode are determined, only the vacancy of a specified position is necessarily left after the plurality of character strings are combined), then obtains the own equipment code and authorization time, carries out hash calculation to obtain the characteristic hash value, compares the characteristic hash value with the missing private key (for example, the number of bits of the hash value adopted by the application is the same as that of the private key, for example, using SHA256 algorithm and 256-bit private key), a character segment corresponding to the vacant position (which is actually a coincident character segment) can be found out, and the character segment is filled into the vacant position of the vacant private key, so as to obtain the correct private key.
The digital television signal data transmission method based on the surrogate text combination obtains preset digital television signal data and calls a preset key pair; carrying out encryption processing to obtain encrypted data, and sending the encrypted data; if the signal receiving ends are all authorized terminals, acquiring n characteristic data sets; respectively carrying out Hash calculation to obtain n Hash values; carrying out coincident character segment discovery processing to obtain n coincident character segments respectively corresponding to the n hash values; n batches of splitting processing are carried out on the private key to correspondingly obtain n private key section combinations; performing substitute sentence combination generation processing to generate n substitute sentence combinations corresponding to the n private key section combinations; and the ith splitting method, the ith substitute text combination and the ith truncation method are sent to the ith digital television signal receiving end, so that the safety and the information safety of the secret key are improved, and the fine control of the authority is realized.
Referring to fig. 2, an embodiment of the present application provides a digital television signal data transmitting apparatus based on a substitute combination, which is applied to a digital television signal transmitting end, and includes:
a key pair retrieving unit 10, configured to obtain preset digital television signal data, and retrieve a preset key pair; wherein the key pair comprises a public key and a private key;
the encryption processing unit 20 is configured to encrypt the digital television signal data by using the public key to obtain encrypted data, send the encrypted data to preset n digital television signal receiving ends, and determine whether the n digital television signal receiving ends are all authorized terminals; wherein n is an integer greater than 1;
a feature data set obtaining unit 30, configured to obtain n feature data sets respectively corresponding to the n digital television signal receiving ends if the n digital television signal receiving ends are all authorized terminals; each characteristic data set consists of an equipment code and authorized time, and different digital television signal receiving ends have different equipment codes;
the hash calculation unit 40 is configured to perform hash calculation on the n feature data sets respectively by using a preset hash algorithm to obtain n hash values;
a coincident character segment finding unit 50 configured to perform a coincident character segment finding process to find a coincident character segment between the hash value and the private key, thereby obtaining n coincident character segments corresponding to the n hash values, respectively; wherein the first hash value corresponds to the first coincident character segment, the second hash value corresponds to the second coincident character segment, …, and the nth hash value corresponds to the nth coincident character segment;
the batch splitting unit 60 is configured to perform n batch splitting processes on the private key according to n preset splitting methods to obtain n private key section combinations correspondingly; each private key section combination comprises m private key sections, the first private key section combination comprises a first coincident character segment, the second private key section combination comprises a second coincident character segment, …, and the nth private key section combination comprises an nth coincident character segment; m is an integer greater than 2;
a substitute sentence combination generating unit 70 for performing substitute sentence combination generation processing to generate n substitute sentence combinations corresponding to the n private key section combinations; wherein each combination of the substitutes comprises m-1 substitutes; after performing hash calculation and respectively performing truncation processing according to a preset ith truncation method on m-1 substitutional texts in the ith substitutional text combination, generating an ith private key section combination except the ith coincident character section, wherein i is an integer greater than or equal to 1 and less than or equal to n;
and the substitute text combination sending unit 80 is configured to send the ith splitting method, the ith substitute text combination and the ith truncation method to the ith digital television signal receiving end.
The operations performed by the units are respectively corresponding to the steps of the method for sending digital television signal data based on the combination of substitute texts in the foregoing embodiment one by one, and are not described herein again.
The digital television signal data transmitting device based on the substitute combination obtains preset digital television signal data and calls a preset key pair; carrying out encryption processing to obtain encrypted data, and sending the encrypted data; if the signal receiving ends are all authorized terminals, acquiring n characteristic data sets; respectively carrying out Hash calculation to obtain n Hash values; carrying out coincident character segment discovery processing to obtain n coincident character segments respectively corresponding to the n hash values; n batches of splitting processing are carried out on the private key to correspondingly obtain n private key section combinations; performing substitute sentence combination generation processing to generate n substitute sentence combinations corresponding to the n private key section combinations; and the ith splitting method, the ith substitute text combination and the ith truncation method are sent to the ith digital television signal receiving end, so that the safety and the information safety of the secret key are improved, and the fine control of the authority is realized.
Referring to fig. 3, an embodiment of the present invention further provides a computer device, where the computer device may be a server, and an internal structure of the computer device may be as shown in the figure. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium. The database of the computer device is used for storing data used by the digital television signal data transmission method based on the combination of the substitute texts. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method for transmitting digital television signal data based on a combination of surrogates.
The processor executes the above digital television signal data transmission method based on the combination of the substitute texts, wherein the steps included in the method correspond to the steps of executing the digital television signal data transmission method based on the combination of the substitute texts of the foregoing embodiment one to one, and are not described herein again.
It will be understood by those skilled in the art that the structures shown in the drawings are only block diagrams of some of the structures associated with the embodiments of the present application and do not constitute a limitation on the computer apparatus to which the embodiments of the present application may be applied.
The computer equipment acquires preset digital television signal data and calls a preset key pair; carrying out encryption processing to obtain encrypted data, and sending the encrypted data; if the signal receiving ends are all authorized terminals, acquiring n characteristic data sets; respectively carrying out Hash calculation to obtain n Hash values; carrying out coincident character segment discovery processing to obtain n coincident character segments respectively corresponding to the n hash values; n batches of splitting processing are carried out on the private key to correspondingly obtain n private key section combinations; performing substitute sentence combination generation processing to generate n substitute sentence combinations corresponding to the n private key section combinations; and the ith splitting method, the ith substitute text combination and the ith truncation method are sent to the ith digital television signal receiving end, so that the safety and the information safety of the secret key are improved, and the fine control of the authority is realized.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored thereon, and when the computer program is executed by a processor, the method for transmitting digital television signal data based on a substitute text combination is implemented, where steps included in the method are respectively in one-to-one correspondence with steps of the method for transmitting digital television signal data based on a substitute text combination in the foregoing embodiment, and are not described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (8)

1. A method for transmitting digital television signal data based on substitute text combination is characterized in that the method is applied to a digital television signal transmitting end and comprises the following steps:
s1, acquiring preset digital television signal data and calling a preset key pair; wherein the key pair comprises a public key and a private key;
s2, encrypting the digital television signal data by adopting the public key to obtain encrypted data, sending the encrypted data to preset n digital television signal receiving ends, and judging whether the n digital television signal receiving ends are all authorized terminals; wherein n is an integer greater than 1;
s3, if the n digital television signal receiving ends are all authorization terminals, acquiring n characteristic data sets respectively corresponding to the n digital television signal receiving ends; each characteristic data set consists of an equipment code and authorized time, and different digital television signal receiving ends have different equipment codes;
s4, respectively performing hash calculation on the n characteristic data groups by adopting a preset hash algorithm to obtain n hash values;
s5, carrying out coincident character segment finding processing to find out coincident character segments between the hash values and the private key, thereby obtaining n coincident character segments corresponding to the n hash values respectively; wherein the first hash value corresponds to the first coincident character segment, the second hash value corresponds to the second coincident character segment, …, and the nth hash value corresponds to the nth coincident character segment;
s6, according to preset n splitting methods, n batches of splitting processing are carried out on the private key, so that n private key section combinations are correspondingly obtained; each private key section combination comprises m private key sections, the first private key section combination comprises a first coincident character segment, the second private key section combination comprises a second coincident character segment, …, and the nth private key section combination comprises an nth coincident character segment; m is an integer greater than 2;
s7, performing substitute text combination generation processing to generate n substitute text combinations corresponding to the n private key section combinations; wherein each combination of the substitutes comprises m-1 substitutes; after performing hash calculation and respectively performing truncation processing according to a preset ith truncation method on m-1 substitutional texts in the ith substitutional text combination, generating an ith private key section combination except the ith coincident character section, wherein i is an integer greater than or equal to 1 and less than or equal to n;
and S8, sending the ith splitting method, the ith alternative text combination and the ith truncation method to the ith digital television signal receiving terminal.
2. The method for sending digital television signal data based on combination of surrogates according to claim 1, wherein the step S2 of encrypting the digital television signal data by using the public key to obtain encrypted data, sending the encrypted data to preset n digital television signal receiving terminals, and determining whether the n digital television signal receiving terminals are all authorized terminals includes:
s201, encrypting the digital television signal data by adopting the public key to obtain encrypted data;
s202, sending the encrypted data to a preset n digital television signal receiving end through a preset first network; the nodes in the first network comprise a digital television signal sending end and a digital television signal receiving end, and only the digital television signal sending end can send data;
s203, judging whether the n digital television signal receiving ends are all authorized terminals;
the step S8 of sending the ith splitting method, the ith alternative text combination, and the ith truncation method to the ith digital television signal receiving end includes:
s801, sending an ith splitting method, an ith substitute text combination and an ith truncation method to an ith digital television signal receiving end through a preset second network; the nodes in the second network comprise a digital television signal sending end and a digital television signal receiving end, and the digital television signal sending end and the digital television signal receiving end can perform bidirectional communication.
3. The method according to claim 1, wherein the private key is a string with a specified number of bits, and the hash algorithm outputs a hash value with a length equal to the specified number of bits.
4. The method for transmitting combination-of-alternatives-based digital television signal data according to claim 3, wherein the step S5 of performing a coincidence character segment finding process to find a coincidence character segment between a hash value and the private key, thereby obtaining n coincidence character segments corresponding to the n hash values respectively comprises:
s501, performing parity comparison processing to compare each bit of characters of the hash value with each bit of characters of the private key one by one to obtain the same characters;
s502, connecting adjacent same characters to obtain a plurality of same character sequences;
s503, selecting the longest identical character sequence from the plurality of identical character sequences;
s504, judging whether the number of bits of the longest identical character sequence is more than or equal to 10 and less than or equal to half of the number of the specified bits;
and S505, if the number of bits of the longest identical character sequence is more than or equal to 10 and less than or equal to half of the designated number of bits, marking the longest identical character sequence as an overlapping character segment.
5. The method for transmitting digital television signal data according to claim 1, wherein the step S7 of performing a combination of alternatives generation process to generate n combinations of alternatives corresponding to the n combinations of private key sections comprises:
s701, generating m-1 trial texts by adopting a random method, and performing hash calculation on the m-1 trial texts respectively to obtain m-1 trial hash values;
s702, intercepting a first bit to a t bit character of a first trial hash value to obtain a first trial string, intercepting a first bit to a t bit character of a second trial hash value to obtain a second trial string, …, and intercepting a first bit to a t bit character of an m-1 trial hash value to obtain an m-1 trial string; wherein t is an integer greater than or equal to 10;
s703, recording the ith superposed character segment in the ith private key segment combination as the mth private key segment;
s704, judging whether the first trial character string is equal to a first private key section in the ith private key section combination or not, simultaneously judging whether the second trial character string is equal to a second private key section in the ith private key section combination or not, …, and simultaneously judging whether the m-1 th trial character string is equal to the m-1 th private key section in the ith private key section combination or not;
s705, if the first trial string is equal to the first private key section in the ith private key section combination, and the second trial string is equal to the second private key section in the ith private key section combination, …, and the m-1 trial string is equal to the m-1 private key section in the ith private key section combination, then marking the m-1 trial text as the ith substitute text combination corresponding to the ith private key section combination.
6. A digital television signal data transmitting device based on combination of substitute texts is applied to a digital television signal transmitting end and comprises:
the key pair acquiring unit is used for acquiring preset digital television signal data and acquiring a preset key pair; wherein the key pair comprises a public key and a private key;
the encryption processing unit is used for encrypting the digital television signal data by adopting the public key to obtain encrypted data, sending the encrypted data to preset n digital television signal receiving ends and judging whether the n digital television signal receiving ends are all authorized terminals; wherein n is an integer greater than 1;
a feature data set obtaining unit, configured to obtain n feature data sets respectively corresponding to the n digital television signal receiving ends if the n digital television signal receiving ends are all authorized terminals; each characteristic data set consists of an equipment code and authorized time, and different digital television signal receiving ends have different equipment codes;
the hash calculation unit is used for performing hash calculation on the n characteristic data groups respectively by adopting a preset hash algorithm to obtain n hash values;
a coincident character segment finding unit configured to perform a coincident character segment finding process to find a coincident character segment between the hash value and the private key, thereby obtaining n coincident character segments corresponding to the n hash values, respectively; wherein the first hash value corresponds to the first coincident character segment, the second hash value corresponds to the second coincident character segment, …, and the nth hash value corresponds to the nth coincident character segment;
the batch splitting unit is used for carrying out n batches of splitting processing on the private key according to preset n splitting methods so as to correspondingly obtain n private key section combinations; each private key section combination comprises m private key sections, the first private key section combination comprises a first coincident character segment, the second private key section combination comprises a second coincident character segment, …, and the nth private key section combination comprises an nth coincident character segment; m is an integer greater than 2;
the substitute sentence combination generating unit is used for carrying out substitute sentence combination generating processing so as to generate n substitute sentence combinations corresponding to the n private key section combinations; wherein each combination of the substitutes comprises m-1 substitutes; after performing hash calculation and respectively performing truncation processing according to a preset ith truncation method on m-1 substitutional texts in the ith substitutional text combination, generating an ith private key section combination except the ith coincident character section, wherein i is an integer greater than or equal to 1 and less than or equal to n;
and the substitute text combination sending unit is used for sending the ith splitting method, the ith substitute text combination and the ith truncation method to the ith digital television signal receiving end.
7. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 5 when executing the computer program.
8. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
CN202111077524.7A 2021-09-15 2021-09-15 Digital television signal data transmission method and device based on substitute text combination Active CN113518244B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111077524.7A CN113518244B (en) 2021-09-15 2021-09-15 Digital television signal data transmission method and device based on substitute text combination

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111077524.7A CN113518244B (en) 2021-09-15 2021-09-15 Digital television signal data transmission method and device based on substitute text combination

Publications (2)

Publication Number Publication Date
CN113518244A CN113518244A (en) 2021-10-19
CN113518244B true CN113518244B (en) 2021-11-12

Family

ID=78063388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111077524.7A Active CN113518244B (en) 2021-09-15 2021-09-15 Digital television signal data transmission method and device based on substitute text combination

Country Status (1)

Country Link
CN (1) CN113518244B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113742760A (en) * 2021-11-04 2021-12-03 武汉泰乐奇信息科技有限公司 Big data calling method and device for preventing data increase

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009144111A1 (en) * 2008-05-30 2009-12-03 Viaccess Methods and burst-transmitters of a piece of encrypted multimedia content, and storage medium for said methods
CN103037246A (en) * 2011-10-10 2013-04-10 华为技术有限公司 Encryption content distribution method and conditional access device and system
CN104683824A (en) * 2013-11-29 2015-06-03 航天信息股份有限公司 Encryption transmission method and system of flv format video file
CN111416710A (en) * 2020-03-24 2020-07-14 国网山东省电力公司 Certificateless searchable encryption method and system applied to multiple receiving ends

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4434969B2 (en) * 2004-01-21 2010-03-17 株式会社東芝 Content providing side system, user side system, tracking system, apparatus, method and program
US11012722B2 (en) * 2018-02-22 2021-05-18 Secure Cloud Systems, Inc. System and method for securely transferring data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009144111A1 (en) * 2008-05-30 2009-12-03 Viaccess Methods and burst-transmitters of a piece of encrypted multimedia content, and storage medium for said methods
CN103037246A (en) * 2011-10-10 2013-04-10 华为技术有限公司 Encryption content distribution method and conditional access device and system
CN104683824A (en) * 2013-11-29 2015-06-03 航天信息股份有限公司 Encryption transmission method and system of flv format video file
CN111416710A (en) * 2020-03-24 2020-07-14 国网山东省电力公司 Certificateless searchable encryption method and system applied to multiple receiving ends

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于等效信道的物理层认证和密钥分发机制;戴峤等;《中国科学:信息科学》;20141220(第12期);第1580-1592页 *

Also Published As

Publication number Publication date
CN113518244A (en) 2021-10-19

Similar Documents

Publication Publication Date Title
CN111492615B (en) Encryption device with updatable shared matrix
US8254570B2 (en) Method and system for encryption of data
US20040101142A1 (en) Method and system for an integrated protection system of data distributed processing in computer networks and system for carrying out said method
KR101267109B1 (en) Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups
US8180048B2 (en) Method and system for computational transformation
WO2000049764A1 (en) Data authentication system employing encrypted integrity blocks
WO2023030316A1 (en) Key generation and distribution method, key generation apparatus, and key management system
US20120027198A1 (en) System and method for cryptographic communications using permutation
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN112383522B (en) Function parameter data transmission encryption method, system, device and readable storage medium
RU2459367C2 (en) Method to generate alternating key for unit coding and transfer of coded data
CN113518244B (en) Digital television signal data transmission method and device based on substitute text combination
KR20140078917A (en) Apparatas and method for security message transmission and reception of vehicle network
CN115378614A (en) Data transmission method and device and electronic equipment
CN114500006A (en) Query request processing method and device
KR100551992B1 (en) Application data encryption and decryption method
CN115277064B (en) Data encryption and data decryption methods and devices, electronic equipment and medium
JPH08204701A (en) Electronic mail cipher communication system and cipher communication method
CN114362964A (en) Big data encryption transmission method and system
CN102474413B (en) Private key compression
JP2023509203A (en) A method for sending and receiving messages containing a cryptographic identifier of a sender device
CN117411727B (en) Encryption method, device and storage medium for symmetric encryption of communication transmission
RU2631981C2 (en) Method of block encryption with private key
CN119300024B (en) A secure communication method and system for digital car keys
KR102626974B1 (en) Method and system for protecting secret key of white box cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant