您当前的位置是:  首页 > technology > Corporate communications > technology > Video communication > Technical dynamics >
Technology - Corporate Communications -Video Communication Technology Channel
  Home >technology > Corporate communications > technology > Video communication > Technical dynamics > The question you care about, I repeatedly mentioned: about video encryption

The question you care about, I repeatedly mentioned: about video encryption

2018-05-09 11:33:29 Author: Source:CTI ForumComment:0  Click:


With the explosive development of online education, online education is getting more and more attention. How video encryption technology can protect video intellectual property is the most concerned issue in the online education industry. Actually, it is not only online education. It also involves internal training for industry secrets. It also requires the security of video content. This is also where companies focus on understanding when selecting cloud video service providers. The following is a brief introduction of some functions of Poly-Voice video encryption anti-theft.
1. What is the limitation of playing a domain name?
The domain name restriction feature allows you to implement a video anti-theft chain. At present, pirates use the source code to find the video playback address, and then copy it to their own website for direct video playback. This not only infringes the copyright of the video owner, but also increases the loss of the traffic of the video source website.
 
The limitation of playing the domain name is to set the black and white list of the video through Polyview. A domain name that is set as a blacklist cannot play video. Opening the video will prompt: "This site is not authorized to play this video." And domain names other than this domain name can be played. The same applies to the white list. Except for domain names that are set as whitelists, all other domain names are not allowed to play videos. This will effectively prevent the video link from being stolen.
2. What is a video watermark?
The video watermark is set before the video is uploaded, and then the background watermark is combined with the video during the video transcoding, so that the pirate cannot remove the video watermark; the watermark position can be set by itself. Even if the video is referenced by other websites, the watermark is always attached to the video and plays a role in protecting the copyright.
3. What is video file encryption?
PolyVision uses distributed coding technology to slice video physically and use different encryption algorithms for each video. Multiple encryption algorithms can be used simultaneously for the same video clip to use hybrid encryption. This is combined with a separate codebook developed by PolyView. The data is confused and the difficulty of video cracking is doubled. (Confusion algorithm*: This processing mechanism covers a number of patents and software creation rights independently developed by Poly Dynamics.)
Even if the video file was downloaded by pirates through illegal means, the video cannot be played without the use of a Polyvideo player. And let each video file have a unique key, even if a file is cracked, other files are also safe, this greatly increased the difficulty of the cracker. This technology gives online video an anti-download security guarantee.
4, how to prevent recording screen?
Completely anti-recording screen, this looks like an impossible problem. With computer software, VGA hardware, and a camera, you can easily record to your desired video file. As in the past, we will add a logo to the video. For example, the more primitive interference measures such as watermarking, online video is still very easy to be heavily stolen.
Quiz player
  
Poly-Voice launches a Q&A player to solve this problem. Users can add questions during the video playback. The player will automatically pop up questions when the video is played to the specified time. The viewer is required to answer the question. The question can only be played after the question is answered correctly. If the question is answered incorrectly, the video can be skipped to another specified time. In the online video teaching application, the more interaction problems are inserted, the better the anti-recording screen effect is, which not only improves the learning effect of the trainees, but also greatly increases the operating costs of the pirates, and at the same time, reduces the use experience of the stolen videos.
Marquee Technology
In addition, Polystar's marquee technology is connected to the user's website through an API interface. When visitors watch videos, visitors' IDs are displayed in marquees. Because the ID of the visitor appears in an irregular manner, the post-processing difficulty of the screen-recorder is extremely increased, and the problem of video piracy is extremely resolved.
Disable browser plug-ins
Poly Vista added a new browser blocking browser plug-in to enable real-time monitoring of the player. When detecting the browser's behavior of recording video, it immediately transmits a signal to control the video to stop playing, and prompts the screen user to stop the screen recording operation. The video was sneaked out to prevent the browser from ripping. Effectively cripple the browser mainstream screen features (such as a secure browser, etc.), I Wei video copyright.
Poly Vista is committed to creating an integrated ecological model of Internet education video "protection + terminal + application + statistics", which now covers nearly 20,000 Internet education institutions, and uploads tens of thousands of video courseware daily.
As a member of China DRM, Poly Vision will use PlaySafe as the core video copyright protection system in the future. It will work together with CCTV, Tsinghua University and other institutions to promote the implementation of China's DRM standard and contribute to the sound development of China’s intellectual property protection system. the power of.
[Disclaimer] This article only represents the author's own opinion and has nothing to do with the CTI Forum. The CTI Forum maintains its neutrality in the presentation of statements and opinions, and does not provide any express or implied warranty for the accuracy, reliability or completeness of the contents contained therein. Readers are for reference only, and please bear full responsibility for yourself.

Related Reading:

Topics