tencent cloud



Last updated: 2022-04-27 11:05:07

    To protect the security of your videos and prevent them from hotlinking and unauthorized download and distribution, VOD provides multiple protection mechanisms for video content security to defend your video copyright against infringements in many dimensions.

    Category Feature Advantage Security Level
    Hotlink protection Referer hotlink protection It identifies the request source through the `Referer` field in the playback request header and controls the request sources through a blocklist or allowlist Low
    Key hotlink protection It adds control parameters in the playback URL and uses `Key` as a signature to control the URL validity period, preview duration, number of IPs allowed for playback, etc. Medium
    Video encryption HLS common encryption It is an HLS-based AES encryption scheme and uses keys to encrypt video data High
    • Hotlink protection is mainly used to control the validity of the sources of video playback requests, but does not encrypt video content, which means that users can download videos for secondary distribution; therefore, the security level of copyright protection is low.
    • Video encryption is a means to encrypt the video content itself with a key, which cannot be played back directly after being obtained by others. Only when a terminal device passes the authentication by the business backend and the decryption key is obtained can the content by played back.

    VOD's video encryption feature provides the HLS common encryption capability, which has a higher security level than hotlink protection.

    How It Works

    The overall architecture of VOD video encryption, decryption, and playback is as follows:

    1. Upload from server: the business backend uploads a video to VOD through the console, server API, or other means.
    2. Trigger video processing: when the video is uploaded, adaptive bitrate streaming with encryption is specified. After the video is uploaded, the encryption process begins.
    3. Get the key: the video is transcoded to adaptive bitstream and encrypted. VOD gets the key used during video encryption from the KMS module.
    4. Encrypt and write to storage: after the video is transcoded to adaptive bitstream and encrypted, the output video content is written to the VOD storage.
    5. Update the media asset: the encrypted video information is written into the media asset management module.
    6. Get the player signature: the business terminal integrates with VOD superplayer, and the player requests the player signature from the business server.
    7. Request the download address: superplayer gets the download address of the video from VOD's playback service.
    8. Download the content: superplayer downloads the content from VOD CDN at the download address.
    9. Get the key: superplayer requests the decryption key with the player signature.
    10. Decrypt and play back: superplayer uses the decryption key to decrypt the video for playback.

    Integration Guide

    To help you quickly integrate the encryption capabilities of VOD, we provide a video encryption [integration guide] to describe the integration steps by way of demos.


    1. How do I encrypt uploaded videos?
      VOD's adaptive bitrate streaming feature can transcode videos into multiple resolutions and encrypt them.For specific steps, please see the operation guide.
    2. How do I play back encrypted videos on terminal devices?
      To play back videos encrypted in VOD, you need to integrate the superplayer SDK on the terminal devices and build a signature distribution service.For specific steps, please see the operation guide.
    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support