CN103997681A - Method for conducting link theft protection processing on live video and system thereof - Google Patents

Method for conducting link theft protection processing on live video and system thereof Download PDF

Info

Publication number
CN103997681A
CN103997681A CN201410237968.6A CN201410237968A CN103997681A CN 103997681 A CN103997681 A CN 103997681A CN 201410237968 A CN201410237968 A CN 201410237968A CN 103997681 A CN103997681 A CN 103997681A
Authority
CN
China
Prior art keywords
user
player
user profile
decrypted token
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410237968.6A
Other languages
Chinese (zh)
Other versions
CN103997681B (en
Inventor
何涛
阙宏宇
吴昊宇
荆凤山
李歆
赵洪达
姚键
潘柏宇
卢述奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba China Co Ltd
Youku Network Technology Beijing Co Ltd
Original Assignee
1Verge Internet Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 1Verge Internet Technology Beijing Co Ltd filed Critical 1Verge Internet Technology Beijing Co Ltd
Priority to CN201410237968.6A priority Critical patent/CN103997681B/en
Publication of CN103997681A publication Critical patent/CN103997681A/en
Priority to PCT/CN2014/092263 priority patent/WO2015184743A1/en
Application granted granted Critical
Publication of CN103997681B publication Critical patent/CN103997681B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4408Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream encryption, e.g. re-encrypting a decrypted video stream for redistribution in a home network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention provides a method for conducting link theft protection processing on a live video and a system thereof. The system comprises a player, a player interface and a server, wherein the player is used for extracting user information, the player comprises a decryption module, the displayer interface comprises an encryption module coupled with the decryption module, wherein the encryption module is used for receiving user information and encrypting the user information to acquire encrypted information, and the server comprises a verification module. The player interface sends the encrypted information back to the decryption module, the decryption module decrypts the encrypted information to obtain a decryption token and sends the decryption token to the verification module, and the verification module verifies the decryption token to judge whether decryption is successful. By means of the method for conducting link theft protection processing on the live video and the system of the method, the live video can be encrypted and decrypted, and the problems of interception, theft broadcast and the like of a third party are solved.

Description

Net cast is carried out to method and the system thereof of door chain processing
Technical field
The application relates to data encryption and deciphering, specifically, relates to a kind of method and system thereof of net cast being carried out to door chain processing.
Background technology
So-called net cast refers to that to utilize the Internet and stream media technology to carry out live, and video enriches element because having merged image, word, sound etc., excellent both in sound and shape, and effect is splendid, becomes gradually the main flow expression way of the Internet.Video, by true, lively propagation, is built strong presence, attracts eyeball, reach with deep impression, remember lasting communication effect.
Along with the development of network technology, network bandwidth is wider, and network speed is faster, can experience also more for the Internet that offers user.Seeing live on the internet video therefore also becomes a lot of network users' selection.But the provider of live video has to face a challenge, steals chain.
Steal chain and refer to by certain technological means, obtain/crack the video flowing address of network video player the inside, then play-over the behavior of this video flowing address (walking around live video provider's network player) by third-party player.Steal chain and not only invade live video provider's rights and interests, also can bring risk to user, for example, thereby the chained address that the credulous side of being to provide of user provides does not add the use of strick precaution, result is stolen personal information (such as account, password etc.) by lawless person, thereby brings potential safety hazard to personal property.
Therefore a kind of need live video badly encryption and decryption method, is effectively protected live video.
Summary of the invention
In view of this, the invention provides and a kind of net cast is carried out to the method for door chain processing and system thereof to address the above problem.
The invention provides a kind of system of net cast being carried out to door chain processing, comprising: player, in order to extract user profile, described player comprises deciphering module; Player interface, comprises the encrypting module that couples described deciphering module, in order to receive described user profile and described user profile is encrypted and obtains enciphered message; And server, comprise authentication module.Wherein, described enciphered message is returned to described deciphering module by described player interface, described deciphering module is decrypted and obtains decrypted token described enciphered message, and sending described decrypted token to described authentication module, described authentication module verifies to judge that to described decrypted token whether described deciphering is successful.
Described authentication module judges whether success of described deciphering by judging that User IP in described decrypted token is whether identical with User IP in described user profile, wherein, in the time that the User IP in described decrypted token is identical with User IP in described user profile, judge described successful decryption.In the time that the User IP in described decrypted token and User IP in described user profile are not identical, described authentication module further judges whether success of described deciphering by judging that user cookie in described decrypted token is whether identical with user cookie in described user profile, wherein, in the time that the user cookie in described decrypted token is identical with user cookie in described user profile, judge described successful decryption.
In the time that described authentication module judges described successful decryption, described server responds the play instruction that described player sends, and sends video flowing to described player.
Described user profile comprises user cookie, user's service time and/or user ID.
The invention provides a kind of method of net cast being carried out to door chain processing, comprising: extract user profile by player; Receive described user profile by player interface; Encrypting module by described player interface is encrypted and obtains enciphered message described user profile; Return described enciphered message to described player; Deciphering module by described player is decrypted and obtains decrypted token described enciphered message; By described player interface, described decrypted token is sent to the authentication module of server; And by described authentication module, described decrypted token is verified to judge that whether deciphering is successful.
By described authentication module, whether successfully described decrypted token is verified to judge deciphering step, further comprise: judge that whether the User IP in described decrypted token is identical with the User IP in described user profile; Wherein, in the time that the User IP in described decrypted token is identical with User IP in described user profile, judge described successful decryption.In the time judging that User IP in described decrypted token and User IP in described user profile are not identical, described method further comprises: judge that whether the user cookie in described decrypted token is identical with the user cookie in described user profile; Wherein, in the time that the user cookie in described decrypted token is identical with user cookie in described user profile, judge described successful decryption.
In the time judging described successful decryption, by response play instruction, described server sends video flowing to described player.
Described user profile comprises user cookie, user's service time and/or user ID.
Compared with prior art, method and system thereof of net cast being carried out to door chain processing provided by the invention, has reached following effect:
(1) method and system thereof of net cast being carried out to door chain processing of the present invention, can effectively play the encryption and decryption to live video, effectively prevents that third party from intercepting, directly carrying out the problems such as bootlegging broadcasting.
(2) method and system thereof of net cast being carried out to door chain processing of the present invention, can also change and continue to form the encryption and decryption to live video according to customer location, effectively prevents that third party from intercepting, directly carrying out the problems such as bootlegging broadcasting.
Certainly, arbitrary product of enforcement the application must not necessarily need to reach above-described all technique effects simultaneously.
 
Brief description of the drawings
Accompanying drawing described herein is used to provide further understanding of the present application, forms the application's a part, and the application's schematic description and description is used for explaining the application, does not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 is for providing the system of live video in prior art.
Fig. 2 is the system that net cast is carried out to door chain processing according to one embodiment of the invention.
Fig. 3 is the method that net cast is carried out to door chain processing according to one embodiment of the invention.
Fig. 4 is the method that net cast is carried out to door chain processing according to another embodiment of the present invention.
 
Embodiment
Censure specific components as used some vocabulary in the middle of specification and claim.Those skilled in the art should understand, and hardware manufacturer may be called same assembly with different nouns.This specification and claims are not used as distinguishing the mode of assembly with the difference of title, but the difference in function is used as the criterion of distinguishing with assembly.If " comprising " mentioned in the middle of specification and claim is in the whole text an open language, therefore should be construed to " comprise but be not limited to "." roughly " refer to that in receivable error range, those skilled in the art can solve the technical problem within the scope of certain error, reach described technique effect substantially.In addition, " couple " word and comprise directly any and electric property coupling means indirectly at this.Therefore, be coupled to one second device if describe a first device in literary composition, represent that described first device can directly be electrically coupled to described the second device, or be indirectly electrically coupled to described the second device by other devices or the means that couple.Specification subsequent descriptions is to implement the application's preferred embodiments, and right described description is to illustrate that the application's rule is object, not in order to limit the application's scope.The application's protection range is when being as the criterion depending on the claims person of defining.
Fig. 1 is for providing the system 100 of live video in prior art.As shown in Figure 1, system 100 comprises: player 101, player interface 102 and server 103.
Server 103 is used for storing video file to be played, and wherein the form of this video file can be Audio Video Interleaved (being called for short AVI) form, high level flow (being called for short ASF) form, window multimedia video (being called for short WMV) form, 3G streaming media video coding (being called for short 3GP) form etc.Server 103 not only can be far-end server but also can be near-end server.
Player interface 102 couples server 103 and player 101, and video flowing that should play instruction with acquisition from server 103 (or obtain and wait corresponding operating) phase in order to the play instruction that transmits player 101 is to player 101.
Player 101 can be the player that downloads to local terminal (for example, desktop computer, panel computer, smart mobile phone, personal digital assistant etc.).Player 101 also can be the flash player that webpage provides, and user only need open webpage, and the player that just can directly provide with webpage is watched video, and without downloading in advance this player to local terminal.
But due to player 101, player interface 102 and server 103 do not take when the transmitting video-frequency flow to net cast carry out door chain processing measure, therefore in transmitting procedure, easily stolen video flowing address by lawless person.
The invention provides a kind of system of net cast being carried out to door chain processing to address the above problem.Fig. 2 is the system 200 that net cast is carried out to door chain processing according to one embodiment of the invention.The system 200 of as shown in Figure 2, net cast being carried out to door chain processing comprises: player 201, player interface 202 and server 203.Be with Fig. 1 difference, player 201 has deciphering module 204, and player interface 202 has encrypting module 205, and server 203 has authentication module 206.
When being used by user, player 201 (detects that user inputs, for example, when user opens the action of player), extract user profile and this user profile is sent to player interface 202, wherein, this user profile comprises user cookie, user's service time and/or user ID etc.Wherein, in one embodiment of this invention, this user time represents enciphered message ageing of the ageing of live video and/or a player interface acquisition request.When exceeding the scheduled time, for example 3 ~ 5 hours, enciphered message was just invalid.
Player interface 202 receives this user profile, and utilize encrypting module 205 that this user profile is encrypted and obtains enciphered message, wherein, this encryption can be by for example for DES, 3DES, RC2, RC4 etc. cryptographic algorithm realize, the present invention is as limit, and this enciphered message is returned to player 201.
The deciphering module 204 of player 201 is decrypted and obtains decrypted token (such as secure identifier SID and/or label token etc.) the enciphered message of this passback, wherein this decryption processing can be by realizing with the corresponding decipherment algorithm of this cryptographic algorithm, for example, in the time using DES symmetry algorithm to be encrypted, can use symmetrical decipherment algorithm to be decrypted.The present invention does not limit the concrete form of decipherment algorithm.Player 201 sends to decrypted token by player interface 202 authentication module 206 of server 203, and authentication module verifies to judge that to this decrypted token whether deciphering is successful.
In one embodiment of this invention, encrypting module 205 is undertaken user cookie, user's service time and/or user ID for example, to go here and there to realize encryption with the encryption of condition code (random number) in conjunction with rear generation by cryptographic algorithm, and deciphering module 204 is decrypted and obtains decrypted token this encryption string.And the authentication module 206 that also this user profile can be sent to server 203 after player interface 202 receives user profile, authentication module 206 is verified decrypted token according to this user profile.For example authentication module 206 judges that whether the User IP in decrypted token is identical with the User IP in user profile, if identical, can judge it is same validated user, i.e. successful decryption, and the response play instruction that sends of player 201 and send video flowing and play for player 201.If not identical, judgement is not identical validated user, i.e. Decryption failures, returns to HTTP 404 mistakes, can not send video flowing to player 201.
Use in sights at some, user may use same local terminal, but can change the place to use of local terminal, for example, change to Huo Cong Beijing, restaurant from family and change to Shanghai and use same panel computer to watch video.Now the IP address of local terminal, along with the variation of network can change, if only according to User IP, can cause misjudgment, and makes validated user can not normally watch video.But in above-mentioned use sight, no matter whether user changes place to use, and this user's user cookie is identical, and whether therefore can differentiate by user cookie is same validated user.Use in sight at other, user may change local terminal and place to use simultaneously, for example, watch video in Beijing with panel computer, and watch video in Shanghai with desktop computer.Now the IP address of local terminal, along with the variation of network can change, if only according to User IP, can cause misjudgment, and makes validated user can not normally watch video.Whether if but in above-mentioned use sight, user is login user (utilizing same account to log in), the user ID of the user cookie of this login user is identical, therefore can differentiate by this user ID is same validated user.
Therefore, in an embodiment of the present invention, in the time judging that User IP in decrypted token and User IP in user profile are not identical, authentication module 206 further judges that whether the user cookie in decrypted token is identical with the user cookie in user profile, if identical, can judge it is same validated user, i.e. successful decryption, sends video flowing and plays for player 201.If not identical, judgement is not identical validated user, i.e. Decryption failures, thus do not send video flowing to player 201.Wherein, above-mentioned user cookie comprises the cookie information of login user and non-login user.
Fig. 3 is the method that net cast is carried out to door chain processing according to one embodiment of the invention.As shown in Figure 3:
In step 301, extract user profile and this user profile is sent to player interface by player.Wherein, in one embodiment of this invention, this user profile comprises that user cookie(is user cookie), user's service time and/or user ID etc.Wherein, user cookie comprises the cookie information of login user and non-login user.
In step 302, utilize the encrypting module in player interface to be encrypted and to obtain enciphered message this user profile.Wherein, in one embodiment of this invention, this encryption can be by for example for DES, 3DES, RC2, RC4 etc. cryptographic algorithm realize, and the present invention is not as limit.In one embodiment of this invention, encrypting module 205 is undertaken user cookie, user's service time and/or user ID to go here and there to realize encryption in conjunction with rear generation with the encryption of condition code by cryptographic algorithm.
In step 303, passback enciphered message is to player.
In step 304, the deciphering module of player is decrypted and obtains decrypted token the enciphered message of this passback.Wherein, in one embodiment, this decrypted token can be for example secure identifier SID and/or label token etc.And in one embodiment, this decryption processing can be by realizing with the corresponding decipherment algorithm of this cryptographic algorithm, and the present invention does not limit the concrete form of decipherment algorithm.
In step 305, by player interface, decrypted token is sent to the authentication module of server.
In step 306, authentication module verifies to judge that to this decrypted token whether deciphering is successful.
In one embodiment of this invention, authentication module can judge whether success of deciphering by judging that User IP in decrypted token is whether identical with User IP in user profile.For example, if judge, User IP is identical with the User IP in user profile, can judge it is same validated user, i.e. successful decryption, and the play instruction that response player sends and send video flowing for player plays.If judge, User IP is not identical with the User IP in user profile, and judgement is not identical validated user, i.e. Decryption failures, returns to HTTP 404 mistakes, can not send video flowing to player.But in some actual use sights, user may change the place to use of local terminal, for example, change to Huo Cong Beijing, restaurant from family and change to Shanghai and use same panel computer to watch video.Use in sight at other, user may change local terminal and place to use simultaneously, for example, watch video in Beijing with panel computer, and watch video in Shanghai with desktop computer.Now the IP address of panel computer, along with the variation of network can change, if only according to User IP, can cause misjudgment, and makes validated user can not normally watch video.
Therefore a kind of method that net cast is carried out to door chain processing that, the present invention proposes reinforcement is to address the above problem.Fig. 4 is the method that net cast is carried out to door chain processing according to another embodiment of the present invention.As shown in Figure 4:
In step 401, extract user profile and this user profile is sent to player interface by player.Wherein, in one embodiment, this user profile comprises user cookie, user's service time and/or user ID etc.
In step 402, utilize the encrypting module in player interface to be encrypted and to obtain enciphered message this user profile.Wherein, in one embodiment of this invention, this encryption can be by for example for DES, 3DES, RC2, RC4 etc. cryptographic algorithm realize, and the present invention is not as limit.In one embodiment of this invention, encrypting module 205 is undertaken user cookie, user's service time and/or user ID to go here and there to realize encryption in conjunction with rear generation with the encryption of condition code by cryptographic algorithm.
In step 403, passback enciphered message is to player.
In step 404, the deciphering module of player is decrypted and obtains decrypted token the enciphered message of this passback.Wherein, in one embodiment, this decrypted token can be for example secure identifier SID and/or label token etc.And in one embodiment, this decryption processing can be by realizing with the corresponding decipherment algorithm of this cryptographic algorithm, and the present invention does not limit the concrete form of decipherment algorithm.
In step 405, by player interface, decrypted token is sent to the authentication module of server.
In step 406, authentication module judges that whether the User IP in decrypted token is identical with the User IP in user profile.If identical, enter step 407.If not identical, enter step 408.
In step 407, judgement is same validated user, i.e. successful decryption.
In step 408, authentication module judges that whether the user cookie in decrypted token is identical with the user cookie in user profile.If identical, enter step 407.If not identical, enter step 409.
In step 409, judgement is not identical validated user, i.e. Decryption failures.
Compared with prior art, method and system thereof that net cast is carried out to door chain processing described in the application, reached following effect:
(1) method and system thereof of net cast being carried out to door chain processing of the present invention, can effectively play the encryption and decryption to live video, effectively prevents that third party from intercepting, directly carrying out the problems such as bootlegging broadcasting.
(2) method and system thereof of net cast being carried out to door chain processing of the present invention, can also change and continue to form the encryption and decryption to live video according to customer location, effectively prevents that third party from intercepting, directly carrying out the problems such as bootlegging broadcasting.
Those skilled in the art should understand, the application's embodiment can be provided as method, device or computer program.Therefore, the application can adopt complete hardware implementation example, completely implement software example or the form in conjunction with the embodiment of software and hardware aspect.And the application can adopt the form at one or more upper computer programs of implementing of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) that wherein include computer usable program code.
Above-mentioned explanation illustrates and has described some preferred embodiments of the application, but as previously mentioned, be to be understood that the application is not limited to disclosed form herein, should not regard the eliminating to other embodiment as, and can be used for various other combinations, amendment and environment, and can, in invention contemplated scope described herein, change by technology or the knowledge of above-mentioned instruction or association area.And the spirit and scope that the change that those skilled in the art carry out and variation do not depart from the application, all should be in the protection range of the application's claims.

Claims (10)

1. a system of net cast being carried out to door chain processing, is characterized in that, comprising:
Player, in order to extract user profile, described player comprises deciphering module;
Player interface, comprises the encrypting module that couples described deciphering module, in order to receive described user profile and described user profile is encrypted and obtains enciphered message; And
Server, comprises authentication module,
Wherein, described enciphered message is returned to described deciphering module by described player interface, described deciphering module is decrypted and obtains decrypted token described enciphered message, and sending described decrypted token to described authentication module, described authentication module verifies to judge that to described decrypted token whether described deciphering is successful.
2. system of net cast being carried out to door chain processing as claimed in claim 1, it is characterized in that, described authentication module judges whether success of described deciphering by judging that User IP in described decrypted token is whether identical with User IP in described user profile, wherein, in the time that the User IP in described decrypted token is identical with User IP in described user profile, judge described successful decryption.
3. system of net cast being carried out to door chain processing as claimed in claim 2, it is characterized in that, in the time that the User IP in described decrypted token and User IP in described user profile are not identical, described authentication module further judges whether success of described deciphering by judging that user cookie in described decrypted token is whether identical with user cookie in described user profile, wherein, in the time that the user cookie in described decrypted token is identical with user cookie in described user profile, judge described successful decryption.
4. as claimed in claim 2 or claim 3 net cast is carried out the system of door chain processing, it is characterized in that, in the time that described authentication module judges described successful decryption, described server responds the play instruction that described player sends, and sends video flowing to described player.
5. system of net cast being carried out to door chain processing as claimed in claim 1, is characterized in that, described user profile comprises user cookie, user's service time and/or user ID.
6. a method of net cast being carried out to door chain processing, is characterized in that, comprising:
Extract user profile by player;
Receive described user profile by player interface;
Encrypting module by described player interface is encrypted and obtains enciphered message described user profile;
Return described enciphered message to described player;
Deciphering module by described player is decrypted and obtains decrypted token described enciphered message;
By described player interface, described decrypted token is sent to the authentication module of server; And
By described authentication module, described decrypted token is verified to judge that whether deciphering is successful.
7. method of net cast being carried out to door chain processing as claimed in claim 6, is characterized in that, by described authentication module, whether successfully described decrypted token is verified to judge deciphering step, further comprises:
Judge that whether the User IP in described decrypted token is identical with the User IP in described user profile;
Wherein, in the time that the User IP in described decrypted token is identical with User IP in described user profile, judge described successful decryption.
8. method of net cast being carried out to door chain processing as claimed in claim 7, is characterized in that, in the time judging that User IP in described decrypted token and User IP in described user profile are not identical, described method further comprises:
Judge that whether the user cookie in described decrypted token is identical with the user cookie in described user profile;
Wherein, in the time that the user cookie in described decrypted token is identical with user cookie in described user profile, judge described successful decryption.
9. the method for as claimed in claim 7 or 8 net cast being carried out door chain processing, is characterized in that, described method further comprises:
In the time judging described successful decryption, by response play instruction, described server sends video flowing to described player.
10. method of net cast being carried out to door chain processing as claimed in claim 6, is characterized in that, described user profile comprises user cookie, user's service time and/or user ID.
CN201410237968.6A 2014-06-02 2014-06-02 Net cast is carried out to method and the system thereof of door chain process Active CN103997681B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410237968.6A CN103997681B (en) 2014-06-02 2014-06-02 Net cast is carried out to method and the system thereof of door chain process
PCT/CN2014/092263 WO2015184743A1 (en) 2014-06-02 2014-11-26 Method and system for conducting security chain processing on live video

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410237968.6A CN103997681B (en) 2014-06-02 2014-06-02 Net cast is carried out to method and the system thereof of door chain process

Publications (2)

Publication Number Publication Date
CN103997681A true CN103997681A (en) 2014-08-20
CN103997681B CN103997681B (en) 2016-02-17

Family

ID=51311665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410237968.6A Active CN103997681B (en) 2014-06-02 2014-06-02 Net cast is carried out to method and the system thereof of door chain process

Country Status (2)

Country Link
CN (1) CN103997681B (en)
WO (1) WO2015184743A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284215A (en) * 2014-09-26 2015-01-14 北京奇艺世纪科技有限公司 Video request processing method and device
CN104735484A (en) * 2015-03-05 2015-06-24 天脉聚源(北京)科技有限公司 Method and device for playing video
WO2015184743A1 (en) * 2014-06-02 2015-12-10 合一网络技术(北京)有限公司 Method and system for conducting security chain processing on live video
CN105721903A (en) * 2014-12-26 2016-06-29 乐视网信息技术(北京)股份有限公司 Method and system for playing online videos
CN105847881A (en) * 2016-03-31 2016-08-10 武汉斗鱼网络科技有限公司 Illegal-playing-prevention video player, server and system
CN105847869A (en) * 2016-05-24 2016-08-10 武汉斗鱼网络科技有限公司 Encrypted playing method and apparatus
CN108390935A (en) * 2018-02-28 2018-08-10 北京酷我科技有限公司 A kind of audio broadcast strategy based on file stream
CN109005427A (en) * 2018-08-20 2018-12-14 全球播科技(北京)有限公司 Encrypted video playback method, device and equipment, storage medium and processor
CN110519325A (en) * 2019-07-12 2019-11-29 安徽威斯贝尔智能科技有限公司 A kind of video processor

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108735241B (en) * 2017-04-25 2021-02-02 武汉斗鱼网络科技有限公司 Local time detection method and system for Flash player
CN113329242A (en) * 2021-05-27 2021-08-31 北京沃东天骏信息技术有限公司 Resource management method and device
CN115278345A (en) * 2022-07-28 2022-11-01 中国电信股份有限公司 Video transmitting method, system, device and non-volatile storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080072301A1 (en) * 2004-07-09 2008-03-20 Matsushita Electric Industrial Co., Ltd. System And Method For Managing User Authentication And Service Authorization To Achieve Single-Sign-On To Access Multiple Network Interfaces
CN102209046A (en) * 2010-08-24 2011-10-05 济南聚易信息技术有限公司 Network resource integration system and method
CN102377788A (en) * 2011-12-13 2012-03-14 方正国际软件有限公司 Single sign-on (SSO) system and single sign-on (SSO) method
CN102833257A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Operation request queuing method, associated equipment and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7711647B2 (en) * 2004-06-10 2010-05-04 Akamai Technologies, Inc. Digital rights management in a distributed network
CN100576795C (en) * 2006-12-31 2009-12-30 华东师范大学 Public security broadcast control media management and its complete authentication method of not distorted of identification
KR101518089B1 (en) * 2007-11-16 2015-05-15 톰슨 라이센싱 System and method for session management of streaming media
US8200968B2 (en) * 2007-12-20 2012-06-12 The Directv Group, Inc. Method and apparatus for communicating between a requestor and a user receiving device using a user device locating module
CN103997681B (en) * 2014-06-02 2016-02-17 合一网络技术(北京)有限公司 Net cast is carried out to method and the system thereof of door chain process

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080072301A1 (en) * 2004-07-09 2008-03-20 Matsushita Electric Industrial Co., Ltd. System And Method For Managing User Authentication And Service Authorization To Achieve Single-Sign-On To Access Multiple Network Interfaces
CN102209046A (en) * 2010-08-24 2011-10-05 济南聚易信息技术有限公司 Network resource integration system and method
CN102377788A (en) * 2011-12-13 2012-03-14 方正国际软件有限公司 Single sign-on (SSO) system and single sign-on (SSO) method
CN102833257A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Operation request queuing method, associated equipment and system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015184743A1 (en) * 2014-06-02 2015-12-10 合一网络技术(北京)有限公司 Method and system for conducting security chain processing on live video
CN104284215A (en) * 2014-09-26 2015-01-14 北京奇艺世纪科技有限公司 Video request processing method and device
CN104284215B (en) * 2014-09-26 2018-04-27 北京奇艺世纪科技有限公司 A kind for the treatment of method and apparatus of video request
CN105721903B (en) * 2014-12-26 2017-12-12 乐视网信息技术(北京)股份有限公司 The online method and system for playing video
CN105721903A (en) * 2014-12-26 2016-06-29 乐视网信息技术(北京)股份有限公司 Method and system for playing online videos
CN104735484B (en) * 2015-03-05 2017-12-15 天脉聚源(北京)科技有限公司 A kind of method and device for playing video
CN104735484A (en) * 2015-03-05 2015-06-24 天脉聚源(北京)科技有限公司 Method and device for playing video
CN105847881A (en) * 2016-03-31 2016-08-10 武汉斗鱼网络科技有限公司 Illegal-playing-prevention video player, server and system
CN105847881B (en) * 2016-03-31 2019-07-09 武汉斗鱼网络科技有限公司 A kind of illegal-broadcast preventing video player and server and system
CN105847869A (en) * 2016-05-24 2016-08-10 武汉斗鱼网络科技有限公司 Encrypted playing method and apparatus
CN105847869B (en) * 2016-05-24 2019-06-18 武汉斗鱼网络科技有限公司 A kind of encryption playback method and device
CN108390935A (en) * 2018-02-28 2018-08-10 北京酷我科技有限公司 A kind of audio broadcast strategy based on file stream
CN109005427A (en) * 2018-08-20 2018-12-14 全球播科技(北京)有限公司 Encrypted video playback method, device and equipment, storage medium and processor
CN109005427B (en) * 2018-08-20 2021-06-08 全球播科技(北京)有限公司 Encrypted video playing method, device and equipment and storage medium
CN110519325A (en) * 2019-07-12 2019-11-29 安徽威斯贝尔智能科技有限公司 A kind of video processor

Also Published As

Publication number Publication date
WO2015184743A1 (en) 2015-12-10
CN103997681B (en) 2016-02-17

Similar Documents

Publication Publication Date Title
CN103997681B (en) Net cast is carried out to method and the system thereof of door chain process
US11055429B2 (en) Key providing method, video playing method, server and client
US11580570B2 (en) Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust
EP2884716B1 (en) Token-based authentication mechanism
US9223943B2 (en) Method for scalable access control decisions
KR101658959B1 (en) Method and apparatus for building a hardware root of trust and providing protected content processing within an open computing platform
US8850216B1 (en) Client device and media client authentication mechanism
US20080270578A1 (en) Method, Device And Data Download System For Controlling Effectiveness Of A Download Transaction
AU2012275667A1 (en) Method and apparatus for dynamic, real-time ad insertion based on meta-data within a hardware based root of trust
AU2010276315B2 (en) Off-line content delivery system with layered encryption
WO2015154720A1 (en) Method of delivering and protecting media content
CN104735484B (en) A kind of method and device for playing video
US9008305B2 (en) Video data delivery protection
CN109040079A (en) The establishment of live streaming chained address and verification method and related device
CN105721903A (en) Method and system for playing online videos
US20230132485A1 (en) System for Thin Client Devices in Hybrid Edge Cloud Systems
CN106791934A (en) For the encryption player method and encryption system of VIP videos
CN110572454A (en) Advertisement delivery system for guaranteeing safety of advertisement delivery process
JP2013162360A (en) Information terminal device, information terminal system, information terminal control method, and program
CN114007106B (en) H5 video encryption playing method
CN110139136A (en) A kind of method and device that the Web TV based on DRM technology plays
CN111602380A (en) Method and system for identifying a user terminal for receiving streaming protected multimedia content
CN105871788B (en) Password generation method and device for login server
CN115225934B (en) Video playing method, system, electronic device and storage medium
WO2015189833A1 (en) Streaming of secure content in a home network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 100080 Beijing Haidian District city Haidian street A Sinosteel International Plaza No. 8 block 5 layer A, C

Patentee after: Youku network technology (Beijing) Co.,Ltd.

Address before: 100080 Beijing Haidian District city Haidian street A Sinosteel International Plaza No. 8 block 5 layer A, C

Patentee before: 1VERGE INTERNET TECHNOLOGY (BEIJING) Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200319

Address after: 310003 room 508, floor 5, building 4, No. 699, Wangshang Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Alibaba (China) Co.,Ltd.

Address before: 100080 Beijing Haidian District city Haidian street A Sinosteel International Plaza No. 8 block 5 layer A, C

Patentee before: Youku network technology (Beijing) Co.,Ltd.