Summary of the invention
In view of this, the invention provides and a kind of net cast is carried out to the method for door chain processing and system thereof to address the above problem.
The invention provides a kind of system of net cast being carried out to door chain processing, comprising: player, in order to extract user profile, described player comprises deciphering module; Player interface, comprises the encrypting module that couples described deciphering module, in order to receive described user profile and described user profile is encrypted and obtains enciphered message; And server, comprise authentication module.Wherein, described enciphered message is returned to described deciphering module by described player interface, described deciphering module is decrypted and obtains decrypted token described enciphered message, and sending described decrypted token to described authentication module, described authentication module verifies to judge that to described decrypted token whether described deciphering is successful.
Described authentication module judges whether success of described deciphering by judging that User IP in described decrypted token is whether identical with User IP in described user profile, wherein, in the time that the User IP in described decrypted token is identical with User IP in described user profile, judge described successful decryption.In the time that the User IP in described decrypted token and User IP in described user profile are not identical, described authentication module further judges whether success of described deciphering by judging that user cookie in described decrypted token is whether identical with user cookie in described user profile, wherein, in the time that the user cookie in described decrypted token is identical with user cookie in described user profile, judge described successful decryption.
In the time that described authentication module judges described successful decryption, described server responds the play instruction that described player sends, and sends video flowing to described player.
Described user profile comprises user cookie, user's service time and/or user ID.
The invention provides a kind of method of net cast being carried out to door chain processing, comprising: extract user profile by player; Receive described user profile by player interface; Encrypting module by described player interface is encrypted and obtains enciphered message described user profile; Return described enciphered message to described player; Deciphering module by described player is decrypted and obtains decrypted token described enciphered message; By described player interface, described decrypted token is sent to the authentication module of server; And by described authentication module, described decrypted token is verified to judge that whether deciphering is successful.
By described authentication module, whether successfully described decrypted token is verified to judge deciphering step, further comprise: judge that whether the User IP in described decrypted token is identical with the User IP in described user profile; Wherein, in the time that the User IP in described decrypted token is identical with User IP in described user profile, judge described successful decryption.In the time judging that User IP in described decrypted token and User IP in described user profile are not identical, described method further comprises: judge that whether the user cookie in described decrypted token is identical with the user cookie in described user profile; Wherein, in the time that the user cookie in described decrypted token is identical with user cookie in described user profile, judge described successful decryption.
In the time judging described successful decryption, by response play instruction, described server sends video flowing to described player.
Described user profile comprises user cookie, user's service time and/or user ID.
Compared with prior art, method and system thereof of net cast being carried out to door chain processing provided by the invention, has reached following effect:
(1) method and system thereof of net cast being carried out to door chain processing of the present invention, can effectively play the encryption and decryption to live video, effectively prevents that third party from intercepting, directly carrying out the problems such as bootlegging broadcasting.
(2) method and system thereof of net cast being carried out to door chain processing of the present invention, can also change and continue to form the encryption and decryption to live video according to customer location, effectively prevents that third party from intercepting, directly carrying out the problems such as bootlegging broadcasting.
Certainly, arbitrary product of enforcement the application must not necessarily need to reach above-described all technique effects simultaneously.
Embodiment
Censure specific components as used some vocabulary in the middle of specification and claim.Those skilled in the art should understand, and hardware manufacturer may be called same assembly with different nouns.This specification and claims are not used as distinguishing the mode of assembly with the difference of title, but the difference in function is used as the criterion of distinguishing with assembly.If " comprising " mentioned in the middle of specification and claim is in the whole text an open language, therefore should be construed to " comprise but be not limited to "." roughly " refer to that in receivable error range, those skilled in the art can solve the technical problem within the scope of certain error, reach described technique effect substantially.In addition, " couple " word and comprise directly any and electric property coupling means indirectly at this.Therefore, be coupled to one second device if describe a first device in literary composition, represent that described first device can directly be electrically coupled to described the second device, or be indirectly electrically coupled to described the second device by other devices or the means that couple.Specification subsequent descriptions is to implement the application's preferred embodiments, and right described description is to illustrate that the application's rule is object, not in order to limit the application's scope.The application's protection range is when being as the criterion depending on the claims person of defining.
Fig. 1 is for providing the system 100 of live video in prior art.As shown in Figure 1, system 100 comprises: player 101, player interface 102 and server 103.
Server 103 is used for storing video file to be played, and wherein the form of this video file can be Audio Video Interleaved (being called for short AVI) form, high level flow (being called for short ASF) form, window multimedia video (being called for short WMV) form, 3G streaming media video coding (being called for short 3GP) form etc.Server 103 not only can be far-end server but also can be near-end server.
Player interface 102 couples server 103 and player 101, and video flowing that should play instruction with acquisition from server 103 (or obtain and wait corresponding operating) phase in order to the play instruction that transmits player 101 is to player 101.
Player 101 can be the player that downloads to local terminal (for example, desktop computer, panel computer, smart mobile phone, personal digital assistant etc.).Player 101 also can be the flash player that webpage provides, and user only need open webpage, and the player that just can directly provide with webpage is watched video, and without downloading in advance this player to local terminal.
But due to player 101, player interface 102 and server 103 do not take when the transmitting video-frequency flow to net cast carry out door chain processing measure, therefore in transmitting procedure, easily stolen video flowing address by lawless person.
The invention provides a kind of system of net cast being carried out to door chain processing to address the above problem.Fig. 2 is the system 200 that net cast is carried out to door chain processing according to one embodiment of the invention.The system 200 of as shown in Figure 2, net cast being carried out to door chain processing comprises: player 201, player interface 202 and server 203.Be with Fig. 1 difference, player 201 has deciphering module 204, and player interface 202 has encrypting module 205, and server 203 has authentication module 206.
When being used by user, player 201 (detects that user inputs, for example, when user opens the action of player), extract user profile and this user profile is sent to player interface 202, wherein, this user profile comprises user cookie, user's service time and/or user ID etc.Wherein, in one embodiment of this invention, this user time represents enciphered message ageing of the ageing of live video and/or a player interface acquisition request.When exceeding the scheduled time, for example 3 ~ 5 hours, enciphered message was just invalid.
Player interface 202 receives this user profile, and utilize encrypting module 205 that this user profile is encrypted and obtains enciphered message, wherein, this encryption can be by for example for DES, 3DES, RC2, RC4 etc. cryptographic algorithm realize, the present invention is as limit, and this enciphered message is returned to player 201.
The deciphering module 204 of player 201 is decrypted and obtains decrypted token (such as secure identifier SID and/or label token etc.) the enciphered message of this passback, wherein this decryption processing can be by realizing with the corresponding decipherment algorithm of this cryptographic algorithm, for example, in the time using DES symmetry algorithm to be encrypted, can use symmetrical decipherment algorithm to be decrypted.The present invention does not limit the concrete form of decipherment algorithm.Player 201 sends to decrypted token by player interface 202 authentication module 206 of server 203, and authentication module verifies to judge that to this decrypted token whether deciphering is successful.
In one embodiment of this invention, encrypting module 205 is undertaken user cookie, user's service time and/or user ID for example, to go here and there to realize encryption with the encryption of condition code (random number) in conjunction with rear generation by cryptographic algorithm, and deciphering module 204 is decrypted and obtains decrypted token this encryption string.And the authentication module 206 that also this user profile can be sent to server 203 after player interface 202 receives user profile, authentication module 206 is verified decrypted token according to this user profile.For example authentication module 206 judges that whether the User IP in decrypted token is identical with the User IP in user profile, if identical, can judge it is same validated user, i.e. successful decryption, and the response play instruction that sends of player 201 and send video flowing and play for player 201.If not identical, judgement is not identical validated user, i.e. Decryption failures, returns to HTTP 404 mistakes, can not send video flowing to player 201.
Use in sights at some, user may use same local terminal, but can change the place to use of local terminal, for example, change to Huo Cong Beijing, restaurant from family and change to Shanghai and use same panel computer to watch video.Now the IP address of local terminal, along with the variation of network can change, if only according to User IP, can cause misjudgment, and makes validated user can not normally watch video.But in above-mentioned use sight, no matter whether user changes place to use, and this user's user cookie is identical, and whether therefore can differentiate by user cookie is same validated user.Use in sight at other, user may change local terminal and place to use simultaneously, for example, watch video in Beijing with panel computer, and watch video in Shanghai with desktop computer.Now the IP address of local terminal, along with the variation of network can change, if only according to User IP, can cause misjudgment, and makes validated user can not normally watch video.Whether if but in above-mentioned use sight, user is login user (utilizing same account to log in), the user ID of the user cookie of this login user is identical, therefore can differentiate by this user ID is same validated user.
Therefore, in an embodiment of the present invention, in the time judging that User IP in decrypted token and User IP in user profile are not identical, authentication module 206 further judges that whether the user cookie in decrypted token is identical with the user cookie in user profile, if identical, can judge it is same validated user, i.e. successful decryption, sends video flowing and plays for player 201.If not identical, judgement is not identical validated user, i.e. Decryption failures, thus do not send video flowing to player 201.Wherein, above-mentioned user cookie comprises the cookie information of login user and non-login user.
Fig. 3 is the method that net cast is carried out to door chain processing according to one embodiment of the invention.As shown in Figure 3:
In step 301, extract user profile and this user profile is sent to player interface by player.Wherein, in one embodiment of this invention, this user profile comprises that user cookie(is user cookie), user's service time and/or user ID etc.Wherein, user cookie comprises the cookie information of login user and non-login user.
In step 302, utilize the encrypting module in player interface to be encrypted and to obtain enciphered message this user profile.Wherein, in one embodiment of this invention, this encryption can be by for example for DES, 3DES, RC2, RC4 etc. cryptographic algorithm realize, and the present invention is not as limit.In one embodiment of this invention, encrypting module 205 is undertaken user cookie, user's service time and/or user ID to go here and there to realize encryption in conjunction with rear generation with the encryption of condition code by cryptographic algorithm.
In step 303, passback enciphered message is to player.
In step 304, the deciphering module of player is decrypted and obtains decrypted token the enciphered message of this passback.Wherein, in one embodiment, this decrypted token can be for example secure identifier SID and/or label token etc.And in one embodiment, this decryption processing can be by realizing with the corresponding decipherment algorithm of this cryptographic algorithm, and the present invention does not limit the concrete form of decipherment algorithm.
In step 305, by player interface, decrypted token is sent to the authentication module of server.
In step 306, authentication module verifies to judge that to this decrypted token whether deciphering is successful.
In one embodiment of this invention, authentication module can judge whether success of deciphering by judging that User IP in decrypted token is whether identical with User IP in user profile.For example, if judge, User IP is identical with the User IP in user profile, can judge it is same validated user, i.e. successful decryption, and the play instruction that response player sends and send video flowing for player plays.If judge, User IP is not identical with the User IP in user profile, and judgement is not identical validated user, i.e. Decryption failures, returns to HTTP 404 mistakes, can not send video flowing to player.But in some actual use sights, user may change the place to use of local terminal, for example, change to Huo Cong Beijing, restaurant from family and change to Shanghai and use same panel computer to watch video.Use in sight at other, user may change local terminal and place to use simultaneously, for example, watch video in Beijing with panel computer, and watch video in Shanghai with desktop computer.Now the IP address of panel computer, along with the variation of network can change, if only according to User IP, can cause misjudgment, and makes validated user can not normally watch video.
Therefore a kind of method that net cast is carried out to door chain processing that, the present invention proposes reinforcement is to address the above problem.Fig. 4 is the method that net cast is carried out to door chain processing according to another embodiment of the present invention.As shown in Figure 4:
In step 401, extract user profile and this user profile is sent to player interface by player.Wherein, in one embodiment, this user profile comprises user cookie, user's service time and/or user ID etc.
In step 402, utilize the encrypting module in player interface to be encrypted and to obtain enciphered message this user profile.Wherein, in one embodiment of this invention, this encryption can be by for example for DES, 3DES, RC2, RC4 etc. cryptographic algorithm realize, and the present invention is not as limit.In one embodiment of this invention, encrypting module 205 is undertaken user cookie, user's service time and/or user ID to go here and there to realize encryption in conjunction with rear generation with the encryption of condition code by cryptographic algorithm.
In step 403, passback enciphered message is to player.
In step 404, the deciphering module of player is decrypted and obtains decrypted token the enciphered message of this passback.Wherein, in one embodiment, this decrypted token can be for example secure identifier SID and/or label token etc.And in one embodiment, this decryption processing can be by realizing with the corresponding decipherment algorithm of this cryptographic algorithm, and the present invention does not limit the concrete form of decipherment algorithm.
In step 405, by player interface, decrypted token is sent to the authentication module of server.
In step 406, authentication module judges that whether the User IP in decrypted token is identical with the User IP in user profile.If identical, enter step 407.If not identical, enter step 408.
In step 407, judgement is same validated user, i.e. successful decryption.
In step 408, authentication module judges that whether the user cookie in decrypted token is identical with the user cookie in user profile.If identical, enter step 407.If not identical, enter step 409.
In step 409, judgement is not identical validated user, i.e. Decryption failures.
Compared with prior art, method and system thereof that net cast is carried out to door chain processing described in the application, reached following effect:
(1) method and system thereof of net cast being carried out to door chain processing of the present invention, can effectively play the encryption and decryption to live video, effectively prevents that third party from intercepting, directly carrying out the problems such as bootlegging broadcasting.
(2) method and system thereof of net cast being carried out to door chain processing of the present invention, can also change and continue to form the encryption and decryption to live video according to customer location, effectively prevents that third party from intercepting, directly carrying out the problems such as bootlegging broadcasting.
Those skilled in the art should understand, the application's embodiment can be provided as method, device or computer program.Therefore, the application can adopt complete hardware implementation example, completely implement software example or the form in conjunction with the embodiment of software and hardware aspect.And the application can adopt the form at one or more upper computer programs of implementing of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) that wherein include computer usable program code.
Above-mentioned explanation illustrates and has described some preferred embodiments of the application, but as previously mentioned, be to be understood that the application is not limited to disclosed form herein, should not regard the eliminating to other embodiment as, and can be used for various other combinations, amendment and environment, and can, in invention contemplated scope described herein, change by technology or the knowledge of above-mentioned instruction or association area.And the spirit and scope that the change that those skilled in the art carry out and variation do not depart from the application, all should be in the protection range of the application's claims.