CN110290097B - Data processing method and device, storage medium and electronic device - Google Patents

Data processing method and device, storage medium and electronic device Download PDF

Info

Publication number
CN110290097B
CN110290097B CN201810225999.8A CN201810225999A CN110290097B CN 110290097 B CN110290097 B CN 110290097B CN 201810225999 A CN201810225999 A CN 201810225999A CN 110290097 B CN110290097 B CN 110290097B
Authority
CN
China
Prior art keywords
file
local server
request
network address
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810225999.8A
Other languages
Chinese (zh)
Other versions
CN110290097A (en
Inventor
宋培岩
陈锦海
褚佳义
邓清哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201810225999.8A priority Critical patent/CN110290097B/en
Publication of CN110290097A publication Critical patent/CN110290097A/en
Application granted granted Critical
Publication of CN110290097B publication Critical patent/CN110290097B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8106Monomedia components thereof involving special audio data, e.g. different tracks for different languages
    • H04N21/8113Monomedia components thereof involving special audio data, e.g. different tracks for different languages comprising music, e.g. song in MP3 format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8126Monomedia components thereof involving additional data, e.g. news, sports, stocks, weather forecasts

Abstract

The invention discloses a data processing method, a data processing device, a storage medium and an electronic device. Wherein, the method comprises the following steps: a local server of a target application acquires an identifier of a target file in a first network address sent by a multimedia control; the local server sends a first request to a remote server according to the identification of the target file, wherein the first request is used for requesting to acquire a password file of the target file; the local server receives the encrypted password file sent by the remote server according to the first request; the local server decrypts the encrypted password file to obtain the password file; and the local server sends the password file to the multimedia control, wherein the password file is used for decrypting the encrypted target file in the multimedia control. The invention solves the technical problem of poorer security when the client plays the multimedia file.

Description

Data processing method and device, storage medium and electronic device
Technical Field
The present invention relates to the field of data, and in particular, to a method and an apparatus for processing data, a storage medium, and an electronic apparatus.
Background
The existing multimedia files are not usually encrypted during transmission, so that the multimedia files are easily leaked after being grabbed slowly in the transmission process. In order to avoid leakage of the multimedia file, the multimedia file can be encrypted, and a password file for decryption can be transmitted to the terminal, however, once the password file is leaked, the multimedia file is also easily decrypted, and the leakage of the multimedia file is also caused, so that the security of the multimedia file played by the multimedia client is poor.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a data processing method, a data processing device, a storage medium and an electronic device, and at least solves the technical problem of poor security when a client plays a multimedia file.
According to an aspect of an embodiment of the present invention, there is provided a data processing method, including: a local server of a target application acquires an identifier of a target file in a first network address sent by a multimedia control; the local server sends a first request to a remote server according to the identification of the target file, wherein the first request is used for requesting to acquire a password file of the target file; the local server receives the encrypted password file sent by the remote server according to the first request; the local server decrypts the encrypted password file to obtain the password file; and the local server sends the password file to the multimedia control, wherein the password file is used for decrypting the encrypted target file in the multimedia control.
According to another aspect of the embodiments of the present invention, there is also provided a data processing apparatus, including: the acquiring unit is used for acquiring the identification of the target file in the first network address sent by the multimedia control; the first request unit is used for sending a first request to a remote server according to the identification of the target file, wherein the first request is used for requesting to acquire a password file of the target file; a first receiving unit, configured to receive the encrypted password file sent by the remote server according to the first request; the decryption unit is used for decrypting the encrypted password file to obtain the password file; and the first sending unit is used for sending the password file to the multimedia control, wherein the password file is used for decrypting the encrypted target file in the multimedia control.
Optionally, the apparatus further comprises: a second verifying unit, configured to verify a check code carried by a second network address sent by a multimedia control after the second receiving unit receives the second network address, where the check code is generated by the local server according to a second field of the second network address and an identifier of the target file, and the second field is used to indicate a request to acquire the storage address list; a second determining unit, configured to determine to send the second request to the remote server after the verification is successful.
Optionally, the modifying unit modifies the address of the password file into the first network address in the memory of the target application.
Optionally, the apparatus further comprises: the instruction unit is used for acquiring a pre-stored identifier of the target file after the target application receives a first instruction before receiving a second network address sent by a multimedia control, wherein the first instruction is used for indicating to acquire the target file; and the generating unit is used for generating the second network address according to the identification of the target file.
The password file transmitted between the local server and the remote server is in an encrypted state, so that the security of the password file in the transmission process is ensured, and the password file is requested to the remote server through the local server, so that the target application can directly call the multimedia control to play the target file without changing the multimedia control, the flexibility of the multimedia control is improved, the technical problem that the security of the client plays the multimedia file is poor in the prior art is solved, and the technical effect of improving the security is achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a hardware block diagram according to an embodiment of the invention;
FIG. 2 is a flow chart of a method of processing data according to an embodiment of the invention;
FIG. 3 is a schematic diagram of an interface of a target application according to an embodiment of the invention;
FIG. 4 is a schematic diagram of a playback interface according to an embodiment of the invention;
FIG. 5 is a schematic illustration of an m3u8 file according to an embodiment of the present invention;
FIG. 6 is a schematic diagram of a password for an m3u8 file according to an embodiment of the invention;
FIG. 7 is a flow diagram of obtaining a password file according to an embodiment of the present invention;
FIG. 8 is a flowchart of obtaining an m3u8 file according to an embodiment of the present invention;
FIG. 9 is a schematic diagram of an apparatus for processing data according to an embodiment of the present invention;
fig. 10 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of an embodiment of the present invention, a method for processing data is provided. In this embodiment, the data processing method can be applied to a hardware environment formed by the terminal and the server shown in fig. 1. As shown in fig. 1, an application 101 establishes a local server 102, and the local server 102 is connected to a remote server 103 via a network. Such networks include, but are not limited to: the terminal 101 may be a mobile phone terminal, or may also be a PC terminal, a notebook terminal, or a tablet terminal.
Fig. 2 is a flow of a data processing method according to an embodiment of the present invention. As shown in fig. 2, the data processing method includes:
step S200, the local server of the target application acquires the identification of the target file in the first network address sent by the multimedia control.
The target application may be the application 101 shown in fig. 1. The multimedia control can be a control used in the terminal to play the multimedia file. For example, the target application is a news client shown in fig. 3 for displaying news, the multimedia widget is program code for playing an audio file, the news client calls the multimedia widget to play the multimedia file, and the playing interface of the multimedia file is shown in fig. 4. For example, the multimedia control may obtain, through the local server, a multimedia file such as an audio file or a video file stored on the remote server, and play the obtained multimedia file.
The target file may be a file that the target application calls the multimedia control to play, and the target file may be a multimedia file such as an audio file or a video file. The identification of the target file may be used to indicate the name, number, etc. of the target file. The storage address of the target file is stored in the m3u8 file. Fig. 5 shows the storage content of the m3u8 file. m3u8 is a multimedia playlist file format. The m3u8 file is a text file with the content opened as shown in fig. 5, and has many audio file addresses therein, such as the content in the red box of the figure in fig. 5. For example:
http:// tfp. gtimg. com/tfp/dd/audio/KMJH8nEURbrsu0nTq33.0. mp3, etc., the player will play the audio files listed in m3u8 in sequence.
As shown in fig. 5, any one of the addresses in the black box indicates a storage address of one target file, for example, kmjjjjjj8eurbrsu 0ntg33.0 in the storage address is an identifier of one target file, and kmjjjjjjjj8eurbrsu 0ntg33.1 and kmjjjjjjjjjjjjjjjjjjjjh 0 in the other storage addresses are identifiers of two target files, respectively.
The first network address is an address pointing to a local server, unlike the storage address shown in fig. 5. The first network address may be http://127.0.0.1/a.keyid xxx & code xxx. Where 127.0.0.1 points to the local server, the first network address is used to request a key for decoding the encrypted audio file stored at the storage address in m3u 8. Id ═ xxx in the first network address represents the identifier of the target file, and code ═ xxx is a check code of the first network address, and is used for checking whether the first network address is generated by the local server. It should be noted that the web address is used to illustrate information that the first network address can carry, and the form is not limited to the above example.
Step S202, the local server sends a first request to a remote server according to the identification of the target file, wherein the first request is used for requesting to acquire the password file of the target file.
The remote server stores the target file, and the target file is transmitted in an encrypted form, so that the target file is prevented from being captured and played in the transmission process. Therefore, after obtaining the encrypted target file, the multimedia control needs to decode the encrypted target file by using the password file of the target file. The object files recorded in the m3u8 file shown in fig. 5 can all be decrypted with the same password file.
The encryption scheme of the target file is described in the m3u8 file shown in fig. 5, and as shown in the box shown in fig. 6, the encryption scheme is: EXT-X-KEY: METHOD AES-128.
Step S204, the local server receives the encrypted password file sent by the remote server according to the first request.
Step S206, the local server decrypts the encrypted password file to obtain the password file.
The local server and the remote server agree on encryption rules in advance, for example, using asymmetric encryption. And after receiving the encrypted password file, the local server decrypts the encrypted password file by using an agreed encryption rule to obtain the password file. In the process of transmitting the password file by the remote server and the local server, the password file is in an encrypted state, so that even if the encrypted password file is intercepted or captured, the security of the password file is ensured because decryption cannot be performed.
Step S208, the local server sends the password file to the multimedia control, where the password file is used to decrypt the encrypted target file in the multimedia control.
And after the local server acquires the password file, the password file is sent to the multimedia control. Because the local server and the multimedia control are both arranged in the same terminal, the password file transmitted between the local server and the multimedia control cannot be leaked, and the security of the password file is further ensured. The multimedia control decrypts the target file by using the password file, thereby playing the target file.
The password file transmitted between the local server and the remote server is in an encrypted state, so that the security of the password file in the transmission process is ensured, and the password file is requested to the remote server through the local server, so that the target application can directly call the multimedia control to play the target file without changing the multimedia control, the flexibility of the multimedia control is improved, the technical problem that the security of the client plays the multimedia file is poor in the prior art is solved, and the technical effect of improving the security is achieved.
In order to more clearly explain the technical solution of the present embodiment, the present embodiment is explained below with reference to fig. 7. Fig. 7 is a flowchart of requesting a password file according to an embodiment of the present invention.
The player sends the first network address http://127.0.0.1/a.keyid ═ xxx & code ═ xxx to the local server. The player is a multimedia control, and the local server is a local server of the target application.
And the local server checks the check code of the first network address. That is, after the local server of the target application acquires the identifier of the target file in the first network address sent by the multimedia control, the method further includes: the local server verifies a check code carried by the first network address, wherein the check code is generated by the local server according to a first field in the first network address and the identifier of the target file, and the first field is used for indicating a request for obtaining the password file; and the local server determines to send the first request to the remote server after the verification is successful.
The first field may be the first network address http:// 127.0.0.1/a.keyid? A field. The identifier of the target file may be id xxx, and the generated check code may be code xxx. The local server judges whether the received first network address is sent by the multimedia control or not by verifying the check code, so that response to a forged network address is avoided. After successful verification, a first request may be sent to the remote server, determining that the first network address is legitimate.
Finding the real url (uniform resource locator) corresponding to the id. Namely, the network address corresponding to the identification of the target file is determined. The network address is the address on the remote server where the target file is stored, which is the network address in the m3u8 file shown in fig. 7.
Optionally, the sending, by the local server, the first request to the remote server according to the identifier of the target file includes: the local server determines a first storage address of a target password file of the target file on the remote server according to the identification of the target file; the local server generates the first request according to the first storage address, wherein the first request is used for requesting to access the first storage address; the local server sends the first request to the remote server.
The local server stores the corresponding relation between the id and the real url of the password file in advance, and determines a real address, namely a first storage address according to the id which is xxx. The local server requests access to the first storage address to download the password file.
Fourthly, the key file is requested. That is, the local server requests the password file from the remote server.
And fifthly, returning the asymmetrically encrypted key file. The remote server returns the encrypted password file to the local server.
Sixthly, the real key is obtained through public key decryption. And the local server decrypts the encrypted password file through a pre-agreed public key to obtain a decrypted password file.
And seventhly, returning the real key file. Namely, the local server sends the password file to the multimedia control through the memory of the target application.
The local server sends the password file through the memory of the target application, so that the password file is prevented from being captured, the password file can be ensured to be only obtained by the multimedia control, the downloaded target file is decoded by utilizing the password file, and the target file is played.
Fig. 8 is a flowchart of requesting an m3u8 file according to an embodiment of the present invention. This step of requesting m3u8 is performed before the request key file of FIG. 7. In this embodiment, an m3u8 file is requested first, and after an m3u8 file is obtained, an address (enc. key) of a password file recorded in the m3u8 file is modified to point to a local server, so that the local server requests the remote server for the password file
The flow of modifying the address of the password file is described below in conjunction with fig. 8.
Target application requests the m3u8 file from the local server, the second network address of the m3u8 file pointing to the local server: http://127.0.0.1/a.m3u8id ═ xxx & code ═ xxx
Optionally, the local server obtains a pre-stored identifier of the target file after the target application receives a first instruction, where the first instruction is used to instruct to obtain the target file; and the local server generates the second network address according to the identification of the target file.
The target application stores the identifier of the target file, and after receiving a first instruction for indicating the playing of the target file, the target application sends the identifier of the target file to the local server. The local server is established by the target application, and the local server generates a second network address according to the identification of the target file, so that the multimedia control requests the m3u8 file from the remote server through the local server when requesting the m3u8 file.
And the local server receives a second network address sent by the multimedia control, wherein the second network address is used for requesting to acquire a storage address list of the target file, and the second network address carries an identifier of the target file. The storage address list is an m3u8 file, and the id in the second network address represents
And the local server checks the check code of the second network address. Namely, after the local server receives the second network address sent by the multimedia control, the method further comprises: and the local server verifies a check code carried by the second network address, wherein the check code is generated by the local server according to a second field of the second network address and the identifier of the target file, and the second field is used for indicating a request for acquiring the storage address list. And after the verification is successful, the local server determines to send the second request to the remote server.
The second field is a.m3u8 in the second network address, and this field is used to indicate that the second network address is used to request to obtain the m3u8 file. After the local server verifies the second network address, it determines that the second network address is not forged and determines to generate the second request.
Finding real url corresponding to id
And (3) finding the corresponding relation between the id recorded in the local server and the m3u8, and finding the true network address of the m3u8 file corresponding to the id. Namely, the local server determines a second storage address of the storage address list of the target file on the remote server according to the identifier of the target file.
Request m3u8 file. I.e., the local server sends a second request to the remote server to request the download of the m3u8 file. That is, the local server sends a second request to the remote server according to the second storage address, where the second request is used to request to obtain the storage address list;
and returning to the m3u8 file. The local server receives the storage address list sent by the remote server, wherein the storage address list records the address of the password file;
sixthly, modifying the address of enc.key to http://127.0.0.1/a.m3u8id ═ xxx & code ═ xxx. The local server modifies the address of the password file into the first network address, wherein the first network address points to the local server; and the local server sends the first network address to the multimedia control.
C returning the m3u8 file. And the local server modifies the address of the password file into the first network address in the memory of the target application. The address of the password file is modified into the first network address in the memory of the target application, the modified first network address is prevented from being captured, the first network address can be ensured to be only obtained by the multimedia control, and the first network address is prevented from being intercepted to forge the request to the remote server.
Through the embodiment, the security of transmitting the password file between the local server and the remote server is improved, the key is not required to be intercepted by a packet capturing tool such as Fiddler, and the target file is encrypted, so that the security of the target file is ensured. Secondly, the multimedia control of the system is used for playing the target file, the multimedia control does not need to be customized independently, and the development period is short. The system application is used, the customized application does not need to be introduced, the size of an installation package of the target application is increased by only a few k, and a plurality of platforms (including Android and iOS platforms) can be used.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
According to another aspect of the embodiments of the present invention, there is also provided a data processing apparatus for implementing the data processing method, where the data processing apparatus is configured as a local server of a target application, and as shown in fig. 9, the local server includes:
the obtaining unit 90 is configured to obtain an identifier of a target file in a first network address sent by a multimedia control;
the first request unit 92 is configured to send a first request to a remote server according to the identifier of the target file, where the first request is used to request to obtain a password file of the target file;
the first receiving unit 94 is configured to receive the encrypted password file sent by the remote server according to the first request;
the decryption unit 96 is configured to decrypt the encrypted password file to obtain the password file;
the first sending unit 98 is configured to send the password file to the multimedia control, where the password file is used to decrypt the encrypted target file in the multimedia control.
Optionally, the first request unit includes: the address module is used for determining a first storage address of a target password file of the target file on the remote server according to the identification of the target file; a generating module, configured to generate the first request according to the first storage address, where the first request is used to request access to the first storage address; a first sending module, configured to send the first request to the remote server.
Optionally, the first sending unit sends the password file to the multimedia control through the memory of the target application.
Optionally, the apparatus further comprises: the first verification unit is configured to verify a check code carried by a first network address after the acquisition unit acquires an identifier of a target file in the first network address sent by the multimedia control, where the check code is generated by the local server according to a first field in the first network address and the identifier of the target file, and the first field is used to indicate that the acquisition of the password file is requested; a first determining unit, configured to determine to send the first request to the remote server after the verification is successful.
Optionally, the apparatus further comprises: a second receiving unit, configured to receive a second network address sent by the multimedia control before the obtaining unit obtains an identifier of a target file in a first network address sent by the multimedia control, where the second network address is used to request to obtain a storage address list of the target file, and the second network address carries the identifier of the target file; the second address unit is used for determining a second storage address of the storage address list of the target file on the remote server according to the identifier of the target file; a second sending unit, configured to send a second request to the remote server according to the second storage address, where the second request is used to request to obtain the storage address list; a third receiving unit, configured to receive the storage address list sent by the remote server, where the storage address list describes an address of the password file; a modification unit, configured to modify an address of the password file into the first network address, where the first network address points to the local server; and the second sending unit is used for sending the first network address to the multimedia control.
Optionally, the apparatus further comprises: a second verifying unit, configured to verify a check code carried by a second network address sent by a multimedia control after the second receiving unit receives the second network address, where the check code is generated by the local server according to a second field of the second network address and an identifier of the target file, and the second field is used to indicate a request to acquire the storage address list; a second determining unit, configured to determine to send the second request to the remote server after the verification is successful.
Optionally, the modifying unit modifies the address of the password file into the first network address in the memory of the target application.
Optionally, the apparatus further comprises: the instruction unit is used for acquiring a pre-stored identifier of the target file after the target application receives a first instruction before receiving a second network address sent by a multimedia control, wherein the first instruction is used for indicating to acquire the target file; and the generating unit is used for generating the second network address according to the identification of the target file.
Optionally, the specific execution steps and actions of the data processing apparatus in this embodiment refer to the method embodiment, which is not described herein again.
According to a further aspect of the embodiments of the present invention, there is also provided an electronic device for implementing the data processing method, as shown in fig. 10, the electronic device includes a memory and a processor, the memory stores a computer program, and the processor is configured to execute the steps in any one of the method embodiments by the computer program.
Alternatively, fig. 10 is a block diagram of an electronic device according to an embodiment of the invention. As shown in fig. 10, the electronic device may include: one or more processors 1001 (only one of which is shown), at least one communication bus 1002, a user interface 1003, at least one transmission device 1004
12PN84429 and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include, among other things, a display 1006 and a keyboard 1007. The transmission means 1004 may optionally include standard wired and wireless interfaces.
Optionally, in this embodiment, the electronic apparatus may be located in at least one network device of a plurality of network devices of a computer network.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, the local server of the target application acquires the identification of the target file in the first network address sent by the multimedia control;
s2, the local server sends a first request to a remote server according to the identification of the target file, wherein the first request is used for requesting to acquire the password file of the target file;
s3, the local server receives the encrypted password file sent by the remote server according to the first request;
s4, the local server decrypts the encrypted password file to obtain the password file;
and S5, the local server sends the password file to the multimedia control, wherein the password file is used for decrypting the encrypted target file in the multimedia control.
Alternatively, it can be understood by those skilled in the art that the structure shown in fig. 10 is only an illustration, and the electronic device may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 10 is a diagram illustrating a structure of the electronic device. For example, the electronic device may also include more or fewer components (e.g., network interfaces, display devices, etc.) than shown in FIG. 10, or have a different configuration than shown in FIG. 10.
The memory 1005 may be used to store software programs and modules, such as program instructions/modules corresponding to the data processing method and apparatus in the embodiments of the present invention, and the processor 1001 executes various functional applications and data processing by running the software programs and modules stored in the memory 1005, that is, implements the data processing method. The memory 1005 may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 1005 may further include memory located remotely from the processor 1001, which may be connected to a terminal over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The transmission device 1004 is used for receiving or transmitting data via a network. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 1004 includes a Network adapter (NIC) that can be connected to a router via a Network cable and other Network devices to communicate with the internet or a local area Network. In one example, the transmission device 1004 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
The memory 1005 is specifically configured to store a correspondence between the identifier and the real website.
The password file transmitted between the local server and the remote server is in an encrypted state, so that the security of the password file in the transmission process is ensured, and the password file is requested to the remote server through the local server, so that the target application can directly call the multimedia control to play the target file without changing the multimedia control, the flexibility of the multimedia control is improved, the technical problem that the security of the client plays the multimedia file is poor in the prior art is solved, and the technical effect of improving the security is achieved.
Embodiments of the present invention also provide a storage medium having a computer program stored therein, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the storage medium may be configured to store a computer program for executing the steps of:
s1, the local server of the target application acquires the identification of the target file in the first network address sent by the multimedia control;
s2, the local server sends a first request to a remote server according to the identification of the target file, wherein the first request is used for requesting to acquire the password file of the target file;
s3, the local server receives the encrypted password file sent by the remote server according to the first request;
s4, the local server decrypts the encrypted password file to obtain the password file;
and S5, the local server sends the password file to the multimedia control, wherein the password file is used for decrypting the encrypted target file in the multimedia control.
Optionally, the storage medium is further arranged to store a computer program for performing the steps of:
the local server determines a first storage address of a target password file of the target file on the remote server according to the identification of the target file;
the local server generates the first request according to the first storage address, wherein the first request is used for requesting to access the first storage address;
the local server sends the first request to the remote server.
Optionally, the storage medium is further arranged to store a computer program for performing the steps of: and the local server sends the password file to the multimedia control through the memory of the target application.
Optionally, the storage medium is further arranged to store a computer program for performing the steps of: the local server verifies a check code carried by the first network address, wherein the check code is generated by the local server according to a first field in the first network address and the identifier of the target file, and the first field is used for indicating a request for obtaining the password file;
and the local server determines to send the first request to the remote server after the verification is successful.
Optionally, the storage medium is further arranged to store a computer program for performing the steps of: the local server receives a second network address sent by the multimedia control, wherein the second network address is used for requesting to acquire a storage address list of the target file, and the second network address carries an identifier of the target file;
the local server determines a second storage address of the storage address list of the target file on the remote server according to the identifier of the target file;
the local server sends a second request to the remote server according to the second storage address, wherein the second request is used for requesting to acquire the storage address list;
the local server receives the storage address list sent by the remote server, wherein the storage address list records the address of the password file;
the local server modifies the address of the password file into the first network address, wherein the first network address points to the local server;
and the local server sends the first network address to the multimedia control.
Optionally, the storage medium is further arranged to store a computer program for performing the steps of: the local server verifies a check code carried by the second network address, wherein the check code is generated by the local server according to a second field of the second network address and the identifier of the target file, and the second field is used for indicating a request for acquiring the storage address list;
and after the verification is successful, the local server determines to send the second request to the remote server.
Optionally, the storage medium is further arranged to store a computer program for performing the steps of: and the local server modifies the address of the password file into the first network address in the memory of the target application.
Optionally, the storage medium is further arranged to store a computer program for performing the steps of: the local server acquires a pre-stored identifier of the target file after the target application receives a first instruction, wherein the first instruction is used for indicating to acquire the target file;
and the local server generates the second network address according to the identification of the target file.
Optionally, the storage medium is further configured to store a computer program for executing the steps included in the method in the foregoing embodiment, which is not described in detail in this embodiment.
Alternatively, in this embodiment, a person skilled in the art may understand that all or part of the steps in the methods of the foregoing embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing one or more computer devices (which may be personal computers, servers, network devices, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (13)

1. A method for processing data, comprising:
a local server of a target application acquires an identifier of a target file in a first network address sent by a multimedia control;
the local server sends a first request to a remote server according to the identification of the target file, wherein the first request is used for requesting to acquire a password file of the target file;
the local server receives the encrypted password file sent by the remote server according to the first request;
the local server decrypts the encrypted password file to obtain the password file;
the local server sends the password file to the multimedia control, wherein the password file is used for decrypting the encrypted target file in the multimedia control;
after the local server of the target application acquires the identifier of the target file in the first network address sent by the multimedia control, the method further includes:
the local server verifies a check code carried by the first network address, wherein the check code is generated by the local server according to a first field in the first network address and the identifier of the target file, the first field is used for indicating a request to acquire the password file, and the local server judges whether the received first network address is sent by the multimedia control or not by verifying the check code;
and the local server determines to send the first request to the remote server after the verification is successful.
2. The method of claim 1, wherein the local server issuing a first request to a remote server based on the identification of the target file comprises:
the local server determines a first storage address of a target password file of the target file on the remote server according to the identification of the target file;
the local server generates the first request according to the first storage address, wherein the first request is used for requesting to access the first storage address;
the local server sends the first request to the remote server.
3. The method of claim 1, wherein the local server sending the password file to the multimedia control comprises:
and the local server sends the password file to the multimedia control through the memory of the target application.
4. The method of claim 1, wherein before the local server of the target application obtains the identification of the target file in the first network address sent by the multimedia control, the method further comprises:
the local server receives a second network address sent by the multimedia control, wherein the second network address is used for requesting to acquire a storage address list of the target file, and the second network address carries an identifier of the target file;
the local server determines a second storage address of the storage address list of the target file on the remote server according to the identifier of the target file;
the local server sends a second request to the remote server according to the second storage address, wherein the second request is used for requesting to acquire the storage address list;
the local server receives the storage address list sent by the remote server, wherein the storage address list records the address of the password file;
the local server modifies the address of the password file into the first network address, wherein the first network address points to the local server;
and the local server sends the first network address to the multimedia control.
5. The method of claim 4, wherein after the local server receives the second network address sent by the multimedia control, the method further comprises:
the local server verifies a check code carried by the second network address, wherein the check code is generated by the local server according to a second field of the second network address and the identifier of the target file, and the second field is used for indicating a request for acquiring the storage address list;
and after the verification is successful, the local server determines to send the second request to the remote server.
6. The method of claim 4, wherein the local server modifying the address of the password file to the first network address comprises:
and the local server modifies the address of the password file into the first network address in the memory of the target application.
7. The method of claim 4, wherein before the local server receives the second network address sent by the multimedia control, the method further comprises:
the local server acquires a pre-stored identifier of the target file after the target application receives a first instruction, wherein the first instruction is used for indicating to acquire the target file;
and the local server generates the second network address according to the identification of the target file.
8. A processing apparatus for data, the processing apparatus being configured as a local server for a target application, the local server comprising:
the acquiring unit is used for acquiring the identification of the target file in the first network address sent by the multimedia control;
the first request unit is used for sending a first request to a remote server according to the identification of the target file, wherein the first request is used for requesting to acquire a password file of the target file;
a first receiving unit, configured to receive the encrypted password file sent by the remote server according to the first request;
the decryption unit is used for decrypting the encrypted password file to obtain the password file;
the first sending unit is used for sending the password file to the multimedia control, wherein the password file is used for decrypting the encrypted target file in the multimedia control;
the device further comprises:
the first verification unit is configured to verify a check code carried by a first network address after the acquisition unit acquires an identifier of a target file in the first network address sent by a multimedia control, where the check code is generated by the local server according to a first field in the first network address and the identifier of the target file, the first field is used for indicating a request to acquire the password file, and the local server verifies the check code to determine whether the received first network address is sent by the multimedia control;
a first determining unit, configured to determine to send the first request to the remote server after the verification is successful.
9. The apparatus of claim 8, wherein the first request unit comprises:
the address module is used for determining a first storage address of a target password file of the target file on the remote server according to the identification of the target file;
a generating module, configured to generate the first request according to the first storage address, where the first request is used to request access to the first storage address;
a first sending module, configured to send the first request to the remote server.
10. The apparatus of claim 8, wherein the first sending unit sends the password file to the multimedia control through a memory of the target application.
11. The apparatus of claim 8, further comprising:
a second receiving unit, configured to receive a second network address sent by the multimedia control before the obtaining unit obtains an identifier of a target file in a first network address sent by the multimedia control, where the second network address is used to request to obtain a storage address list of the target file, and the second network address carries the identifier of the target file;
the second address unit is used for determining a second storage address of the storage address list of the target file on the remote server according to the identifier of the target file;
a second sending unit, configured to send a second request to the remote server according to the second storage address, where the second request is used to request to obtain the storage address list;
a third receiving unit, configured to receive the storage address list sent by the remote server, where the storage address list describes an address of the password file;
a modification unit, configured to modify an address of the password file into the first network address, where the first network address points to the local server;
and the second sending unit is used for sending the first network address to the multimedia control.
12. A computer-readable storage medium, in which a computer program is stored, wherein the computer program is arranged to perform the method of any of claims 1 to 7 when executed.
13. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 7 by means of the computer program.
CN201810225999.8A 2018-03-19 2018-03-19 Data processing method and device, storage medium and electronic device Active CN110290097B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810225999.8A CN110290097B (en) 2018-03-19 2018-03-19 Data processing method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810225999.8A CN110290097B (en) 2018-03-19 2018-03-19 Data processing method and device, storage medium and electronic device

Publications (2)

Publication Number Publication Date
CN110290097A CN110290097A (en) 2019-09-27
CN110290097B true CN110290097B (en) 2021-08-27

Family

ID=68000944

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810225999.8A Active CN110290097B (en) 2018-03-19 2018-03-19 Data processing method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN110290097B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110677686B (en) * 2019-10-14 2022-04-15 体奥动力(北京)体育传播有限公司 Multimedia information calling method, device, system and server
CN113901534B (en) * 2021-09-18 2022-07-19 橙色云互联网设计有限公司 Data service method, device, storage medium and processor

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819702A (en) * 2012-07-19 2012-12-12 腾讯科技(深圳)有限公司 File encryption operation method and file encryption operation system
CN104754571A (en) * 2013-12-25 2015-07-01 深圳中兴力维技术有限公司 User authentication realizing method, device and system thereof for multimedia data transmission
CN105512520A (en) * 2015-12-02 2016-04-20 厦门雅迅网络股份有限公司 Anti-cloning vehicle-mounted system and work method thereof
CN105516143A (en) * 2015-12-10 2016-04-20 浙江省公众信息产业有限公司 Anti-leech method, device and system for streaming media
CN105657456A (en) * 2016-03-10 2016-06-08 腾讯科技(深圳)有限公司 Processing method, device and system for multimedia data
CN107770130A (en) * 2016-08-17 2018-03-06 杭州海康威视数字技术股份有限公司 A kind of content of multimedia acquisition methods and device

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105763827B (en) * 2014-12-16 2019-09-03 深圳市腾讯计算机系统有限公司 Voice and video telephone method, apparatus and system
US9936040B2 (en) * 2014-12-19 2018-04-03 Citrix Systems, Inc. Systems and methods for partial video caching
CN104951506A (en) * 2015-05-21 2015-09-30 腾讯科技(深圳)有限公司 Method and device for acquiring multimedia file
US10432685B2 (en) * 2016-05-31 2019-10-01 Brightcove, Inc. Limiting key request rates for streaming media
CN106657165B (en) * 2017-03-09 2020-08-04 腾讯科技(深圳)有限公司 Network attack defense method, server and terminal
CN107396423B (en) * 2017-07-26 2019-01-08 腾讯科技(深圳)有限公司 Method for network access and device, storage medium and electronic device
CN107734361A (en) * 2017-09-30 2018-02-23 深圳融创新技术有限公司 Streaming media server dispatching method, system, readable storage medium storing program for executing and server
CN107659829B (en) * 2017-11-06 2020-05-22 网宿科技股份有限公司 Video encryption method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102819702A (en) * 2012-07-19 2012-12-12 腾讯科技(深圳)有限公司 File encryption operation method and file encryption operation system
CN104754571A (en) * 2013-12-25 2015-07-01 深圳中兴力维技术有限公司 User authentication realizing method, device and system thereof for multimedia data transmission
CN105512520A (en) * 2015-12-02 2016-04-20 厦门雅迅网络股份有限公司 Anti-cloning vehicle-mounted system and work method thereof
CN105516143A (en) * 2015-12-10 2016-04-20 浙江省公众信息产业有限公司 Anti-leech method, device and system for streaming media
CN105657456A (en) * 2016-03-10 2016-06-08 腾讯科技(深圳)有限公司 Processing method, device and system for multimedia data
CN107770130A (en) * 2016-08-17 2018-03-06 杭州海康威视数字技术股份有限公司 A kind of content of multimedia acquisition methods and device

Also Published As

Publication number Publication date
CN110290097A (en) 2019-09-27

Similar Documents

Publication Publication Date Title
US11055429B2 (en) Key providing method, video playing method, server and client
US10218512B2 (en) Robot mitigation
CN110198296B (en) Authentication method and device, storage medium and electronic device
CN110399717B (en) Key acquisition method and device, storage medium and electronic device
CN110401677B (en) Method and device for acquiring digital copyright key, storage medium and electronic equipment
US20140351583A1 (en) Method of implementing a right over a content
CN110011950B (en) Authentication method and device for video stream address
CN110276000B (en) Method and device for acquiring media resources, storage medium and electronic device
CN104735484B (en) A kind of method and device for playing video
CN104602238A (en) Wireless network connecting method, device and system
CN111143869A (en) Application package processing method and device, electronic equipment and storage medium
US20170171166A1 (en) Anti-hotlinking method and electronic device
CN111723889B (en) Code scanning login method, graphic code display method, device, equipment and storage medium
CN109040079A (en) The establishment of live streaming chained address and verification method and related device
CN110958239B (en) Method and device for verifying access request, storage medium and electronic device
CN112738117A (en) Data transmission method, device and system, storage medium and electronic device
CN112199622A (en) Page jump method, system and storage medium
CN104935435A (en) Login methods, terminal and application server
US10708326B2 (en) Secure media casting bypassing mobile devices
CA3127882A1 (en) Short message sending method, device, and computer system
CN110290097B (en) Data processing method and device, storage medium and electronic device
CN112399392A (en) Communication connection method, device, equipment and storage medium of home care terminal
CN108235067B (en) Authentication method and device for video stream address
CN110012317A (en) A kind of video acquiring method and device, a kind of video encryption method and device
CN108055356A (en) A kind of information processing method, server, client and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant