CN110401669A - A kind of proof of identity method and relevant device - Google Patents

A kind of proof of identity method and relevant device Download PDF

Info

Publication number
CN110401669A
CN110401669A CN201910704436.1A CN201910704436A CN110401669A CN 110401669 A CN110401669 A CN 110401669A CN 201910704436 A CN201910704436 A CN 201910704436A CN 110401669 A CN110401669 A CN 110401669A
Authority
CN
China
Prior art keywords
terminal
identity
legal
data packet
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910704436.1A
Other languages
Chinese (zh)
Other versions
CN110401669B (en
Inventor
朱嘉俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Cubesili Information Technology Co Ltd
Original Assignee
Guangzhou Huaduo Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huaduo Network Technology Co Ltd filed Critical Guangzhou Huaduo Network Technology Co Ltd
Priority to CN201910704436.1A priority Critical patent/CN110401669B/en
Publication of CN110401669A publication Critical patent/CN110401669A/en
Application granted granted Critical
Publication of CN110401669B publication Critical patent/CN110401669B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Abstract

The present invention provides a kind of proof of identity method and relevant device, sends the data packet that terminal is sent this method comprises: receiving terminal and receiving.Data packet is parsed, the terminal identity mark in data packet is obtained.Verifying terminal identity identifies whether to be present in legal terminal list.If terminal identity mark is present in legal terminal list, determine that the transmission terminal identity for sending data packet is legal.In embodiments of the present invention, it receives terminal and identifies whether to be present in legal terminal list by verifying terminal identity, so that it is determined that whether the identity for sending terminal is legal, when terminal identity mark is present in legal terminal list, determine that the transmission terminal identity for sending data packet is legal, the wasting of resources of Cloud Server can be reduced, and the resource utilization of server can be reduced.

Description

A kind of proof of identity method and relevant device
Technical field
The present invention relates to technical field of information communication more particularly to a kind of proof of identity method and relevant devices.
Background technique
With the development of science and technology, Cloud Server supports a variety of data to calculate.But various data calculate required service Device resource is different, and is needed rationally to utilize Cloud Server resource, is avoided the waste of Cloud Server resource.
In the prior art, cloud server receive send terminal be sent to receive terminal data packet when, cloud service Whether device verification data packet is legal, since data packet does not have any value to cloud server, passes through cloud server school Test whether data packet is legal, will lead to the serious waste of resources of Cloud Server.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of proof of identity method and relevant device, to solve in the prior art The problem of waste of server resource.
To achieve the above object, the embodiment of the present invention provides the following technical solutions:
First aspect of the embodiment of the present invention discloses a kind of proof of identity method, which comprises
It receives and sends the data packet that terminal is sent, the data packet is with Preset Transfer format transmission, in the data packet extremely It less include that terminal identity identifies;
The data packet is parsed, the terminal identity mark in the data packet is obtained;
It verifies the terminal identity to identify whether to be present in legal terminal list, be stored in the legal terminal list The terminal identity of legal terminal identifies, and the legal terminal list is sent to the reception terminal by the Cloud Server;
If the terminal identity mark is present in the legal terminal list, determine that the transmission for sending the data packet is whole Hold identity legal.
Optionally, the parsing data packet obtains the terminal identity mark in the data packet, comprising:
The data packet is parsed, the data with Preset Transfer structure are obtained, the Preset Transfer structure includes terminal body Part identification field and operation data store field, and the data of the Preset Transfer structure are by transmission terminal according to Preset Transfer structure Will serializing treated the terminal identity of itself mark and operation data carry out it is assembled after obtain;
The unserializing processing data with Preset Transfer structure, terminal identity mark after obtaining unserializing and Operation data;
Terminal identity mark after unserializing is converted to the identifiable data of the reception terminal with operation data;
Obtain the terminal identity mark.
Optionally, after the determining transmission terminal identity for sending the data packet is legal, further includes:
The operation data is obtained, and corresponding operating is executed based on the operation data, and show corresponding live streaming picture.
Optionally, the verifying terminal identity identifies whether to be present in legal terminal list, comprising:
The legal terminal list is traversed, searching in all legal terminal lists whether there is and the terminal identity Identify consistent terminal identity mark.
Optionally, further includes:
If the terminal identity mark is not present in the legal terminal list, the transmission for sending the data packet is determined Terminal identity is illegal, and abandons the data packet.
Second aspect of the embodiment of the present invention discloses a kind of proof of identity method, is suitable for sending terminal, the method packet It includes:
Acquisition executes the operation data generated when business operation;
Terminal identity mark to be spliced based on Preset Transfer structure is serialized with operation data, it is described pre- If transmission structure includes terminal identity identification field and operation data storage field;
Based on the terminal identity mark after the operation data and serializing after Preset Transfer structures to form serializing, obtain To data packet, the operation data after the serializing is stored in the operation data storage field, the terminal after the serializing Identity is stored in the terminal identity identification field;
The data packet is sent to terminal is received, is wrapped based on the data for triggering the reception terminal to the transmission Terminal carries out authentication.
The third aspect of the embodiment of the present invention discloses a kind of identity verification device, and described device includes:
Receiving unit, for receiving the data packet for sending terminal and sending, the data packet is with Preset Transfer format transmission, institute It states and includes at least terminal identity mark in data packet;
Resolution unit obtains the terminal identity mark in the data packet for parsing the data packet;
Authentication unit identifies whether to be present in legal terminal list, the legal end for verifying the terminal identity The terminal identity mark of legal terminal is stored in the list of end, the legal terminal list is sent to described by the Cloud Server Receive terminal;
Determination unit determines described in sending if being present in the legal terminal list for terminal identity mark The transmission terminal identity of data packet is legal.
Fourth aspect of the embodiment of the present invention discloses a kind of identity identity verification device, is suitable for sending terminal, the dress It sets and includes:
Acquisition module, the operation data generated when executing business operation for acquiring;
Serialization module, for by the terminal identity to be spliced based on Preset Transfer structure mark and operation data into Row serializing, the Preset Transfer structure include terminal identity identification field and operation data storage field;
Splicing module, for based on the end after the operation data and serializing after Preset Transfer structures to form serializing Identity is held, data packet is obtained, the operation data after the serializing is stored in the operation data storage field, the sequence Terminal identity mark after columnization is stored in the terminal identity identification field;
Sending module is based on the number for triggering the reception terminal for sending the data packet to terminal is received Authentication is carried out to the transmission terminal according to packet.
The 5th aspect of the embodiment of the present invention discloses a kind of client, comprising:
Processor and memory;
Wherein, the processor is for executing the program stored in the memory;
The memory is for storing program, and described program is for executing the body as disclosed in first aspect of the embodiment of the present invention Auth method disclosed in part verification method or second aspect of the embodiment of the present invention.
The 6th aspect of the embodiment of the present invention discloses a kind of storage medium, and the storage medium includes storage program, wherein Identity disclosed in equipment where the storage medium is executed such as first aspect of the embodiment of the present invention is controlled in described program operation Verification method, or execute the auth method as disclosed in second aspect of the embodiment of the present invention.
The proof of identity method and relevant device provided based on the embodiments of the present invention, this method comprises: receiving terminal It receives and sends the data packet that terminal is sent, include that terminal identity identifies in data packet.Data packet is parsed, the end in data packet is obtained Hold identity.Verifying terminal identity identifies whether to be present in legal terminal list, and it is legal to be stored in legal terminal list The terminal identity of terminal identifies, and legal terminal list is sent to the reception terminal by Cloud Server.If terminal identity mark is deposited It is in legal terminal list, determines that the transmission terminal identity for sending data packet is legal.In embodiments of the present invention, terminal is received It identifies whether to be present in legal terminal list by verifying terminal identity, so that it is determined that whether the identity for sending terminal is legal, When terminal identity mark is present in legal terminal list, the determining transmission terminal identity for sending data packet is legal.It can reduce The wasting of resources of Cloud Server, and reduce the resource utilization of Cloud Server.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the application architecture figure of multiple terminals provided in an embodiment of the present invention and Cloud Server;
Fig. 2 is the schematic diagram that Cloud Server provided in an embodiment of the present invention sends legal terminal list to the whole network terminal;
Fig. 3 is the application schematic diagram that transmission terminal provided in an embodiment of the present invention generates data packet;
Fig. 4 is that reception terminal provided in an embodiment of the present invention receives the application schematic diagram for sending terminal data packet;
Fig. 5 is a kind of flow diagram of proof of identity method provided in an embodiment of the present invention;
Fig. 6 is the flow diagram of another proof of identity method provided in an embodiment of the present invention;
Fig. 7 is the flow diagram of specific parsing data packet provided in an embodiment of the present invention;
Fig. 8 is that a kind of user terminal provided in an embodiment of the present invention executes the display interface figure after adjustment operation;
Fig. 9 is a kind of structural block diagram of identity verification device provided in an embodiment of the present invention;
Figure 10 is the structural block diagram of another identity verification device provided in an embodiment of the present invention;
Figure 11 is a kind of structural block diagram of client provided in an embodiment of the present invention;
Figure 12 is the structural block diagram of another identity verification device provided in an embodiment of the present invention;
Figure 13 is the structural block diagram of another client provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In this application, the terms "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion, So that the process, method, article or equipment for including a series of elements not only includes those elements, but also including not having The other element being expressly recited, or further include for elements inherent to such a process, method, article, or device.Do not having There is the element limited in the case where more limiting by sentence "including a ...", it is not excluded that in the mistake including the element There is also other identical elements in journey, method, article or equipment.
It can be seen from background technology that, cloud server receive send terminal and be sent to the data packet for receiving terminal when, cloud clothes Whether device verification data packet of being engaged in is legal, since data packet does not have any value to cloud server, passes through cloud server It whether legal verifies data packet, will lead to the serious waste of resources of Cloud Server.
As shown in Figure 1, the application architecture figure of multiple terminals provided by the invention and Cloud Server.
The application architecture of multiple terminal and Cloud Server includes Cloud Server 11, terminal 12, terminal 13, terminal 14, end End 15 and terminal 16.
Realize that the treatment process for proof of identity includes: based on the processing framework
In the specific application process, Cloud Server 11 obtains the terminal identity mark of legal terminal in real time, and is added to conjunction In method terminal list, which is sent to the whole network terminal.Terminal identity mark refers to user in live streaming application After registration, Cloud Server 11 distributes to a number of the terminal, which is unique mode for distinguishing terminal identity.
Specifically, Cloud Server 11 is according to the IP address of terminal distribution one after user registers in the live streaming application of terminal A number gives the terminal.For example, after user registers in the live streaming application for the terminal that IP address is 120.11.31, Cloud Server It is ID135426 according to the number that the IP address distributes to terminal.
As shown in Fig. 2, the schematic diagram of legal terminal list is sent to the whole network terminal for Cloud Server.
It is at this time live streaming terminal for the terminal 12 of live streaming when main broadcaster is broadcast live by terminal 12.User passes through terminal The live content of the corresponding direct broadcasting room of 13 viewing live streaming terminals, the terminal 13 for watching live streaming is user terminal at this time.When it It, can also be using other terminals as user terminal when his user is broadcast live using the viewing of other terminals.
Live streaming terminal acquires itself and executes the operation data generated after operation, which is handled, and will place Operation data and the terminal identity of itself after reason identify and are spliced according to Preset Transfer structure, obtain sending to user terminal Data packet.
In the concrete realization, terminal is broadcast live, that is, sends terminal and is obtained using following manner to reception terminal transmission Data packet:
It then treats and is spelled based on Preset Transfer structure firstly, acquisition executes the operation data generated when business operation The terminal identity mark and operation data connect is serialized, and the Preset Transfer structure includes terminal identity identification field and behaviour Make data storage field;Then, based on the end after the operation data and serializing after Preset Transfer structures to form serializing Identity is held, data packet is obtained, finally, sending the data packet to terminal is received, is based on for triggering the reception terminal The data packet carries out authentication to the transmission terminal.Specifically, the operation data after the serializing be stored in it is described Operation data stores field, and the terminal identity mark after the serializing is stored in the terminal identity identification field.
As shown in figure 3, be specifically illustrated in conjunction with live streaming terminal disclosed above and user terminal, such as: eventually by live streaming It holds collected operation data to be converted, i.e., operation data is serialized, obtain the operation data indicated with byte format are as follows: 1001,0010,1100,0110,1001,0010,1100,0110.By the operation data with byte format instruction according to default After regularly arranged alignment, uid:1234 is identified as with the terminal identity of itself.According to Preset Transfer structure as shown in Table 1 into Row splicing, obtains corresponding data packet.
Table 1:
Data structure Int64 Any
Meaning uid businessData
Position (Byte) [0,8) [8,infiitas)
As shown in table 1, which refers to that terminal identity identifies, for example, the terminal identity is identified as ID123564.It is pre- at this If in transmission structure, the uid occupy in the Preset Transfer structure [0,8) byte, the uid with have the 64 of symbol it is whole Corresponding terminal identity mark is stored in corresponding byte by the format of type variable.The businessData is business datum, The businessData is used particularly as transport vehicle for storage service data, in the Preset Transfer in the Preset Transfer structure Occupied in structure [8, infiitas) byte.
As shown in figure 4, user terminal receives the data packet that live streaming terminal is sent by network channel, and data packet is parsed, Obtain the data with Preset Transfer structure.Data with Preset Transfer structure are converted to the identifiable number of user terminal According to.Obtain terminal identity mark and the operation data in the data.
Whether the identity of user terminal verification live streaming terminal is legal, i.e., user terminal verifying terminal identity identifies whether It is present in legal terminal list, if the live streaming terminal is present in legal terminal list, illustrates that verification passes through, display executes Corresponding live streaming picture after the operation data.If the live streaming terminal is not present in legal terminal list, illustrate verification not Pass through, abandons the data packet.
The processing framework shown based on the above embodiment verifies live streaming terminal identity by user terminal and identifies whether exist In legal terminal list, in order to determine that it is legal that live streaming terminal identity identifies whether, if live streaming terminal identity mark is legal, Display executes corresponding live streaming picture after the operation data, if live streaming terminal identity mark is illegal, packet discard.From And the wasting of resources of Cloud Server can be reduced, and reduce the resource utilization of Cloud Server.
Transmission terminal can be specially live streaming terminal shown in fig. 1 shown in the embodiment of the present invention, and receiving terminal can be with User terminal specially shown in fig. 1, Cloud Server can be specially Cloud Server shown in fig. 1.
Based on processing framework disclosed in the embodiments of the present invention, referring to Fig. 5, for a kind of body provided in an embodiment of the present invention The flow diagram of part method of calibration.The method is suitable for receiving terminal, which implements the mistake of proof of identity Journey the following steps are included:
Step S501: it receives and sends the data packet that terminal is sent.
In step S501, the data packet includes at least terminal body with Preset Transfer format transmission in the data packet Part mark and operation data.
During implementing step S501, the data packet is sent to described by transmission terminal by network channel Receive terminal.
Specifically, send terminal by collected operation data format afterwards with the terminal identity of itself mark by Spliced according to Preset Transfer structure, obtains the data packet sent to user terminal.
It should be noted that the network channel can be communication transmission passage, wherein the communication transmission passage is supported The communication transmission technologies such as 4G, wife and LTE can be set according to actual conditions, and the application is without restriction.
Step S502: parsing the data packet, obtains the terminal identity mark in the data packet.
It during implementing step S502, receives terminal and the data packet is parsed, obtain having default Data with Preset Transfer structure are converted to the identifiable data of user terminal, obtain the tool by the data of transmission structure There is the terminal identity mark in the data of Preset Transfer structure.
Step S503: it verifies the terminal identity and identifies whether to be present in legal terminal list, if the terminal identity Mark be present in the legal terminal list, execute step S504, if the terminal identity mark be not present in it is described legal In terminal list, step S505 is executed.
In step S503, legal terminal identity, the legal terminal column are stored in the legal terminal list Table is sent to the reception terminal by the Cloud Server.
It should be noted that the legal terminal list is sent to the process packet for receiving terminal by the Cloud Server It includes:
Terminal is pre-established with Cloud Server and is contacted.
Whether the N number of terminal of Cloud Server real-time detection completes registration information, when the completion registration information for detecting terminal When, to N number of terminal distribution number (i.e. terminal identity mark).Terminal identity is identified into deposit legal terminal list, that is, updates and closes Method terminal list.
The legal terminal list of update is sent to reception terminal by the Cloud Server in real time, and N is whole more than or equal to 1 Number.
It should be noted that before the reception terminal receives the legal terminal list that the Cloud Server is sent, The terminal that receives distrusts any transmission terminal for sending data packet.The terminal that receives receives what the Cloud Server was sent After the legal terminal list, the reception terminal trusts the legal transmission terminal in the legal terminal list.
During specifically executing step S503, the legal terminal list is traversed, searches all legal terminals Consistent terminal identity mark is identified with the presence or absence of with the terminal identity in list.It is identified if finding with the terminal identity Consistent terminal identity mark, thens follow the steps S504, identifies consistent terminal body with the terminal identity if not finding Part mark, thens follow the steps S505.
Step S504: determine that the transmission terminal identity for sending the data packet is legal.
Step S505: it determines that the transmission terminal identity for sending the data packet is illegal, and abandons the data packet.
During implementing step S505, determine that the transmission terminal identity for sending the data packet is illegal, and Remove the data packet that the transmission terminal is sent.
In the embodiment of the present invention, receives terminal and identifies whether to be present in legal terminal list by verifying terminal identity, So that it is determined that whether the identity for sending terminal is legal, it is present in legal terminal list when terminal identity identifies, determines and send number It is legal according to the transmission terminal identity of packet.The present invention is by that can reduce in the legitimacy for receiving client checks transmission terminal identity The wasting of resources of Cloud Server, and reduce the resource utilization of Cloud Server.
Based on the proof of identity method shown in embodiments of the present invention Fig. 5, executing, step S504 shown in Fig. 5 is true Surely send the data packet send the legal specific implementation process of terminal identity after, in conjunction with Fig. 5, with reference to Fig. 6, the identity Method of calibration further include:
Step S506: obtaining the operation data in the data, and shows the corresponding live streaming picture of the operation data.
During implementing step S506, the operation data received in the identifiable data of terminal is obtained, And the corresponding live streaming picture of the operation data is shown in the reception terminal.
In embodiments of the present invention, by the way that after determining that the identity for sending terminal is legal, receiving terminal can be directly displayed Operation data shows corresponding live streaming picture.So as to reduce the resource utilization of Cloud Server.
Based on proof of identity method disclosed above, the data packet is parsed executing step S502 shown in Fig. 5, is obtained During taking the terminal identity in the data packet to identify, as shown in fig. 7, comprises following steps:
Step S701: parsing the data packet, obtains the data with Preset Transfer structure.
In step s 701, the Preset Transfer structure includes that terminal identity identification field and operation data store field, For details, reference can be made to the Preset Transfer structures shown in upper table 1.The data of the Preset Transfer structure are by transmission terminal according to default biography Defeated structure will serialize treated the terminal identity of itself mark and operation data carry out it is assembled after obtain.
The operation data generated after business operation is executed it should be noted that sending terminal and acquiring itself, by the operand Serializing processing is carried out according to itself terminal identity mark, and by the terminal body of serializing treated operation data and itself Part mark is spliced according to Preset Transfer structure, obtains the data packet sent to user terminal.
Step S702: the unserializing processing data with Preset Transfer structure, the terminal after obtaining unserializing Identity and operation data.
Step S703: the data with Preset Transfer structure are converted to the identifiable data of the reception terminal.
During implementing step S703, the transmission terminal itself is executed into the operation data generated after operation It is converted to the identifiable operation data of the reception terminal.
Step S704: terminal identity mark is obtained.
In the embodiment of the present invention, by parsing data packet, the data with Preset Transfer structure are obtained.And will have default The data of transmission structure, which are converted to, receives the identifiable data of terminal.The terminal identity mark in the data is obtained again.So as to Send the proof of identity of terminal in reception terminal.The resource utilization of Cloud Server can be reduced.
More preferably to illustrate proof of identity method disclosed in the embodiments of the present invention, below with the proof of identity side Method for specific application example, is specifically described on " sound console ".
Assuming that live streaming terminal is legal terminal, terminal identity is identified as ID123564, is obtained simultaneously by Cloud Server in advance It is stored in legal terminal list.During live streaming, when live streaming terminal executes in live streaming application by the progress F.F. of song 2.5 seconds, and corresponding operation data are generated, after then being handled the operation data, it is sent to the user terminal.The user is whole Whether end can show that executing the operation data is broadcast live picture later, and the identity to live streaming terminal is needed to verify.
The live streaming terminal can send terminal for the embodiments of the present invention are disclosed, which can be above-mentioned Inventive embodiments are disclosed to receive terminal.Based on auth method disclosed in the embodiments of the present invention, to the above process into Row illustrates.Include:
Firstly, live streaming terminal acquisition is by progress F.F. 2.5 seconds of song, the corresponding operation data of generation.
Then, serializing processing is carried out to the operation data, obtains indicating with the format that 8 binary numbers are a byte Operation data.And by the operation data indicated using the format that 8 binary numbers are a byte according to using 4 bytes as boundary Sequence alignment.
Then, treated that the terminal identity of itself identifies for operation data after will be aligned and same serializing ID123564 is spliced according to Preset Transfer structure, obtains the data packet sent to user terminal, and send out by network channel Give user terminal.
For user terminal during the corresponding live streaming of viewing transmission terminal, receive live streaming terminal transmission carries terminal The data packet of identity ID123564 and operation data.
Firstly, user terminal parses data packet, the data with preset data structure are obtained.
Then, the user terminal unserializing processing data with Preset Transfer structure, after obtaining unserializing Terminal identity mark and operation data, that is, obtain terminal identity mark ID123564 and the operation data in the data.
Then, which is identified into ID123564 and operation data is converted to the identifiable data of user terminal.
Then, user terminal traverses the legal terminal list being previously received, and searching whether there is in legal terminal list It is identified with the consistent terminal identity of terminal identity mark ID123564.
It is identified if finding in legal terminal list with the consistent terminal identity of ID123564, determines the body of the live streaming terminal Part mark is legal, shows song progress by the live streaming picture after F.F. 2.5 seconds in user terminal.
After Fig. 8 shows the above-mentioned authentication of user terminal execution, display is executed in the data packet that live streaming terminal is sent Corresponding live streaming picture after operation data.The operation data is song progress operation data corresponding to F.F. 2.5 seconds.
In embodiments of the present invention, during live streaming, live streaming terminal acquisition executes the operand generated when business operation According to, after then being handled operation data, be sent to the user terminal, user terminal by verify terminal identity identify whether to deposit It is in legal terminal list, so that it is determined that whether the identity of live streaming terminal is legal, when terminal identity mark is present in legal end It holds in list, determines that the live streaming terminal identity for sending data packet is legal, display live streaming picture.The present invention is by receiving terminal school The legitimacy for sending terminal identity is issued after examination and approval, the wasting of resources of Cloud Server can be reduced, and reduce the utilization of resources of Cloud Server Rate.
Corresponding with proof of identity method disclosed in the embodiments of the present invention, also correspondence of the embodiment of the present invention discloses one Kind identity verification device, as shown in figure 9, the identity verification device includes:
Receiving unit 901, for receiving the data packet for sending terminal and sending.
It should be noted that including that terminal identity identifies in the data packet.
Resolution unit 902 obtains the terminal identity mark in the data packet for parsing the data packet.
Authentication unit 903 identified whether to be present in legal terminal list, if the end for verifying the terminal identity End identity is present in the legal terminal list, then executes determination unit.If the terminal identity mark is present in institute It states in legal terminal list, then executes discarding unit.
It should be noted that the terminal identity mark of legal terminal is stored in the legal terminal list, it is described legal Terminal list is sent to the reception terminal by the Cloud Server.
Determination unit 904, for determining that the transmission terminal identity for sending the data packet is legal.
Discarding unit 905 for determining that the transmission terminal identity for sending the data packet is illegal, and abandons the data Packet.
It should be noted that the specific principle of each unit in identity verification device disclosed in the embodiments of the present invention And implementation procedure, it is identical as aforementioned present invention implementation proof of identity method, reference can be made to identity disclosed in the embodiments of the present invention Corresponding part, is not discussed here in method of calibration.
In the embodiment of the present invention, the data packet for sending terminal and sending is received by receiving unit.It is parsed using resolution unit Data packet obtains the terminal identity identification marking in data packet.Authentication unit verifying terminal identity is recycled to identify whether exist In legal terminal list, so that it is determined that whether the identity for sending terminal is legal, when terminal identity mark is present in legal terminal In list, determination unit determines that the transmission terminal identity for sending data packet is legal.The present invention is by receiving client checks transmission The legitimacy of terminal identity can reduce the wasting of resources of Cloud Server, and reduce the resource utilization of Cloud Server.
Based on the identity verification device shown in above-mentioned Fig. 9, the verification unit 903 is specifically used for:
The legal terminal list is traversed, searching in all legal terminal lists whether there is and the terminal identity Identify consistent terminal identity mark.
In embodiments of the present invention, it can search by traversing legal terminal list and identify consistent terminal with terminal identity Identity, can avoid the transmission terminal not in legal terminal list also has the problem of legitimacy, improves the peace for sending terminal Quan Xing.And then reduce the wasting of resources of Cloud Server.
Based on the identity verification device shown in above-mentioned Fig. 9, offer of the embodiment of the present invention is shown with reference to Figure 10 in conjunction with Fig. 9 A kind of identity verification device structural block diagram, described device further include:
Display unit 906 for obtaining operation data in the data packet, and is shown based on the operation data corresponding Picture is broadcast live.
In the embodiment of the present invention, by the way that after determining that the identity for sending terminal is legal, behaviour can be directly displayed by receiving terminal Make data and shows corresponding live streaming picture.So as to reduce the resource utilization of Cloud Server.
Based on identity verification device disclosed in the embodiments of the present invention, above-mentioned each unit can be by one kind by handling The hardware device that device and memory are constituted is realized.
The embodiment of the present invention also provides a kind of client, as shown in figure 11, shows one kind provided in an embodiment of the present invention The structural block diagram of client, the client 110 include: processor 111 and memory 112.
Processor 111, for executing the program stored in memory 112
Memory 112, for storing program, which is at least used for: it receives and sends the data packet that terminal is sent, data packet With Preset Transfer format transmission, terminal identity mark and operation data are included at least in data packet;Data packet is parsed, data are obtained Terminal identity mark in packet;Verifying terminal identity identifies whether to be present in legal terminal list, deposits in legal terminal list The terminal identity mark of legal terminal is contained, legal terminal list is sent to reception terminal by Cloud Server;If terminal identity mark Knowledge is present in legal terminal list, determines that the transmission terminal identity for sending data packet is legal.
On the other hand, the embodiment of the present invention also provides a kind of storage medium, and it is executable that computer is stored in storage medium Instruction, when computer executable instructions are loaded and executed by processor, for realizing described in any one embodiment as above 's.In conclusion the embodiment of the present invention provides a kind of identity verify method and device, this method are as follows: receive terminal and receive transmission The data packet that terminal is sent includes that terminal identity identifies in data packet.Data packet is parsed, the terminal identity mark in data packet is obtained Know.Verifying terminal identity identifies whether to be present in legal terminal list, and the end of legal terminal is stored in legal terminal list Identity is held, legal terminal list is sent to the reception terminal by Cloud Server.If it is legal that terminal identity mark is present in In terminal list, determine that the transmission terminal identity for sending data packet is legal.It realizes and does not need Cloud Server verification, it will be able to is right The identity of terminal is verified, to save the wasting of resources of Cloud Server, and saves the resource utilization of Cloud Server.
Corresponding with proof of identity method disclosed in the embodiments of the present invention, also correspondence of the embodiment of the present invention discloses one Kind identity verification device, as shown in figure 12, the identity verification device includes:
Acquisition module 1201, the operation data generated when executing business operation for acquiring.
Serialization module 1202, for by the terminal identity to be spliced based on Preset Transfer structure mark and operand According to being serialized, the Preset Transfer structure includes terminal identity identification field and operation data storage field.
Splicing module 1203, after based on the operation data and serializing after Preset Transfer structures to form serializing Terminal identity mark, obtain data packet.
Wherein, the operation data after the serializing is stored in the operation data storage field, after the serializing Terminal identity mark is stored in the terminal identity identification field.
Sending module 1204 is based on institute for triggering the reception terminal for sending the data packet to terminal is received It states data packet and authentication is carried out to the transmission terminal.
It should be noted that the specific principle of each unit in identity verification device disclosed in the embodiments of the present invention And implementation procedure, it is identical as aforementioned present invention implementation proof of identity method, reference can be made to identity disclosed in the embodiments of the present invention Corresponding part, is not discussed here in method of calibration.
In the embodiment of the present invention, pass through the operation data generated when acquisition unit acquisition execution business operation.Utilize sequence Change module is treated the terminal identity mark spliced based on Preset Transfer structure and is serialized with operation data, Preset Transfer Structure includes terminal identity identification field and operation data storage field.Splicing module is recycled to be based on Preset Transfer structures to form Terminal identity mark after operation data and serializing after serializing, obtains data packet, the operation data storage after serializing Field is stored in operation data, the terminal identity mark after serializing is stored in the terminal identity identification field.Using hair Unit is sent to send data packet to receiving terminal.The present invention is by the way that client checks transmission data packet is received, triggering receives terminal base Authentication is carried out to terminal is sent in data packet, the wasting of resources of Cloud Server can be reduced, and reduce Cloud Server Resource utilization.
Based on identity verification device disclosed in the embodiments of the present invention, above-mentioned each unit can be by one kind by handling The hardware device that device and memory are constituted is realized.
The embodiment of the present invention also provides a kind of client, as shown in figure 13, shows one kind provided in an embodiment of the present invention The structural block diagram of client, the client 130 include: processor 131 and memory 132.
Processor 131, for executing the program stored in memory 132
Memory 132, for storing program, which is at least used for: acquisition executes the operand generated when business operation According to;It treats the terminal identity mark spliced based on Preset Transfer structure to be serialized with operation data, Preset Transfer knot Structure includes terminal identity identification field and operation data storage field;Based on the operand after the serializing of Preset Transfer structures to form It is identified according to the terminal identity after serializing, obtains data packet, the operation data after serializing is stored in operation data storage word Section, the terminal identity mark after serializing are stored in terminal identity identification field;Data packet is sent to terminal is received, for triggering Terminal is received to be wrapped based on the data to transmission terminal progress authentication.
On the other hand, the embodiment of the present invention also provides a kind of storage medium, and it is executable that computer is stored in storage medium Instruction, when computer executable instructions are loaded and executed by processor, for realizing described in any one embodiment as above 's.In conclusion the embodiment of the present invention provides a kind of identity verify method and device,
In conclusion the embodiment of the present invention provides a kind of identity verify method and device, this method are as follows: acquisition execution business The operation data generated when operation;Treat the terminal identity mark and operation data progress spliced based on Preset Transfer structure Serializing;Based on the terminal identity mark after the operation data and serializing after the serializing of Preset Transfer structures to form, counted According to packet;Data packet is sent to receiving terminal.The present invention is by the way that client checks transmission data packet is received, triggering receives terminal and is based on Data packet carries out authentication to terminal is sent, and can reduce the wasting of resources of Cloud Server, and reduce the money of Cloud Server Source utilization rate.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other. For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.
The foregoing description of the disclosed embodiments can be realized those skilled in the art or using the present invention.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest Range.
The above is only a preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of proof of identity method, which is characterized in that be suitable for receiving terminal, which comprises
It receives and sends the data packet that terminal is sent, the data packet is at least wrapped in the data packet with Preset Transfer format transmission Include terminal identity mark;
The data packet is parsed, the terminal identity mark in the data packet is obtained;
It verifies the terminal identity to identify whether to be present in legal terminal list, it is legal to be stored in the legal terminal list The terminal identity of terminal identifies, and the legal terminal list is sent to the reception terminal by the Cloud Server;
If the terminal identity mark is present in the legal terminal list, the transmission terminal body for sending the data packet is determined Part is legal.
2. the method according to claim 1, wherein the parsing data packet, obtains in the data packet Terminal identity mark, comprising:
The data packet is parsed, the data with Preset Transfer structure are obtained, the Preset Transfer structure includes terminal identity mark Section and the operation data of becoming literate store field, and the data of the Preset Transfer structure are by transmission terminal according to Preset Transfer structure by sequence Columnization treated the terminal identity of itself mark and operation data carry out it is assembled after obtain;
The unserializing processing data with Preset Transfer structure, terminal identity mark and operation after obtaining unserializing Data;
Terminal identity mark after unserializing is converted to the identifiable data of the reception terminal with operation data;
Obtain the terminal identity mark.
3. according to the method described in claim 2, it is characterized in that, the determining transmission terminal identity for sending the data packet After legal, further includes:
The operation data is obtained, and corresponding operating is executed based on the operation data, and show corresponding live streaming picture.
4. the method according to claim 1, wherein the verifying terminal identity identifies whether to be present in conjunction In method terminal list, comprising:
The legal terminal list is traversed, searches in all legal terminal lists and is identified with the presence or absence of with the terminal identity Consistent terminal identity mark.
5. the method according to claim 1, wherein further include:
If the terminal identity mark is not present in the legal terminal list, the transmission terminal for sending the data packet is determined Identity is illegal, and abandons the data packet.
6. a kind of proof of identity method, which is characterized in that be suitable for sending terminal, which comprises
Acquisition executes the operation data generated when business operation;
Terminal identity mark to be spliced based on Preset Transfer structure is serialized with operation data, the default biography Defeated structure includes terminal identity identification field and operation data storage field;
Based on the terminal identity mark after the operation data and serializing after Preset Transfer structures to form serializing, counted According to packet, the operation data after the serializing is stored in the operation data storage field, the terminal identity after the serializing Mark is stored in the terminal identity identification field;
The data packet is sent to terminal is received, is wrapped based on the data for triggering the reception terminal to the transmission terminal Carry out authentication.
7. a kind of identity verification device, which is characterized in that described device includes:
Receiving unit, for receiving the data packet for sending terminal and sending, the data packet is with Preset Transfer format transmission, the number It is identified according to terminal identity is included at least in packet;
Resolution unit obtains the terminal identity mark in the data packet for parsing the data packet;
Authentication unit identifies whether to be present in legal terminal list for verifying the terminal identity, the legal terminal column The terminal identity mark of legal terminal is stored in table, the legal terminal list is sent to the reception by the Cloud Server Terminal;
Determination unit determines if being present in the legal terminal list for terminal identity mark and sends the data The transmission terminal identity of packet is legal.
8. a kind of identity verification device, which is characterized in that be suitable for sending terminal, described device includes:
Acquisition module, the operation data generated when executing business operation for acquiring;
Serialization module, for the mark of the terminal identity to be spliced based on Preset Transfer structure and operation data to be carried out sequence Columnization, the Preset Transfer structure include terminal identity identification field and operation data storage field;
Splicing module, for based on the terminal body after the operation data and serializing after Preset Transfer structures to form serializing Part mark, obtains data packet, and the operation data after the serializing is stored in the operation data storage field, the serializing Terminal identity mark afterwards is stored in the terminal identity identification field;
Sending module is wrapped for sending the data packet to terminal is received for triggering the reception terminal based on the data Authentication is carried out to the transmission terminal.
9. a kind of client characterized by comprising
Processor and memory;
Wherein, the processor is for executing the program stored in the memory;
The memory is for storing program, and described program is for executing such as authentication as claimed in any one of claims 1 to 5 Method executes auth method as claimed in claim 6.
10. a kind of storage medium, which is characterized in that the storage medium includes storage program, wherein in described program operation Equipment where controlling the storage medium executes such as proof of identity method as claimed in any one of claims 1 to 5, or execution and such as weighs Benefit require 6 described in proof of identity method.
CN201910704436.1A 2019-07-31 2019-07-31 Identity verification method and related equipment Active CN110401669B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910704436.1A CN110401669B (en) 2019-07-31 2019-07-31 Identity verification method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910704436.1A CN110401669B (en) 2019-07-31 2019-07-31 Identity verification method and related equipment

Publications (2)

Publication Number Publication Date
CN110401669A true CN110401669A (en) 2019-11-01
CN110401669B CN110401669B (en) 2021-06-11

Family

ID=68327044

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910704436.1A Active CN110401669B (en) 2019-07-31 2019-07-31 Identity verification method and related equipment

Country Status (1)

Country Link
CN (1) CN110401669B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111277602A (en) * 2020-01-23 2020-06-12 奇安信科技集团股份有限公司 Network data packet identification processing method and device, electronic equipment and storage medium
CN114422167A (en) * 2021-12-02 2022-04-29 深信服科技股份有限公司 Network access control method, device, electronic equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101193068A (en) * 2006-11-21 2008-06-04 华为技术有限公司 A response request method and device
CN104038514A (en) * 2013-03-05 2014-09-10 福建星网视易信息系统有限公司 Method and system for realizing mobile interconnection services, data center, and mobile terminal
US20150043561A1 (en) * 2012-04-24 2015-02-12 Huawei Technologies Co., Ltd. Wireless network access technology
CN106161385A (en) * 2015-04-15 2016-11-23 腾讯科技(上海)有限公司 The long-range control method of a kind of equipment and device
WO2017190668A1 (en) * 2016-05-05 2017-11-09 腾讯科技(深圳)有限公司 Identity verification method and device
CN108011873A (en) * 2017-11-28 2018-05-08 江苏方天电力技术有限公司 A kind of illegal connection determination methods based on set covering
CN108322443A (en) * 2017-12-30 2018-07-24 京信通信系统(中国)有限公司 Equipment interactive communication method, apparatus, storage medium and computer equipment
CN108881966A (en) * 2018-04-13 2018-11-23 武汉斗鱼网络科技有限公司 A kind of information processing method and relevant device
CN109982099A (en) * 2019-03-25 2019-07-05 广州华多网络科技有限公司 List imposition layout method, apparatus, computer equipment and storage medium is broadcast live

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101193068A (en) * 2006-11-21 2008-06-04 华为技术有限公司 A response request method and device
US20150043561A1 (en) * 2012-04-24 2015-02-12 Huawei Technologies Co., Ltd. Wireless network access technology
CN104038514A (en) * 2013-03-05 2014-09-10 福建星网视易信息系统有限公司 Method and system for realizing mobile interconnection services, data center, and mobile terminal
CN106161385A (en) * 2015-04-15 2016-11-23 腾讯科技(上海)有限公司 The long-range control method of a kind of equipment and device
WO2017190668A1 (en) * 2016-05-05 2017-11-09 腾讯科技(深圳)有限公司 Identity verification method and device
CN108011873A (en) * 2017-11-28 2018-05-08 江苏方天电力技术有限公司 A kind of illegal connection determination methods based on set covering
CN108322443A (en) * 2017-12-30 2018-07-24 京信通信系统(中国)有限公司 Equipment interactive communication method, apparatus, storage medium and computer equipment
CN108881966A (en) * 2018-04-13 2018-11-23 武汉斗鱼网络科技有限公司 A kind of information processing method and relevant device
CN109982099A (en) * 2019-03-25 2019-07-05 广州华多网络科技有限公司 List imposition layout method, apparatus, computer equipment and storage medium is broadcast live

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111277602A (en) * 2020-01-23 2020-06-12 奇安信科技集团股份有限公司 Network data packet identification processing method and device, electronic equipment and storage medium
CN114422167A (en) * 2021-12-02 2022-04-29 深信服科技股份有限公司 Network access control method, device, electronic equipment and storage medium
CN114422167B (en) * 2021-12-02 2024-04-09 深信服科技股份有限公司 Network access control method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110401669B (en) 2021-06-11

Similar Documents

Publication Publication Date Title
US11818142B2 (en) Distributed data authentication and validation using blockchain
CN110311899A (en) Multiservice system access method, device and server
CN103428179B (en) A kind of log in the method for many domain names website, system and device
CN107967416A (en) The methods, devices and systems of copyright right-safeguarding detection
CN106656849B (en) Message rate-limiting method and device
CN105100067B (en) A kind of high in the clouds Activiation method and system
CN104767714B (en) A kind of ID and the correlating method of user resources information, terminal and system
CN106131175A (en) A kind of acquisition of information, information-pushing method and equipment
CN110401669A (en) A kind of proof of identity method and relevant device
CN103944889B (en) A kind of method and certificate server of network user's online identity certification
CN110071806A (en) The method and system of data processing based on interface check
CN106060097B (en) A kind of management system and management method of information security contest
CN110049046A (en) Access control method, terminal, server and system
CN108566374A (en) A kind of application method for down loading and its system, block chain node device, terminal
CN110417787A (en) A kind of data processing method, device, client and storage medium
CN107333151B (en) A kind of video flowing address method for authenticating and device
CN109547172A (en) Data transmission method, system and data transmitting equipment, data receiver
CN106548043A (en) A kind of authorization method of application program, installation method, installation end and system
CN110417905B (en) Contract issuing method, device, equipment and union chain system
CN108063748A (en) A kind of user authen method, apparatus and system
CN110213671A (en) A kind of short-sighted frequency of hot spot determines method and apparatus
CN108228197A (en) A kind of method and apparatus for installing software in the cluster
CN112181599B (en) Model training method, device and storage medium
CN110301127A (en) Device and method for predictive token authentication
CN104469427B (en) Data transmission method and terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210113

Address after: 510000 3108, 79 Wanbo 2nd Road, Nancun Town, Panyu District, Guangzhou City, Guangdong Province

Applicant after: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 28th floor, block B1, Wanda Plaza, Nancun Town, Panyu District, Guangzhou City, Guangdong Province

Applicant before: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant