CN110896505A - Video link anti-theft method, system, device and storage medium - Google Patents

Video link anti-theft method, system, device and storage medium Download PDF

Info

Publication number
CN110896505A
CN110896505A CN201911198535.3A CN201911198535A CN110896505A CN 110896505 A CN110896505 A CN 110896505A CN 201911198535 A CN201911198535 A CN 201911198535A CN 110896505 A CN110896505 A CN 110896505A
Authority
CN
China
Prior art keywords
file
fragment
video
files
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911198535.3A
Other languages
Chinese (zh)
Inventor
于江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lajin Zhongbo Technology Co ltd
Original Assignee
Tianmai Juyuan (hangzhou) Media Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianmai Juyuan (hangzhou) Media Technology Co Ltd filed Critical Tianmai Juyuan (hangzhou) Media Technology Co Ltd
Priority to CN201911198535.3A priority Critical patent/CN110896505A/en
Publication of CN110896505A publication Critical patent/CN110896505A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/845Structuring of content, e.g. decomposing content into time segments
    • H04N21/8456Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/23424Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving splicing one content stream with another content stream, e.g. for inserting or substituting an advertisement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/44016Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving splicing one content stream with another content stream, e.g. for substituting a video clip
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream, rendering scenes according to MPEG-4 scene graphs involving video stream decryption

Abstract

The invention discloses a video link anti-theft method, a system, a device and a storage medium, wherein the method comprises the following steps: carrying out fragment processing on the video file to obtain a plurality of first fragment files; performing interference processing on each first fragmented file to obtain a processed second fragmented file; receiving a file access request, and judging and detecting an access object in the file access request; and splicing the third fragment files according to the standard format of the video file to obtain a spliced video file. The invention effectively avoids the situation that a chain stealing person acquires the whole file or acquires a plurality of files in batches and synthesizes the files by segmenting and interfering the video file and refusing the access to the whole video file, thereby greatly improving the safety. The invention can be widely applied to the technical field of video anti-theft chains.

Description

Video link anti-theft method, system, device and storage medium
Technical Field
The invention relates to the technical field of video anti-theft chains, in particular to a video link anti-theft method, a video link anti-theft system, a video link anti-theft device and a storage medium.
Background
The current video anti-stealing link method mainly comprises the following steps: the refer request access mode is that all refer (not designated refer does not allow access) are requested, but refer can be forged; or token, password, etc., but the token may be copied, so the token is time limited but is also risky within the time limit; DRM methods, such as movies, encrypt video with high security but at a high cost; the DASH method first generates a header to record list information of each fragment or segment, and is easy to crack.
Disclosure of Invention
In order to solve the above technical problems, an object of the present invention is to provide a video link anti-theft method, system, device and storage medium with better security.
The technical scheme adopted by the invention is as follows:
a video link anti-theft method comprises the following steps:
carrying out fragment processing on the video file to obtain a plurality of first fragment files;
performing interference processing on each first fragmented file to obtain a processed second fragmented file;
receiving a file access request, judging and detecting an access object in the file access request, and not processing the file access request when the access object is determined to be the whole video file; when the access object is determined to be the second fragment file, sending out the corresponding second fragment file in the access object;
decoding the obtained second fragment file to obtain a third fragment file;
and splicing the third fragment files according to the standard format of the video file to obtain a spliced video file.
As a further improvement of the video link anti-theft method, the step of performing fragment processing on the video file to obtain a plurality of first fragment files specifically includes:
and dividing the video file into a plurality of first fragment files according to the preset time length.
As a further improvement of the video link anti-theft method, the step of performing interference processing on each first fragmented file to obtain a processed second fragmented file specifically includes:
randomly generating an interference code;
and according to the interference codes, carrying out XOR processing on the preset file positions in the first fragmented files to obtain second fragmented files.
As a further improvement of the video link anti-theft method, the decoding processing is performed on the obtained second fragment file to obtain a third fragment file, and the step specifically includes:
and performing XOR processing on the preset file position in the second fragment file according to the interference code to obtain a third fragment file.
As a further improvement of the video link anti-theft method, the step of performing interference processing on each first fragmented file to obtain a processed second fragmented file specifically includes:
randomly generating a secret key;
and encrypting the first fragmented file by using a preset encryption algorithm according to the secret key to obtain a second fragmented file.
As a further improvement of the video link anti-theft method, the decoding processing is performed on the obtained second fragment file to obtain a third fragment file, and the step specifically includes:
and decoding the second fragment file according to the secret key and a preset decryption algorithm to obtain a third fragment file.
As a further improvement of the video link anti-theft method, the third split files are spliced according to a standard format of the video file to obtain a spliced video file, and the step specifically includes:
acquiring index information in each third fragment file;
and splicing the third fragment files according to the standard format of the video file according to the index information to obtain a spliced video file.
The invention adopts another technical scheme that:
a video linking theft prevention system comprising:
the device comprises a segmentation unit, a storage unit and a processing unit, wherein the segmentation unit is used for carrying out fragmentation processing on a video file to obtain a plurality of first fragment files;
the interference processing unit is used for carrying out interference processing on each first fragment file to obtain a processed second fragment file;
the detection unit is used for receiving the file access request, judging and detecting an access object in the file access request, and not processing the file access request when the access object is determined to be the whole video file; when the access object is determined to be the second fragment file, sending out the corresponding second fragment file in the access object;
the decoding unit is used for decoding the obtained second fragment file to obtain a third fragment file;
and the splicing unit is used for splicing the third split files according to the standard format of the video file to obtain a spliced video file.
The invention adopts another technical scheme that:
a video linking anti-theft device, comprising:
a memory for storing a program;
a processor for executing the program, the program causing the processor to execute the video link anti-theft method.
The invention adopts another technical scheme that:
a computer-readable storage medium comprising a computer program which, when run on a computer, causes the video link anti-theft method to be performed.
The invention has the beneficial effects that:
the video link anti-theft method, the system, the device and the storage medium provided by the invention have the advantages that the video file is segmented and subjected to interference processing, the access to the whole video file is refused, the condition that a chain thief acquires the whole file or acquires a plurality of files in batches and synthesizes the files is effectively avoided, and the safety is greatly improved.
Drawings
FIG. 1 is a flow chart of the steps of a video link anti-theft method of the present invention;
fig. 2 is a block diagram of the modules of a video link theft prevention system of the present invention.
Detailed Description
The following further describes embodiments of the present invention with reference to the accompanying drawings:
referring to fig. 1, the present embodiment provides a video link anti-theft method, including the following steps:
s1, carrying out fragment processing on the video file to obtain a plurality of first fragment files;
the video file in the invention can be in MP4 format, AVI format, rm format, rmvb format, mov format, mtv format, wmv format, flv format and the like. The fragmentation in this embodiment may be set according to a preset time length or a preset fragmentation file size.
S2, carrying out interference processing on each first fragment file to obtain a processed second fragment file;
interference processing in the embodiment can be realized by generating the interference code and then performing interference processing on the first fragment file according to a preset algorithm through the interference code, so that the first fragment file is converted into the second fragment file, even if a chain stealing person can obtain a plurality of second fragment files in batches, the second fragment files cannot be restored and synthesized into the original video file under the condition that the interference code and the algorithm are unknown, and the chain stealing behavior is effectively avoided.
S3, receiving a file access request, judging and detecting an access object in the file access request, and not processing the file access request when determining that the access object is the whole video file; when the access object is determined to be the second fragment file, sending out the corresponding second fragment file in the access object;
in the embodiment, all file access requests are judged and detected, if the access object is the whole video file, the link stealing behavior is determined by default, and the file access request is rejected; and only when the access object is detected to be the second fragment file, the corresponding second fragment file in the access object is sent out.
S4, decoding the obtained second fragment file to obtain a third fragment file;
in this step, the second fragmented file may be decoded according to the interference code and then according to a decoding algorithm corresponding to the interference algorithm, so as to obtain a restored third fragmented file.
And S5, splicing the third split files according to the standard format of the video file to obtain a spliced video file.
In this step, the third fragment file is obtained and then can be played by a player after being spliced at the front end according to the standard format of the original video file. According to the embodiment, the video file is segmented and subjected to interference processing, and the access to the whole video file is refused, so that the situation that a stealer obtains the whole file or obtains a plurality of files in batches and synthesizes the files is effectively avoided, and the safety is greatly improved.
Further as a preferred embodiment, the performing slicing processing on the video file to obtain a plurality of first sliced files in this embodiment specifically includes:
and dividing the video file into a plurality of first fragment files according to the preset time length.
As a further preferred embodiment, in the present embodiment, the interference processing is performed by using an interference scrambling code, and the step of performing interference processing on each first fragmented file to obtain a processed second fragmented file specifically includes: firstly, randomly generating an interference code, and then carrying out XOR processing on the first 1 byte in the first fragment file by using the interference code to obtain a second fragment file. In this embodiment, the decoding process is performed on the obtained second fragmented file to obtain a third fragmented file, and the step specifically includes: and performing XOR processing on the first 1 byte in the second fragment file according to the interference code to obtain a restored third fragment file. In the embodiment, a header file is not required, the operation is convenient and simple, and other simple logic algorithms can be used for implementation besides the exclusive-or operation.
Further as a preferred embodiment, in another embodiment, the interference processing is performed by using an encryption algorithm, and the step of performing interference processing on each first fragmented file to obtain a processed second fragmented file specifically includes: firstly, a secret key is randomly generated, and then the whole first fragment file or a plurality of bytes are encrypted by using a preset encryption algorithm according to the secret key to obtain a second fragment file. In this embodiment, the decoding process is performed on the obtained second fragmented file to obtain a third fragmented file, and the step specifically includes: and decoding the whole second fragment file or the encrypted data of the first plurality of bytes according to the secret key and a preset decryption algorithm to obtain a restored third fragment file.
Further as a preferred embodiment, the splicing each third tile file according to the standard format of the video file to obtain a spliced video file specifically includes:
s51, acquiring index information in each third fragment file;
and S52, splicing the third fragment files according to the standard format of the video file according to the index information to obtain a spliced video file.
Referring to fig. 2, the present embodiment provides a video link anti-theft system, including:
the device comprises a segmentation unit, a storage unit and a processing unit, wherein the segmentation unit is used for carrying out fragmentation processing on a video file to obtain a plurality of first fragment files;
the interference processing unit is used for carrying out interference processing on each first fragment file to obtain a processed second fragment file;
the detection unit is used for receiving the file access request, judging and detecting an access object in the file access request, and not processing the file access request when the access object is determined to be the whole video file; when the access object is determined to be the second fragment file, sending out the corresponding second fragment file in the access object;
the decoding unit is used for decoding the obtained second fragment file to obtain a third fragment file;
and the splicing unit is used for splicing the third split files according to the standard format of the video file to obtain a spliced video file.
The contents in the above method embodiments are all applicable to the present system embodiment, the functions specifically implemented by the present system embodiment are the same as those in the above method embodiment, and the beneficial effects achieved by the present system embodiment are also the same as those achieved by the above method embodiment.
This embodiment also provides a video interlinkage anti-theft device, includes:
a memory for storing a program;
a processor for executing the program, the program causing the processor to execute the video link anti-theft method.
The contents in the above method embodiments are all applicable to the present apparatus embodiment, the functions specifically implemented by the present apparatus embodiment are the same as those in the above method embodiments, and the advantageous effects achieved by the present apparatus embodiment are also the same as those achieved by the above method embodiments.
The present embodiment provides a computer-readable storage medium including a computer program that, when run on a computer, causes the video link anti-theft method to be performed.
The contents in the above method embodiments are all applicable to the present storage medium embodiment, the functions specifically implemented by the present storage medium embodiment are the same as those in the above method embodiments, and the advantageous effects achieved by the present storage medium embodiment are also the same as those achieved by the above method embodiments.
According to the method and the device, the video file is segmented and subjected to interference processing, and the access to the whole video file is refused, so that the situation that a pirate acquires the whole file or acquires a plurality of files in batches and synthesizes the files is effectively avoided, and the safety is greatly improved.
While the preferred embodiments of the present invention have been illustrated and described, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A video link anti-theft method is characterized by comprising the following steps:
carrying out fragment processing on the video file to obtain a plurality of first fragment files;
performing interference processing on each first fragmented file to obtain a processed second fragmented file;
receiving a file access request, judging and detecting an access object in the file access request, and not processing the file access request when the access object is determined to be the whole video file; when the access object is determined to be the second fragment file, sending out the corresponding second fragment file in the access object;
decoding the obtained second fragment file to obtain a third fragment file;
and splicing the third fragment files according to the standard format of the video file to obtain a spliced video file.
2. The video linking anti-theft method according to claim 1, wherein: the slicing processing is performed on the video file to obtain a plurality of first sliced files, and the step specifically includes:
and dividing the video file into a plurality of first fragment files according to the preset time length.
3. The video linking anti-theft method according to claim 1, wherein: the step of performing interference processing on each first fragmented file to obtain a processed second fragmented file specifically includes: randomly generating an interference code;
and according to the interference codes, carrying out XOR processing on the preset file positions in the first fragmented files to obtain second fragmented files.
4. The video link anti-theft method according to claim 3, wherein: the decoding processing is performed on the obtained second fragment file to obtain a third fragment file, and the step specifically includes:
and performing XOR processing on the preset file position in the second fragment file according to the interference code to obtain a third fragment file.
5. The video linking anti-theft method according to claim 1, wherein: the step of performing interference processing on each first fragmented file to obtain a processed second fragmented file specifically includes: randomly generating a secret key;
and encrypting the first fragmented file by using a preset encryption algorithm according to the secret key to obtain a second fragmented file.
6. The video link anti-theft method according to claim 5, wherein: the decoding processing is performed on the obtained second fragment file to obtain a third fragment file, and the step specifically includes:
and decoding the second fragment file according to the secret key and a preset decryption algorithm to obtain a third fragment file.
7. The video linking anti-theft method according to claim 1, wherein: the third fragment files are spliced according to the standard format of the video files to obtain spliced video files, and the method specifically comprises the following steps:
acquiring index information in each third fragment file;
and splicing the third fragment files according to the standard format of the video file according to the index information to obtain a spliced video file.
8. A video linking theft prevention system, comprising:
the device comprises a segmentation unit, a storage unit and a processing unit, wherein the segmentation unit is used for carrying out fragmentation processing on a video file to obtain a plurality of first fragment files;
the interference processing unit is used for carrying out interference processing on each first fragment file to obtain a processed second fragment file;
the detection unit is used for receiving the file access request, judging and detecting an access object in the file access request, and not processing the file access request when the access object is determined to be the whole video file; when the access object is determined to be the second fragment file, sending out the corresponding second fragment file in the access object;
the decoding unit is used for decoding the obtained second fragment file to obtain a third fragment file;
and the splicing unit is used for splicing the third split files according to the standard format of the video file to obtain a spliced video file.
9. A video linking theft protection device, comprising:
a memory for storing a program;
a processor for executing the program, the program causing the processor to execute the video link anti-theft method according to any one of claims 1 to 7.
10. A computer-readable storage medium, characterized by comprising a computer program which, when run on a computer, causes the video link anti-theft method according to any one of claims 1 to 7 to be performed.
CN201911198535.3A 2019-11-29 2019-11-29 Video link anti-theft method, system, device and storage medium Pending CN110896505A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911198535.3A CN110896505A (en) 2019-11-29 2019-11-29 Video link anti-theft method, system, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911198535.3A CN110896505A (en) 2019-11-29 2019-11-29 Video link anti-theft method, system, device and storage medium

Publications (1)

Publication Number Publication Date
CN110896505A true CN110896505A (en) 2020-03-20

Family

ID=69787060

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911198535.3A Pending CN110896505A (en) 2019-11-29 2019-11-29 Video link anti-theft method, system, device and storage medium

Country Status (1)

Country Link
CN (1) CN110896505A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030001880A1 (en) * 2001-04-18 2003-01-02 Parkervision, Inc. Method, system, and computer program product for producing and distributing enhanced media
CN107483978A (en) * 2017-07-19 2017-12-15 河南神州数码索贝科技有限公司 A kind of video anti-stealing link method based on FFMPEG
CN109348292A (en) * 2018-11-20 2019-02-15 广州易方信息科技股份有限公司 A kind of video segment method based on slice file byte-threshold
CN109525893A (en) * 2018-11-20 2019-03-26 广州易方信息科技股份有限公司 Video segment method based on slice file duration threshold value
CN109743586A (en) * 2018-12-28 2019-05-10 广州华多网络科技有限公司 Live streaming media anti-stealing link method and system
CN110138716A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of offer of key, video broadcasting method, server and client
CN110213669A (en) * 2019-05-18 2019-09-06 杭州当虹科技股份有限公司 A kind of video content burglary-resisting system and method based on TS slice

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030001880A1 (en) * 2001-04-18 2003-01-02 Parkervision, Inc. Method, system, and computer program product for producing and distributing enhanced media
CN107483978A (en) * 2017-07-19 2017-12-15 河南神州数码索贝科技有限公司 A kind of video anti-stealing link method based on FFMPEG
CN110138716A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of offer of key, video broadcasting method, server and client
CN109348292A (en) * 2018-11-20 2019-02-15 广州易方信息科技股份有限公司 A kind of video segment method based on slice file byte-threshold
CN109525893A (en) * 2018-11-20 2019-03-26 广州易方信息科技股份有限公司 Video segment method based on slice file duration threshold value
CN109743586A (en) * 2018-12-28 2019-05-10 广州华多网络科技有限公司 Live streaming media anti-stealing link method and system
CN110213669A (en) * 2019-05-18 2019-09-06 杭州当虹科技股份有限公司 A kind of video content burglary-resisting system and method based on TS slice

Similar Documents

Publication Publication Date Title
US9208334B2 (en) Content management using multiple abstraction layers
CN106203128B (en) Webpage data encryption and decryption method, device and system
US8838977B2 (en) Watermark extraction and content screening in a networked environment
US20160117518A1 (en) File Encryption/Decryption Device And File Encryption/Decryption Method
WO2016184216A1 (en) Link-stealing prevention method, link-stealing prevention server, and client side
CN109728914B (en) Digital signature verification method, system, device and computer readable storage medium
CN109274644B (en) Data processing method, terminal and watermark server
EP3198498B1 (en) A challenge-response method and associated computing device
US20180204004A1 (en) Authentication method and apparatus for reinforced software
JP2009501470A (en) Protecting multimedia data
CN1759560A (en) Protected return path from digital rights management dongle
CN101719205A (en) Digital copyright management method and system
CN109151506B (en) Method, system and server for operating video file
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
US20220286272A1 (en) Method and apparatus for neural network model encryption and decryption
WO2024012515A1 (en) Vehicle monitoring method and device, and storage medium
KR20130020861A (en) Software modulation prevention method using own encryption
CN108431819B (en) Method and system for protecting client access to service of DRM agent of video player
CN109286495B (en) DCP public key protection method and device and HDCP equipment
CN115955310A (en) Information source encrypted multimedia data export security protection method, device and equipment
CN110896505A (en) Video link anti-theft method, system, device and storage medium
CN108809889B (en) Data deterministic deletion method based on data block random position negation
CN111338841A (en) Data processing method, device, equipment and storage medium
US20220345292A1 (en) Method and device for encryption of video stream, communication equipment, and storage medium
CN111259387B (en) Method and device for detecting tampered application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20221107

Address after: Room 1602, 16th Floor, Building 18, Yard 6, Wenhuayuan West Road, Beijing Economic and Technological Development Zone, Daxing District, Beijing 100176

Applicant after: Beijing Lajin Zhongbo Technology Co.,Ltd.

Address before: 310000 room 650, building 3, No. 16, Zhuantang science and technology economic block, Xihu District, Hangzhou City, Zhejiang Province

Applicant before: Tianmai Juyuan (Hangzhou) Media Technology Co.,Ltd.

WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200320