Summary of the invention
In view of this, the invention provides and a kind of the method for door chain process and system thereof are carried out to solve the problem to net cast.
The invention provides a kind of system of net cast being carried out to door chain process, comprising: player, in order to extract user profile, described player comprises deciphering module; Player interface, comprises the encrypting module coupling described deciphering module, obtains enciphered message in order to receive described user profile and to be encrypted described user profile; And server, comprise authentication module.Wherein, described enciphered message is returned to described deciphering module by described player interface, described deciphering module is decrypted described enciphered message and obtains decrypted token, and sending described decrypted token to described authentication module, described authentication module carries out checking to judge that whether described deciphering is successful to described decrypted token.
Described authentication module judges described deciphering whether success by judging that whether User IP in described decrypted token is identical with the User IP in described user profile, wherein, when the User IP in described decrypted token is identical with the User IP in described user profile, judge described successful decryption.When the User IP in described decrypted token and the User IP in described user profile are not identical, further by whether the user cookie judged in described decrypted token is identical with the user cookie in described user profile, described authentication module judges that whether described deciphering is successful, wherein, when the user cookie in described decrypted token is identical with the user cookie in described user profile, judge described successful decryption.
When described authentication module judges described successful decryption, described server responds the play instruction that described player sends, and sends video flowing to described player.
Described user profile comprises user cookie, user's service time and/or user ID.
The invention provides a kind of method of net cast being carried out to door chain process, comprising: extract user profile by player; Described user profile is received by player interface; By the encrypting module of described player interface described user profile is encrypted and obtains enciphered message; Return described enciphered message to described player; By the deciphering module of described player described enciphered message is decrypted and obtains decrypted token; By described player interface, described decrypted token is sent to the authentication module of server; And whether carry out checking to judge deciphering by described authentication module to described decrypted token successful.
By described authentication module, whether successfully checking is carried out judge deciphering step to described decrypted token, comprise further: judge that whether the User IP in described decrypted token is identical with the User IP in described user profile; Wherein, when the User IP in described decrypted token is identical with the User IP in described user profile, described successful decryption is judged.When judging that the User IP in described decrypted token and the User IP in described user profile are not identical, described method comprises further: judge that whether the user cookie in described decrypted token is identical with the user cookie in described user profile; Wherein, when the user cookie in described decrypted token is identical with the user cookie in described user profile, described successful decryption is judged.
When judging described successful decryption, by response play instruction, described server sends video flowing to described player.
Described user profile comprises user cookie, user's service time and/or user ID.
Compared with prior art, method and system thereof of net cast being carried out to door chain process provided by the invention, reaches following effect:
(1) method and system thereof of net cast being carried out to door chain process of the present invention, effectively can play the encryption and decryption to live video, effectively prevents third party from carrying out intercepting, directly carrying out the problems such as bootlegging broadcasting.
(2) method and system thereof of net cast being carried out to door chain process of the present invention, can also continue to form the encryption and decryption to live video according to customer location change, effectively prevent third party from carrying out intercepting, directly carrying out the problems such as bootlegging broadcasting.
Certainly, the arbitrary product implementing the application must not necessarily need to reach above-described all technique effects simultaneously.
Embodiment
As employed some vocabulary to censure specific components in the middle of specification and claim.Those skilled in the art should understand, and hardware manufacturer may call same assembly with different noun.This specification and claims are not used as with the difference of title the mode distinguishing assembly, but are used as the criterion of differentiation with assembly difference functionally." comprising " as mentioned in the middle of specification and claim is in the whole text an open language, therefore should be construed to " comprise but be not limited to "." roughly " refer to that in receivable error range, those skilled in the art can solve the technical problem within the scope of certain error, reach described technique effect substantially.In addition, " couple " word and comprise directly any and indirectly electric property coupling means at this.Therefore, if describe a first device in literary composition to be coupled to one second device, then represent described first device and directly can be electrically coupled to described second device, or be indirectly electrically coupled to described second device by other devices or the means that couple.Specification subsequent descriptions is implement the better embodiment of the application, and right described description is for the purpose of the rule that the application is described, and is not used to the scope limiting the application.The protection range of the application is when being as the criterion depending on the claims person of defining.
Fig. 1 is for providing the system 100 of live video in prior art.As shown in Figure 1, system 100 comprises: player 101, player interface 102 and server 103.
Server 103 is used for storing video file to be played, and wherein the form of this video file can be Audio Video Interleaved (being called for short AVI) form, high level flow (being called for short ASF) form, window multimedia video (being called for short WMV) form, 3G streaming media video coding (being called for short 3GP) form etc.Server 103 not only can be far-end server but also can be near-end server.
Player interface 102 couples server 103 and player 101, in order to the play instruction that transmits player 101 capturing from server 103 corresponding operatings such as (or) acquisitions mutually should the video flowing of play instruction to player 101.
Player 101 can be the player downloading to local terminal (such as, desktop computer, panel computer, smart mobile phone, personal digital assistant etc.).Player 101 also can be the flash player that webpage provides, and user only need open webpage, the player that just can directly use webpage to provide to watch video, and without the need to downloading this player in advance to local terminal.
But due to player 101, player interface 102 and server 103 do not take when transmitting video-frequency flow to net cast carry out door chain process measure, therefore in transmitting procedure, easily stolen video flowing address by lawless person.
The invention provides a kind of system of net cast being carried out to door chain process to solve the problem.Fig. 2 is the system 200 of net cast being carried out to door chain process according to one embodiment of the invention.As shown in Figure 2, the system 200 that door chain process is carried out in net cast is comprised: player 201, player interface 202 and server 203.Be with Fig. 1 difference, player 201 has deciphering module 204, and player interface 202 has encrypting module 205, and server 203 has authentication module 206.
(detect that user inputs when player 201 is used by user, such as, when user opens the action of player), extract user profile and this user profile is sent to player interface 202, wherein, this user profile comprises user cookie, user's service time and/or user ID etc.Wherein, in one embodiment of this invention, this user time represents the ageing of the enciphered message of the ageing of live video and/or a player interface acquisition request.When exceeding the scheduled time, such as 3 ~ 5 hours, enciphered message was just invalid.
Player interface 202 receives this user profile, and utilize encrypting module 205 this user profile to be encrypted to obtain enciphered message, wherein, this encryption is by such as realizing for DES, 3DES, RC2, RC4 etc. cryptographic algorithm, this enciphered message not as limit, and is returned to player 201 by the present invention.
The enciphered message of deciphering module 204 to this passback of player 201 is decrypted and obtains decrypted token (such as secure identifier SID and/or label token etc.), wherein this decryption processing is by realizing with the decipherment algorithm corresponding to this cryptographic algorithm, such as, when using DES symmetry algorithm to be encrypted, symmetrical decipherment algorithm can be used to be decrypted.The present invention does not limit the concrete form of decipherment algorithm.Decrypted token is sent to the authentication module 206 of server 203 by player 201 by player interface 202, whether authentication module carries out checking to judge deciphering to this decrypted token successful.
In one embodiment of this invention, user cookie, user's service time and/or user ID cryptographic algorithm carry out realizing encrypting in conjunction with the encryption string of rear generation with condition code (such as a random number) by encrypting module 205, and deciphering module 204 is decrypted this encryption string and obtains decrypted token.And after player interface 202 receives user profile, also this user profile can be sent to the authentication module 206 of server 203, authentication module 206 is verified decrypted token according to this user profile.Such as authentication module 206 judges that whether the User IP in decrypted token is identical with the User IP in user profile, if identical, then can judge it is same validated user, i.e. successful decryption, namely respond play instruction that player 201 sends and send video flowing for player 201 and play.If not identical, then judge it is not identical validated user, namely decipher failure, return HTTP404 mistake, then can not send video flowing to player 201.
Use in sight at some, user may use same local terminal, but can change the place to use of local terminal, such as, change to restaurant from family or change to Shanghai from Beijing to use same panel computer to watch video.Now the IP address of local terminal can change along with the change of network, if only according to User IP, then can cause misjudgment, make validated user normally can not watch video.But in above-mentioned use sight, no matter whether user changes place to use, and the user cookie of this user is identical, therefore can differentiate whether be same validated user by user cookie.Use in sight at other, user may change local terminal and place to use simultaneously, such as, watch video at Beijing panel computer, and watch video at Shanghai desktop computer.Now the IP address of local terminal can change along with the change of network, if only according to User IP, then can cause misjudgment, make validated user normally can not watch video.If but in above-mentioned use sight, user is login user (utilizing same account to log in), then the user ID of the user cookie of this login user is identical, therefore can differentiate whether be same validated user by this user ID.
Therefore, in an embodiment of the present invention, when judging that the User IP in decrypted token and the User IP in user profile are not identical, authentication module 206 judges that whether the user cookie in decrypted token is identical with the user cookie in user profile further, if identical, then can judge it is same validated user, i.e. successful decryption, namely send video flowing and play for player 201.If not identical, then judge it is not identical validated user, namely decipher failure, thus do not send video flowing to player 201.Wherein, above-mentioned user cookie comprises the cookie information of login user and non-login user.
Fig. 3 is the method for net cast being carried out to door chain process according to one embodiment of the invention.As shown in Figure 3:
In step 301, extract user profile by player and this user profile is sent to player interface.Wherein, in one embodiment of this invention, this user profile comprises user cookie(and user cookie), user's service time and/or user ID etc.Wherein, user cookie comprises the cookie information of login user and non-login user.
In step 302, utilize the encrypting module in player interface to be encrypted this user profile and obtain enciphered message.Wherein, in one embodiment of this invention, this encryption is by such as realizing for DES, 3DES, RC2, RC4 etc. cryptographic algorithm, and the present invention is not as limit.In one embodiment of this invention, user cookie, user's service time and/or user ID cryptographic algorithm carry out realizing encrypting in conjunction with the encryption string of rear generation with condition code by encrypting module 205.
In step 303, enciphered message is returned to player.
In step 304, the enciphered message of deciphering module to this passback of player is decrypted and obtains decrypted token.Wherein, in one embodiment, this decrypted token can be such as secure identifier SID and/or label token etc.And in one embodiment, this decryption processing is by realizing with the decipherment algorithm corresponding to this cryptographic algorithm, and the present invention does not limit the concrete form of decipherment algorithm.
In step 305, by player interface, decrypted token is sent to the authentication module of server.
Within step 306, whether successfully authentication module carries out checking to judge deciphering to this decrypted token.
In one embodiment of this invention, authentication module judges to decipher whether success by judging that whether User IP in decrypted token is identical with the User IP in user profile.Such as, if judge, User IP is identical with the User IP in user profile, then can judge it is same validated user, i.e. successful decryption, namely responds the play instruction of player transmission and sends video flowing for player plays.If judge, User IP is not identical with the User IP in user profile, then judge it is not identical validated user, namely decipher failure, return HTTP404 mistake, then can not send video flowing to player.But in some actual use sights, user may change the place to use of local terminal, such as change to restaurant from family or change to from Beijing Shanghai use same panel computer watch video.Use in sight at other, user may change local terminal and place to use simultaneously, such as, watch video at Beijing panel computer, and watch video at Shanghai desktop computer.Now the IP address of panel computer can change along with the change of network, if only according to User IP, then can cause misjudgment, make validated user normally can not watch video.
Therefore, what the present invention proposed a kind of reinforcement carries out the method for door chain process to solve the problem to net cast.Fig. 4 is the method for net cast being carried out to door chain process according to another embodiment of the present invention.As shown in Figure 4:
In step 401, extract user profile by player and this user profile is sent to player interface.Wherein, in one embodiment, this user profile comprises user cookie, user's service time and/or user ID etc.
In step 402, utilize the encrypting module in player interface to be encrypted this user profile and obtain enciphered message.Wherein, in one embodiment of this invention, this encryption is by such as realizing for DES, 3DES, RC2, RC4 etc. cryptographic algorithm, and the present invention is not as limit.In one embodiment of this invention, user cookie, user's service time and/or user ID cryptographic algorithm carry out realizing encrypting in conjunction with the encryption string of rear generation with condition code by encrypting module 205.
In step 403, enciphered message is returned to player.
In step 404, the enciphered message of deciphering module to this passback of player is decrypted and obtains decrypted token.Wherein, in one embodiment, this decrypted token can be such as secure identifier SID and/or label token etc.And in one embodiment, this decryption processing is by realizing with the decipherment algorithm corresponding to this cryptographic algorithm, and the present invention does not limit the concrete form of decipherment algorithm.
In step 405, by player interface, decrypted token is sent to the authentication module of server.
In a step 406, authentication module judges that whether the User IP in decrypted token is identical with the User IP in user profile.If identical, enter step 407.If not identical, enter step 408.
In step 407, judgement is same validated user, i.e. successful decryption.
In a step 408, authentication module judges that whether the user cookie in decrypted token is identical with the user cookie in user profile.If identical, enter step 407.If not identical, enter step 409.
In step 409, judge it is not identical validated user, namely decipher failure.
Compared with prior art, method and the system thereof of net cast being carried out to door chain process described in the application, reach following effect:
(1) method and system thereof of net cast being carried out to door chain process of the present invention, effectively can play the encryption and decryption to live video, effectively prevents third party from carrying out intercepting, directly carrying out the problems such as bootlegging broadcasting.
(2) method and system thereof of net cast being carried out to door chain process of the present invention, can also continue to form the encryption and decryption to live video according to customer location change, effectively prevent third party from carrying out intercepting, directly carrying out the problems such as bootlegging broadcasting.
Those skilled in the art should understand, the embodiment of the application can be provided as method, device or computer program.Therefore, the application can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the application can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
Above-mentioned explanation illustrate and describes some preferred embodiments of the application, but as previously mentioned, be to be understood that the application is not limited to the form disclosed by this paper, should not regard the eliminating to other embodiments as, and can be used for other combinations various, amendment and environment, and can in invention contemplated scope described herein, changed by the technology of above-mentioned instruction or association area or knowledge.And the change that those skilled in the art carry out and change do not depart from the spirit and scope of the application, then all should in the protection range of the application's claims.