CN105844121A - Method and system for applying digital watermark to content delivery network (CDN) - Google Patents
Method and system for applying digital watermark to content delivery network (CDN) Download PDFInfo
- Publication number
- CN105844121A CN105844121A CN201610196581.XA CN201610196581A CN105844121A CN 105844121 A CN105844121 A CN 105844121A CN 201610196581 A CN201610196581 A CN 201610196581A CN 105844121 A CN105844121 A CN 105844121A
- Authority
- CN
- China
- Prior art keywords
- watermark
- address
- requested file
- url
- digital watermarking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000004891 communication Methods 0.000 claims description 3
- 238000012216 screening Methods 0.000 claims description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims 3
- 238000009826 distribution Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000010025 steaming Methods 0.000 description 4
- 230000004888 barrier function Effects 0.000 description 2
- 238000005336 cracking Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005304 joining Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241000270322 Lepidosauria Species 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000003860 storage Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Abstract
The invention provides a method for applying a digital watermark to a content delivery network (CDN). The method comprises the following steps that: a CDN node resolves an access request from a client in order to determine requested file information; the CDN node acquires a requested file which corresponds to the requested file information according to the requested file information, and determines a URL (Uniform Resource Locator) address which corresponds to the requested file; and the CND node adds the digital watermark into the URL address to generate a watermark URL address in response to the access request. The embodiment of the invention also provides a system for applying the digital watermark to the content delivery network. Through adoption of the method and the system, the digital watermark is applied to the whole content delivery network, and added into a URL, so that the invisibility of the digital watermark is improved in comparison to a way of directly adding the digital watermark into an audio/video file code under a general situation.
Description
Technical field
Disclosure embodiment relates to content distributing network technical field, particularly relates to a kind of content delivery network
The method and system of network Applied Digital watermark.
Background technology
CDN (Content Delivery Network, content distributing network) is a kind of by network
Place on existing Internet basic one layer of intelligent virtual net that CDN node is constituted everywhere
Network.CDN can be in real time according to network traffics and the connection of each node, load state and to user
Distance and the integrated information such as response time the request of user is re-directed to from the nearest service of user
On node, its objective is to select the node from user's relative close needed for user sends user
Content, alleviates the situation of network congestion, improves the response speed of website.
Along with the development of streaming media service, the digital copyright protecting problem of Streaming Media is more and more prominent
Go out, and utilize digital watermark technology can solve for above-mentioned copyright safety problem well, wherein count
Word digital watermark is typically to be directly embedded in the middle of digital carrier by some identification informations (i.e. digital watermarking),
And do not affect the use value of original vector, also it is not easy to be ascertained and again revises, but can be produced
Side identifies and identification.
Owing to content distributing network is widelyd popularize, how by numeral by Ge great stream media network operator
Digital watermark is applied becomes one of industry technical barrier urgently to be resolved hurrily among CDN the whole network;Again
Person, along with Internet technology and the fast development of multimedia technology, substantial amounts of safety problem meet the tendency and
Raw, stealing chain problem is exactly one of them, steals chain and refers to that service provider oneself does not provide the content of service,
The service content of other service provider is directly provided to end user on the website of oneself, defrauds of
Whole user browses and clicking rate, and the whole network door chain how being effectively realized content distributing network is also
One of technical barrier that industry is urgently to be resolved hurrily.
Summary of the invention
Disclosure embodiment provides the method and system of a kind of content distributing network Applied Digital watermark, in order to
Solve at least one technical problem illustrated in above-mentioned prior art.
On the one hand, disclosure embodiment provides a kind of method of content distributing network Applied Digital watermark, its
In, including:
CDN node resolves from the access request of client to determine requested fileinfo;
Described CDN node obtains according to described requested fileinfo to be believed corresponding to described requested file
The requested file of breath, and determine the URL address corresponding to described requested file;
The generation described access of response is added to described URL address in digital watermarking by described CDN node please
The watermark URL address asked.
On the other hand, disclosure embodiment also provide for a kind of content distributing network Applied Digital watermark be
System, described system is applied to CDN node, and wherein, described system includes:
Communication unit, for receiving the access request that client is sent;
Requested file address determines unit, for obtaining corresponding to institute according to described requested fileinfo
State the requested file of requested fileinfo, and determine the URL ground corresponding to described requested file
Location;
Requested file watermark scalar/vector, for adding digital watermarking to described URL address
Generate the watermark URL address responding described access request.
The method of the Applied Digital watermark of the content distributing network provided by disclosure embodiment and be
System, it is achieved that in content distribution the whole network Applied Digital watermark;Secondly, digital watermarking is added extremely
In URL, compared to generally directly digital watermarking being added to audio-video document coding, increase
Digital watermarking obscure disguise;Furthermore, digital watermarking is to the URL address corresponding to access request
The digital watermarking added, more achieves compared to the URL corresponding to All Files is all added digital watermarking
The on-demand interpolation of digital watermarking, has saved the resource consumption of CDN node.
Accompanying drawing explanation
In order to be illustrated more clearly that disclosure embodiment or technical scheme of the prior art, below will be to reality
Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that under,
Accompanying drawing in the description of face is some embodiments of the disclosure, for those of ordinary skill in the art,
On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is illustrated that the method for a kind of content distributing network Applied Digital watermark of the disclosure one embodiment
Flow chart;
A kind of detailed execution figure of the specific embodiment of step S13 that Fig. 2 is illustrated that in Fig. 1;
Fig. 3 is illustrated that the flow chart of a kind of preferred embodiment method of method shown in Fig. 1;
Fig. 4 is illustrated that the system of a kind of content distributing network Applied Digital watermark of the disclosure one embodiment
Structural representation.
Detailed description of the invention
For making the purpose of disclosure embodiment, technical scheme and advantage clearer, below in conjunction with these public affairs
Open the accompanying drawing in embodiment, the technical scheme in disclosure embodiment be clearly and completely described,
Obviously, described embodiment is a part of embodiment of the disclosure rather than whole embodiments.Based on
Embodiment in the disclosure, those of ordinary skill in the art are obtained under not making creative work premise
The every other embodiment obtained, broadly falls into the scope of disclosure protection.
See the Applied Digital watermark that Fig. 1 is illustrated that a kind of content distributing network of the disclosure one embodiment
The flow chart of method, wherein, including:
S11:CDN node resolves from the access request of client to determine requested fileinfo;
S12:CDN node obtains being asked corresponding to requested fileinfo according to requested fileinfo
Seek file, and determine the URL address corresponding to requested file;
Generation response access request is added to above-mentioned URL address in digital watermarking by S13:CDN node
Watermark URL address.
It should be noted that, digital watermark information is embedded in the non-critical information of URL address, because of
The presence or absence of this digital watermarking does not interferes with normally holding of the URL address corresponding to requested file
OK;Access request for above-mentioned client should not limit the type of access request, can be webpage client
The access request of end can also be the access request etc. of mobile phone app client;And, the table of above-mentioned node
Existing form can be server but be not limited to server.
The method of the Applied Digital watermark of the content distributing network provided by disclosure embodiment, first,
Achieve in content distribution the whole network Applied Digital watermark;Secondly, digital watermarking is added to URL, phase
Than in generally directly digital watermarking being added to audio-video document coding, increase digital watermarking
Obscure disguise;Furthermore, the digital watermarking that the URL address corresponding to access request is added, compare
The on-demand interpolation of digital watermarking is more achieved in the URL corresponding to All Files all being added digital watermarking,
Save the resource consumption of CDN node.
See the detailed execution figure of a kind of specific embodiment of step S13 that Fig. 2 is illustrated that in Fig. 1,
Wherein, step S13 includes:
S131: resolve access request to determine the access time corresponding to access request and IP address;
S132: at least based on the time of access, IP address and requested file generated digital watermarking;
S133: by above-mentioned digital watermark embedding to the URL corresponding to requested file to generate watermark
URL address.
It should be noted that, the content that requested file is requested file in this preferred embodiment method,
When requested file is multimedia file, the requested file in above-mentioned steps S132 can be by
The matchmaker of demand file provides ID and also can also is that the matchmaker of requested file provides type etc..
In disclosure embodiment method, by using the access time of access request as timestamp, IP ground
Location and requested file count the Consideration of digital watermarking AES together so that digital watermarking is not
Easily it is forged, enhances the repellence of digital watermarking;Meanwhile, access time and the visit of IP address will be comprised
Ask the source information reference aspect as digital watermarking, it is achieved that utilize digital watermarking to distinguish different access originators
Information;Furthermore, make, when there is dispute over copyright, to be conducive to by the stamp of joining day in digital watermarking
Operator is really weighed by digital watermarking, strengthens operator's maintenance dynamics to digital publishing rights;Further
Ground, owing to the algorithm of digital watermarking is stored in CDN node, therefore the work to numeral watermark verification
Each CDN node just can be accomplished without want Hui Yuan to Centroid, increase and test in digital watermarking
Efficiency during card.
See the flow chart that Fig. 3 is illustrated that a kind of preferred embodiment method of method shown in Fig. 1,
Also include after step S13:
S14: the access times of watermark URL address in statistics scheduled duration;
S15: compare the size of access times and predetermined threshold, filters out access times more than predetermined threshold
Watermark URL address;
S16: resolve above-mentioned more than the digital watermarking in the watermark URL address of predetermined threshold, to determine robber
The IP address of chain person.
It should be noted that, illegal service provider is to immobilize by the digital watermarking that reptile obtains
, therefore steal chain person and will not change by stealing the digital watermarking acquired in chain, steal chain person to being stolen
The access times of the link including digital watermarking will compare many.In disclosure preferred embodiment method
In, the difference of the access originator information comprised in asking according to different access, such as access User IP ground
Location, the difference of access time, it is possible to accomplish each independent accessing with having independent digital watermarking per family
Information, and the access request of same user is because of the difference of the time of access, the numeral that user is had
Watermark information is the most different, and then the watermark URL address generated also can be different, thus will not go out when judging
Now fail to judge, the situation such as erroneous judgement occurs.
As further optimizing, in order to improve the degree of accuracy judging to steal chain, above-mentioned predetermined threshold is permissible
Regularly or it is updated according to demand.
Ensure that robber chain person is also limited while accessing by normal users by disclosure embodiment method
System, it is possible to by watermark URL be accessed number of times not normal and determine robber chain person's target, resolve above-mentioned watermark
The IP address of chain person is stolen in digital watermarking in URL address to determine, and then visits above-mentioned IP address mask
The service of asking avoids the authorized party of streaming media manufacturer during door chain to accidentally injure, and improves anti-
Steal the degree of accuracy of chain.
As further optimal way, after step S16, however, it is determined that the IP address of above-mentioned robber chain person
It is contained in default white list, does not the most perform the shielding access service to above-mentioned IP address;If it is determined that it is above-mentioned
The IP address stealing chain person is not included in presetting in white list, then perform the shielding access to above-mentioned IP address
Service.
Include what content delivery network service operator was authorized it should be noted that, preset in white list
The IP address of server.More specifically, in order to prevent the phenomenon occurring accidentally injuring during door chain,
Such as: New Orient may authorize Wei Bo can use some inside informations of New Orient, some services of Wei Bo
Device IP just should list in the middle of above-mentioned default white list, therefore can be the most anti-by this preferred implementation
Only during door chain, authorized party is accidentally injured.
In disclosure preferred embodiment method for generate digital watermarking visitor access originator information can
The property selected variation (can be IP address and/or the access time can also be the MAC Address of access originator, source thing
Reason port numbers and/or Ethernet protocol type etc.), the possibility of its stolen chain be dramatically reduced, and from
Solving multiple visitor in principle uses same agency to conduct interviews website, and visitor IP is identical and leads
The problem that cause cannot be distinguished.The feasibility of the disclosure is high, and most of websites can be by letters such as filters
Single technology realizes, and will not business original to website impact.
As a kind of preferred embodiment of disclosure embodiment method, at least based on accessing time, IP address
Include with requested file generated digital watermarking:
Based on RSA Algorithm according at least to the time of access, IP address and requested file generated digital watermarking.
As further optimizing, above-mentioned digital watermarking is the binary coding that computer cannot directly perform.
About disclosure embodiment method, more specifically, based on RSA Algorithm according to the time of access, IP ground
Stochastic generation number and key corresponding to location, the ID of requested file, access time generate digital watermarking.
In disclosure embodiment method, utilize RSA Algorithm generate digital watermarking, due to except operator it
Outer other people cannot know the private key about RSA Algorithm, so that the digital watermarking generated has
The strongest anti-ability of cracking.
As the further optimization of disclosure embodiment method, file to be asked is MPEG-4 form
Video data file.
It should be noted that, MPEG-4 standard is mainly used in streaming media service at present, pass through
MPEG-4 standard implementation utilizes the narrowest bandwidth and by frame reconstruction technique, compresses and transmits data,
Take with minimum data and obtain optimal picture quality.
As further optimizing, above-mentioned MPEG-4 form includes ffpeg, Divx and Xvid.
When disclosure embodiment method is applied in Streaming Media field, disclosure embodiment method innovation
Digital watermarking is added to URL rather than adds to audio/video coding by ground, more can improve digital watermarking
Obscure disguise;In one case, when disclosure preferred embodiment method is applied in net cast
During business scope, utilize the whole network Applied Digital watermark while ensureing copyright safety and the whole network door chain also
The real-time effect of live video can be significantly improved, improve Consumer's Experience.
As a kind of preferred embodiment of disclosure embodiment method, CDN node is according to requested file
Acquisition of information includes corresponding to the requested file of requested fileinfo:
Whether it is cached with corresponding to requested file according to requested fileinfo inquiry CDN node this locality
The requested file of information;
The most then read requested file from CDN node local cache;
If it is not, then Hui Yuan to Centroid to obtain requested file.
In disclosure embodiment method, it is achieved that obtain in the network-wide basis of content distributing network and visit
The resource file that the request of asking is corresponding.
In the application on the one hand of disclosure embodiment method, including disclosure embodiment method can be applied
In the CDN server of content distributing network, especially apply each CDN service under steaming media platform
In device, it is possible to realize the digital watermarking application at steaming media platform the whole network, additionally can substantially increase number
The disguise of word watermark, further utilizes digital watermarking to achieve the accurate lock stealing chain person's information
And ensured the whole network door chain of streaming medium content distribution network.
See Fig. 4 and be illustrated that a kind of content distributing network Applied Digital watermark of the disclosure one embodiment
The structural representation of system, said system is applied to CDN node, and wherein, said system includes:
Communication unit, for receiving the access request that client is sent;
Requested file address determines unit, for obtaining corresponding to requested according to requested fileinfo
The requested file of fileinfo, and determine the URL address corresponding to requested file;
Requested file watermark scalar/vector, generates to URL address for digital watermarking being added
The watermark URL address of response access request.
The system of the Applied Digital watermark of the content distributing network provided by disclosure embodiment, first,
Achieve in content distribution the whole network Applied Digital watermark;Secondly, digital watermarking is added to URL, phase
Than in generally directly digital watermarking being added to audio-video document coding, increase digital watermarking
Disguise;Furthermore, the digital watermarking adding the URL address corresponding to access request, compared to right
URL corresponding to All Files all adds digital watermarking and more achieves the on-demand interpolation of digital watermarking, saves
The resource consumption of CDN node.
As a kind of preferred embodiment of disclosure embodiment system, requested file watermark address generates single
Unit includes:
Access originator information analysis module, for resolving access request to determine the access corresponding to access request
Time and IP address;
Digital watermarking generation module, at least based on the time of access, IP address and requested file generated
Digital watermarking;
Digital watermark embedding module, for by the URL corresponding to digital watermark embedding to requested file
To generate watermark URL address.
In disclosure embodiment system, by access originator information analysis module and numeral watermark generation module
The access time of access request is counted examining of digital watermarking AES as timestamp together with IP address
Worry factor so that digital watermarking is difficult to be forged, enhances the repellence of digital watermarking;Meanwhile, utilize
Access originator information analysis module and numeral watermark generation module will comprise access time and the access originator of IP address
Information is as the reference aspect of digital watermarking, it is achieved that utilize digital watermarking to distinguish different access originator information;
Furthermore, make dispute over copyright by digital watermarking generation module joining day stamp in digital watermarking
Time, beneficially operator is really weighed by digital watermarking, strengthens operator's maintenance dynamics to digital publishing rights;
Further, owing to algorithm and the access originator information of digital watermarking are all stored in CDN node,
Therefore numeral watermark verification is operated in each CDN node and just can be accomplished without wanting Hui Yuan to center
Node, increases the efficiency when digital watermarking is verified.
As a kind of preferred embodiment of disclosure embodiment system, generate with requested file watermark address
Unit also includes that watermark door chain unit, watermark door chain unit also include:
Access times statistical module, the access times of watermark URL address in statistics scheduled duration;
Screening module, for comparing the size of access times and predetermined threshold, filters out access times and is more than
The watermark URL address of predetermined threshold;
Parsing module, above-mentioned more than the digital watermarking in the watermark URL address of predetermined threshold for resolving,
To determine the IP address stealing chain person.
Ensure that robber chain person is also limited while accessing by normal users by disclosure embodiment system
System, it is possible to be accessed number of times according to watermark URL by access times statistical module and screening module and determine
Stealing chain person's target, the digital watermarking resolved in watermark URL address by parsing module steals chain person's to determine
IP address;Further, above-mentioned IP address mask is accessed service to avoid during door chain
The authorized party of streaming media manufacturer accidentally injures, and improves the degree of accuracy of door chain.
As a kind of preferred embodiment of disclosure embodiment system, digital watermarking generation module for based on
RSA Algorithm is according at least to the time of access, IP address and requested file generated digital watermarking.
In disclosure embodiment system, above-mentioned digital watermarking generation module utilizes RSA Algorithm to generate numeral
Watermark, owing to other people in addition to operator cannot know the private key about RSA Algorithm, so that
The digital watermarking generated has the strongest anti-ability of cracking.
As a kind of preferred embodiment of disclosure embodiment system, above-mentioned file to be asked is
The video data file of MPEG-4 form.
It should be noted that, MPEG-4 standard is mainly used in streaming media service at present, pass through
MPEG-4 standard implementation utilizes the narrowest bandwidth and by frame reconstruction technique, compresses and transmits data,
Take with minimum data and obtain optimal picture quality.
As further optimizing, above-mentioned MPEG-4 form includes ffpeg, Divx and Xvid.
When disclosure embodiment system is applied in Streaming Media field, disclosure embodiment system innovation
Digital watermarking is added to URL rather than adds to audio/video coding by ground, more can improve digital watermarking
Obscure disguise;In one case, when disclosure preferred embodiment method is applied in net cast
During business scope, utilize the whole network Applied Digital watermark while ensureing copyright safety and the whole network door chain also
The real-time effect of live video can be significantly improved, improve Consumer's Experience.
As a kind of preferred embodiment of disclosure embodiment system, above-mentioned requested file address determines list
Whether unit is used for: be cached with corresponding to requested literary composition according to requested fileinfo inquiry CDN node this locality
The requested file of part information;The most then read requested file from CDN node local cache;If it is not,
Then Hui Yuan to Centroid to obtain requested file.
In disclosure embodiment system, utilizing requested file address to determine, unit achieves divides in content
The resource file corresponding with access request is obtained in the network-wide basis of hairnet network.
It should be noted that in the case of not conflicting, in embodiment in the application and embodiment
Involved technical characteristic can be mutually combined each other.
Disclosure embodiment can realize related function module and unit by hardware processor.
In the application on the one hand of disclosure embodiment system, including disclosure embodiment system can be built
In the CDN server of content distributing network, especially in each CDN server under steaming media platform,
It is capable of the digital watermarking application at steaming media platform the whole network, additionally can substantially increase digital watermarking
Disguise, further utilize digital watermarking to achieve stealing the accurately locking of chain person's information and protecting
Hinder the whole network door chain of streaming medium content distribution network.
Device embodiment described above is only schematically, the list wherein illustrated as separating component
Unit can be or may not be physically separate, and the parts shown as unit can be or also
Can not be physical location, i.e. may be located at a place, or multiple NE can also be distributed to
On.Some or all of module therein can be selected according to the actual needs to realize the present embodiment scheme
Purpose.Those of ordinary skill in the art, in the case of not paying performing creative labour, are i.e. appreciated that
And implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality
The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly
Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words
Dividing and can embody with the form of software product, this computer software product can be stored in computer can
Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one
Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented
The method described in some part of example or embodiment.
Last it is noted that above example is only in order to illustrate the technical scheme of the disclosure, rather than to it
Limit;Although the disclosure being described in detail with reference to previous embodiment, the ordinary skill of this area
Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or
Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill
The essence of art scheme departs from the spirit and scope of the disclosure each embodiment technical scheme.
Claims (10)
1. a method for content distributing network Applied Digital watermark, wherein, including:
CDN node resolves from the access request of client to determine requested fileinfo;
Described CDN node obtains according to described requested fileinfo to be believed corresponding to described requested file
The requested file of breath, and determine the URL address corresponding to described requested file;
The generation described access of response is added to described URL address in digital watermarking by described CDN node please
The watermark URL address asked.
Method the most according to claim 1, wherein, digital watermarking is added by described CDN node
The watermark URL address generating the described access request of response to described URL address includes:
Resolve described access request to determine the access time corresponding to described access request and IP address;
At least based on digital watermarking described in described access time, IP address and described requested file generated;
By in described digital watermark embedding to the URL corresponding to described requested file to generate described water
Print URL address.
Method the most according to claim 2, wherein, by the most described for described digital watermark embedding
In URL with generate the described access request of described response watermark URL address after also include:
The access times of described watermark URL address in statistics scheduled duration;
Relatively described access times and the size of predetermined threshold, filter out access times more than predetermined threshold
Watermark URL address;
Resolve the described digital watermarking in the described watermark URL address more than predetermined threshold, to determine robber's chain
The IP address of person.
Method the most according to claim 2, wherein, described at least based on described access time, IP
Digital watermarking described in address and described requested file generated includes:
Based on RSA Algorithm according at least to described access time, IP address and described requested file generated institute
State digital watermarking.
5. file to be asked described according to the method described in any one of claim 1-4, wherein, is
The video data file of MPEG-4 form.
6. a system for the Applied Digital watermark of content distributing network, described system is applied to CDN joint
Point, wherein, described system includes:
Communication unit, for receiving the access request that client is sent;
Requested file address determines unit, for obtaining corresponding to institute according to described requested fileinfo
State the requested file of requested fileinfo, and determine the URL ground corresponding to described requested file
Location;
Requested file watermark scalar/vector, for adding digital watermarking to described URL address
The middle watermark URL address generating the described access request of response.
System the most according to claim 6, wherein, described requested file watermark address generates single
Unit includes:
Access originator information analysis module, is used for resolving described access request right to determine described access request institute
The access time answered and IP address;
Digital watermarking generation module, at least based on described access time, IP address and described requested
Digital watermarking described in file generated;
Digital watermark embedding module, for by corresponding to described digital watermark embedding to described requested file
URL in generate described watermark URL address.
System the most according to claim 7, wherein, generates with described requested file watermark address
Unit also includes that watermark door chain unit, described watermark door chain unit also include:
Access times statistical module, the access times of described watermark URL address in statistics scheduled duration;
Screening module, for relatively described access times and the size of predetermined threshold, filters out access times
Watermark URL address more than predetermined threshold;
Parsing module, for resolving the described numeral water in the described watermark URL address more than predetermined threshold
Print, to determine the IP address stealing chain person.
System the most according to claim 7, wherein, described digital watermarking generation module for based on
RSA Algorithm is according at least to numeral water described in described access time, IP address and described requested file generated
Print.
10. file to be asked described according to the method described in any one of claim 6-9, wherein, is
The video data file of MPEG-4 form.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610196581.XA CN105844121A (en) | 2016-03-31 | 2016-03-31 | Method and system for applying digital watermark to content delivery network (CDN) |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610196581.XA CN105844121A (en) | 2016-03-31 | 2016-03-31 | Method and system for applying digital watermark to content delivery network (CDN) |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105844121A true CN105844121A (en) | 2016-08-10 |
Family
ID=56596425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610196581.XA Pending CN105844121A (en) | 2016-03-31 | 2016-03-31 | Method and system for applying digital watermark to content delivery network (CDN) |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105844121A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107341375A (en) * | 2016-12-09 | 2017-11-10 | 北京安天网络安全技术有限公司 | A kind of method and system for the attacker that traced to the source based on Web page picture secret mark |
CN108882055A (en) * | 2018-06-28 | 2018-11-23 | 广州虎牙信息科技有限公司 | The method and device of net cast method and system, synthetic video stream |
CN111917787A (en) * | 2020-08-06 | 2020-11-10 | 北京奇艺世纪科技有限公司 | Request detection method and device, electronic equipment and computer-readable storage medium |
CN112003873A (en) * | 2020-08-31 | 2020-11-27 | 成都安恒信息技术有限公司 | HTTP (hyper text transport protocol) traffic defense method and system for resisting DDoS (distributed denial of service) attack |
CN111935306B (en) * | 2020-09-11 | 2020-12-29 | 腾讯科技(深圳)有限公司 | Node scheduling method and device |
CN112313919A (en) * | 2018-05-04 | 2021-02-02 | 思杰系统有限公司 | System and method for watermarking using an embedded browser |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309275A (en) * | 2008-06-27 | 2008-11-19 | 武汉烽火网络有限责任公司 | File name protection method for stream media service |
CN103036924A (en) * | 2011-09-29 | 2013-04-10 | 深圳市快播科技有限公司 | Chaining processing method and chaining processing system |
CN103986735A (en) * | 2014-06-05 | 2014-08-13 | 北京赛维安讯科技发展有限公司 | CDN (content distribution network) antitheft system and antitheft method |
CN104283845A (en) * | 2013-07-03 | 2015-01-14 | 中国电信股份有限公司 | Hotlink protecting method and system, CDN server and client side |
CN104980771A (en) * | 2014-04-09 | 2015-10-14 | 中国电信股份有限公司 | Method and system for stream media-on-demand through internet protocol television (IPTV) |
CN105357190A (en) * | 2015-10-26 | 2016-02-24 | 网宿科技股份有限公司 | Method and system for performing authentication on access request |
-
2016
- 2016-03-31 CN CN201610196581.XA patent/CN105844121A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101309275A (en) * | 2008-06-27 | 2008-11-19 | 武汉烽火网络有限责任公司 | File name protection method for stream media service |
CN103036924A (en) * | 2011-09-29 | 2013-04-10 | 深圳市快播科技有限公司 | Chaining processing method and chaining processing system |
CN104283845A (en) * | 2013-07-03 | 2015-01-14 | 中国电信股份有限公司 | Hotlink protecting method and system, CDN server and client side |
CN104980771A (en) * | 2014-04-09 | 2015-10-14 | 中国电信股份有限公司 | Method and system for stream media-on-demand through internet protocol television (IPTV) |
CN103986735A (en) * | 2014-06-05 | 2014-08-13 | 北京赛维安讯科技发展有限公司 | CDN (content distribution network) antitheft system and antitheft method |
CN105357190A (en) * | 2015-10-26 | 2016-02-24 | 网宿科技股份有限公司 | Method and system for performing authentication on access request |
Non-Patent Citations (1)
Title |
---|
袁楷等: ""流媒体服务器防盗链系统"", 《企业技术开发》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107341375A (en) * | 2016-12-09 | 2017-11-10 | 北京安天网络安全技术有限公司 | A kind of method and system for the attacker that traced to the source based on Web page picture secret mark |
CN112313919A (en) * | 2018-05-04 | 2021-02-02 | 思杰系统有限公司 | System and method for watermarking using an embedded browser |
CN108882055A (en) * | 2018-06-28 | 2018-11-23 | 广州虎牙信息科技有限公司 | The method and device of net cast method and system, synthetic video stream |
CN111917787A (en) * | 2020-08-06 | 2020-11-10 | 北京奇艺世纪科技有限公司 | Request detection method and device, electronic equipment and computer-readable storage medium |
CN112003873A (en) * | 2020-08-31 | 2020-11-27 | 成都安恒信息技术有限公司 | HTTP (hyper text transport protocol) traffic defense method and system for resisting DDoS (distributed denial of service) attack |
CN112003873B (en) * | 2020-08-31 | 2022-04-19 | 成都安恒信息技术有限公司 | HTTP (hyper text transport protocol) traffic defense method and system for resisting DDoS (distributed denial of service) attack |
CN111935306B (en) * | 2020-09-11 | 2020-12-29 | 腾讯科技(深圳)有限公司 | Node scheduling method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105844121A (en) | Method and system for applying digital watermark to content delivery network (CDN) | |
US11521147B2 (en) | Cloud service usage risk assessment | |
KR101603149B1 (en) | A system and method to protect user privacy in multimedia uploaded to internet sites | |
US11824946B2 (en) | Systems and methods for distributing content | |
CN103986735B (en) | CDN (content distribution network) antitheft system and antitheft method | |
CN107517179B (en) | Authentication method, device and system | |
US20110289116A1 (en) | Method and Apparatus for Protecting Online Content by Detecting Noncompliant Access Patterns | |
CN110072122B (en) | Video playing method and related equipment | |
KR20160003783A (en) | Real-time anti-piracy for broadcast streams | |
KR20170007427A (en) | Token-based authentication and authorization information signaling and exchange for adaptive streaming | |
CN103795702A (en) | Transit control for data | |
CN109088909B (en) | Service gray level publishing method and device based on merchant type | |
US20120011244A1 (en) | Method for redistributing license tokens for a service across a cloud computing environment | |
CN108449308B (en) | Method and device for identifying malicious resource access | |
CN106254528B (en) | Resource downloading method and caching device | |
KR20120072013A (en) | Method and apparatus for generating security label for scalable contents distribution | |
US10805162B2 (en) | Content policy discovery | |
CN111083093A (en) | Method and device for calling terminal capability | |
CN111988644B (en) | Anti-stealing-link method, device, equipment and storage medium for network video | |
US20150113575A1 (en) | Generating media signature for content delivery | |
CN113407967A (en) | Service security method and device based on application market architecture | |
CN107995616A (en) | The processing method and device of user behavior data | |
US20140053233A1 (en) | Online media policy platform | |
EP4084485A1 (en) | Methods, systems, and devices for detecting over-the-top piracy | |
CN109379344A (en) | The method for authenticating and authentication server of access request |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160810 |
|
WD01 | Invention patent application deemed withdrawn after publication |