CN105844121A - Method and system for applying digital watermark to content delivery network (CDN) - Google Patents

Method and system for applying digital watermark to content delivery network (CDN) Download PDF

Info

Publication number
CN105844121A
CN105844121A CN201610196581.XA CN201610196581A CN105844121A CN 105844121 A CN105844121 A CN 105844121A CN 201610196581 A CN201610196581 A CN 201610196581A CN 105844121 A CN105844121 A CN 105844121A
Authority
CN
China
Prior art keywords
watermark
address
requested file
url
digital watermarking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610196581.XA
Other languages
Chinese (zh)
Inventor
李洪福
李艳松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Cloud Computing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Cloud Computing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Cloud Computing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610196581.XA priority Critical patent/CN105844121A/en
Publication of CN105844121A publication Critical patent/CN105844121A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Abstract

The invention provides a method for applying a digital watermark to a content delivery network (CDN). The method comprises the following steps that: a CDN node resolves an access request from a client in order to determine requested file information; the CDN node acquires a requested file which corresponds to the requested file information according to the requested file information, and determines a URL (Uniform Resource Locator) address which corresponds to the requested file; and the CND node adds the digital watermark into the URL address to generate a watermark URL address in response to the access request. The embodiment of the invention also provides a system for applying the digital watermark to the content delivery network. Through adoption of the method and the system, the digital watermark is applied to the whole content delivery network, and added into a URL, so that the invisibility of the digital watermark is improved in comparison to a way of directly adding the digital watermark into an audio/video file code under a general situation.

Description

A kind of method and system of content distributing network Applied Digital watermark
Technical field
Disclosure embodiment relates to content distributing network technical field, particularly relates to a kind of content delivery network The method and system of network Applied Digital watermark.
Background technology
CDN (Content Delivery Network, content distributing network) is a kind of by network Place on existing Internet basic one layer of intelligent virtual net that CDN node is constituted everywhere Network.CDN can be in real time according to network traffics and the connection of each node, load state and to user Distance and the integrated information such as response time the request of user is re-directed to from the nearest service of user On node, its objective is to select the node from user's relative close needed for user sends user Content, alleviates the situation of network congestion, improves the response speed of website.
Along with the development of streaming media service, the digital copyright protecting problem of Streaming Media is more and more prominent Go out, and utilize digital watermark technology can solve for above-mentioned copyright safety problem well, wherein count Word digital watermark is typically to be directly embedded in the middle of digital carrier by some identification informations (i.e. digital watermarking), And do not affect the use value of original vector, also it is not easy to be ascertained and again revises, but can be produced Side identifies and identification.
Owing to content distributing network is widelyd popularize, how by numeral by Ge great stream media network operator Digital watermark is applied becomes one of industry technical barrier urgently to be resolved hurrily among CDN the whole network;Again Person, along with Internet technology and the fast development of multimedia technology, substantial amounts of safety problem meet the tendency and Raw, stealing chain problem is exactly one of them, steals chain and refers to that service provider oneself does not provide the content of service, The service content of other service provider is directly provided to end user on the website of oneself, defrauds of Whole user browses and clicking rate, and the whole network door chain how being effectively realized content distributing network is also One of technical barrier that industry is urgently to be resolved hurrily.
Summary of the invention
Disclosure embodiment provides the method and system of a kind of content distributing network Applied Digital watermark, in order to Solve at least one technical problem illustrated in above-mentioned prior art.
On the one hand, disclosure embodiment provides a kind of method of content distributing network Applied Digital watermark, its In, including:
CDN node resolves from the access request of client to determine requested fileinfo;
Described CDN node obtains according to described requested fileinfo to be believed corresponding to described requested file The requested file of breath, and determine the URL address corresponding to described requested file;
The generation described access of response is added to described URL address in digital watermarking by described CDN node please The watermark URL address asked.
On the other hand, disclosure embodiment also provide for a kind of content distributing network Applied Digital watermark be System, described system is applied to CDN node, and wherein, described system includes:
Communication unit, for receiving the access request that client is sent;
Requested file address determines unit, for obtaining corresponding to institute according to described requested fileinfo State the requested file of requested fileinfo, and determine the URL ground corresponding to described requested file Location;
Requested file watermark scalar/vector, for adding digital watermarking to described URL address Generate the watermark URL address responding described access request.
The method of the Applied Digital watermark of the content distributing network provided by disclosure embodiment and be System, it is achieved that in content distribution the whole network Applied Digital watermark;Secondly, digital watermarking is added extremely In URL, compared to generally directly digital watermarking being added to audio-video document coding, increase Digital watermarking obscure disguise;Furthermore, digital watermarking is to the URL address corresponding to access request The digital watermarking added, more achieves compared to the URL corresponding to All Files is all added digital watermarking The on-demand interpolation of digital watermarking, has saved the resource consumption of CDN node.
Accompanying drawing explanation
In order to be illustrated more clearly that disclosure embodiment or technical scheme of the prior art, below will be to reality Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that under, Accompanying drawing in the description of face is some embodiments of the disclosure, for those of ordinary skill in the art, On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is illustrated that the method for a kind of content distributing network Applied Digital watermark of the disclosure one embodiment Flow chart;
A kind of detailed execution figure of the specific embodiment of step S13 that Fig. 2 is illustrated that in Fig. 1;
Fig. 3 is illustrated that the flow chart of a kind of preferred embodiment method of method shown in Fig. 1;
Fig. 4 is illustrated that the system of a kind of content distributing network Applied Digital watermark of the disclosure one embodiment Structural representation.
Detailed description of the invention
For making the purpose of disclosure embodiment, technical scheme and advantage clearer, below in conjunction with these public affairs Open the accompanying drawing in embodiment, the technical scheme in disclosure embodiment be clearly and completely described, Obviously, described embodiment is a part of embodiment of the disclosure rather than whole embodiments.Based on Embodiment in the disclosure, those of ordinary skill in the art are obtained under not making creative work premise The every other embodiment obtained, broadly falls into the scope of disclosure protection.
See the Applied Digital watermark that Fig. 1 is illustrated that a kind of content distributing network of the disclosure one embodiment The flow chart of method, wherein, including:
S11:CDN node resolves from the access request of client to determine requested fileinfo;
S12:CDN node obtains being asked corresponding to requested fileinfo according to requested fileinfo Seek file, and determine the URL address corresponding to requested file;
Generation response access request is added to above-mentioned URL address in digital watermarking by S13:CDN node Watermark URL address.
It should be noted that, digital watermark information is embedded in the non-critical information of URL address, because of The presence or absence of this digital watermarking does not interferes with normally holding of the URL address corresponding to requested file OK;Access request for above-mentioned client should not limit the type of access request, can be webpage client The access request of end can also be the access request etc. of mobile phone app client;And, the table of above-mentioned node Existing form can be server but be not limited to server.
The method of the Applied Digital watermark of the content distributing network provided by disclosure embodiment, first, Achieve in content distribution the whole network Applied Digital watermark;Secondly, digital watermarking is added to URL, phase Than in generally directly digital watermarking being added to audio-video document coding, increase digital watermarking Obscure disguise;Furthermore, the digital watermarking that the URL address corresponding to access request is added, compare The on-demand interpolation of digital watermarking is more achieved in the URL corresponding to All Files all being added digital watermarking, Save the resource consumption of CDN node.
See the detailed execution figure of a kind of specific embodiment of step S13 that Fig. 2 is illustrated that in Fig. 1, Wherein, step S13 includes:
S131: resolve access request to determine the access time corresponding to access request and IP address;
S132: at least based on the time of access, IP address and requested file generated digital watermarking;
S133: by above-mentioned digital watermark embedding to the URL corresponding to requested file to generate watermark URL address.
It should be noted that, the content that requested file is requested file in this preferred embodiment method, When requested file is multimedia file, the requested file in above-mentioned steps S132 can be by The matchmaker of demand file provides ID and also can also is that the matchmaker of requested file provides type etc..
In disclosure embodiment method, by using the access time of access request as timestamp, IP ground Location and requested file count the Consideration of digital watermarking AES together so that digital watermarking is not Easily it is forged, enhances the repellence of digital watermarking;Meanwhile, access time and the visit of IP address will be comprised Ask the source information reference aspect as digital watermarking, it is achieved that utilize digital watermarking to distinguish different access originators Information;Furthermore, make, when there is dispute over copyright, to be conducive to by the stamp of joining day in digital watermarking Operator is really weighed by digital watermarking, strengthens operator's maintenance dynamics to digital publishing rights;Further Ground, owing to the algorithm of digital watermarking is stored in CDN node, therefore the work to numeral watermark verification Each CDN node just can be accomplished without want Hui Yuan to Centroid, increase and test in digital watermarking Efficiency during card.
See the flow chart that Fig. 3 is illustrated that a kind of preferred embodiment method of method shown in Fig. 1, Also include after step S13:
S14: the access times of watermark URL address in statistics scheduled duration;
S15: compare the size of access times and predetermined threshold, filters out access times more than predetermined threshold Watermark URL address;
S16: resolve above-mentioned more than the digital watermarking in the watermark URL address of predetermined threshold, to determine robber The IP address of chain person.
It should be noted that, illegal service provider is to immobilize by the digital watermarking that reptile obtains , therefore steal chain person and will not change by stealing the digital watermarking acquired in chain, steal chain person to being stolen The access times of the link including digital watermarking will compare many.In disclosure preferred embodiment method In, the difference of the access originator information comprised in asking according to different access, such as access User IP ground Location, the difference of access time, it is possible to accomplish each independent accessing with having independent digital watermarking per family Information, and the access request of same user is because of the difference of the time of access, the numeral that user is had Watermark information is the most different, and then the watermark URL address generated also can be different, thus will not go out when judging Now fail to judge, the situation such as erroneous judgement occurs.
As further optimizing, in order to improve the degree of accuracy judging to steal chain, above-mentioned predetermined threshold is permissible Regularly or it is updated according to demand.
Ensure that robber chain person is also limited while accessing by normal users by disclosure embodiment method System, it is possible to by watermark URL be accessed number of times not normal and determine robber chain person's target, resolve above-mentioned watermark The IP address of chain person is stolen in digital watermarking in URL address to determine, and then visits above-mentioned IP address mask The service of asking avoids the authorized party of streaming media manufacturer during door chain to accidentally injure, and improves anti- Steal the degree of accuracy of chain.
As further optimal way, after step S16, however, it is determined that the IP address of above-mentioned robber chain person It is contained in default white list, does not the most perform the shielding access service to above-mentioned IP address;If it is determined that it is above-mentioned The IP address stealing chain person is not included in presetting in white list, then perform the shielding access to above-mentioned IP address Service.
Include what content delivery network service operator was authorized it should be noted that, preset in white list The IP address of server.More specifically, in order to prevent the phenomenon occurring accidentally injuring during door chain, Such as: New Orient may authorize Wei Bo can use some inside informations of New Orient, some services of Wei Bo Device IP just should list in the middle of above-mentioned default white list, therefore can be the most anti-by this preferred implementation Only during door chain, authorized party is accidentally injured.
In disclosure preferred embodiment method for generate digital watermarking visitor access originator information can The property selected variation (can be IP address and/or the access time can also be the MAC Address of access originator, source thing Reason port numbers and/or Ethernet protocol type etc.), the possibility of its stolen chain be dramatically reduced, and from Solving multiple visitor in principle uses same agency to conduct interviews website, and visitor IP is identical and leads The problem that cause cannot be distinguished.The feasibility of the disclosure is high, and most of websites can be by letters such as filters Single technology realizes, and will not business original to website impact.
As a kind of preferred embodiment of disclosure embodiment method, at least based on accessing time, IP address Include with requested file generated digital watermarking:
Based on RSA Algorithm according at least to the time of access, IP address and requested file generated digital watermarking.
As further optimizing, above-mentioned digital watermarking is the binary coding that computer cannot directly perform.
About disclosure embodiment method, more specifically, based on RSA Algorithm according to the time of access, IP ground Stochastic generation number and key corresponding to location, the ID of requested file, access time generate digital watermarking.
In disclosure embodiment method, utilize RSA Algorithm generate digital watermarking, due to except operator it Outer other people cannot know the private key about RSA Algorithm, so that the digital watermarking generated has The strongest anti-ability of cracking.
As the further optimization of disclosure embodiment method, file to be asked is MPEG-4 form Video data file.
It should be noted that, MPEG-4 standard is mainly used in streaming media service at present, pass through MPEG-4 standard implementation utilizes the narrowest bandwidth and by frame reconstruction technique, compresses and transmits data, Take with minimum data and obtain optimal picture quality.
As further optimizing, above-mentioned MPEG-4 form includes ffpeg, Divx and Xvid.
When disclosure embodiment method is applied in Streaming Media field, disclosure embodiment method innovation Digital watermarking is added to URL rather than adds to audio/video coding by ground, more can improve digital watermarking Obscure disguise;In one case, when disclosure preferred embodiment method is applied in net cast During business scope, utilize the whole network Applied Digital watermark while ensureing copyright safety and the whole network door chain also The real-time effect of live video can be significantly improved, improve Consumer's Experience.
As a kind of preferred embodiment of disclosure embodiment method, CDN node is according to requested file Acquisition of information includes corresponding to the requested file of requested fileinfo:
Whether it is cached with corresponding to requested file according to requested fileinfo inquiry CDN node this locality The requested file of information;
The most then read requested file from CDN node local cache;
If it is not, then Hui Yuan to Centroid to obtain requested file.
In disclosure embodiment method, it is achieved that obtain in the network-wide basis of content distributing network and visit The resource file that the request of asking is corresponding.
In the application on the one hand of disclosure embodiment method, including disclosure embodiment method can be applied In the CDN server of content distributing network, especially apply each CDN service under steaming media platform In device, it is possible to realize the digital watermarking application at steaming media platform the whole network, additionally can substantially increase number The disguise of word watermark, further utilizes digital watermarking to achieve the accurate lock stealing chain person's information And ensured the whole network door chain of streaming medium content distribution network.
See Fig. 4 and be illustrated that a kind of content distributing network Applied Digital watermark of the disclosure one embodiment The structural representation of system, said system is applied to CDN node, and wherein, said system includes:
Communication unit, for receiving the access request that client is sent;
Requested file address determines unit, for obtaining corresponding to requested according to requested fileinfo The requested file of fileinfo, and determine the URL address corresponding to requested file;
Requested file watermark scalar/vector, generates to URL address for digital watermarking being added The watermark URL address of response access request.
The system of the Applied Digital watermark of the content distributing network provided by disclosure embodiment, first, Achieve in content distribution the whole network Applied Digital watermark;Secondly, digital watermarking is added to URL, phase Than in generally directly digital watermarking being added to audio-video document coding, increase digital watermarking Disguise;Furthermore, the digital watermarking adding the URL address corresponding to access request, compared to right URL corresponding to All Files all adds digital watermarking and more achieves the on-demand interpolation of digital watermarking, saves The resource consumption of CDN node.
As a kind of preferred embodiment of disclosure embodiment system, requested file watermark address generates single Unit includes:
Access originator information analysis module, for resolving access request to determine the access corresponding to access request Time and IP address;
Digital watermarking generation module, at least based on the time of access, IP address and requested file generated Digital watermarking;
Digital watermark embedding module, for by the URL corresponding to digital watermark embedding to requested file To generate watermark URL address.
In disclosure embodiment system, by access originator information analysis module and numeral watermark generation module The access time of access request is counted examining of digital watermarking AES as timestamp together with IP address Worry factor so that digital watermarking is difficult to be forged, enhances the repellence of digital watermarking;Meanwhile, utilize Access originator information analysis module and numeral watermark generation module will comprise access time and the access originator of IP address Information is as the reference aspect of digital watermarking, it is achieved that utilize digital watermarking to distinguish different access originator information; Furthermore, make dispute over copyright by digital watermarking generation module joining day stamp in digital watermarking Time, beneficially operator is really weighed by digital watermarking, strengthens operator's maintenance dynamics to digital publishing rights; Further, owing to algorithm and the access originator information of digital watermarking are all stored in CDN node, Therefore numeral watermark verification is operated in each CDN node and just can be accomplished without wanting Hui Yuan to center Node, increases the efficiency when digital watermarking is verified.
As a kind of preferred embodiment of disclosure embodiment system, generate with requested file watermark address Unit also includes that watermark door chain unit, watermark door chain unit also include:
Access times statistical module, the access times of watermark URL address in statistics scheduled duration;
Screening module, for comparing the size of access times and predetermined threshold, filters out access times and is more than The watermark URL address of predetermined threshold;
Parsing module, above-mentioned more than the digital watermarking in the watermark URL address of predetermined threshold for resolving, To determine the IP address stealing chain person.
Ensure that robber chain person is also limited while accessing by normal users by disclosure embodiment system System, it is possible to be accessed number of times according to watermark URL by access times statistical module and screening module and determine Stealing chain person's target, the digital watermarking resolved in watermark URL address by parsing module steals chain person's to determine IP address;Further, above-mentioned IP address mask is accessed service to avoid during door chain The authorized party of streaming media manufacturer accidentally injures, and improves the degree of accuracy of door chain.
As a kind of preferred embodiment of disclosure embodiment system, digital watermarking generation module for based on RSA Algorithm is according at least to the time of access, IP address and requested file generated digital watermarking.
In disclosure embodiment system, above-mentioned digital watermarking generation module utilizes RSA Algorithm to generate numeral Watermark, owing to other people in addition to operator cannot know the private key about RSA Algorithm, so that The digital watermarking generated has the strongest anti-ability of cracking.
As a kind of preferred embodiment of disclosure embodiment system, above-mentioned file to be asked is The video data file of MPEG-4 form.
It should be noted that, MPEG-4 standard is mainly used in streaming media service at present, pass through MPEG-4 standard implementation utilizes the narrowest bandwidth and by frame reconstruction technique, compresses and transmits data, Take with minimum data and obtain optimal picture quality.
As further optimizing, above-mentioned MPEG-4 form includes ffpeg, Divx and Xvid.
When disclosure embodiment system is applied in Streaming Media field, disclosure embodiment system innovation Digital watermarking is added to URL rather than adds to audio/video coding by ground, more can improve digital watermarking Obscure disguise;In one case, when disclosure preferred embodiment method is applied in net cast During business scope, utilize the whole network Applied Digital watermark while ensureing copyright safety and the whole network door chain also The real-time effect of live video can be significantly improved, improve Consumer's Experience.
As a kind of preferred embodiment of disclosure embodiment system, above-mentioned requested file address determines list Whether unit is used for: be cached with corresponding to requested literary composition according to requested fileinfo inquiry CDN node this locality The requested file of part information;The most then read requested file from CDN node local cache;If it is not, Then Hui Yuan to Centroid to obtain requested file.
In disclosure embodiment system, utilizing requested file address to determine, unit achieves divides in content The resource file corresponding with access request is obtained in the network-wide basis of hairnet network.
It should be noted that in the case of not conflicting, in embodiment in the application and embodiment Involved technical characteristic can be mutually combined each other.
Disclosure embodiment can realize related function module and unit by hardware processor.
In the application on the one hand of disclosure embodiment system, including disclosure embodiment system can be built In the CDN server of content distributing network, especially in each CDN server under steaming media platform, It is capable of the digital watermarking application at steaming media platform the whole network, additionally can substantially increase digital watermarking Disguise, further utilize digital watermarking to achieve stealing the accurately locking of chain person's information and protecting Hinder the whole network door chain of streaming medium content distribution network.
Device embodiment described above is only schematically, the list wherein illustrated as separating component Unit can be or may not be physically separate, and the parts shown as unit can be or also Can not be physical location, i.e. may be located at a place, or multiple NE can also be distributed to On.Some or all of module therein can be selected according to the actual needs to realize the present embodiment scheme Purpose.Those of ordinary skill in the art, in the case of not paying performing creative labour, are i.e. appreciated that And implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words Dividing and can embody with the form of software product, this computer software product can be stored in computer can Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented The method described in some part of example or embodiment.
Last it is noted that above example is only in order to illustrate the technical scheme of the disclosure, rather than to it Limit;Although the disclosure being described in detail with reference to previous embodiment, the ordinary skill of this area Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill The essence of art scheme departs from the spirit and scope of the disclosure each embodiment technical scheme.

Claims (10)

1. a method for content distributing network Applied Digital watermark, wherein, including:
CDN node resolves from the access request of client to determine requested fileinfo;
Described CDN node obtains according to described requested fileinfo to be believed corresponding to described requested file The requested file of breath, and determine the URL address corresponding to described requested file;
The generation described access of response is added to described URL address in digital watermarking by described CDN node please The watermark URL address asked.
Method the most according to claim 1, wherein, digital watermarking is added by described CDN node The watermark URL address generating the described access request of response to described URL address includes:
Resolve described access request to determine the access time corresponding to described access request and IP address;
At least based on digital watermarking described in described access time, IP address and described requested file generated;
By in described digital watermark embedding to the URL corresponding to described requested file to generate described water Print URL address.
Method the most according to claim 2, wherein, by the most described for described digital watermark embedding In URL with generate the described access request of described response watermark URL address after also include:
The access times of described watermark URL address in statistics scheduled duration;
Relatively described access times and the size of predetermined threshold, filter out access times more than predetermined threshold Watermark URL address;
Resolve the described digital watermarking in the described watermark URL address more than predetermined threshold, to determine robber's chain The IP address of person.
Method the most according to claim 2, wherein, described at least based on described access time, IP Digital watermarking described in address and described requested file generated includes:
Based on RSA Algorithm according at least to described access time, IP address and described requested file generated institute State digital watermarking.
5. file to be asked described according to the method described in any one of claim 1-4, wherein, is The video data file of MPEG-4 form.
6. a system for the Applied Digital watermark of content distributing network, described system is applied to CDN joint Point, wherein, described system includes:
Communication unit, for receiving the access request that client is sent;
Requested file address determines unit, for obtaining corresponding to institute according to described requested fileinfo State the requested file of requested fileinfo, and determine the URL ground corresponding to described requested file Location;
Requested file watermark scalar/vector, for adding digital watermarking to described URL address The middle watermark URL address generating the described access request of response.
System the most according to claim 6, wherein, described requested file watermark address generates single Unit includes:
Access originator information analysis module, is used for resolving described access request right to determine described access request institute The access time answered and IP address;
Digital watermarking generation module, at least based on described access time, IP address and described requested Digital watermarking described in file generated;
Digital watermark embedding module, for by corresponding to described digital watermark embedding to described requested file URL in generate described watermark URL address.
System the most according to claim 7, wherein, generates with described requested file watermark address Unit also includes that watermark door chain unit, described watermark door chain unit also include:
Access times statistical module, the access times of described watermark URL address in statistics scheduled duration;
Screening module, for relatively described access times and the size of predetermined threshold, filters out access times Watermark URL address more than predetermined threshold;
Parsing module, for resolving the described numeral water in the described watermark URL address more than predetermined threshold Print, to determine the IP address stealing chain person.
System the most according to claim 7, wherein, described digital watermarking generation module for based on RSA Algorithm is according at least to numeral water described in described access time, IP address and described requested file generated Print.
10. file to be asked described according to the method described in any one of claim 6-9, wherein, is The video data file of MPEG-4 form.
CN201610196581.XA 2016-03-31 2016-03-31 Method and system for applying digital watermark to content delivery network (CDN) Pending CN105844121A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610196581.XA CN105844121A (en) 2016-03-31 2016-03-31 Method and system for applying digital watermark to content delivery network (CDN)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610196581.XA CN105844121A (en) 2016-03-31 2016-03-31 Method and system for applying digital watermark to content delivery network (CDN)

Publications (1)

Publication Number Publication Date
CN105844121A true CN105844121A (en) 2016-08-10

Family

ID=56596425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610196581.XA Pending CN105844121A (en) 2016-03-31 2016-03-31 Method and system for applying digital watermark to content delivery network (CDN)

Country Status (1)

Country Link
CN (1) CN105844121A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341375A (en) * 2016-12-09 2017-11-10 北京安天网络安全技术有限公司 A kind of method and system for the attacker that traced to the source based on Web page picture secret mark
CN108882055A (en) * 2018-06-28 2018-11-23 广州虎牙信息科技有限公司 The method and device of net cast method and system, synthetic video stream
CN111917787A (en) * 2020-08-06 2020-11-10 北京奇艺世纪科技有限公司 Request detection method and device, electronic equipment and computer-readable storage medium
CN112003873A (en) * 2020-08-31 2020-11-27 成都安恒信息技术有限公司 HTTP (hyper text transport protocol) traffic defense method and system for resisting DDoS (distributed denial of service) attack
CN111935306B (en) * 2020-09-11 2020-12-29 腾讯科技(深圳)有限公司 Node scheduling method and device
CN112313919A (en) * 2018-05-04 2021-02-02 思杰系统有限公司 System and method for watermarking using an embedded browser

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309275A (en) * 2008-06-27 2008-11-19 武汉烽火网络有限责任公司 File name protection method for stream media service
CN103036924A (en) * 2011-09-29 2013-04-10 深圳市快播科技有限公司 Chaining processing method and chaining processing system
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method
CN104283845A (en) * 2013-07-03 2015-01-14 中国电信股份有限公司 Hotlink protecting method and system, CDN server and client side
CN104980771A (en) * 2014-04-09 2015-10-14 中国电信股份有限公司 Method and system for stream media-on-demand through internet protocol television (IPTV)
CN105357190A (en) * 2015-10-26 2016-02-24 网宿科技股份有限公司 Method and system for performing authentication on access request

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309275A (en) * 2008-06-27 2008-11-19 武汉烽火网络有限责任公司 File name protection method for stream media service
CN103036924A (en) * 2011-09-29 2013-04-10 深圳市快播科技有限公司 Chaining processing method and chaining processing system
CN104283845A (en) * 2013-07-03 2015-01-14 中国电信股份有限公司 Hotlink protecting method and system, CDN server and client side
CN104980771A (en) * 2014-04-09 2015-10-14 中国电信股份有限公司 Method and system for stream media-on-demand through internet protocol television (IPTV)
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method
CN105357190A (en) * 2015-10-26 2016-02-24 网宿科技股份有限公司 Method and system for performing authentication on access request

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁楷等: ""流媒体服务器防盗链系统"", 《企业技术开发》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107341375A (en) * 2016-12-09 2017-11-10 北京安天网络安全技术有限公司 A kind of method and system for the attacker that traced to the source based on Web page picture secret mark
CN112313919A (en) * 2018-05-04 2021-02-02 思杰系统有限公司 System and method for watermarking using an embedded browser
CN108882055A (en) * 2018-06-28 2018-11-23 广州虎牙信息科技有限公司 The method and device of net cast method and system, synthetic video stream
CN111917787A (en) * 2020-08-06 2020-11-10 北京奇艺世纪科技有限公司 Request detection method and device, electronic equipment and computer-readable storage medium
CN112003873A (en) * 2020-08-31 2020-11-27 成都安恒信息技术有限公司 HTTP (hyper text transport protocol) traffic defense method and system for resisting DDoS (distributed denial of service) attack
CN112003873B (en) * 2020-08-31 2022-04-19 成都安恒信息技术有限公司 HTTP (hyper text transport protocol) traffic defense method and system for resisting DDoS (distributed denial of service) attack
CN111935306B (en) * 2020-09-11 2020-12-29 腾讯科技(深圳)有限公司 Node scheduling method and device

Similar Documents

Publication Publication Date Title
CN105844121A (en) Method and system for applying digital watermark to content delivery network (CDN)
US11521147B2 (en) Cloud service usage risk assessment
KR101603149B1 (en) A system and method to protect user privacy in multimedia uploaded to internet sites
US11824946B2 (en) Systems and methods for distributing content
CN103986735B (en) CDN (content distribution network) antitheft system and antitheft method
CN107517179B (en) Authentication method, device and system
US20110289116A1 (en) Method and Apparatus for Protecting Online Content by Detecting Noncompliant Access Patterns
CN110072122B (en) Video playing method and related equipment
KR20160003783A (en) Real-time anti-piracy for broadcast streams
KR20170007427A (en) Token-based authentication and authorization information signaling and exchange for adaptive streaming
CN103795702A (en) Transit control for data
CN109088909B (en) Service gray level publishing method and device based on merchant type
US20120011244A1 (en) Method for redistributing license tokens for a service across a cloud computing environment
CN108449308B (en) Method and device for identifying malicious resource access
CN106254528B (en) Resource downloading method and caching device
KR20120072013A (en) Method and apparatus for generating security label for scalable contents distribution
US10805162B2 (en) Content policy discovery
CN111083093A (en) Method and device for calling terminal capability
CN111988644B (en) Anti-stealing-link method, device, equipment and storage medium for network video
US20150113575A1 (en) Generating media signature for content delivery
CN113407967A (en) Service security method and device based on application market architecture
CN107995616A (en) The processing method and device of user behavior data
US20140053233A1 (en) Online media policy platform
EP4084485A1 (en) Methods, systems, and devices for detecting over-the-top piracy
CN109379344A (en) The method for authenticating and authentication server of access request

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160810

WD01 Invention patent application deemed withdrawn after publication