CN105847879B - A kind of control method and device of the server object of server - Google Patents

A kind of control method and device of the server object of server Download PDF

Info

Publication number
CN105847879B
CN105847879B CN201610154027.5A CN201610154027A CN105847879B CN 105847879 B CN105847879 B CN 105847879B CN 201610154027 A CN201610154027 A CN 201610154027A CN 105847879 B CN105847879 B CN 105847879B
Authority
CN
China
Prior art keywords
channel
data
server
service program
target data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610154027.5A
Other languages
Chinese (zh)
Other versions
CN105847879A (en
Inventor
叶荣华
刘志聪
孙石平
江振钱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Ncast Electronic Science & Technology Co Ltd
Original Assignee
Guangzhou Ncast Electronic Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Ncast Electronic Science & Technology Co Ltd filed Critical Guangzhou Ncast Electronic Science & Technology Co Ltd
Priority to CN201610154027.5A priority Critical patent/CN105847879B/en
Publication of CN105847879A publication Critical patent/CN105847879A/en
Application granted granted Critical
Publication of CN105847879B publication Critical patent/CN105847879B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general

Abstract

The embodiment of the present application provides a kind of control method of the server object of server, comprising: in access server, receives the video stream data that second service program object provides;Video stream data is decoded, video frame images are obtained;First object data are extracted by the first presetting rule from video frame images;The second target data is extracted by the second presetting rule from video frame images;Judge whether first object data match with the second target data;When first object data are matched with the second target data, the access right control of open first service program object.Identifying code of the embodiment of the present application by using the specific data in the image provided by server as proving program, only when proving program program verification success, the access right of ability open flows media server program is controlled.Using the data in video frame images as identifying code, there is good camouflage effectiveness, be not easy to be imitated and crack, improve the confidentiality of streaming media service program in server.

Description

A kind of control method and device of the server object of server
Technical field
This application involves server technology fields, more particularly to a kind of control method of the server object of server With a kind of control device of the server object of server.
Background technique
During net cast, recorded broadcast, camera sends collected video stream data in streaming media server, Video stream data is sent to by streaming media server the terminal of user.
But many streaming media servers are all not provided with protective program at present, or only provided with relatively simple, easy The protective program being cracked, for example, carrying out the method tradition of encryption communication with local program, protective program is not carried out at camouflage Reason, is easily imitated and cracks, confidentiality is not high.Data in the not high streaming media server of these safeties will be easy to be modified by people Or it steals.Once the loss of data in streaming media server or when being modified, the effect of net cast, recorded broadcast will affect.
Therefore, the application proposes a kind of control method of the server object of server, to improve number in server According to safety.
Summary of the invention
In view of the above problems, it proposes the embodiment of the present application and overcomes the above problem or at least partly in order to provide one kind A kind of control method of the server object of the server to solve the above problems and a kind of corresponding service routine of server The control device of object.
To solve the above-mentioned problems, the embodiment of the present application discloses a kind of controlling party of the server object of server Method includes at least in the server: the first service program object with access right control, and, do not have the right to use The second service program object of control is limited, the method includes:
When accessing the server, the video stream data that the second service program object provides is received;
The video stream data is decoded, video frame images are obtained;
First object data are extracted by the first presetting rule from the video frame images;
The second target data is extracted by the second presetting rule from the video frame images;
Judge whether the first object data match with second target data;
When the first object data are matched with second target data, the open first service program object Access right control.
Preferably, described the step of extracting first object data by the first presetting rule from the video frame images, wraps It includes:
Extracted from the video frame images channel R of preset first object pixel, the channel G, channel B value formed First object data.
Preferably, described the step of extracting the second target data by the second presetting rule from the video frame images, wraps It includes:
Extracted from the video frame images channels R of preset second target pixel points, the channel G, channel B value formed Second target data.
Preferably, the channel R, the channel G of second target pixel points, channel B value by the second service program pair As using the channel R of the first object pixel, the channel G, channel B value, calculate generation by default value transfer algorithm.
Preferably, described to judge that the step of whether the first object data match with second target data includes:
Using the first object data, is calculated by the default value transfer algorithm and generate third target data;
Whether identical as second target data compare the third target data, if they are the same, then determines described first Target data is matched with second target data;Otherwise do not determine the first object data and second target data not Match.
Preferably, when some in the channel R of the first object pixel or the second pixel, the channel G, channel B is logical Value when road is not used, using random value as the unadapted channel.
Preferably, the access right control of the first service program object is to lack first clothes in the server The core document of business program object;The core document of the first service program object is included at least for supporting first clothes The essential file of program object normal operation of being engaged in;
The opening first service program object access right control the step of include:
The core document of the preset first service program object is sent to the server, the server is used for After the core document for receiving the first service program object, the access right control of the open first service program object System.
Meanwhile disclosed herein as well is a kind of control device of the server object of server, in the server extremely It less include: the first service program object with access right control, and, the second service journey without access right control Ordered pair is as the device includes:
Video stream data receiving module, for receiving the second service program object and mentioning when accessing the server The video stream data of confession;
Video frame images obtain module, for decoding to the video stream data, obtain video frame images;
First extraction module, for extracting first object data by the first presetting rule from the video frame images;
Second extraction module, for extracting the second target data by the second presetting rule from the video frame images;
Judgment module, for judging whether the first object data match with second target data;
Open module, for opening described first when the first object data are matched with second target data The access right of server object controls.
Preferably, first extraction module further comprises:
First passage extracting sub-module, for extracting the R of preset first object pixel from the video frame images Channel, the channel G, channel B value formed first object data.
Preferably, second extraction module further comprises:
Second channel extracting sub-module, for extracting the R of preset second target pixel points from the video frame images Channel, the channel G, channel B value formed the second target data.
Preferably, the channel R, the channel G of second target pixel points, channel B value by the second service program pair As using the channel R of the first object pixel, the channel G, channel B value, calculate generation by default value transfer algorithm.
Preferably, the judgment module further comprises:
Target data computational submodule, for using the first object data, based on the default value transfer algorithm It calculates and generates third target data;
Target data Comparative sub-module, for the third target data whether with the second target data phase Together, if they are the same, then determine that the first object data are matched with second target data;Otherwise determine the first object number It is mismatched according to second target data.
Preferably, when some in the channel R of the first object pixel or the second pixel, the channel G, channel B is logical Value when road is not used, using random value as the unadapted channel.
Preferably, the access right control of the first service program object is to lack first clothes in the server The core document of business program object;The core document of the first service program object is included at least for supporting first clothes The essential file of program object normal operation of being engaged in;
The open module further comprises:
Core document sending submodule, for the core document of the preset first service program object to be sent to institute Server is stated, the server is used for after the core document for receiving the first service program object, and open described first The access right of server object controls.
The embodiment of the present application includes the following advantages:
The embodiment of the present application is by being set using permission control for the streaming media service program in server, using by servicing Identifying code of the specific data in video frame images that device provides as proving program, only when proving program program verification success When ability open flows media server program access right control.Using the specific data in video frame images as proving program Identifying code has good camouflage effectiveness, is not easy to be imitated and crack, improve the secrecy of streaming media service program in server Property.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of the control method embodiment 1 of the server object of server of the application;
Fig. 2 is a kind of step flow chart of the control method embodiment 2 of the server object of server of the application;
Fig. 3 is the schematic diagram that first object data are generated in the embodiment of the present application;
Fig. 4 is a kind of step flow chart of the control method embodiment 3 of the server object of server of the application;
Fig. 5 is a kind of structural block diagram of the control device embodiment of the server object of server of the application.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real Applying mode, the present application will be further described in detail.
One of the core concepts of the embodiments of the present application is that by the way that the streaming media service program in server is set using Permission control, the identifying code using the specific data in the video frame images for providing view by server as proving program, only The access right control of ability open flows media server program when proving program program verification success.
Referring to Fig.1, the step of showing a kind of control method embodiment 1 of the server object of server of the application Flow chart includes at least in the server: the first service program object with access right control, and, without making The second service program object controlled with permission, the method can specifically include following steps:
Step 101, when accessing the server, the video stream data that the second service program object provides is received;
First service program object is specifically to provide the service routine of streaming media service, and second service program object is specifically The service routine of video stream data is provided.Service routine refers to installation in the server for providing the program of specific function.One As for, the server for being equipped with streaming media service program is properly termed as streaming media server.
In the embodiment of the present application, by the proving program of outside access to the first service program of offer streaming media service The access right of object is controlled.Proving program may be mounted in moveable equipment, similar U-shield.Whenever need using When the streaming media service program of server, access proving program is required to control the access right of streaming media service program.
Step 102, the video stream data is decoded, obtains video frame images;
When proving program access server, pressed from not having to obtain in the second service program object that access right controls The video requency frame data that preset rules generate.Each video frame images in video requency frame data are all previously provided with as identifying code First object data and the second target data.
Step 103, first object data are extracted by the first presetting rule from the video frame images;
Proving program extracts pre-set first object data in video frame images by the first presetting rule.
Step 104, the second target data is extracted by the second presetting rule from the video frame images;
Proving program extracts pre-set second target data in video frame images by the second presetting rule
Step 105, judge whether the first object data match with second target data;
Proving program judges whether first object data match with the second target data.
Step 106, when the first object data are matched with second target data, the open first service journey The access right of ordered pair elephant controls.
When first object data are matched with the second target data, the use of the open first service program object of proving program Permission control.
As a kind of preferable example of the embodiment of the present application, the access right control of the first service program object is institute State the core document for lacking the first service program object in server;The core document of the first service program object is extremely It less include for supporting the first service program object to operate normally essential file;
The step 106 can specifically include following sub-step:
The core document of the preset first service program object is sent to the server by sub-step S11, described Server is used for after the core document for receiving the first service program object, the open first service program object Access right control.
Further, when the movable equipment for being equipped with proving program that server detects, when being transferred to from server, Server can delete the core document of first service program object, the access right control of first service program object is arranged System.
The embodiment of the present application is by being set using permission control for the streaming media service program in server, using by servicing Device provides identifying code of the specific data as proving program in the frequency frame image of view, only when proving program program verification success When ability open flows media server program access right control.Using the pre-set first object data in video frame images Identifying code with the second target data as proving program has good camouflage effectiveness, is not easy to be imitated and crack, improve clothes Streaming media service program confidentiality in device of being engaged in is high.
Referring to Fig. 2, the step of showing a kind of control method embodiment 2 of the server object of server of the application Flow chart includes at least in the server: the first service program object with access right control, and, without making The second service program object controlled with permission, the method can specifically include following steps:
Step 201, when accessing the server, the video stream data that the second service program object provides is received;
Step 202, the video stream data is decoded, obtains video frame images;
Step 203, the channel R, the channel G, channel B of preset first object pixel are extracted from the video frame images Value formed first object data;
In the embodiment of the present application, proving program extracts from video frame images and presets one or more first objects Then the value of R, G of pixel, channel B generate first object number using the value of R, G of each first object pixel, channel B According to.
Such as: extract the value of R, G of each pixel of the first row in video frame images, channel B, by the R of each pixel, G, the value of channel B is arranged in order, and obtains first object data.
As shown in figure 3, being the schematic diagram for generating first object data in the embodiment of the present application.
In figure, the first row, R, G of first pixel, channel B value are respectively 23,49,214;The R of second pixel point, G, channel B value is respectively 26,40,225;R, G of third pixel, channel B value are respectively 26,45,209;……
The first object data that the value of R, G of each pixel of the first row, channel B is arranged in order are as follows: 234921426402253045209……
First object pixel in video frame images is arranged by the second service program in server;Second service program Which pixel is selected all to be possible as first object pixel, as long as proving program can learn that second service program is selected Which point has been selected as first object pixel.
The numberical range of image R, G, B value is 0-255.
As a kind of preferable example of the embodiment of the present application, when the channel R, the channel G, B of the first object pixel are logical Value when some channel in road is not used, using random value as the unadapted channel.
When some channel in the channel R of the first object pixel, the channel G, channel B is not used, by verifying Program generates value of the random value as the unadapted channel.The range of random value is between 0-255.
Step 204, the channel R, the channel G, channel B of preset second target pixel points are extracted from the video frame images Value formed the second target data;
In the embodiment of the present application, proving program is extracted from video frame images presets one or more the and target Then the value of R, G of pixel, channel B generate the second number of targets using the value of R, G of each second target pixel points, channel B According to.
Such as: extract the value of R, G of each pixel of the second row in video frame images, channel B, by the R of each pixel, G, the value of channel B is arranged in order, and obtains the second target data.
The second target pixel points in video frame images are arranged by the second service program in server;Second service program Which pixel is selected all to be possible as the second target pixel points, as long as proving program can learn that second service program is selected Which point has been selected as the second target pixel points.
As a kind of preferable example of the embodiment of the present application, when the channel R, the channel G, B of second target pixel points are logical Value when some channel in road is not used, using random value as the unadapted channel.
When some channel in the channel R of second target pixel points, the channel G, channel B is not used, by verifying Program generates value of the random value as the unadapted channel.The range of random value is between 0-255.
Step 205, judge whether the first object data match with second target data;
Proving program judges whether first object data match with the second target data.
In the embodiment of the present application, the channel R, the channel G of second target pixel points, channel B value by described second Server object using the channel R of the first object pixel, the channel G, channel B value, by default value transfer algorithm It calculates and generates.
Specifically, the value of R, G of the first object pixel in second service Program extraction video frame images, channel B;So Afterwards according to preset numerical value conversion algorithm (for example, character string reversion algorithm) to R, G of first object pixel, the value of channel B It is converted, generates intermediate value.
Then the second target pixel points corresponding with each first object pixel are chosen from video frame images, then will The median generated by the value of R, G of each first object pixel, channel B, it is original instead of corresponding second target pixel points R, G, channel B value.
As a kind of preferable example of the embodiment of the present application, the step 205 can specifically include following sub-step:
Sub-step S21 is calculated by the default value transfer algorithm using the first object data and is generated third target Data;
Proving program uses preset numerical value conversion algorithm, by first object data conversion at third target data.Specifically , the numerical value conversion algorithm in proving program with the numerical value conversion algorithm in second service program is arranged by producer. Numerical value conversion algorithm used by second server program is input in corresponding proving program by producer in setting.
Sub-step S21, whether the third target data is identical as second target data, if they are the same, then sentences The fixed first object data are matched with second target data;Otherwise determine the first object data and second mesh Data are marked to mismatch.
In general, second service journey when using proving program access server corresponding with server, in server The numerical value conversion algorithm of sequence with numerical value conversion algorithm used by proving program be it is identical, therefore, adopted by second service program The second target data generated with numerical value conversion algorithm and the third number of targets for using numerical value conversion algorithm to generate by proving program According to should be identical.
When third target data is identical as the second target data, then proving program is thought, first object data and second Target data matching.
When third target data and the second target data be not identical, then proving program is thought, first object data and the Two target datas mismatch.Third target data and the different reason of the second target data may be proving program and server Be not it is corresponding, proving program use numerical value conversion algorithm it is different from the numerical value conversion algorithm of second service program.
Step 206, when the first object data are matched with second target data, the open first service journey The access right of ordered pair elephant controls.
When first object data are matched with the second target data, the use of the open first service program object of proving program Permission control.
As a kind of preferable example of the embodiment of the present application, the access right control of the first service program object is institute State the core document for lacking the first service program object in server;The core document of the first service program object is extremely It less include for supporting the first service program object to operate normally essential file;
The step 206 can specifically include following sub-step:
The core document of the preset first service program object is sent to the server by sub-step S31, described Server is used for after the core document for receiving the first service program object, the open first service program object Access right control.
In order to make those skilled in the art can better understand that the embodiment of the present invention, below by an example to this hair Bright embodiment is illustrated:
Referring to shown in Fig. 4, the step of being a kind of control method embodiment 3 of server object of server of the application stream Cheng Tu.
Step 301, the video flowing generating routine in server presses preset authentication image create-rule, generates video fluxion According to;
Step 302, video stream data is sent to code key service routine by video flowing generating routine;
Step 303, by U-shield access server;
Step 304, after server detects U-shield access, code key service routine sends video stream data to the verifying of U-shield In program;
Step 305, proving program decoding video flow data obtains multiple video frame images;
Step 306, proving program extracts R, G of the pixel of the first row, channel B value in video frame images, as first Target data;R, G of the pixel of the second row, channel B value in video frame images are extracted, as the second target data;By first Target data carries out character string reversion, generates third target data;Judge third target data whether with the second target data phase Together;
Step 307, if they are the same, then proving program by the core corresponding with the streaming media service program of server in U-shield File is sent to server.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented Necessary to example.
Referring to Fig. 5, a kind of structure of the control device embodiment of the server object of server of the application is shown Block diagram includes at least in the server: the first service program object with access right control, and, do not have and uses The second service program object of permission control, the device can specifically include following module:
Video stream data receiving module 41, for receiving the second service program object when accessing the server The video stream data of offer;
Video frame images obtain module 42, for decoding to the video stream data, obtain video frame images;
First extraction module 43, for extracting first object data by the first presetting rule from the video frame images;
Second extraction module 44, for extracting the second target data by the second presetting rule from the video frame images;
Judgment module 45, for judging whether the first object data match with second target data;
Open module 46, for when the first object data are matched with second target data, opening described the The access right of one server object controls.
As a kind of preferable example of the embodiment of the present application, first extraction module 43 be may further include:
First passage extracting sub-module, for extracting the R of preset first object pixel from the video frame images Channel, the channel G, channel B value formed first object data.
As a kind of preferable example of the embodiment of the present application, second extraction module 44 be may further include:
Second channel extracting sub-module, for extracting the R of preset second target pixel points from the video frame images Channel, the channel G, channel B value formed the second target data.
As a kind of preferable example of the embodiment of the present application, the channel R, the channel G, channel B of second target pixel points Value by the second service program object using the channel R of the first object pixel, the channel G, channel B value, by pre- Setting value transfer algorithm, which calculates, to be generated.
As a kind of preferable example of the embodiment of the present application, the judgment module 45 be may further include:
Target data computational submodule, for using the first object data, based on the default value transfer algorithm It calculates and generates third target data;
Target data Comparative sub-module, for the third target data whether with the second target data phase Together, if they are the same, then determine that the first object data are matched with second target data;Otherwise determine the first object number It is mismatched according to second target data.
As a kind of preferable example of the embodiment of the present application, when the R of the first object pixel or the second pixel is logical When road, the channel G, some channel in channel B are not used, the value using random value as the unadapted channel.
As a kind of preferable example of the embodiment of the present application, the access right control of the first service program object is institute State the core document for lacking the first service program object in server;The core document of the first service program object is extremely It less include for supporting the first service program object to operate normally essential file;
The open module may further include:
Core document sending submodule, for the core document of the preset first service program object to be sent to institute Server is stated, the server is used for after the core document for receiving the first service program object, and open described first The access right of server object controls.
For device embodiment, since it is basically similar to the method embodiment, related so being described relatively simple Place illustrates referring to the part of embodiment of the method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiments of the present application may be provided as method, apparatus or calculating Machine program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present application can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
Control method to a kind of server object of server provided herein and a kind of server above The control device of server object, is described in detail, used herein principle and reality of the specific case to the application The mode of applying is expounded, the description of the example is only used to help understand the method for the present application and its core ideas;Together When, for those of ordinary skill in the art, according to the thought of the application, have in specific embodiments and applications Change place, in conclusion the contents of this specification should not be construed as limiting the present application.

Claims (10)

1. a kind of control method of the server object of server, which is characterized in that include at least: having in the server The first service program object of access right control, and, the second service program object without access right control is described Method include:
When accessing the server, the video stream data that the second service program object provides is received;
The video stream data is decoded, video frame images are obtained;
The value formation first in the channel R, the channel G, channel B of preset first object pixel is extracted from the video frame images Target data;
The value formation second in the channel R, the channel G, channel B of preset second target pixel points is extracted from the video frame images Target data;
Judge whether the first object data match with second target data;
When the first object data are matched with second target data, the use of the open first service program object Permission control.
2. the method according to claim 1, wherein the channel R of second target pixel points, the channel G, B are logical The value in road by the second service program object using the channel R of the first object pixel, the channel G, channel B value, press Default value transfer algorithm, which calculates, to be generated.
3. according to the method described in claim 2, it is characterized in that, whether described judge the first object data with described Two target datas match the step of include:
Using the first object data, is calculated by the default value transfer algorithm and generate third target data;
Whether identical as second target data compare the third target data, if they are the same, then determines the first object Data are matched with second target data;Otherwise determine that the first object data and second target data mismatch.
4. according to the method described in claim 3, it is characterized in that, as the first object pixel or the R of the second pixel When channel, the channel G, some channel in channel B are not used, the value using random value as the unadapted channel.
5. method according to claim 1 or 2 or 3 or 4, which is characterized in that the use of the first service program object Permission control is the core document for lacking the first service program object in the server;The first service program object Core document include at least for supporting the first service program object to operate normally essential file;
The opening first service program object access right control the step of include:
The core document of the preset first service program object is sent to the server, the server is for connecing After the core document for receiving the first service program object, the access right control of the open first service program object.
6. a kind of control device of the server object of server, which is characterized in that include at least: having in the server The first service program object of access right control, and, the second service program object without access right control is described Device include:
Video stream data receiving module, for when accessing the server, receiving the second service program object offer Video stream data;
Video frame images obtain module, for decoding to the video stream data, obtain video frame images;
First extraction module, for extracting first object data by the first presetting rule from the video frame images;
Second extraction module, for extracting the second target data by the second presetting rule from the video frame images;
Judgment module, for judging whether the first object data match with second target data;
Open module, for opening the first service when the first object data are matched with second target data The access right of program object controls;
Wherein, first extraction module further comprises:
First passage extracting sub-module, for extracted from the video frame images preset first object pixel the channel R, The channel G, channel B value formed first object data;
Second extraction module further comprises:
Second channel extracting sub-module, for extracted from the video frame images preset second target pixel points the channel R, The channel G, channel B value formed the second target data.
7. device according to claim 6, which is characterized in that the channel R of second target pixel points, the channel G, B are logical The value in road by the second service program object using the channel R of the first object pixel, the channel G, channel B value, press Default value transfer algorithm, which calculates, to be generated.
8. device according to claim 7, which is characterized in that the judgment module further comprises:
Target data computational submodule is calculated by the default value transfer algorithm and is given birth to for using the first object data At third target data;
Target data Comparative sub-module, it is whether identical as second target data for the third target data, if It is identical, then determine that the first object data are matched with second target data;Otherwise determine the first object data with Second target data mismatches.
9. device according to claim 8, which is characterized in that as the first object pixel or the R of the second pixel When channel, the channel G, some channel in channel B are not used, the value using random value as the unadapted channel.
10. device described according to claim 6 or 7 or 8 or 9, which is characterized in that the use of the first service program object Permission control is the core document for lacking the first service program object in the server;The first service program object Core document include at least for supporting the first service program object to operate normally essential file;
The open module further comprises:
Core document sending submodule, for the core document of the preset first service program object to be sent to the clothes Business device, the server are used for after the core document for receiving the first service program object, the open first service The access right of program object controls.
CN201610154027.5A 2016-03-17 2016-03-17 A kind of control method and device of the server object of server Active CN105847879B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610154027.5A CN105847879B (en) 2016-03-17 2016-03-17 A kind of control method and device of the server object of server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610154027.5A CN105847879B (en) 2016-03-17 2016-03-17 A kind of control method and device of the server object of server

Publications (2)

Publication Number Publication Date
CN105847879A CN105847879A (en) 2016-08-10
CN105847879B true CN105847879B (en) 2018-12-04

Family

ID=56587173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610154027.5A Active CN105847879B (en) 2016-03-17 2016-03-17 A kind of control method and device of the server object of server

Country Status (1)

Country Link
CN (1) CN105847879B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184182A (en) * 2011-03-24 2011-09-14 中国华录集团有限公司 Video-orientated value-added information system based on time points and keywords
CN103024090A (en) * 2011-09-20 2013-04-03 阿里巴巴集团控股有限公司 Method and system for identifying user terminal
CN103618911A (en) * 2013-10-12 2014-03-05 北京视博云科技有限公司 Video streaming providing method and device based on video attribute information
CN104899515A (en) * 2014-03-04 2015-09-09 北京奇虎科技有限公司 Method and apparatus for altering safety of application
CN104917752A (en) * 2015-05-04 2015-09-16 北京奇艺世纪科技有限公司 Abnormality detection method and abnormality detection system based on communication

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8312267B2 (en) * 2004-07-20 2012-11-13 Time Warner Cable Inc. Technique for securely communicating programming content
US9258584B2 (en) * 2013-11-22 2016-02-09 Verizon Patent And Licensing Inc. Video content protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102184182A (en) * 2011-03-24 2011-09-14 中国华录集团有限公司 Video-orientated value-added information system based on time points and keywords
CN103024090A (en) * 2011-09-20 2013-04-03 阿里巴巴集团控股有限公司 Method and system for identifying user terminal
CN103618911A (en) * 2013-10-12 2014-03-05 北京视博云科技有限公司 Video streaming providing method and device based on video attribute information
CN104899515A (en) * 2014-03-04 2015-09-09 北京奇虎科技有限公司 Method and apparatus for altering safety of application
CN104917752A (en) * 2015-05-04 2015-09-16 北京奇艺世纪科技有限公司 Abnormality detection method and abnormality detection system based on communication

Also Published As

Publication number Publication date
CN105847879A (en) 2016-08-10

Similar Documents

Publication Publication Date Title
CN104255009B (en) System and method for the fragment integrity and authenticity of adaptive stream media
US20200382274A1 (en) Secure Analytics Using an Encrypted Analytics Matrix
CN103873454B (en) Authentication method and equipment
CN104113534B (en) The login system and method for application APP
CN104023012B (en) The method, apparatus and system of service are called in cluster
CN107111723A (en) User terminal, service providing device, the driving method of user terminal, the driving method of service providing device and the search system based on encrypted indexes
Li et al. A modified reversible data hiding in encrypted images using random diffusion and accurate prediction
EP3132368B1 (en) Method and apparatus of verifying usability of biological characteristic image
CN109063426A (en) A kind of copyright based on alliance's block chain deposits card sharing method and system
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN102299802A (en) Cross-domain single sign-on realization method
CN105827582B (en) A kind of communication encrypting method, device and system
US20200356641A1 (en) Method of and system for providing access to access restricted content to a user
CN106131603B (en) A kind of video broadcasting method and system based on dynamic dictionary
Li et al. Reversible data hiding in block compressed sensing images
CN105991559A (en) User safety login method based on image encryption technology
Tang et al. Universal steganography model for low bit‐rate speech codec
CN105847879B (en) A kind of control method and device of the server object of server
CN109150835A (en) Method, apparatus, equipment and the computer readable storage medium of cloud data access
CN105205376A (en) Method for logging into intelligent application through fingerprints based on Android system
US20160285845A1 (en) Method for setting up, via an intermediate entity, a secure session between a first and a second entity, and corresponding entities and computer program products
CN103580874B (en) Identity identifying method, system and cipher protection apparatus
Shobana et al. Efficient method for hiding data by pixel intensity
CN107018132B (en) Cloud platform encrypting and decrypting method and system based on open network environment
CN105282125A (en) Access control method and device in Web real-time communication

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
CB02 Change of applicant information

Address after: 510665, Guangzhou high tech Industrial Development Zone, Guangdong Science Town 162 science Avenue, creative building B2, building second, 201 units

Applicant after: Guangzhou Ncast Electronic Science & Technology Co., Ltd.

Address before: 510665 Guangdong city of Guangzhou province Tianhe District Tong Road 188, room 409, 407

Applicant before: Guangzhou Ncast Electronic Science & Technology Co., Ltd.

COR Change of bibliographic data
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: A control method and device for server service program object

Effective date of registration: 20210506

Granted publication date: 20181204

Pledgee: China Co. truction Bank Corp Guangzhou economic and Technological Development Zone sub branch

Pledgor: GUANGZHOU NCAST ELECTRONICS Co.,Ltd.

Registration number: Y2021980003287

PE01 Entry into force of the registration of the contract for pledge of patent right