CN106060057B - Net cast website generates the system and method for white list based on user's barrage behavior - Google Patents

Net cast website generates the system and method for white list based on user's barrage behavior Download PDF

Info

Publication number
CN106060057B
CN106060057B CN201610440099.6A CN201610440099A CN106060057B CN 106060057 B CN106060057 B CN 106060057B CN 201610440099 A CN201610440099 A CN 201610440099A CN 106060057 B CN106060057 B CN 106060057B
Authority
CN
China
Prior art keywords
user
barrage
server end
white list
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610440099.6A
Other languages
Chinese (zh)
Other versions
CN106060057A (en
Inventor
吴瑞诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Urumqi Bangbangjun Technology Co ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201610440099.6A priority Critical patent/CN106060057B/en
Publication of CN106060057A publication Critical patent/CN106060057A/en
Application granted granted Critical
Publication of CN106060057B publication Critical patent/CN106060057B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A kind of system and method the invention discloses net cast website based on user's barrage behavior generation white list, is related to net cast field.The system includes client and server end, and client obtains the barrage content of user's input, sends barrage information to server end, server end broadcasts barrage;Server end is cached and is pre-processed to barrage information, and according to time granularity or the batch mode of fixed size data slice, the data in caching are submitted to real-time computing unit;Real-time computing unit verifies the validity of user's barrage behavior according to the UUID of data slice, and verifying effectively, then updates User ID into white list fragment, and white list carries out fragment storage according to User ID;Verifying is invalid, then abandons user's barrage information.The present invention is based on user's barrage behaviors to generate white list, can limit inactive users and the interactive event for the user participation main broadcaster that practises fraud, guarantee effective progress of interactive event.

Description

Net cast website generates the system and method for white list based on user's barrage behavior
Technical field
The present invention relates to net cast field, it is specifically related to a kind of net cast website and is generated based on the behavior of user's barrage The system and method for white list.
Background technique
Net cast refers to be broadcast live using internet and stream media technology, and video is because having merged image, text, sound Etc. abundant element, excellent both in sound and shape, excellent is increasingly becoming the mainstream expression way of internet.Online Video live streaming refers to benefit The live video direct broadcast service carried out with Internet resource is synchronized by the video capture at scene and is published on network, is used Family can see real-time field condition the same time on network.
During net cast, the main broadcaster of direct broadcasting room may interact with the user for entering direct broadcasting room.In order to protect Effective progress of interactive event is demonstrate,proved, server needs to be defined the participation movable user of living broadcast interactive, only enters white name User in list just allows to participate in interact.But since inactive users can not be limited and the interaction for the user participation main broadcaster that practises fraud Activity, it is difficult to guarantee effective progress of interactive event.
Summary of the invention
The purpose of the invention is to overcome the shortcomings of above-mentioned background technique, a kind of net cast website is provided and is based on user Barrage behavior generates the system and method for white list,
The present invention provides a kind of system that net cast website generates white list based on user's barrage behavior, which includes Client and server end, the server end include distributed several real-time computing units, and client obtains user's input Barrage content, the barrage information of the EIC equipment identification code containing encryption is sent to server end, server end is worked as to watching The all clients of preceding live streaming broadcast barrage;
Server end is cached and is pre-processed to the barrage information that client is submitted, and the undesirable number of format is abandoned According to;
Server end submits to the data in caching according to time granularity or the batch mode of fixed size data slice Distributed several real-time computing units;
Real-time computing unit verifies the validity of user's barrage behavior according to the UUID of data slice, if verifying is effectively, User ID is updated into white list fragment, white list carries out fragment storage according to User ID;If verifying is invalid, use is abandoned Family barrage information;
The EIC equipment identification code encrypted in barrage information is decrypted in server end, then takes out timestamp and equipment Whether whether identification code, checking time stamp in zone of reasonableness, calibration equipment identification code meet specification;
Obtained white list by Restful interface or remote procedure call interface, is supplied to it by server end He using.
Based on the above technical solution, the client is submitted in the barrage information of server end comprising several use In identification the behavior of user's barrage mark: direct broadcasting room address, user input content, user's uniqueness ID and according to specific rule The EIC equipment identification code of the encryption then generated.
Based on the above technical solution, the create-rule of the EIC equipment identification code is: timestamp+equipment application programming The Unique Device ID+ random number that interface API is obtained, the EIC equipment identification code of generation is regular length, is then known to the equipment of generation Other code is encrypted.
Based on the above technical solution, the format is undesirable refers to: barrage content includes sensitive or illegal Content, direct broadcasting room address format are illegal, Customs Assigned Number be it is empty, do not meet data field type, timestamp format not to, client Type identification is illegal.
Based on the above technical solution, the server end according to specified data slice ID Hash strategy, by data Piece distributes to specified real-time computing unit processing, and specific implementation is: to data slice distribute one it is random general unique Identification code UUID obtains the ID of real-time computing unit to the number modulus of real-time computing unit, submits to the real-time computing unit Data slice.
The behavior of user's barrage, which is based on, the present invention also provides a kind of net cast website suitable for above system generates white name Single method, comprising the following steps:
S1, client obtain the barrage content of user's input, send the EIC equipment identification code containing encryption to server end Barrage information, server end broadcast barrage to all clients for watching current live;
S2, server end are cached and are pre-processed to the barrage information that client is submitted, and it is undesirable to abandon format Data;
S3, server end propose the data in caching according to time granularity or the batch mode of fixed size data slice Give distributed several real-time computing units;
S4, real-time computing unit verify the validity of user's barrage behavior according to the UUID of data slice, if verifying has Effect then updates User ID into white list fragment, and white list carries out fragment storage according to User ID;If verifying is invalid, Abandon user's barrage information;
The EIC equipment identification code encrypted in barrage information is decrypted in S5, server end, then take out timestamp and Whether whether EIC equipment identification code, checking time stamp in zone of reasonableness, calibration equipment identification code meet specification;
S6, server end by Restful interface or remote procedure call interface, provide obtained white list It is used to other application.
Based on the above technical solution, in step S1, client, which is submitted in the barrage information of server end, includes The mark of several barrage behaviors of user for identification: direct broadcasting room address, user input content, user's uniqueness ID and according to The EIC equipment identification code for the encryption that ad hoc rules generates.
Based on the above technical solution, the create-rule of the EIC equipment identification code is: timestamp+equipment application programming The Unique Device ID+ random number that interface API is obtained, the EIC equipment identification code of generation is regular length, is then known to the equipment of generation Other code is encrypted.
Based on the above technical solution, in step S2, format is undesirable to be referred to: barrage content include it is sensitive or Illegal contents, direct broadcasting room address format are illegal, Customs Assigned Number be it is empty, do not meet data field type, timestamp format not to, visitor Family end type identification is illegal.
Based on the above technical solution, in step S3, server end according to specified data slice ID Hash strategy, Data slice is distributed into specified real-time computing unit processing, specific implementation is: to data slice distribute one it is random logical The ID of real-time computing unit is obtained to the number modulus of real-time computing unit with unique identifier UUID, it is single to the real-time calculating Member submits data slice.
Compared with prior art, advantages of the present invention is as follows:
(1) the present invention is based on user's barrage behaviors to generate white list, can limit inactive users and cheating user participates in The interactive event of main broadcaster guarantees effective progress of interactive event.
(2) white list that the present invention generates, can filter inactive users account in multiple important scenes.
Detailed description of the invention
Fig. 1 is the process for the method that net cast website generates white list based on user's barrage behavior in the embodiment of the present invention Figure.
Specific embodiment
With reference to the accompanying drawing and specific embodiment the present invention is described in further detail.
The embodiment of the present invention provides a kind of system that net cast website generates white list based on user's barrage behavior, this is System includes client and server end, and server end includes distributed several real-time computing units.
Shown in Figure 1, the embodiment of the present invention provides a kind of net cast website suitable for above system and is based on user The method of barrage behavior generation white list, comprising the following steps:
S1, certain customers can send barrage during watching live streaming to express the emotion of oneself, client, which obtains, to be used The barrage content of family input, the barrage information of the EIC equipment identification code containing encryption is sent to server end, server end is to The all clients for watching current live broadcast barrage.
Client submits to the mark in the barrage information of server end comprising several barrage behaviors of user for identification: straight Broadcast an address, user input content, user's uniqueness ID and according to ad hoc rules generate encryption EIC equipment identification code.
The create-rule of EIC equipment identification code is: timestamp+equipment API (Application Programming Interface, Application Programming Interface) obtain Unique Device ID+ random number, the EIC equipment identification code of generation is regular length, so The EIC equipment identification code of generation is encrypted afterwards.
S2, server end are cached and are pre-processed to the barrage information that client is submitted, and it is undesirable to abandon format Data, format is undesirable to be referred to: barrage content includes that sensitive or illegal contents, direct broadcasting room address format be illegal, user Number be it is empty, do not meet data field type, timestamp format, client type is not identified it is illegal.
S3, server end propose the data in caching according to time granularity or the batch mode of fixed size data slice Give distributed several real-time computing units;For example, strategy of the server end according to specified data slice ID Hash, by data Piece distributes to specified real-time computing unit processing, in order to the horizontal extension ability of real-time computing unit is improved, in this way, Server end can accordingly increase and decrease the quantity for participating in the real-time computing unit calculated according to the scale of data volume.Specific implementation side Formula is: distributing random UUID (Universally Unique Identifier, a general unique identification to data slice Code), then to the number modulus of real-time computing unit, the ID of real-time computing unit is obtained, is then mentioned to the real-time computing unit Hand over data slice.Time granularity, fixed size data slice are set according to actual needs, in practical applications, can be by time granularity It is set as 1 second, fixed size data slice is set as 1MB.
S4, real-time computing unit verify the validity of user's barrage behavior according to the UUID of data slice, if verifying has Effect then updates User ID into white list fragment, and white list carries out fragment storage according to User ID;If verifying is invalid, User's barrage information is abandoned, normal users barrage is just only considered as by the barrage that normal client is sent.
The EIC equipment identification code encrypted in barrage information is decrypted in S5, server end, then take out timestamp and Whether whether EIC equipment identification code, checking time stamp in zone of reasonableness, calibration equipment identification code meet specification.
S6, server end by obtained white list by Restful (Representational State Transfer, A kind of software architecture style) interface or RPC (Remote Procedure Call, remote procedure call) interface, it is supplied to it He using.
The white list generated according to the method described above can filter inactive users account in multiple important scenes.
Those skilled in the art can carry out various modifications to the embodiment of the present invention and modification, if these modifications and change For type within the scope of the claims in the present invention and its equivalent technologies, then these modifications and variations are also in protection scope of the present invention Within.
The prior art that the content being not described in detail in specification is known to the skilled person.

Claims (10)

1. the system that a kind of net cast website generates white list based on user's barrage behavior, which includes client and service Device end, it is characterised in that: the server end includes distributed several real-time computing units, and client obtains user's input Barrage content, the barrage information of the EIC equipment identification code containing encryption is sent to server end, and server end is current to watching The all clients of live streaming broadcast barrage;
Server end is cached and is pre-processed to the barrage information that client is submitted, and the undesirable data of format are abandoned;
Server end submits to distribution according to time granularity or the batch mode of fixed size data slice, by the data in caching Several real-time computing units of formula;
Real-time computing unit verifies the validity of user's barrage behavior according to the UUID of data slice, if verifying is effectively, will use Family ID is updated into white list fragment, and white list carries out fragment storage according to User ID;If verifying is invalid, user's bullet is abandoned Curtain information;
The EIC equipment identification code encrypted in barrage information is decrypted in server end, then takes out timestamp and equipment identification Whether whether code, checking time stamp in zone of reasonableness, calibration equipment identification code meet specification;
Obtained white list by Restful interface or remote procedure call interface, is supplied to other and answered by server end With using.
2. the system that net cast website as described in claim 1 generates white list based on user's barrage behavior, feature exist In: it include the mark of several barrage behaviors of user for identification in the barrage information that the client submits to server end: straight Broadcast an address, user input content, user's uniqueness ID and according to ad hoc rules generate encryption EIC equipment identification code.
3. the system that net cast website as claimed in claim 2 generates white list based on user's barrage behavior, feature exist In: the create-rule of the EIC equipment identification code is: the Unique Device ID+ that timestamp+equipment application programming interface API is obtained is random Number, the EIC equipment identification code of generation is regular length, and then the EIC equipment identification code of generation is encrypted.
4. the system that net cast website as described in claim 1 generates white list based on user's barrage behavior, feature exist In: the format is undesirable to be referred to: barrage content illegal, user comprising sensitive or illegal contents, direct broadcasting room address format Number be it is empty, do not meet data field type, timestamp format, client type is not identified it is illegal.
5. the system that net cast website as described in claim 1 generates white list based on user's barrage behavior, feature exist In: the server end is distributed to data slice at specified real-time computing unit according to the strategy of specified data slice ID Hash Reason, specific implementation is: a random Universally Unique Identifier UUID is distributed to data slice, to of real-time computing unit Number modulus, obtains the ID of real-time computing unit, submits data slice to the real-time computing unit.
6. a kind of net cast website suitable for system described in any one of claims 1 to 5 is raw based on the behavior of user's barrage At the method for white list, which comprises the following steps:
S1, client obtain the barrage content of user's input, and the barrage of the EIC equipment identification code containing encryption is sent to server end Information, server end broadcast barrage to all clients for watching current live;
S2, server end are cached and are pre-processed to the barrage information that client is submitted, and the undesirable number of format is abandoned According to;
S3, server end submit to the data in caching according to time granularity or the batch mode of fixed size data slice Distributed several real-time computing units;
S4, real-time computing unit verify the validity of user's barrage behavior according to the UUID of data slice, if verifying is effectively, User ID is updated into white list fragment, white list carries out fragment storage according to User ID;If verifying is invalid, use is abandoned Family barrage information;
The EIC equipment identification code encrypted in barrage information is decrypted in S5, server end, then takes out timestamp and equipment Whether whether identification code, checking time stamp in zone of reasonableness, calibration equipment identification code meet specification;
Obtained white list by Restful interface or remote procedure call interface, is supplied to it by S6, server end He using.
7. the method that net cast website as claimed in claim 6 generates white list based on user's barrage behavior, feature exist In: in step S1, client submits to the mark in the barrage information of server end comprising several barrage behaviors of user for identification Know: the equipment identification of direct broadcasting room address, the content of user's input, the ID of user's uniqueness and the encryption generated according to ad hoc rules Code.
8. the method that net cast website as claimed in claim 7 generates white list based on user's barrage behavior, feature exist In: the create-rule of the EIC equipment identification code is: the Unique Device ID+ that timestamp+equipment application programming interface API is obtained is random Number, the EIC equipment identification code of generation is regular length, and then the EIC equipment identification code of generation is encrypted.
9. the method that net cast website as claimed in claim 6 generates white list based on user's barrage behavior, feature exist In: in step S2, format is undesirable to be referred to: barrage content include sensitive or illegal contents, direct broadcasting room address format it is illegal, Customs Assigned Number be it is empty, do not meet data field type, timestamp format, client type is not identified it is illegal.
10. the method that net cast website as claimed in claim 6 generates white list based on user's barrage behavior, feature exist In: in step S3, data slice is distributed to specified real-time calculating according to the strategy of specified data slice ID Hash by server end Cell processing, specific implementation are: distributing a random Universally Unique Identifier UUID to data slice, calculate list to real-time The number modulus of member, obtains the ID of real-time computing unit, submits data slice to the real-time computing unit.
CN201610440099.6A 2016-06-17 2016-06-17 Net cast website generates the system and method for white list based on user's barrage behavior Active CN106060057B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610440099.6A CN106060057B (en) 2016-06-17 2016-06-17 Net cast website generates the system and method for white list based on user's barrage behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610440099.6A CN106060057B (en) 2016-06-17 2016-06-17 Net cast website generates the system and method for white list based on user's barrage behavior

Publications (2)

Publication Number Publication Date
CN106060057A CN106060057A (en) 2016-10-26
CN106060057B true CN106060057B (en) 2019-04-05

Family

ID=57169246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610440099.6A Active CN106060057B (en) 2016-06-17 2016-06-17 Net cast website generates the system and method for white list based on user's barrage behavior

Country Status (1)

Country Link
CN (1) CN106060057B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789992B (en) * 2016-12-09 2020-04-10 武汉斗鱼网络科技有限公司 Live broadcast platform anchor white list management method and management system
CN107517394A (en) * 2017-09-01 2017-12-26 北京小米移动软件有限公司 Identify the method, apparatus and computer-readable recording medium of disabled user
CN107770161B (en) * 2017-10-09 2019-11-15 武汉斗鱼网络科技有限公司 The method and device of brush present is prevented in a kind of live streaming platform
CN108520401B (en) * 2018-04-08 2021-04-27 深圳乐信软件技术有限公司 User list management method, device, platform and storage medium
CN108769718B (en) * 2018-04-10 2020-12-15 武汉斗鱼网络科技有限公司 Barrage verification method, computer equipment and storage medium
CN108769719B (en) * 2018-04-10 2020-12-15 武汉斗鱼网络科技有限公司 Barrage verification method, computer equipment and storage medium
CN108769720B (en) * 2018-04-10 2020-10-16 武汉斗鱼网络科技有限公司 Barrage verification method, computer equipment and storage medium
CN110413607B (en) * 2018-04-28 2022-04-08 武汉斗鱼网络科技有限公司 Distributed counting method, server and system
CN108964901B (en) * 2018-07-06 2021-05-28 武汉斗鱼网络科技有限公司 Information verification method, system and device
CN113660507B (en) * 2019-12-16 2022-09-13 广州随手播网络科技有限公司 Live video bullet screen interception system based on black and white list setting

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
IL209793A0 (en) * 2010-12-06 2011-07-31 Robert Moskovitch A method for authentication and verification of user identity
CN103701946B (en) * 2013-12-20 2017-02-08 珠海金山网络游戏科技有限公司 Method and system for client-side to be in communication with server through URL (Universal Resource Locator)
CN104967896A (en) * 2014-08-04 2015-10-07 腾讯科技(北京)有限公司 Method for displaying bulletscreen comment information, and apparatus thereof
CN105373554A (en) * 2014-08-25 2016-03-02 北京爱声声科技有限公司 Mobile device webpage based screen popup method and system
CN104754396B (en) * 2015-03-12 2018-02-23 腾讯科技(北京)有限公司 The display methods and device of barrage data
CN105072504B (en) * 2015-08-21 2019-10-25 广州弹幕网络科技有限公司 A kind of barrage playback method, the apparatus and system of movie theatre
CN105491458B (en) * 2015-11-27 2018-11-27 武汉斗鱼网络科技有限公司 The optimization method of barrage time limit of speech in a kind of webcast website
CN105451087B (en) * 2015-12-14 2019-04-16 广州弹幕网络科技有限公司 Method for pushing, terminal, historic data server and the system of barrage information

Also Published As

Publication number Publication date
CN106060057A (en) 2016-10-26

Similar Documents

Publication Publication Date Title
CN106060057B (en) Net cast website generates the system and method for white list based on user's barrage behavior
CN106027548B (en) Net cast website generates the system and method for white list based on page heartbeat event
KR102103096B1 (en) Information processing method, first terminal, second terminal, server, and system
KR100856027B1 (en) System for providing copyright-verified video data and method thereof
CN110536146A (en) A kind of live streaming based on cloud game is started broadcasting method, apparatus and storage medium
CN104539977B (en) Method for previewing and device is broadcast live
US10616227B2 (en) Content rights headers
US9866884B2 (en) Social television system
KR101411739B1 (en) Method for capturing contents on tv and connecting with social service using second device and system thereof
CN106792208A (en) Video preference information processing method, apparatus and system
KR20150106904A (en) Authorizing devices based on identifying content distributor
JP2014532239A (en) Method and apparatus for precise interest matching with locally stored content
CN106797500B (en) Video transmission device, terminal, video transmission system, control method, program, and information storage medium
JP2020017873A (en) Content distribution server, virtual character provision server, content distribution system, content distribution method and program
CN106067991B (en) A kind of white list generation system and method based on User Page action trail
CN106131605A (en) System and method safeguarded by any active ues collection based on time wheel disc and user behavior
CN106791961B (en) Video preference information processing method, device and system
CN102427555A (en) Issuing and playing methods of digital programs as well as device and system thereof
CN105791326A (en) White list generation system and method based on user page behaviors
JP2020017950A (en) Content distribution server, virtual character provision server, content distribution system, content distribution method and program
CN106851348B (en) A kind of promotion method and system based on invitation code
CN106060594B (en) A kind of white list generation system and method based on player heartbeat
CN111932317A (en) Block chain based advertisement playing method, device, medium and electronic equipment
WO2019071857A1 (en) Method and device preventing gift giving on live streaming platform
CN104010198A (en) Method and system for preventing video delivery information from being shielded

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240305

Address after: 830000, Room 17A, Building 17, Block A, Times Square Community, No. 59 Guangming Road, Tianshan District, Urumqi, Xinjiang Uygur Autonomous Region BD00244

Patentee after: Urumqi Bangbangjun Technology Co.,Ltd.

Country or region after: China

Address before: 430000 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4.1 Phase B1 Building 11 Building

Patentee before: WUHAN DOUYU NETWORK TECHNOLOGY Co.,Ltd.

Country or region before: China

TR01 Transfer of patent right