CN107105324A - A kind of method and client of protection barrage information - Google Patents

A kind of method and client of protection barrage information Download PDF

Info

Publication number
CN107105324A
CN107105324A CN201710211330.9A CN201710211330A CN107105324A CN 107105324 A CN107105324 A CN 107105324A CN 201710211330 A CN201710211330 A CN 201710211330A CN 107105324 A CN107105324 A CN 107105324A
Authority
CN
China
Prior art keywords
information
barrage
key
barrage information
special
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710211330.9A
Other languages
Chinese (zh)
Other versions
CN107105324B (en
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710211330.9A priority Critical patent/CN107105324B/en
Publication of CN107105324A publication Critical patent/CN107105324A/en
Application granted granted Critical
Publication of CN107105324B publication Critical patent/CN107105324B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/435Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream
    • H04N21/4353Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream involving decryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content

Abstract

The invention provides a kind of method and client of protection barrage information, methods described includes:Client receives barrage information;Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information, receives key information;The barrage information is decrypted using decipherment algorithm based on the key information, the cleartext information of the barrage information is obtained;Wherein, the barrage information includes:Text information, image information or audio-frequency information;Even if in this way, the corresponding client of domestic consumer receives special barrage information, special barrage information can not also be decrypted because not receiving key information, so as to also obtain the cleartext information less than special barrage information;Thus it can further increase the quantity of advanced level user, so as to add the income of live platform.

Description

A kind of method and client of protection barrage information
Technical field
The invention belongs to barrage technical field of information processing, more particularly to a kind of method for protecting barrage information and client End.
Background technology
At present, with the progress and the speed-raising of broadband network of the network communications technology, network direct broadcasting has been obtained more and more Development and application.
Simultaneously with the development of barrage, barrage information causes live with preferably interactive and interesting.And live flat Increase the income of platform to be classified to user in platform, advanced level user can be escalated into by allowing user to supplement with money, so as to only allow height Level user enjoys some specific functions, such as only allows advanced level user to see some special barrage information, but existing bullet The barrage information that curtain system is sent is visible to all users, causes domestic consumer to get these special barrages easily Information, and then cause the live platform income reduction of barrage.
Based on this, the present invention provides a kind of method and client for protecting barrage information, of the prior art above-mentioned to solve Problem.
The content of the invention
The problem of existing for prior art, the embodiments of the invention provide a kind of method for protecting barrage information and client End, is visible to all users for solving the barrage information that existing server is sent, causes domestic consumer to obtain easily Some special barrage information are got, and then cause the quantity of advanced level user to reduce, the skill of the live platform income reduction of barrage is caused Art problem.
The present invention provides a kind of method for protecting barrage information, and methods described includes:
Client receives barrage information;
Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information When, the key information that the reception server is sent;
The barrage information is decrypted using decipherment algorithm based on the key information, the barrage information is obtained Cleartext information;Wherein, the barrage information includes:Text information, image information or audio-frequency information.
It is described to judge whether the barrage information is special barrage information in such scheme, including:
Obtain the encrypted indicia position of the barrage information;
Judge encrypted indicia position whether be special barrage information the first encrypted indicia position, if encrypted indicia position It is the first encrypted indicia position, it is determined that the barrage information is the special barrage information.
In such scheme, the barrage information is decrypted the utilization decipherment algorithm, including:
The barrage information is solved using decipherment algorithm TEA.decrypt (EncryptChatmessage, KEY) It is close;Wherein, the Chatmessage is the barrage information, and the KEY is the key information.
In such scheme, the barrage information is decrypted the utilization decipherment algorithm, in addition to:
Additional information is extracted in the cipher-text information of the special barrage information according to the key information;
The key information and the additional information are combined to form a combination key;
The cipher-text information is converted into corresponding cleartext information using the combination key.
It is described that additional information is extracted in the cipher-text information according to the key information in such scheme, including:
Insertion position of the additional information in the cipher-text information is determined based on the key information;
The additional information is extracted in the insertion position of the cipher-text information.
It is described that the additional information inserting in the cipher-text information is determined based on the key information in such scheme Enter position, including:
Determine the reference position of the key information;
Obtain character of the key information with reference to position;
The character is converted into a numerical value according to default first transformation rule;
The insertion position is determined based on the numerical value.
It is described that additional information is extracted in the cipher-text information according to the key information in such scheme, in addition to:
Determine the length information of the key information;
Length information based on the key information determines the length information of the additional information;
The additional information is extracted based on the length information in the cipher-text information.
In such scheme, the barrage information is decrypted the utilization decipherment algorithm, in addition to:
Image information is received, at least one set of color value is read from described image information, described image is to cleartext information The encrypted result being encrypted;
At least one set of color value is converted to by digital information according to the second transformation rule;
The digital information is converted into character code;
The character code is changed into the cleartext information.
In such scheme, the barrage information is decrypted the utilization decipherment algorithm, in addition to:
Audio-frequency information is received, at least one audio code is read from the audio-frequency information, the audio is to cleartext information The encrypted result being encrypted;
At least one set of audio code is converted to by cleartext information according to the 3rd transformation rule.
The present invention also provides a kind of client, and the client includes:
Receiving unit, for receiving barrage information;
Judging unit, for judging whether the barrage information is special barrage information, if the barrage information is described During special barrage information, the key information that the reception server is sent;
Decryption unit, for the barrage information to be decrypted using decipherment algorithm based on the key information, is obtained The cleartext information of the barrage information;Wherein, the barrage information includes:Text information, image information or audio-frequency information.
The invention provides a kind of method and client of protection barrage information, methods described includes:Client receives bullet Curtain information;Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information, Receive key information;The barrage information is decrypted using decipherment algorithm based on the key information, the barrage is obtained The cleartext information of information;Wherein, the barrage information includes:Text information, image information or audio-frequency information.Even if in this way, general The corresponding client in general family receives special barrage information, also can not be to special barrage information because not receiving key information It is decrypted, so as to also obtain the cleartext information less than special barrage information;It thus can further increase advanced level user Quantity, so as to add the income of live platform.
Brief description of the drawings
Fig. 1 is the method flow schematic diagram for the protection barrage information that the embodiment of the present invention one is provided;
Fig. 2 is the overall structure diagram for the client that the embodiment of the present invention two is provided.
Embodiment
The barrage information sent to solve existing server is visible to all users, causes domestic consumer light Some special barrage information are easily got, and then cause the quantity of advanced level user to reduce, the live platform income reduction of barrage is caused Technical problem, the invention provides a kind of client receive barrage information;Whether judge the barrage information is special barrage Information, if the barrage information is the special barrage information, receives key information;Decryption is utilized based on the key information The barrage information is decrypted algorithm, obtains the cleartext information of the barrage information;Wherein, the barrage information includes: Text information, image information or audio-frequency information.
Technical scheme is described in further detail below by drawings and the specific embodiments.
Embodiment one
The present embodiment provides a kind of method and client of protection barrage information, in order to reduce the transformation of existing barrage system Cost, this method is designed based on existing barrage system, and methods described is applied to client-side, as shown in figure 1, institute The method of stating includes:
S101, client receives barrage information.
In this step, client is before display barrage information, it is necessary first to receive barrage information, the barrage information Including:Common barrage information and special barrage information;In general, the special barrage information merely desires to allow advanced level user to see, Do not want to allow domestic consumer to see.Such as, the barrage information includes:Text information, image information or audio-frequency information;It is described special Barrage information can include:Chat message between favor information, advanced level user etc..
S102, whether be special barrage information, if the barrage information is the special barrage if judging the barrage information During information, key information is received.
In this step, whether after client receives barrage information, it is special barrage information to judge the barrage information, If common barrage information directly can just be shown, if special barrage information, then the key that the reception server is issued is also needed to Information.Certainly, the client for there was only advanced level user in the present embodiment can just receive key information, and come for domestic consumer Say, server will not issue key information to it, even if therefore the corresponding client of domestic consumer receives special barrage Information, special barrage information can not also be decrypted because of no key information.Here, server be based on user's mark come Advanced level user and domestic consumer are distinguished, such as:The user's mark of the advanced level user can be vip fields etc..
It is described to judge whether the barrage information is special barrage information, including:Obtain the marker bit of the barrage information; Judge encrypted indicia position whether be special barrage information the first marker bit, if encrypted indicia position be described first plus Close marker bit, it is determined that the barrage information is the special barrage information.Here, the first encrypted indicia position can include Letter, numeral that server is arranged with client etc., the first encrypted indicia position in the present embodiment is digital " 1 ".Described first Encrypted indicia position can be located at after the first character of special barrage information or after ultimate character, or can be the word of other agreements Fu Hou.
If the encrypted indicia position is the second encrypted indicia position, it is determined that the barrage information is the common barrage letter Breath, can be directly displayed.Likewise, the second encrypted indicia position can include letter, the number that server is arranged with client Word etc., the second encrypted indicia position in the present embodiment is digital " 0 ".The second encrypted indicia position can be located at common barrage letter After the first character of breath or after ultimate character, or can be other agreement character after.
S103, the barrage information is decrypted using decipherment algorithm based on the key information, obtains the barrage The cleartext information of information.
In this step, after key information is received, decipherment algorithm can be utilized based on the key information to the bullet Curtain information is decrypted, and obtains the cleartext information of the barrage information.
Specifically, because the AES in server potentially include it is a variety of, such as:TEA AESs, AES encryption algorithm And RSA cryptographic algorithms;Certainly, AES can also be some other AESs.The special barrage information can also Information including diversified forms, such as:Pictorial information, text information, audio-frequency information, video information etc..
When barrage information is text information and AES is TEA AESs, solution is utilized based on the key information The barrage information is decrypted close algorithm, including:
The barrage information is solved using decipherment algorithm TEA.decrypt (EncryptChatmessage, KEY) It is close;Specific procedure is realized as follows:
Chatmessage=TEA.decrypt (EncryptChatmessage, KEY);
Wherein, the Chatmessage is the barrage information after the decryption, and the KEY is the key information received; The decrypt interfaces are the decryption interfaces of TEA algorithms.
When AES is AES encryption algorithm, based on the key information using decipherment algorithm to the barrage information It is decrypted, including:
The barrage information is solved using decipherment algorithm AES.decrypt (EncryptChatmessage, KEY) It is close;Specific procedure is realized as follows:
Chatmessage=AES.decrypt (EncryptChatmessage, KEY);
Wherein, the Chatmessage is the barrage information after the decryption, and the KEY is the key information received; Now the decrypt interfaces are the decryption interfaces of aes algorithm.
When AES is RSA cryptographic algorithms, based on the key information using decipherment algorithm to the barrage information It is decrypted, including:
The barrage information is solved using decipherment algorithm RSA.decrypt (EncryptChatmessage, KEY) It is close;Specific procedure is realized as follows:
Chatmessage=RSA.decrypt (EncryptChatmessage, KEY);
Wherein, the Chatmessage is the barrage information after the decryption, and the KEY is the key information received; Now the decrypt interfaces are the decryption interfaces of RSA Algorithm.
Here, when AES is other default AESs, decipherment algorithm pair is utilized based on the key information The barrage information is decrypted, in addition to:
After key information is received, the length information of key is judged, and according to the key in the cipher-text information In extract additional information, specifically include:The additional information inserting in the cipher-text information is determined based on the key Enter position, the length information of additional information is determined according to the length information of key;In the insertion position of the cipher-text information The additional information is extracted based on the length information.Wherein, the length of the additional information can for key length 2~ 3 times, and the character of additional information can include:Numeral or letter.
Insertion position of the additional information in the cipher-text information is determined based on the key, including:Determine institute State the reference position of key;Obtain character of the key with reference to position;The character is changed according to default first transformation rule For a numerical value;The insertion position is determined based on the numerical value.
Wherein, default first transformation rule be by it is described can include it is a variety of:Such as by character and decimal value pair It should change, character and ASCII character value are subjected to corresponding conversion.
When character and ASCII character value are carried out into corresponding conversion, receive after key, then obtain word of the key with reference to position Symbol, is determined the corresponding decimal system ASCII character value of the character, is found additional information character in ciphertext using this value as reference point The position at place.Search out behind the position, additional information character is extracted from cipher-text information.Here, the key Can be any bit in key, such as the first or last position with reference to position;When be set to the last position of key key reference position, than If key is 12345, then with reference to the character of position be exactly " 5 ", then it is " 53 " to get " 5 " corresponding ASCII character, then will be attached Plus position of the information after the 53rd character in cipher-text information is extracted.
After the additional information is extracted from cipher-text information, and judge whether the ciphertext character end has accordingly File type, if so, then the file of newly-built the type is write with facilitating the later stage to decrypt.If it is not, acquiescence is newly-built One document files records ciphertext data.
Then, after the character string of key string and additional information is obtained, two character strings are spliced, one is formed Combination key, and cipher-text information is converted into cleartext information using the combination key, thus can be by the special barrage of encryption Information is converted to cleartext information, then includes it on the screen of client.
Here, when AES be other default AESs, and barrage information be image information when, based on described close The barrage information is decrypted key Information Pull decipherment algorithm, in addition to:
At least one set of color value is read from image, described image is the encrypted result that cleartext information is encrypted;Root At least one set of color value is converted into digital information according to the second transformation rule;The digital information is converted into character to compile Code;The character code is changed into the cleartext information.
At least one set of color value is converted to digital information according to the second transformation rule by phase, including:
The corresponding maximum stratum of each color is determined, the number of the digital information is determined according to formula A=(B*C+G) * C+R Value A;Wherein, the corresponding maximum stratum of each color is identical, and the R is red, and the G is green, and the B is blueness, The C is the corresponding maximum stratum of each color.
When obscure in described image have obscure color lump when, from described image reading at least one set of color value includes:Receive Numerical value is obscured, according to the quantity for obscuring color lump of the random generation for obscuring numerical value determination;Determined based on Obfuscating Algorithms described Obscure writing position of the color lump in described image;It is determined that writing the first datum mark of the color value;With first benchmark Point travels through described image for original position, and in ergodic process, color lump is obscured based on the quantity for obscuring color lump and described Writing position in described image obscures color lump described in skipping, and reads at least one set of color value.
Here, when AES be other default AESs, and barrage information be audio-frequency information when, based on described close The barrage information is decrypted key Information Pull decipherment algorithm, in addition to:
Audio is received, at least one audio code is read from the audio;According to the 3rd transformation rule at least one by described in Group audio code is converted to cleartext information.
At least one audio code of the reading from audio, including:Voice data is read, the frequency team of the audio is obtained Row;The frequency queue is traveled through, first frequency and second frequency is obtained;The first frequency is converted into the first audio coding, The second frequency is converted into the second audio coding;Phase is determined according to first audio coding and second audio coding The audio coding answered;The audio coding is combined acquisition at least one set of audio code.
The reading voice data, obtains the frequency queue of the audio, including:An audio-frequency information object is set up, in institute State and a sample frequency is set in audio-frequency information object;The voice data is gathered based on the sample frequency, and by the audio Data storage is into an array;The array is traveled through, each single item data in the array are converted into corresponding frequency, is formed Frequency queue.
It is described at least one set of audio code is converted to by cleartext information according to the 3rd transformation rule to include;According to default Extracting rule, at least one set of audio coding is split as by the audio code;It is determined that each digital corresponding audio coding;Based on institute Each digital corresponding audio coding and every group of audio coding are stated, the audio coding is converted at least one set of digital information; At least one set of digital information is converted into character code;The character code is converted into the cleartext information.
After the cleartext information after being decrypted, the file type of the cleartext information is judged, if the word of word class Symbol string is then write the data in document files;If other kinds of special file, such as:Picture, audio and Video, then be converted to corresponding data using Base64 byte codes by character string, and is written in the file created before, reaches To complete decrypting process.
Here, when the special barrage information is picture, audio and video, due to the cleartext information of special barrage information There is the information of various codings, such as:Chinese, English or other words, therefore cleartext information is converted into base64 byte codes Afterwards, then can be very good that unified coded format can be switched to various countries' word into, prevent mess code, or identification less than Situation, Base64 byte codes requirement is converted into 3 octets (3*8=24) byte (4*6=24) of 46, afterwards Two 0 are mended before 6, the form of 8 bytes is formed.If less than 3 bytes of remaining character, filled with 0, Output character it is possible that 1 or 2 '=' using the text end exported after '=', therefore coding.
Embodiment two
Corresponding to embodiment one, the present embodiment also provides a kind of client, as shown in Fig. 2 the client includes:Receive Unit 21, judging unit 22 and decryption unit 23;Wherein;
Client is before display barrage information, and receiving unit 21 is believed firstly the need of barrage information, the barrage is received Breath includes:Common barrage information and special barrage information;In general, the special barrage information merely desires to allow advanced level user to see Arrive, do not want to allow domestic consumer to see.Such as, the special barrage information can include:Chatting between favor information, advanced level user Its information etc..
After receiving unit 21 receives barrage information, judging unit 22 is used to judge whether the barrage information is special Barrage information, if common barrage information directly can just be shown, if special barrage information, the receiving unit 21 is then also needed Want the key information that the reception server is issued.Certainly, the client for there was only advanced level user in the present embodiment can just receive key Information, and for domestic consumer, server will not issue key information to it, even if therefore domestic consumer is corresponding Client receives special barrage information, special barrage information can not be also decrypted because of no key information.Here, take Business device is to distinguish advanced level user and domestic consumer based on user's mark, and the user's mark of the advanced level user can be vip Field etc..
The judging unit 22 judges whether the barrage information is special barrage information, including:Obtain the barrage letter The marker bit of breath;Judge encrypted indicia position whether be special barrage information the first marker bit, if encrypted indicia position It is the first encrypted indicia position, it is determined that the barrage information is the special barrage information.Here, the first encryption mark Remember that position can include letter, numeral that server is arranged with client etc., the first encrypted indicia position in the present embodiment is numeral “1”.The first encrypted indicia position can be located at after the first character of special barrage information or after ultimate character, or can be After the character of other agreements.
If the encrypted indicia position is the second encrypted indicia position, the judging unit 22 then determines that the barrage information is institute Common barrage information is stated, can be directly displayed.Likewise, the second encrypted indicia position can include server and client about Fixed letter, numeral etc., the second encrypted indicia position in the present embodiment is digital " 0 ".The second encrypted indicia position can position In after the first character of common barrage information or after ultimate character, or after being the character of other agreements.
After receiving unit 21 receives key information, the decryption unit 23 can utilize solution based on the key information The barrage information is decrypted close algorithm, obtains the cleartext information of the barrage information.
Specifically, because the AES in server potentially include it is a variety of, such as:TEA AESs, AES encryption algorithm And RSA cryptographic algorithms;Certainly, AES can also be some other AESs.The special barrage information can also Information including diversified forms, such as:Pictorial information, text information, audio-frequency information, video information etc..
When AES is TEA AESs, the decryption unit 23 utilizes decipherment algorithm based on the key information The barrage information is decrypted, including:
The barrage information is solved using decipherment algorithm TEA.decrypt (EncryptChatmessage, KEY) It is close;Specific procedure is realized as follows:
Chatmessage=TEA.decrypt (EncryptChatmessage, KEY);
Wherein, the Chatmessage is the barrage information, and the KEY is the key information received;It is described Decrypt interfaces are the decryption interfaces of TEA algorithms.
Here, when AES is other default AESs, the decryption unit 23 is based on the key information The barrage information is decrypted using decipherment algorithm, in addition to:
After key information is received, the length information of key is judged, and according to the key in the cipher-text information In extract additional information, specifically include:The additional information inserting in the cipher-text information is determined based on the key Enter position, the length information of additional information is determined according to the length information of key;In the insertion position of the cipher-text information The additional information is extracted based on the length information.Wherein, the length of the additional information can for key length 2~ 3 times, and the character of additional information can include:Numeral or letter.
Insertion position of the additional information in the cipher-text information is determined based on the key, including:Determine institute State the reference position of key;Obtain character of the key with reference to position;The character is changed according to default first transformation rule For a numerical value;The insertion position is determined based on the numerical value.
Wherein, default first transformation rule be by it is described can include it is a variety of:Such as by character and decimal value pair It should change, character and ASCII character value are subjected to corresponding conversion.
When character and ASCII character value are carried out into corresponding conversion, receive after key, then the decryption unit 23 is obtained Key is determined the corresponding decimal system ASCII character value of the character, sought using this value as reference point in ciphertext with reference to the character of position The position looked for where additional information character.Search out behind the position, additional information character is extracted from cipher-text information.This In, the reference position of the key can be any bit in key, such as the first or last position;It is close when being set to the last position of key The reference position of key, such as key is 12345, then with reference to the character of position be exactly " 5 ", then get " 5 " corresponding ASCII character be " 53 ", then extract position of the additional information after the 53rd character in cipher-text information.
After the additional information is extracted from cipher-text information, and judge whether the ciphertext character end has accordingly File type, if so, then the file of newly-built the type is write with facilitating the later stage to decrypt.If it is not, acquiescence is newly-built One document files records ciphertext data.
Then, the decryption unit 23 is after the character string of key string and additional information is obtained, by two character strings Spliced, form a combination key, and cipher-text information is converted into cleartext information using the combination key, thus can be by The special barrage information of encryption is converted to cleartext information, then includes it on the screen of client.
Here, when AES be other default AESs, and barrage information be image information when, the decryption list The barrage information is decrypted using decipherment algorithm based on the key information for member 23, in addition to:
At least one set of color value is read from image, described image is the encrypted result that cleartext information is encrypted;Root At least one set of color value is converted into digital information according to the second transformation rule;The digital information is converted into character to compile Code;The character code is changed into the cleartext information.
At least one set of color value is converted to digital information according to the second transformation rule by phase, including:
The corresponding maximum stratum of each color is determined, the number of the digital information is determined according to formula A=(B*C+G) * C+R Value A;Wherein, the corresponding maximum stratum of each color is identical, and the R is red, and the G is green, and the B is blueness, The C is the corresponding maximum stratum of each color.
When obscure in described image have obscure color lump when, from described image reading at least one set of color value includes:Receive Numerical value is obscured, according to the quantity for obscuring color lump of the random generation for obscuring numerical value determination;Determined based on Obfuscating Algorithms described Obscure writing position of the color lump in described image;It is determined that writing the first datum mark of the color value;With first benchmark Point travels through described image for original position, and in ergodic process, color lump is obscured based on the quantity for obscuring color lump and described Writing position in described image obscures color lump described in skipping, and reads at least one set of color value.
Here, when AES be other default AESs, and barrage information be audio-frequency information when, the decryption list The barrage information is decrypted using decipherment algorithm based on the key information for member 23, in addition to:
Audio is received, at least one audio code is read from the audio;According to the 3rd transformation rule at least one by described in Group audio code is converted to cleartext information.
At least one audio code of the reading from audio, including:Voice data is read, the frequency team of the audio is obtained Row;The frequency queue is traveled through, first frequency and second frequency is obtained;The first frequency is converted into the first audio coding, The second frequency is converted into the second audio coding;Phase is determined according to first audio coding and second audio coding The audio coding answered;The audio coding is combined acquisition at least one set of audio code.
The reading voice data, obtains the frequency queue of the audio, including:An audio-frequency information object is set up, in institute State and a sample frequency is set in audio-frequency information object;The voice data is gathered based on the sample frequency, and by the audio Data storage is into an array;The array is traveled through, each single item data in the array are converted into corresponding frequency, is formed Frequency queue.
It is described at least one set of audio code is converted to by cleartext information according to the 3rd transformation rule to include;According to default Extracting rule, at least one set of audio coding is split as by the audio code;It is determined that each digital corresponding audio coding;Based on institute Each digital corresponding audio coding and every group of audio coding are stated, the audio coding is converted at least one set of digital information; At least one set of digital information is converted into character code;The character code is converted into the cleartext information.
After the cleartext information after being decrypted, the judging unit 22 is additionally operable to judge the files classes of the cleartext information Type, if the character string of word class is then write the data in document files;If other kinds of special text Part, such as:Picture, audio and video, then be converted to corresponding data, and be written to using Base64 byte codes by character string In the file created before, complete decrypting process is reached.
Here, when the special barrage information is picture, audio and video, due to the cleartext information of special barrage information There is the information of various codings, such as:Chinese, English or other words, therefore cleartext information is converted into base64 byte codes Afterwards, then can be very good that unified coded format can be switched to various countries' word into, prevent mess code, or identification less than Situation, Base64 byte codes requirement is converted into 3 octets (3*8=24) byte (4*6=24) of 46, afterwards Two 0 are mended before 6, the form of 8 bytes is formed.If less than 3 bytes of remaining character, filled with 0, Output character it is possible that 1 or 2 '=' using the text end exported after '=', therefore coding.
The beneficial effect that the embodiment that the present invention is provided can be brought is at least:
The invention provides a kind of method and client of protection barrage information, methods described includes:Client receives bullet Curtain information;Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information, Receive key information;The barrage information is decrypted using decipherment algorithm based on the key information, the barrage is obtained The cleartext information of information;In this way, the only corresponding client of advanced level user can just receive key information, key letter is then based on Special barrage information is decrypted breath, watches special barrage information;Even if the corresponding client of domestic consumer receives spy Different barrage information, special barrage information can not also be decrypted because not receiving key information, so as to also obtain less than spy The cleartext information of different barrage information;Thus it can further increase the quantity of advanced level user, so as to add live platform Income.Further, since special barrage information is encrypted, the special barrage information is got even if hacker and will not also be broken easily Solution, further ensure that the security of data transfer.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention, it is all Any modifications, equivalent substitutions and improvements made within the spirit and principles in the present invention etc., should be included in the protection of the present invention Within the scope of.

Claims (10)

1. a kind of method for protecting barrage information, it is characterised in that methods described includes:
Client receives barrage information;
Whether be special barrage information, if the barrage information is the special barrage information, connect if judging the barrage information Receive the key information that server is sent;
The barrage information is decrypted using decipherment algorithm based on the key information, the plaintext of the barrage information is obtained Information, wherein, the barrage information includes:Text information, image information or audio-frequency information.
2. the method as described in claim 1, it is characterised in that described to judge whether the barrage information is special barrage letter Breath, including:
Obtain the encrypted indicia position of the barrage information;
Judge encrypted indicia position whether be special barrage information the first encrypted indicia position, if encrypted indicia position is institute State the first encrypted indicia position, it is determined that the barrage information is the special barrage information.
3. the method as described in claim 1, it is characterised in that described to be solved using decipherment algorithm to the barrage information It is close, including:
The barrage information is decrypted using decipherment algorithm TEA.decrypt (EncryptChatmessage, KEY);Its In, the Chatmessage is the barrage information, and the KEY is the key information.
4. the method as described in claim 1, it is characterised in that described to be solved using decipherment algorithm to the barrage information It is close, in addition to:
Additional information is extracted in the cipher-text information of the special barrage information according to the key information;
The key information and the additional information are combined to form a combination key;
The cipher-text information is converted into corresponding cleartext information using the combination key.
5. method as claimed in claim 4, it is characterised in that described to be carried according to the key information in the cipher-text information Additional information is taken out, including:
Insertion position of the additional information in the cipher-text information is determined based on the key information;
The additional information is extracted in the insertion position of the cipher-text information.
6. method as claimed in claim 5, it is characterised in that described that the additional information is determined based on the key information Insertion position in the cipher-text information, including:
Determine the reference position of the key information;
Obtain character of the key information with reference to position;
The character is converted into a numerical value according to default first transformation rule;
The insertion position is determined based on the numerical value.
7. method as claimed in claim 5, it is characterised in that described to be carried according to the key information in the cipher-text information Additional information is taken out, in addition to:
Determine the length information of the key information;
Length information based on the key information determines the length information of the additional information;
The additional information is extracted based on the length information in the cipher-text information.
8. the method as described in claim 1, it is characterised in that described to be solved using decipherment algorithm to the barrage information It is close, in addition to:
Image information is received, at least one set of color value is read from described image information, described image is to the barrage information The encrypted result that is encrypted of cleartext information;
At least one set of color value is converted to by digital information according to the second transformation rule;
The digital information is converted into character code;
The character code is changed into the cleartext information.
9. the method as described in claim 1, it is characterised in that described to be solved using decipherment algorithm to the barrage information It is close, in addition to:
Audio-frequency information is received, at least one audio code is read from the audio-frequency information, the audio is that cleartext information is carried out The encrypted result of encryption;
At least one set of audio code is converted to by cleartext information according to the 3rd transformation rule.
10. a kind of client, it is characterised in that the client includes:
Receiving unit, for receiving barrage information;
Judging unit, for judging whether the barrage information is special barrage information, if the barrage information is described special During barrage information, the key information that the reception server is sent;
Decryption unit, for the barrage information to be decrypted using decipherment algorithm based on the key information, obtains described The cleartext information of barrage information;Wherein, the barrage information includes:Text information, image information or audio-frequency information.
CN201710211330.9A 2017-03-31 2017-03-31 Method and client for protecting bullet screen information Active CN107105324B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710211330.9A CN107105324B (en) 2017-03-31 2017-03-31 Method and client for protecting bullet screen information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710211330.9A CN107105324B (en) 2017-03-31 2017-03-31 Method and client for protecting bullet screen information

Publications (2)

Publication Number Publication Date
CN107105324A true CN107105324A (en) 2017-08-29
CN107105324B CN107105324B (en) 2020-10-16

Family

ID=59676190

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710211330.9A Active CN107105324B (en) 2017-03-31 2017-03-31 Method and client for protecting bullet screen information

Country Status (1)

Country Link
CN (1) CN107105324B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108024121A (en) * 2017-11-17 2018-05-11 武汉微摇科技文化有限公司 Voice barrage synchronous method and system
CN108471557A (en) * 2018-03-28 2018-08-31 武汉斗鱼网络科技有限公司 A kind of barrage broadcasting method, device, server and medium
CN110545452A (en) * 2018-05-28 2019-12-06 阿里巴巴集团控股有限公司 Network live broadcast method, device, terminal and server
CN112995748A (en) * 2021-01-26 2021-06-18 浙江香侬慧语科技有限责任公司 Multi-mode-based automatic bullet screen generation method and system, storage medium and equipment
CN114520923A (en) * 2020-11-20 2022-05-20 武汉斗鱼网络科技有限公司 Barrage information display method, first terminal, second terminal, medium and equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059098A1 (en) * 2000-11-16 2002-05-16 Shinichi Sazawa Method for managing an imaginary store, method for using the imaginary store, and recording medium in which an imaginary store managing program is stored
CN101582157A (en) * 2009-03-06 2009-11-18 中山大学 Adaptive spatial steganographic method based on adjacent pixel difference
CN103646068A (en) * 2013-12-04 2014-03-19 Tcl集团股份有限公司 Encryption method, decryption method, method for group messaging and corresponding devices thereof
CN105898456A (en) * 2015-12-02 2016-08-24 乐视网信息技术(北京)股份有限公司 Multimedia playback interaction method and device
CN106231115A (en) * 2016-08-29 2016-12-14 深圳市金立通信设备有限公司 A kind of information protecting method and terminal
CN106506487A (en) * 2016-11-03 2017-03-15 武汉斗鱼网络科技有限公司 A kind of information Encrypt and Decrypt method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020059098A1 (en) * 2000-11-16 2002-05-16 Shinichi Sazawa Method for managing an imaginary store, method for using the imaginary store, and recording medium in which an imaginary store managing program is stored
CN101582157A (en) * 2009-03-06 2009-11-18 中山大学 Adaptive spatial steganographic method based on adjacent pixel difference
CN103646068A (en) * 2013-12-04 2014-03-19 Tcl集团股份有限公司 Encryption method, decryption method, method for group messaging and corresponding devices thereof
CN105898456A (en) * 2015-12-02 2016-08-24 乐视网信息技术(北京)股份有限公司 Multimedia playback interaction method and device
CN106231115A (en) * 2016-08-29 2016-12-14 深圳市金立通信设备有限公司 A kind of information protecting method and terminal
CN106506487A (en) * 2016-11-03 2017-03-15 武汉斗鱼网络科技有限公司 A kind of information Encrypt and Decrypt method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108024121A (en) * 2017-11-17 2018-05-11 武汉微摇科技文化有限公司 Voice barrage synchronous method and system
CN108024121B (en) * 2017-11-17 2020-02-07 武汉微摇科技文化有限公司 Voice barrage synchronization method and system
CN108471557A (en) * 2018-03-28 2018-08-31 武汉斗鱼网络科技有限公司 A kind of barrage broadcasting method, device, server and medium
CN110545452A (en) * 2018-05-28 2019-12-06 阿里巴巴集团控股有限公司 Network live broadcast method, device, terminal and server
CN110545452B (en) * 2018-05-28 2022-04-12 阿里巴巴集团控股有限公司 Network live broadcast method, device, terminal and server
CN114520923A (en) * 2020-11-20 2022-05-20 武汉斗鱼网络科技有限公司 Barrage information display method, first terminal, second terminal, medium and equipment
CN114520923B (en) * 2020-11-20 2023-09-01 武汉斗鱼网络科技有限公司 Barrage information display method, first terminal, second terminal, medium and equipment
CN112995748A (en) * 2021-01-26 2021-06-18 浙江香侬慧语科技有限责任公司 Multi-mode-based automatic bullet screen generation method and system, storage medium and equipment

Also Published As

Publication number Publication date
CN107105324B (en) 2020-10-16

Similar Documents

Publication Publication Date Title
CN107105324A (en) A kind of method and client of protection barrage information
CN105719120B (en) A method of encryption express delivery list privacy information
Ahvanooey et al. AITSteg: An innovative text steganography technique for hidden transmission of text message via social media
CN103684760B (en) The encryption of communication and the method, apparatus of decryption and system
Abdullah et al. New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm
EP2832102B1 (en) Methods and systems for cryptographic access control of video
CN104680077B (en) Method for encrypting picture, method for viewing picture, system and terminal
CN106506487A (en) A kind of information Encrypt and Decrypt method and device
CN107155113B (en) Method and server for protecting bullet screen information
CN106330976A (en) Information encryption and decryption method and device
JP6346942B2 (en) Blocking password attacks
CN102970530B (en) Graphic interchange format (GIF) image encryption method based on compressed encoding
CN110210270A (en) Two-dimensional barcode information safety encryption and system and image in 2 D code analytic method and system
JP2014011762A (en) Information processing apparatus, terminal device, information processing system, method for information processing, and computer program
US7219229B2 (en) Protected communication system
CN103646068B (en) Encryption method, decryption method, the method for sending bulk message and its corresponding intrument
US7995748B2 (en) Method and apparatus for providing ecryption/decryption using two sequences of numbers
CN105119923B (en) A kind of information decoding method and terminal
CN109214488B (en) Method and system for information transmission based on graphic coded data
CN114357524B (en) Electronic document processing method and device
CN112399027A (en) Picture encryption and decryption method and device, storage medium and electronic equipment
CN103250372A (en) Obtaining a control word to reveal a client device identity
Saeed et al. A record composition/decomposition attack on the NDEF signature record type definition
CN105553676B (en) With the Beidou serial port communication method of equipment authentication function and transmission, reception device
CN108055271A (en) Encryption and decryption approaches, storage medium and the electronic equipment of Email

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant