CN107105324A - A kind of method and client of protection barrage information - Google Patents
A kind of method and client of protection barrage information Download PDFInfo
- Publication number
- CN107105324A CN107105324A CN201710211330.9A CN201710211330A CN107105324A CN 107105324 A CN107105324 A CN 107105324A CN 201710211330 A CN201710211330 A CN 201710211330A CN 107105324 A CN107105324 A CN 107105324A
- Authority
- CN
- China
- Prior art keywords
- information
- barrage
- key
- barrage information
- special
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26613—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/235—Processing of additional data, e.g. scrambling of additional data or processing content descriptors
- H04N21/2351—Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/435—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream
- H04N21/4353—Processing of additional data, e.g. decrypting of additional data, reconstructing software from modules extracted from the transport stream involving decryption of additional data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
Abstract
The invention provides a kind of method and client of protection barrage information, methods described includes:Client receives barrage information;Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information, receives key information;The barrage information is decrypted using decipherment algorithm based on the key information, the cleartext information of the barrage information is obtained;Wherein, the barrage information includes:Text information, image information or audio-frequency information;Even if in this way, the corresponding client of domestic consumer receives special barrage information, special barrage information can not also be decrypted because not receiving key information, so as to also obtain the cleartext information less than special barrage information;Thus it can further increase the quantity of advanced level user, so as to add the income of live platform.
Description
Technical field
The invention belongs to barrage technical field of information processing, more particularly to a kind of method for protecting barrage information and client
End.
Background technology
At present, with the progress and the speed-raising of broadband network of the network communications technology, network direct broadcasting has been obtained more and more
Development and application.
Simultaneously with the development of barrage, barrage information causes live with preferably interactive and interesting.And live flat
Increase the income of platform to be classified to user in platform, advanced level user can be escalated into by allowing user to supplement with money, so as to only allow height
Level user enjoys some specific functions, such as only allows advanced level user to see some special barrage information, but existing bullet
The barrage information that curtain system is sent is visible to all users, causes domestic consumer to get these special barrages easily
Information, and then cause the live platform income reduction of barrage.
Based on this, the present invention provides a kind of method and client for protecting barrage information, of the prior art above-mentioned to solve
Problem.
The content of the invention
The problem of existing for prior art, the embodiments of the invention provide a kind of method for protecting barrage information and client
End, is visible to all users for solving the barrage information that existing server is sent, causes domestic consumer to obtain easily
Some special barrage information are got, and then cause the quantity of advanced level user to reduce, the skill of the live platform income reduction of barrage is caused
Art problem.
The present invention provides a kind of method for protecting barrage information, and methods described includes:
Client receives barrage information;
Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information
When, the key information that the reception server is sent;
The barrage information is decrypted using decipherment algorithm based on the key information, the barrage information is obtained
Cleartext information;Wherein, the barrage information includes:Text information, image information or audio-frequency information.
It is described to judge whether the barrage information is special barrage information in such scheme, including:
Obtain the encrypted indicia position of the barrage information;
Judge encrypted indicia position whether be special barrage information the first encrypted indicia position, if encrypted indicia position
It is the first encrypted indicia position, it is determined that the barrage information is the special barrage information.
In such scheme, the barrage information is decrypted the utilization decipherment algorithm, including:
The barrage information is solved using decipherment algorithm TEA.decrypt (EncryptChatmessage, KEY)
It is close;Wherein, the Chatmessage is the barrage information, and the KEY is the key information.
In such scheme, the barrage information is decrypted the utilization decipherment algorithm, in addition to:
Additional information is extracted in the cipher-text information of the special barrage information according to the key information;
The key information and the additional information are combined to form a combination key;
The cipher-text information is converted into corresponding cleartext information using the combination key.
It is described that additional information is extracted in the cipher-text information according to the key information in such scheme, including:
Insertion position of the additional information in the cipher-text information is determined based on the key information;
The additional information is extracted in the insertion position of the cipher-text information.
It is described that the additional information inserting in the cipher-text information is determined based on the key information in such scheme
Enter position, including:
Determine the reference position of the key information;
Obtain character of the key information with reference to position;
The character is converted into a numerical value according to default first transformation rule;
The insertion position is determined based on the numerical value.
It is described that additional information is extracted in the cipher-text information according to the key information in such scheme, in addition to:
Determine the length information of the key information;
Length information based on the key information determines the length information of the additional information;
The additional information is extracted based on the length information in the cipher-text information.
In such scheme, the barrage information is decrypted the utilization decipherment algorithm, in addition to:
Image information is received, at least one set of color value is read from described image information, described image is to cleartext information
The encrypted result being encrypted;
At least one set of color value is converted to by digital information according to the second transformation rule;
The digital information is converted into character code;
The character code is changed into the cleartext information.
In such scheme, the barrage information is decrypted the utilization decipherment algorithm, in addition to:
Audio-frequency information is received, at least one audio code is read from the audio-frequency information, the audio is to cleartext information
The encrypted result being encrypted;
At least one set of audio code is converted to by cleartext information according to the 3rd transformation rule.
The present invention also provides a kind of client, and the client includes:
Receiving unit, for receiving barrage information;
Judging unit, for judging whether the barrage information is special barrage information, if the barrage information is described
During special barrage information, the key information that the reception server is sent;
Decryption unit, for the barrage information to be decrypted using decipherment algorithm based on the key information, is obtained
The cleartext information of the barrage information;Wherein, the barrage information includes:Text information, image information or audio-frequency information.
The invention provides a kind of method and client of protection barrage information, methods described includes:Client receives bullet
Curtain information;Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information,
Receive key information;The barrage information is decrypted using decipherment algorithm based on the key information, the barrage is obtained
The cleartext information of information;Wherein, the barrage information includes:Text information, image information or audio-frequency information.Even if in this way, general
The corresponding client in general family receives special barrage information, also can not be to special barrage information because not receiving key information
It is decrypted, so as to also obtain the cleartext information less than special barrage information;It thus can further increase advanced level user
Quantity, so as to add the income of live platform.
Brief description of the drawings
Fig. 1 is the method flow schematic diagram for the protection barrage information that the embodiment of the present invention one is provided;
Fig. 2 is the overall structure diagram for the client that the embodiment of the present invention two is provided.
Embodiment
The barrage information sent to solve existing server is visible to all users, causes domestic consumer light
Some special barrage information are easily got, and then cause the quantity of advanced level user to reduce, the live platform income reduction of barrage is caused
Technical problem, the invention provides a kind of client receive barrage information;Whether judge the barrage information is special barrage
Information, if the barrage information is the special barrage information, receives key information;Decryption is utilized based on the key information
The barrage information is decrypted algorithm, obtains the cleartext information of the barrage information;Wherein, the barrage information includes:
Text information, image information or audio-frequency information.
Technical scheme is described in further detail below by drawings and the specific embodiments.
Embodiment one
The present embodiment provides a kind of method and client of protection barrage information, in order to reduce the transformation of existing barrage system
Cost, this method is designed based on existing barrage system, and methods described is applied to client-side, as shown in figure 1, institute
The method of stating includes:
S101, client receives barrage information.
In this step, client is before display barrage information, it is necessary first to receive barrage information, the barrage information
Including:Common barrage information and special barrage information;In general, the special barrage information merely desires to allow advanced level user to see,
Do not want to allow domestic consumer to see.Such as, the barrage information includes:Text information, image information or audio-frequency information;It is described special
Barrage information can include:Chat message between favor information, advanced level user etc..
S102, whether be special barrage information, if the barrage information is the special barrage if judging the barrage information
During information, key information is received.
In this step, whether after client receives barrage information, it is special barrage information to judge the barrage information,
If common barrage information directly can just be shown, if special barrage information, then the key that the reception server is issued is also needed to
Information.Certainly, the client for there was only advanced level user in the present embodiment can just receive key information, and come for domestic consumer
Say, server will not issue key information to it, even if therefore the corresponding client of domestic consumer receives special barrage
Information, special barrage information can not also be decrypted because of no key information.Here, server be based on user's mark come
Advanced level user and domestic consumer are distinguished, such as:The user's mark of the advanced level user can be vip fields etc..
It is described to judge whether the barrage information is special barrage information, including:Obtain the marker bit of the barrage information;
Judge encrypted indicia position whether be special barrage information the first marker bit, if encrypted indicia position be described first plus
Close marker bit, it is determined that the barrage information is the special barrage information.Here, the first encrypted indicia position can include
Letter, numeral that server is arranged with client etc., the first encrypted indicia position in the present embodiment is digital " 1 ".Described first
Encrypted indicia position can be located at after the first character of special barrage information or after ultimate character, or can be the word of other agreements
Fu Hou.
If the encrypted indicia position is the second encrypted indicia position, it is determined that the barrage information is the common barrage letter
Breath, can be directly displayed.Likewise, the second encrypted indicia position can include letter, the number that server is arranged with client
Word etc., the second encrypted indicia position in the present embodiment is digital " 0 ".The second encrypted indicia position can be located at common barrage letter
After the first character of breath or after ultimate character, or can be other agreement character after.
S103, the barrage information is decrypted using decipherment algorithm based on the key information, obtains the barrage
The cleartext information of information.
In this step, after key information is received, decipherment algorithm can be utilized based on the key information to the bullet
Curtain information is decrypted, and obtains the cleartext information of the barrage information.
Specifically, because the AES in server potentially include it is a variety of, such as:TEA AESs, AES encryption algorithm
And RSA cryptographic algorithms;Certainly, AES can also be some other AESs.The special barrage information can also
Information including diversified forms, such as:Pictorial information, text information, audio-frequency information, video information etc..
When barrage information is text information and AES is TEA AESs, solution is utilized based on the key information
The barrage information is decrypted close algorithm, including:
The barrage information is solved using decipherment algorithm TEA.decrypt (EncryptChatmessage, KEY)
It is close;Specific procedure is realized as follows:
Chatmessage=TEA.decrypt (EncryptChatmessage, KEY);
Wherein, the Chatmessage is the barrage information after the decryption, and the KEY is the key information received;
The decrypt interfaces are the decryption interfaces of TEA algorithms.
When AES is AES encryption algorithm, based on the key information using decipherment algorithm to the barrage information
It is decrypted, including:
The barrage information is solved using decipherment algorithm AES.decrypt (EncryptChatmessage, KEY)
It is close;Specific procedure is realized as follows:
Chatmessage=AES.decrypt (EncryptChatmessage, KEY);
Wherein, the Chatmessage is the barrage information after the decryption, and the KEY is the key information received;
Now the decrypt interfaces are the decryption interfaces of aes algorithm.
When AES is RSA cryptographic algorithms, based on the key information using decipherment algorithm to the barrage information
It is decrypted, including:
The barrage information is solved using decipherment algorithm RSA.decrypt (EncryptChatmessage, KEY)
It is close;Specific procedure is realized as follows:
Chatmessage=RSA.decrypt (EncryptChatmessage, KEY);
Wherein, the Chatmessage is the barrage information after the decryption, and the KEY is the key information received;
Now the decrypt interfaces are the decryption interfaces of RSA Algorithm.
Here, when AES is other default AESs, decipherment algorithm pair is utilized based on the key information
The barrage information is decrypted, in addition to:
After key information is received, the length information of key is judged, and according to the key in the cipher-text information
In extract additional information, specifically include:The additional information inserting in the cipher-text information is determined based on the key
Enter position, the length information of additional information is determined according to the length information of key;In the insertion position of the cipher-text information
The additional information is extracted based on the length information.Wherein, the length of the additional information can for key length 2~
3 times, and the character of additional information can include:Numeral or letter.
Insertion position of the additional information in the cipher-text information is determined based on the key, including:Determine institute
State the reference position of key;Obtain character of the key with reference to position;The character is changed according to default first transformation rule
For a numerical value;The insertion position is determined based on the numerical value.
Wherein, default first transformation rule be by it is described can include it is a variety of:Such as by character and decimal value pair
It should change, character and ASCII character value are subjected to corresponding conversion.
When character and ASCII character value are carried out into corresponding conversion, receive after key, then obtain word of the key with reference to position
Symbol, is determined the corresponding decimal system ASCII character value of the character, is found additional information character in ciphertext using this value as reference point
The position at place.Search out behind the position, additional information character is extracted from cipher-text information.Here, the key
Can be any bit in key, such as the first or last position with reference to position;When be set to the last position of key key reference position, than
If key is 12345, then with reference to the character of position be exactly " 5 ", then it is " 53 " to get " 5 " corresponding ASCII character, then will be attached
Plus position of the information after the 53rd character in cipher-text information is extracted.
After the additional information is extracted from cipher-text information, and judge whether the ciphertext character end has accordingly
File type, if so, then the file of newly-built the type is write with facilitating the later stage to decrypt.If it is not, acquiescence is newly-built
One document files records ciphertext data.
Then, after the character string of key string and additional information is obtained, two character strings are spliced, one is formed
Combination key, and cipher-text information is converted into cleartext information using the combination key, thus can be by the special barrage of encryption
Information is converted to cleartext information, then includes it on the screen of client.
Here, when AES be other default AESs, and barrage information be image information when, based on described close
The barrage information is decrypted key Information Pull decipherment algorithm, in addition to:
At least one set of color value is read from image, described image is the encrypted result that cleartext information is encrypted;Root
At least one set of color value is converted into digital information according to the second transformation rule;The digital information is converted into character to compile
Code;The character code is changed into the cleartext information.
At least one set of color value is converted to digital information according to the second transformation rule by phase, including:
The corresponding maximum stratum of each color is determined, the number of the digital information is determined according to formula A=(B*C+G) * C+R
Value A;Wherein, the corresponding maximum stratum of each color is identical, and the R is red, and the G is green, and the B is blueness,
The C is the corresponding maximum stratum of each color.
When obscure in described image have obscure color lump when, from described image reading at least one set of color value includes:Receive
Numerical value is obscured, according to the quantity for obscuring color lump of the random generation for obscuring numerical value determination;Determined based on Obfuscating Algorithms described
Obscure writing position of the color lump in described image;It is determined that writing the first datum mark of the color value;With first benchmark
Point travels through described image for original position, and in ergodic process, color lump is obscured based on the quantity for obscuring color lump and described
Writing position in described image obscures color lump described in skipping, and reads at least one set of color value.
Here, when AES be other default AESs, and barrage information be audio-frequency information when, based on described close
The barrage information is decrypted key Information Pull decipherment algorithm, in addition to:
Audio is received, at least one audio code is read from the audio;According to the 3rd transformation rule at least one by described in
Group audio code is converted to cleartext information.
At least one audio code of the reading from audio, including:Voice data is read, the frequency team of the audio is obtained
Row;The frequency queue is traveled through, first frequency and second frequency is obtained;The first frequency is converted into the first audio coding,
The second frequency is converted into the second audio coding;Phase is determined according to first audio coding and second audio coding
The audio coding answered;The audio coding is combined acquisition at least one set of audio code.
The reading voice data, obtains the frequency queue of the audio, including:An audio-frequency information object is set up, in institute
State and a sample frequency is set in audio-frequency information object;The voice data is gathered based on the sample frequency, and by the audio
Data storage is into an array;The array is traveled through, each single item data in the array are converted into corresponding frequency, is formed
Frequency queue.
It is described at least one set of audio code is converted to by cleartext information according to the 3rd transformation rule to include;According to default
Extracting rule, at least one set of audio coding is split as by the audio code;It is determined that each digital corresponding audio coding;Based on institute
Each digital corresponding audio coding and every group of audio coding are stated, the audio coding is converted at least one set of digital information;
At least one set of digital information is converted into character code;The character code is converted into the cleartext information.
After the cleartext information after being decrypted, the file type of the cleartext information is judged, if the word of word class
Symbol string is then write the data in document files;If other kinds of special file, such as:Picture, audio and
Video, then be converted to corresponding data using Base64 byte codes by character string, and is written in the file created before, reaches
To complete decrypting process.
Here, when the special barrage information is picture, audio and video, due to the cleartext information of special barrage information
There is the information of various codings, such as:Chinese, English or other words, therefore cleartext information is converted into base64 byte codes
Afterwards, then can be very good that unified coded format can be switched to various countries' word into, prevent mess code, or identification less than
Situation, Base64 byte codes requirement is converted into 3 octets (3*8=24) byte (4*6=24) of 46, afterwards
Two 0 are mended before 6, the form of 8 bytes is formed.If less than 3 bytes of remaining character, filled with 0,
Output character it is possible that 1 or 2 '=' using the text end exported after '=', therefore coding.
Embodiment two
Corresponding to embodiment one, the present embodiment also provides a kind of client, as shown in Fig. 2 the client includes:Receive
Unit 21, judging unit 22 and decryption unit 23;Wherein;
Client is before display barrage information, and receiving unit 21 is believed firstly the need of barrage information, the barrage is received
Breath includes:Common barrage information and special barrage information;In general, the special barrage information merely desires to allow advanced level user to see
Arrive, do not want to allow domestic consumer to see.Such as, the special barrage information can include:Chatting between favor information, advanced level user
Its information etc..
After receiving unit 21 receives barrage information, judging unit 22 is used to judge whether the barrage information is special
Barrage information, if common barrage information directly can just be shown, if special barrage information, the receiving unit 21 is then also needed
Want the key information that the reception server is issued.Certainly, the client for there was only advanced level user in the present embodiment can just receive key
Information, and for domestic consumer, server will not issue key information to it, even if therefore domestic consumer is corresponding
Client receives special barrage information, special barrage information can not be also decrypted because of no key information.Here, take
Business device is to distinguish advanced level user and domestic consumer based on user's mark, and the user's mark of the advanced level user can be vip
Field etc..
The judging unit 22 judges whether the barrage information is special barrage information, including:Obtain the barrage letter
The marker bit of breath;Judge encrypted indicia position whether be special barrage information the first marker bit, if encrypted indicia position
It is the first encrypted indicia position, it is determined that the barrage information is the special barrage information.Here, the first encryption mark
Remember that position can include letter, numeral that server is arranged with client etc., the first encrypted indicia position in the present embodiment is numeral
“1”.The first encrypted indicia position can be located at after the first character of special barrage information or after ultimate character, or can be
After the character of other agreements.
If the encrypted indicia position is the second encrypted indicia position, the judging unit 22 then determines that the barrage information is institute
Common barrage information is stated, can be directly displayed.Likewise, the second encrypted indicia position can include server and client about
Fixed letter, numeral etc., the second encrypted indicia position in the present embodiment is digital " 0 ".The second encrypted indicia position can position
In after the first character of common barrage information or after ultimate character, or after being the character of other agreements.
After receiving unit 21 receives key information, the decryption unit 23 can utilize solution based on the key information
The barrage information is decrypted close algorithm, obtains the cleartext information of the barrage information.
Specifically, because the AES in server potentially include it is a variety of, such as:TEA AESs, AES encryption algorithm
And RSA cryptographic algorithms;Certainly, AES can also be some other AESs.The special barrage information can also
Information including diversified forms, such as:Pictorial information, text information, audio-frequency information, video information etc..
When AES is TEA AESs, the decryption unit 23 utilizes decipherment algorithm based on the key information
The barrage information is decrypted, including:
The barrage information is solved using decipherment algorithm TEA.decrypt (EncryptChatmessage, KEY)
It is close;Specific procedure is realized as follows:
Chatmessage=TEA.decrypt (EncryptChatmessage, KEY);
Wherein, the Chatmessage is the barrage information, and the KEY is the key information received;It is described
Decrypt interfaces are the decryption interfaces of TEA algorithms.
Here, when AES is other default AESs, the decryption unit 23 is based on the key information
The barrage information is decrypted using decipherment algorithm, in addition to:
After key information is received, the length information of key is judged, and according to the key in the cipher-text information
In extract additional information, specifically include:The additional information inserting in the cipher-text information is determined based on the key
Enter position, the length information of additional information is determined according to the length information of key;In the insertion position of the cipher-text information
The additional information is extracted based on the length information.Wherein, the length of the additional information can for key length 2~
3 times, and the character of additional information can include:Numeral or letter.
Insertion position of the additional information in the cipher-text information is determined based on the key, including:Determine institute
State the reference position of key;Obtain character of the key with reference to position;The character is changed according to default first transformation rule
For a numerical value;The insertion position is determined based on the numerical value.
Wherein, default first transformation rule be by it is described can include it is a variety of:Such as by character and decimal value pair
It should change, character and ASCII character value are subjected to corresponding conversion.
When character and ASCII character value are carried out into corresponding conversion, receive after key, then the decryption unit 23 is obtained
Key is determined the corresponding decimal system ASCII character value of the character, sought using this value as reference point in ciphertext with reference to the character of position
The position looked for where additional information character.Search out behind the position, additional information character is extracted from cipher-text information.This
In, the reference position of the key can be any bit in key, such as the first or last position;It is close when being set to the last position of key
The reference position of key, such as key is 12345, then with reference to the character of position be exactly " 5 ", then get " 5 " corresponding ASCII character be
" 53 ", then extract position of the additional information after the 53rd character in cipher-text information.
After the additional information is extracted from cipher-text information, and judge whether the ciphertext character end has accordingly
File type, if so, then the file of newly-built the type is write with facilitating the later stage to decrypt.If it is not, acquiescence is newly-built
One document files records ciphertext data.
Then, the decryption unit 23 is after the character string of key string and additional information is obtained, by two character strings
Spliced, form a combination key, and cipher-text information is converted into cleartext information using the combination key, thus can be by
The special barrage information of encryption is converted to cleartext information, then includes it on the screen of client.
Here, when AES be other default AESs, and barrage information be image information when, the decryption list
The barrage information is decrypted using decipherment algorithm based on the key information for member 23, in addition to:
At least one set of color value is read from image, described image is the encrypted result that cleartext information is encrypted;Root
At least one set of color value is converted into digital information according to the second transformation rule;The digital information is converted into character to compile
Code;The character code is changed into the cleartext information.
At least one set of color value is converted to digital information according to the second transformation rule by phase, including:
The corresponding maximum stratum of each color is determined, the number of the digital information is determined according to formula A=(B*C+G) * C+R
Value A;Wherein, the corresponding maximum stratum of each color is identical, and the R is red, and the G is green, and the B is blueness,
The C is the corresponding maximum stratum of each color.
When obscure in described image have obscure color lump when, from described image reading at least one set of color value includes:Receive
Numerical value is obscured, according to the quantity for obscuring color lump of the random generation for obscuring numerical value determination;Determined based on Obfuscating Algorithms described
Obscure writing position of the color lump in described image;It is determined that writing the first datum mark of the color value;With first benchmark
Point travels through described image for original position, and in ergodic process, color lump is obscured based on the quantity for obscuring color lump and described
Writing position in described image obscures color lump described in skipping, and reads at least one set of color value.
Here, when AES be other default AESs, and barrage information be audio-frequency information when, the decryption list
The barrage information is decrypted using decipherment algorithm based on the key information for member 23, in addition to:
Audio is received, at least one audio code is read from the audio;According to the 3rd transformation rule at least one by described in
Group audio code is converted to cleartext information.
At least one audio code of the reading from audio, including:Voice data is read, the frequency team of the audio is obtained
Row;The frequency queue is traveled through, first frequency and second frequency is obtained;The first frequency is converted into the first audio coding,
The second frequency is converted into the second audio coding;Phase is determined according to first audio coding and second audio coding
The audio coding answered;The audio coding is combined acquisition at least one set of audio code.
The reading voice data, obtains the frequency queue of the audio, including:An audio-frequency information object is set up, in institute
State and a sample frequency is set in audio-frequency information object;The voice data is gathered based on the sample frequency, and by the audio
Data storage is into an array;The array is traveled through, each single item data in the array are converted into corresponding frequency, is formed
Frequency queue.
It is described at least one set of audio code is converted to by cleartext information according to the 3rd transformation rule to include;According to default
Extracting rule, at least one set of audio coding is split as by the audio code;It is determined that each digital corresponding audio coding;Based on institute
Each digital corresponding audio coding and every group of audio coding are stated, the audio coding is converted at least one set of digital information;
At least one set of digital information is converted into character code;The character code is converted into the cleartext information.
After the cleartext information after being decrypted, the judging unit 22 is additionally operable to judge the files classes of the cleartext information
Type, if the character string of word class is then write the data in document files;If other kinds of special text
Part, such as:Picture, audio and video, then be converted to corresponding data, and be written to using Base64 byte codes by character string
In the file created before, complete decrypting process is reached.
Here, when the special barrage information is picture, audio and video, due to the cleartext information of special barrage information
There is the information of various codings, such as:Chinese, English or other words, therefore cleartext information is converted into base64 byte codes
Afterwards, then can be very good that unified coded format can be switched to various countries' word into, prevent mess code, or identification less than
Situation, Base64 byte codes requirement is converted into 3 octets (3*8=24) byte (4*6=24) of 46, afterwards
Two 0 are mended before 6, the form of 8 bytes is formed.If less than 3 bytes of remaining character, filled with 0,
Output character it is possible that 1 or 2 '=' using the text end exported after '=', therefore coding.
The beneficial effect that the embodiment that the present invention is provided can be brought is at least:
The invention provides a kind of method and client of protection barrage information, methods described includes:Client receives bullet
Curtain information;Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information,
Receive key information;The barrage information is decrypted using decipherment algorithm based on the key information, the barrage is obtained
The cleartext information of information;In this way, the only corresponding client of advanced level user can just receive key information, key letter is then based on
Special barrage information is decrypted breath, watches special barrage information;Even if the corresponding client of domestic consumer receives spy
Different barrage information, special barrage information can not also be decrypted because not receiving key information, so as to also obtain less than spy
The cleartext information of different barrage information;Thus it can further increase the quantity of advanced level user, so as to add live platform
Income.Further, since special barrage information is encrypted, the special barrage information is got even if hacker and will not also be broken easily
Solution, further ensure that the security of data transfer.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention, it is all
Any modifications, equivalent substitutions and improvements made within the spirit and principles in the present invention etc., should be included in the protection of the present invention
Within the scope of.
Claims (10)
1. a kind of method for protecting barrage information, it is characterised in that methods described includes:
Client receives barrage information;
Whether be special barrage information, if the barrage information is the special barrage information, connect if judging the barrage information
Receive the key information that server is sent;
The barrage information is decrypted using decipherment algorithm based on the key information, the plaintext of the barrage information is obtained
Information, wherein, the barrage information includes:Text information, image information or audio-frequency information.
2. the method as described in claim 1, it is characterised in that described to judge whether the barrage information is special barrage letter
Breath, including:
Obtain the encrypted indicia position of the barrage information;
Judge encrypted indicia position whether be special barrage information the first encrypted indicia position, if encrypted indicia position is institute
State the first encrypted indicia position, it is determined that the barrage information is the special barrage information.
3. the method as described in claim 1, it is characterised in that described to be solved using decipherment algorithm to the barrage information
It is close, including:
The barrage information is decrypted using decipherment algorithm TEA.decrypt (EncryptChatmessage, KEY);Its
In, the Chatmessage is the barrage information, and the KEY is the key information.
4. the method as described in claim 1, it is characterised in that described to be solved using decipherment algorithm to the barrage information
It is close, in addition to:
Additional information is extracted in the cipher-text information of the special barrage information according to the key information;
The key information and the additional information are combined to form a combination key;
The cipher-text information is converted into corresponding cleartext information using the combination key.
5. method as claimed in claim 4, it is characterised in that described to be carried according to the key information in the cipher-text information
Additional information is taken out, including:
Insertion position of the additional information in the cipher-text information is determined based on the key information;
The additional information is extracted in the insertion position of the cipher-text information.
6. method as claimed in claim 5, it is characterised in that described that the additional information is determined based on the key information
Insertion position in the cipher-text information, including:
Determine the reference position of the key information;
Obtain character of the key information with reference to position;
The character is converted into a numerical value according to default first transformation rule;
The insertion position is determined based on the numerical value.
7. method as claimed in claim 5, it is characterised in that described to be carried according to the key information in the cipher-text information
Additional information is taken out, in addition to:
Determine the length information of the key information;
Length information based on the key information determines the length information of the additional information;
The additional information is extracted based on the length information in the cipher-text information.
8. the method as described in claim 1, it is characterised in that described to be solved using decipherment algorithm to the barrage information
It is close, in addition to:
Image information is received, at least one set of color value is read from described image information, described image is to the barrage information
The encrypted result that is encrypted of cleartext information;
At least one set of color value is converted to by digital information according to the second transformation rule;
The digital information is converted into character code;
The character code is changed into the cleartext information.
9. the method as described in claim 1, it is characterised in that described to be solved using decipherment algorithm to the barrage information
It is close, in addition to:
Audio-frequency information is received, at least one audio code is read from the audio-frequency information, the audio is that cleartext information is carried out
The encrypted result of encryption;
At least one set of audio code is converted to by cleartext information according to the 3rd transformation rule.
10. a kind of client, it is characterised in that the client includes:
Receiving unit, for receiving barrage information;
Judging unit, for judging whether the barrage information is special barrage information, if the barrage information is described special
During barrage information, the key information that the reception server is sent;
Decryption unit, for the barrage information to be decrypted using decipherment algorithm based on the key information, obtains described
The cleartext information of barrage information;Wherein, the barrage information includes:Text information, image information or audio-frequency information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710211330.9A CN107105324B (en) | 2017-03-31 | 2017-03-31 | Method and client for protecting bullet screen information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710211330.9A CN107105324B (en) | 2017-03-31 | 2017-03-31 | Method and client for protecting bullet screen information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107105324A true CN107105324A (en) | 2017-08-29 |
CN107105324B CN107105324B (en) | 2020-10-16 |
Family
ID=59676190
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710211330.9A Active CN107105324B (en) | 2017-03-31 | 2017-03-31 | Method and client for protecting bullet screen information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107105324B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108024121A (en) * | 2017-11-17 | 2018-05-11 | 武汉微摇科技文化有限公司 | Voice barrage synchronous method and system |
CN108471557A (en) * | 2018-03-28 | 2018-08-31 | 武汉斗鱼网络科技有限公司 | A kind of barrage broadcasting method, device, server and medium |
CN110545452A (en) * | 2018-05-28 | 2019-12-06 | 阿里巴巴集团控股有限公司 | Network live broadcast method, device, terminal and server |
CN112995748A (en) * | 2021-01-26 | 2021-06-18 | 浙江香侬慧语科技有限责任公司 | Multi-mode-based automatic bullet screen generation method and system, storage medium and equipment |
CN114520923A (en) * | 2020-11-20 | 2022-05-20 | 武汉斗鱼网络科技有限公司 | Barrage information display method, first terminal, second terminal, medium and equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020059098A1 (en) * | 2000-11-16 | 2002-05-16 | Shinichi Sazawa | Method for managing an imaginary store, method for using the imaginary store, and recording medium in which an imaginary store managing program is stored |
CN101582157A (en) * | 2009-03-06 | 2009-11-18 | 中山大学 | Adaptive spatial steganographic method based on adjacent pixel difference |
CN103646068A (en) * | 2013-12-04 | 2014-03-19 | Tcl集团股份有限公司 | Encryption method, decryption method, method for group messaging and corresponding devices thereof |
CN105898456A (en) * | 2015-12-02 | 2016-08-24 | 乐视网信息技术(北京)股份有限公司 | Multimedia playback interaction method and device |
CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
CN106506487A (en) * | 2016-11-03 | 2017-03-15 | 武汉斗鱼网络科技有限公司 | A kind of information Encrypt and Decrypt method and device |
-
2017
- 2017-03-31 CN CN201710211330.9A patent/CN107105324B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020059098A1 (en) * | 2000-11-16 | 2002-05-16 | Shinichi Sazawa | Method for managing an imaginary store, method for using the imaginary store, and recording medium in which an imaginary store managing program is stored |
CN101582157A (en) * | 2009-03-06 | 2009-11-18 | 中山大学 | Adaptive spatial steganographic method based on adjacent pixel difference |
CN103646068A (en) * | 2013-12-04 | 2014-03-19 | Tcl集团股份有限公司 | Encryption method, decryption method, method for group messaging and corresponding devices thereof |
CN105898456A (en) * | 2015-12-02 | 2016-08-24 | 乐视网信息技术(北京)股份有限公司 | Multimedia playback interaction method and device |
CN106231115A (en) * | 2016-08-29 | 2016-12-14 | 深圳市金立通信设备有限公司 | A kind of information protecting method and terminal |
CN106506487A (en) * | 2016-11-03 | 2017-03-15 | 武汉斗鱼网络科技有限公司 | A kind of information Encrypt and Decrypt method and device |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108024121A (en) * | 2017-11-17 | 2018-05-11 | 武汉微摇科技文化有限公司 | Voice barrage synchronous method and system |
CN108024121B (en) * | 2017-11-17 | 2020-02-07 | 武汉微摇科技文化有限公司 | Voice barrage synchronization method and system |
CN108471557A (en) * | 2018-03-28 | 2018-08-31 | 武汉斗鱼网络科技有限公司 | A kind of barrage broadcasting method, device, server and medium |
CN110545452A (en) * | 2018-05-28 | 2019-12-06 | 阿里巴巴集团控股有限公司 | Network live broadcast method, device, terminal and server |
CN110545452B (en) * | 2018-05-28 | 2022-04-12 | 阿里巴巴集团控股有限公司 | Network live broadcast method, device, terminal and server |
CN114520923A (en) * | 2020-11-20 | 2022-05-20 | 武汉斗鱼网络科技有限公司 | Barrage information display method, first terminal, second terminal, medium and equipment |
CN114520923B (en) * | 2020-11-20 | 2023-09-01 | 武汉斗鱼网络科技有限公司 | Barrage information display method, first terminal, second terminal, medium and equipment |
CN112995748A (en) * | 2021-01-26 | 2021-06-18 | 浙江香侬慧语科技有限责任公司 | Multi-mode-based automatic bullet screen generation method and system, storage medium and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN107105324B (en) | 2020-10-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107105324A (en) | A kind of method and client of protection barrage information | |
CN105719120B (en) | A method of encryption express delivery list privacy information | |
Ahvanooey et al. | AITSteg: An innovative text steganography technique for hidden transmission of text message via social media | |
CN103684760B (en) | The encryption of communication and the method, apparatus of decryption and system | |
Abdullah et al. | New approaches to encrypt and decrypt data in image using cryptography and steganography algorithm | |
EP2832102B1 (en) | Methods and systems for cryptographic access control of video | |
CN104680077B (en) | Method for encrypting picture, method for viewing picture, system and terminal | |
CN106506487A (en) | A kind of information Encrypt and Decrypt method and device | |
CN107155113B (en) | Method and server for protecting bullet screen information | |
CN106330976A (en) | Information encryption and decryption method and device | |
JP6346942B2 (en) | Blocking password attacks | |
CN102970530B (en) | Graphic interchange format (GIF) image encryption method based on compressed encoding | |
CN110210270A (en) | Two-dimensional barcode information safety encryption and system and image in 2 D code analytic method and system | |
JP2014011762A (en) | Information processing apparatus, terminal device, information processing system, method for information processing, and computer program | |
US7219229B2 (en) | Protected communication system | |
CN103646068B (en) | Encryption method, decryption method, the method for sending bulk message and its corresponding intrument | |
US7995748B2 (en) | Method and apparatus for providing ecryption/decryption using two sequences of numbers | |
CN105119923B (en) | A kind of information decoding method and terminal | |
CN109214488B (en) | Method and system for information transmission based on graphic coded data | |
CN114357524B (en) | Electronic document processing method and device | |
CN112399027A (en) | Picture encryption and decryption method and device, storage medium and electronic equipment | |
CN103250372A (en) | Obtaining a control word to reveal a client device identity | |
Saeed et al. | A record composition/decomposition attack on the NDEF signature record type definition | |
CN105553676B (en) | With the Beidou serial port communication method of equipment authentication function and transmission, reception device | |
CN108055271A (en) | Encryption and decryption approaches, storage medium and the electronic equipment of Email |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |