CN107155113A - The method and server of a kind of protection barrage information - Google Patents

The method and server of a kind of protection barrage information Download PDF

Info

Publication number
CN107155113A
CN107155113A CN201710206454.8A CN201710206454A CN107155113A CN 107155113 A CN107155113 A CN 107155113A CN 201710206454 A CN201710206454 A CN 201710206454A CN 107155113 A CN107155113 A CN 107155113A
Authority
CN
China
Prior art keywords
information
barrage
key
barrage information
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710206454.8A
Other languages
Chinese (zh)
Other versions
CN107155113B (en
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710206454.8A priority Critical patent/CN107155113B/en
Publication of CN107155113A publication Critical patent/CN107155113A/en
Application granted granted Critical
Publication of CN107155113B publication Critical patent/CN107155113B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8126Monomedia components thereof involving additional data, e.g. news, sports, stocks, weather forecasts

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a kind of method of protection barrage information and server, method includes:Obtain barrage information to be sent;Whether be special barrage information, if barrage information is the special barrage information, the barrage information is encrypted using AES if judging barrage information;The barrage information after encryption is sent into client corresponding to all users, and default key information is sent into client corresponding to advanced level user;So, server is after determining that barrage information to be sent is special barrage information, then the barrage information is encrypted, and key information is only sent into client corresponding to advanced level user so that the corresponding client of advanced level user is checked after the barrage information after encryption being decrypted according to key information;Even and if domestic consumer receives the barrage information, specific content can not be also seen because of no key information, it thus can further increase the quantity of advanced level user, and then add the income of live platform.

Description

The method and server of a kind of protection barrage information
Technical field
The invention belongs to barrage technical field of information processing, more particularly to a kind of method for protecting barrage information and service Device.
Background technology
At present, with the progress and the speed-raising of broadband network of the network communications technology, network direct broadcasting has been obtained more and more Development and application.
Simultaneously with the development of barrage, barrage information causes live with preferably interactive and interesting.And live flat Increase the income of platform to be classified to user in platform, advanced level user can be escalated into by allowing user to supplement with money, so as to only allow height Level user enjoys some specific functions, such as only allows advanced level user to see some special barrage information, but existing bullet The barrage information that curtain system is sent is visible to all users, causes domestic consumer to get these special barrages easily Information, and then cause the live platform income reduction of barrage.
Based on this, the present invention provides a kind of method and server for protecting barrage information, of the prior art above-mentioned to solve Problem.
The content of the invention
The problem of existing for prior art, the embodiments of the invention provide a kind of method for protecting barrage information and service Device, is visible to all users for solving the barrage information that server is sent in the prior art, domestic consumer can also be easily Some special barrage information are got, and then cause the quantity of advanced level user to reduce, the live platform income reduction of barrage is caused Technical problem.
The present invention provides a kind of method for protecting barrage information, and methods described includes:
Obtain barrage information to be sent;
Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information, Then the barrage information is encrypted using AES;
The barrage information after encryption is sent into client corresponding to all users, and default key information is sent out Deliver to the corresponding client of advanced level user;Wherein, the barrage information after the encryption includes:Text information, image information Or audio-frequency information.
In such scheme, the barrage information is encrypted the utilization AES, including:
The barrage information is encrypted using algorithm TEA.encrypt (Chatmessage, KEY), wherein, it is described Chatmessage is the barrage information, and the KEY is the key information.
In such scheme, after the barrage information is encrypted the utilization AES, in addition to:
Obtain the first encrypted indicia position of the special barrage information;
The first encrypted indicia position is added in the barrage information of rule after encryption according to default add.
In such scheme, the barrage information is encrypted the utilization AES, in addition to:
Obtain the key information;
Additional information is generated according to the key information at random, by the key information and the additional information carry out group Close, form combination key;
The cleartext information of the special barrage information is converted to by cipher-text information according to the combination key;
The additional information is inserted in the cipher-text information according to the key information.
It is described to be inserted the additional information in the cipher-text information according to the key information in such scheme, specifically Including:
Insertion of the additional information in the cipher-text information is determined based on Obfuscating Algorithms according to the key information Position;
The insertion position that the additional information is inserted in the cipher-text information.
It is described to determine the additional information described close based on Obfuscating Algorithms according to the key information in such scheme Insertion position in literary information, including:
Determine the reference position of the key information;
Obtain character of the key information with reference to position;
The character is converted into a numerical value according to default first transformation rule;
The insertion position is determined based on the numerical value.
It is described that an additional information is generated according to the key information at random in such scheme, including:Believed according to the key Breath determines the length of the additional information generated.
In such scheme, the barrage information is encrypted the utilization AES, in addition to:
Obtain the cleartext information of the barrage information;
The cleartext information is converted into character code;
The character code is converted into corresponding digital information;
The digital information is converted to by least one set of color value according to the second transformation rule;
Image is generated by least one set of color value, what as the cleartext information was encrypted for described image adds Close result.
In such scheme, the barrage information is encrypted the utilization AES, in addition to:
Obtain the cleartext information of the barrage information;
The cleartext information is converted to by least one set of audio code according to the 3rd transformation rule;
Audio is generated by least one set of audio code;What as the cleartext information was encrypted for the audio adds Close result.
The present invention also provides a kind of server, and the server includes:
Acquiring unit, the barrage information to be sent for obtaining;
Judging unit, for judging whether the barrage information is special barrage information, if the barrage information is described Special barrage information, then the barrage information is encrypted using AES;
Transmitting element, for the barrage information after encryption to be sent into client corresponding to all users, and will be pre- If key information send client corresponding to advanced level user;Wherein, the barrage information after the encryption includes:Word Information, image information or audio-frequency information.
The invention provides a kind of method of protection barrage information and server, methods described includes:Obtain to be sent Barrage information;Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information, Then the barrage information is encrypted using AES;The barrage information after encryption is sent to all users correspondence Client, and default key information is sent into client corresponding to advanced level user;Wherein, the bullet after the encryption Curtain information includes:Text information, image information or audio-frequency information;In this way, server is determining that barrage information to be sent is After special barrage information, then the barrage information is encrypted, and key information is only sent into client corresponding to advanced level user End so that the corresponding client of advanced level user is checked after the barrage information after encryption being decrypted according to key information;And Even if domestic consumer receives the barrage information, it also can not see specific content because of no key information, thus enter one Step can increase the quantity of advanced level user, and then add the income of live platform.
Brief description of the drawings
Fig. 1 is the schematic flow sheet for the protection barrage method that the embodiment of the present invention one is provided;
Fig. 2 is the overall structure diagram for the server that the embodiment of the present invention two is provided.
Embodiment
It is visible to all users to solve the barrage information that server is sent in the prior art, causes domestic consumer Some special barrage information can be got easily, and then cause the technical problem of the live platform income reduction of barrage, the present invention Embodiment provides the method and server of a kind of protection barrage information, and methods described includes:Obtain barrage information to be sent; Whether be special barrage information, if the barrage information is the special barrage information, utilizes and add if judging the barrage information The barrage information is encrypted close algorithm;The barrage information after encryption is sent into client corresponding to all users End, and default key information is sent into client corresponding to advanced level user;Wherein, the barrage information after the encryption Including:Text information, image information or audio-frequency information.
Technical scheme is described in further detail below by drawings and the specific embodiments.
Embodiment one
The present embodiment provides a kind of method for protecting barrage information, in order to reduce the improvement cost of existing barrage system, should Method is designed based on existing barrage system, and methods described is applied to server side, as shown in figure 1, methods described Including:
S101, obtains barrage information to be sent.
In this step, barrage server is before barrage information is sent, it is necessary first to get barrage information to be sent, The barrage information includes:Common barrage information and special barrage information;In general, the special barrage information merely desires to allow height Level user sees, does not want to allow domestic consumer to see.Such as, the special barrage information can include:Favor information, advanced level user Between chat message etc..
S102, whether be special barrage information, if the barrage information is the special barrage if judging the barrage information Information, then the barrage information is encrypted using AES.
In this step, after the server gets barrage information, judged using the tag field in barrage information Whether the barrage information is special barrage information, if the barrage information is the special barrage information, in order to avoid common User is it can be seen that the information is, it is necessary to which the barrage information is encrypted using AES.Wherein, the AES can With including:TEA AESs, AES encryption algorithm and RSA cryptographic algorithms;Certainly, AES can also be it is other some add Close algorithm.The barrage information after the encryption can include the information of diversified forms, such as:Pictorial information, text information, Audio-frequency information, video information etc..
During barrage information after the encryption is text information, the present embodiment, using TEA AESs to the barrage When information is encrypted, specifically include:
The barrage information is encrypted using algorithm TEA.encrypt (Chatmessage, KEY), specific program Realize as follows:
EncryptChatmessage=TEA.encrypt (Chatmessage, KEY);
Wherein, the Chatmessage is the barrage information, and the KEY is default key information;It is described Encrypt interfaces are the encryption interfaces of TEA algorithms;The EncryptChatmessage is the barrage information after encryption.
When the barrage information is encrypted using AES encryption algorithm, specifically include:Utilize algorithm The barrage information is encrypted AES.encrypt (Chatmessage, KEY), and specific program is realized as follows:
EncryptChatmessage=AES.encrypt (Chatmessage, KEY);
Wherein, the Chatmessage is the barrage information, and the KEY is default key information;It is now described Encrypt interfaces are the encryption interfaces of aes algorithm;The EncryptChatmessage is the barrage information after encryption.
When the barrage information is encrypted using RSA cryptographic algorithms, specifically include:Utilize algorithm The barrage information is encrypted RSA.encrypt (Chatmessage, KEY), and specific program is realized as follows:
EncryptChatmessage=RSA.encrypt (Chatmessage, KEY);
Wherein, the Chatmessage is the barrage information, and the KEY is default key information;It is now described Encrypt interfaces are the encryption interfaces of RSA Algorithm;The EncryptChatmessage is the barrage information after encryption.
Here, when AES is other default AESs, the utilization AES is to the barrage information It is encrypted, in addition to:
Obtain the key information;The key is set in advance, as the password of encryption, and the key can be appointed Ideographic characters, such as:Numeral or letter etc., the number of character can include one or more;In order to improve the complexity of key, this Key in invention at least includes six characters.
, can be based on the key one additional information of generation, and at random true according to the key after key information is got The length of the fixed additional information generated, wherein, the length of the additional information can be 2~3 times of key length, and The character of additional information can include:Numeral or letter.During encryption, the key and the additional information are combined, shape Into a combination key.Specifically, exactly the character string of the character string of the key and the additional information is spliced, formed One combination key.
Such as, when key information is 12345, and the length of additional information is 2 times of key length, then generated with chance The information of one ten is used as additional information.Then key information and the information of ten generated at random are subjected to splicing group Close, form a combination key, the cleartext information of the special barrage information is then converted to by ciphertext according to the combination key Information.
After cipher-text information is got, the additional information is inserted in the cipher-text information according to the key, realized Encryption to information.
Specifically, the additional information is inserted into the cipher-text information according to the key includes:According to the key base Insertion position of the additional information in the cipher-text information is determined in Obfuscating Algorithms;Additional information insertion is described The insertion position in cipher-text information.
Insertion position of the additional information in the cipher-text information is determined based on Obfuscating Algorithms according to the key, Including;Determine the reference position of the key;Obtain character of the key with reference to position;According to default first transformation rule by institute State character and be converted to a numerical value;The insertion position is determined based on the numerical value.
Wherein, default first transformation rule be by it is described can include it is a variety of:Such as by character and decimal value pair It should change, character and ASCII character value are subjected to corresponding conversion.
When character and ASCII character value are carried out into corresponding conversion, get key it is new after, the reference position of preset-key;Obtain The key is taken with reference to the character of position;Obtain the corresponding ASCII character value of the character;, will using the ASCII character value as reference point The additional information is inserted in the cipher-text information after the position of analog value.
Here, the reference position of the key can be any bit in key, such as the first or last position;When with the end of key Position is set to the reference position of key, such as key information is 12345, then the character exactly with reference to position is exactly " 5 ", then is got " 5 " corresponding ASCII character is the position after " 53 ", the 53rd character that then additional information is inserted into cipher-text information, The information after encryption is returned, the encryption to barrage information is realized;Wherein, can if the character of cipher-text information is no so more To be replaced with zero.
Here, when the special barrage information after the encryption is pictorial information, the utilization AES is to the bullet Curtain information is encrypted, in addition to:Obtain the cleartext information of the barrage information;The cleartext information is converted into character to compile Code;The character code is converted into corresponding digital information;According to the second transformation rule by the digital information be converted to Few one group of color value;Image is generated by least one set of color value, described image is that the cleartext information is added Close encrypted result.
Specifically, the digital information is converted to by least one set of color value according to the second transformation rule, including:It is determined that every The numerical value of group digital information;The corresponding maximum stratum of each color is determined, according to corresponding numerical value maximum order corresponding with R colors Layer determines the color value of the R colors, and obtains the first surplus value;According to first surplus value maximum corresponding with G colors Stratum determines the color value of the G colors, and obtains the second surplus value;The B colors are determined based on second surplus value Color value;The color value of the color value of the R colors, the color value of G colors and the B colors is combined, obtained at least One group of (R, G, B) color value;Wherein, the R colors are red, and the G colors are green, and the B colors are blueness.
Here, before image is generated by least one set of color value, methods described also includes:Number is obscured in reception Value;According to it is described obscure that numerical value generates respective numbers at random obscure color lump;Existed based on color lump is obscured described in Obfuscating Algorithms determination Writing position in described image.
And image is generated by least one set of color value, including:It is determined that the of write-in at least one set of color value One datum mark;Using first datum mark as original position, based on the quantity for obscuring color lump and described color lump is obscured in institute The writing position in image is stated, at least one set of color value and the color value for obscuring color lump are write into described image successively In.
Further, based on Obfuscating Algorithms determine described in obscure writing position of the color lump in described image and include:It is based on The quantity for obscuring numerical value determines the quantity of every group of said write position;Determine the second datum mark of said write position;With Second datum mark is original position, and every group of writing position is sequentially distributed between the color block corresponding to two groups of color values.
Here, when the special barrage information after the encryption is audio-frequency information, the utilization AES is to the bullet Curtain information is encrypted, in addition to:Obtain the cleartext information of barrage information;The cleartext information is turned according to the 3rd transformation rule It is changed at least one set of audio code;Audio is generated by least one set of audio code;The audio is to the cleartext information The encrypted result being encrypted.
Specifically, it is described the cleartext information is converted to by least one set of audio code according to the 3rd transformation rule to include:Will The cleartext information is converted to character code;The character code is converted at least one set of digital information;At least one by described in Group digital information is converted at least one set of audio code.
It is described at least one set of digital information is converted at least one set of audio code to include:It is determined that per group digital information Numerical value;Determine each digital corresponding audio coding in every group digital information;Based on each digital corresponding audio Coding and the numerical value per group digital information, corresponding audio coding is converted to by every group digital information;By corresponding audio Coding is combined to form audio code.
Further, audio is generated by least one set of audio code, including:The audio code is traveled through, obtains corresponding Audio coding, the audio coding includes:First audio coding and the second audio coding;By first audio coding conversion For first frequency, second audio coding is converted into second frequency, frequency queue is obtained;Using audio generating algorithm by institute State frequency queue generation audio.
Further, after special barrage information is encrypted, in order to cause client is quickly recognized described Barrage information is special barrage information or common barrage information, and methods described also includes:Obtain the special barrage information First encrypted indicia position;First encrypted indicia is added according to default add in the barrage information of rule after encryption Position.
Here, the first encrypted indicia position can include letter, numeral that server is arranged with client etc., this implementation The first encrypted indicia position in example is digital " 1 ".When adding the first encrypted indicia position, bullet after encryption can be directly added Curtain information the first character after or ultimate character after, or can be other agreement character after.
Certainly, will not be to this if server judges current barrage information to be sent for common barrage information Barrage information is encrypted, but needs also exist for obtaining the second encrypted indicia position of the common barrage information;According to default Addition rule adds the second encrypted indicia position in common barrage information.Likewise, second encrypted indicia position can be with Letter, numeral arranged including server and client etc., the second encrypted indicia position in the present embodiment is digital " 0 ".Adding Plus during the second encrypted indicia position, can directly add after the first character of common barrage information or after ultimate character, Huo Zheke Be other agreement character after.
S103, client corresponding to all users is sent by the barrage information after encryption, and by default key Information sends client corresponding to advanced level user.
In this step, after the special barrage information is encrypted, by the barrage information after encryption send to The corresponding client of all users, and default key information is only sent into client corresponding to advanced level user so that it is described The corresponding client of advanced level user the special barrage information after the encryption can be decrypted based on the key information, be entered And special barrage information can be caused to be watched by advanced level user, so that avoiding domestic consumer watches this special barrage letter Breath.
Here, before the key information is sent into client corresponding to advanced level user, in addition to:Marked using user Note judges whether the corresponding user of active client is advanced level user, if the corresponding user of active client is advanced level user, The key information is sent to the client.Such as, the user's mark of the advanced level user can be vip fields etc..
Embodiment two
Corresponding to embodiment one, the present embodiment provides a kind of server, as shown in Fig. 2 the server includes:Obtain single Member 21, judging unit 22, transmitting element 23 and adding device 25;Wherein,
The transmitting element 23 is before barrage information is sent, and server is believed firstly the need of barrage to be sent is got Breath, the barrage information includes:Common barrage information and special barrage information;In general, the special barrage information is merely desired to Allow advanced level user to see, do not want to allow domestic consumer to see.Such as, the special barrage information can include:It is favor information, senior Chat message between user etc..
After the server gets barrage information, the judging unit 22 is used to utilize the marker word in barrage information Section judges whether the barrage information is special barrage information, if the barrage information is the special barrage information, in order to Domestic consumer is avoided it can be seen that the information, the judging unit 22 needs to add the barrage information using AES It is close.Wherein, the AES can include:TEA AESs, AES encryption algorithm and RSA cryptographic algorithms;Certainly, encryption is calculated Method can also be some other AESs.The barrage information can include the information of diversified forms, such as:Picture is believed Breath, text information, audio-frequency information, video information etc..
For text information, in the present embodiment, when the judging unit 22 using TEA AESs to the barrage When information is encrypted, specifically include:
The barrage information is encrypted using algorithm TEA.encrypt (Chatmessage, KEY), specific program Realize as follows:
EncryptChatmessage=TEA.encrypt (Chatmessage, KEY);
Wherein, the Chatmessage is the barrage information, and the KEY is default key information;It is described Encrypt interfaces are the encryption interfaces of TEA algorithms;The EncryptChatmessage is the barrage information after encryption.
When the barrage information is encrypted using AES encryption algorithm, specifically include:Utilize algorithm The barrage information is encrypted AES.encrypt (Chatmessage, KEY), and specific program is realized as follows:
EncryptChatmessage=AES.encrypt (Chatmessage, KEY);
Wherein, the Chatmessage is the barrage information, and the KEY is default key information;It is described Encrypt interfaces are the encryption interfaces of aes algorithm;The EncryptChatmessage is the barrage information after encryption.
When the barrage information is encrypted using RSA cryptographic algorithms, specifically include:Utilize algorithm The barrage information is encrypted RSA.encrypt (Chatmessage, KEY), and specific program is realized as follows:
EncryptChatmessage=RSA.encrypt (Chatmessage, KEY);
Wherein, the Chatmessage is the barrage information, and the KEY is default key information;It is now described Encrypt interfaces are the encryption interfaces of RSA Algorithm;The EncryptChatmessage is the barrage information after encryption.
Here, when AES is other default AESs, the judging unit 22 is using AES to institute Barrage information is stated to be encrypted, in addition to:
Obtain the key information;The key is set in advance, as the password of encryption, and the key can be appointed Ideographic characters, such as:Numeral or letter etc., the number of character can include one or more;In order to improve the complexity of key, this Key in invention at least includes six characters.
After the acquiring unit 21 gets key information, the judging unit 22 can at random be generated based on the key One additional information, and the length for the additional information for determining to be generated according to the key, wherein, the length of the additional information Degree can be 2~3 times of key length, and the character of additional information can include:Numeral or letter., will be described close during encryption Key and the additional information are combined, and form a combination key.Specifically, be exactly by the character string of the key with it is described attached Plus the character string of information is spliced, a combination key is formed.
Such as, when key information is 12345, and the length of additional information is 2 times of key length, then generated with chance The information of one ten is used as additional information.Then key and the information of ten that generates at random are spliced and combined, shape Into a combination key, the cleartext information of the special barrage information is then converted to by cipher-text information according to the combination key.
After cipher-text information is got, the additional information is inserted in the cipher-text information according to the key, realized Encryption to information.
Specifically, the additional information is inserted into the cipher-text information according to the key includes:According to the key base Insertion position of the additional information in the cipher-text information is determined in Obfuscating Algorithms;Additional information insertion is described The insertion position in cipher-text information.
Insertion position of the additional information in the cipher-text information is determined based on Obfuscating Algorithms according to the key, Including;Determine the reference position of the key;Obtain character of the key with reference to position;According to default first transformation rule by institute State character and be converted to a numerical value;The insertion position is determined based on the numerical value.
Wherein, default first transformation rule be by it is described can include it is a variety of:Such as by character and decimal value pair It should change, character and ASCII character value are subjected to corresponding conversion.
When character and ASCII character value are carried out into corresponding conversion, get after key, the reference position of preset-key;Obtain Character of the key with reference to position;Obtain the corresponding ASCII character value of the character;Using the ASCII character value as reference point, by institute Additional information is stated to insert in the cipher-text information after the position of analog value.
Here, the reference position of the key can be any bit in key, such as the first or last position;When with the end of key Position is set to the reference position of key, such as key information is 12345, then the character exactly with reference to position is exactly " 5 ", then is got " 5 " corresponding ASCII character is the position after " 53 ", the 53rd character that then additional information is inserted into cipher-text information, The information after encryption is returned, the encryption to barrage information is realized;Wherein, can if the character of cipher-text information is no so more To be replaced with zero.
Here, when the special barrage information after the encryption is pictorial information, the judging unit 22 utilizes default During other AESs, the barrage information is encrypted the utilization AES, in addition to:Obtain the barrage information Cleartext information;The cleartext information is converted into character code;The character code is converted into corresponding digital information;Root The digital information is converted at least one set of color value according to the second transformation rule;Pass through at least one set of color value generation figure Picture, described image is the encrypted result that the cleartext information is encrypted.
Specifically, the digital information is converted to by least one set of color value according to the second transformation rule, including:It is determined that every The numerical value of group digital information;The corresponding maximum stratum of each color is determined, according to corresponding numerical value maximum order corresponding with R colors Layer determines the color value of the R colors, and obtains the first surplus value;According to first surplus value maximum corresponding with G colors Stratum determines the color value of the G colors, and obtains the second surplus value;The B colors are determined based on second surplus value Color value;The color value of the color value of the R colors, the color value of G colors and the B colors is combined, obtained at least One group of (R, G, B) color value;Wherein, the R colors are red, and the G colors are green, and the B colors are blueness.
Here, before image is generated by least one set of color value, methods described also includes:Number is obscured in reception Value;According to it is described obscure that numerical value generates respective numbers at random obscure color lump;Existed based on color lump is obscured described in Obfuscating Algorithms determination Writing position in described image.
And image is generated by least one set of color value, including:It is determined that the of write-in at least one set of color value One datum mark;Using first datum mark as original position, based on the quantity for obscuring color lump and described color lump is obscured in institute The writing position in image is stated, at least one set of color value and the color value for obscuring color lump are write into described image successively In.
Further, based on Obfuscating Algorithms determine described in obscure writing position of the color lump in described image and include:It is based on The quantity for obscuring numerical value determines the quantity of every group of said write position;Determine the second datum mark of said write position;With Second datum mark is original position, and every group of writing position is sequentially distributed between the color block corresponding to two groups of color values.
Here, when the special barrage information after the encryption is audio-frequency information, the judging unit 22 utilizes default During other AESs, the barrage information is encrypted the utilization AES, in addition to:Obtain the bright of barrage information Literary information;The cleartext information is converted to by least one set of audio code according to the 3rd transformation rule;Pass through at least one set of sound Frequency code generates audio;The audio is the encrypted result that the cleartext information is encrypted.
Specifically, it is described the cleartext information is converted to by least one set of audio code according to the 3rd transformation rule to include:Will The cleartext information is converted to character code;The character code is converted at least one set of digital information;At least one by described in Group digital information is converted at least one set of audio code.
It is described at least one set of digital information is converted at least one set of audio code to include:It is determined that per group digital information Numerical value;Determine each digital corresponding audio coding in every group digital information;Based on each digital corresponding audio Coding and the numerical value per group digital information, corresponding audio coding is converted to by every group digital information;By corresponding audio Coding is combined to form audio code.
Further, audio is generated by least one set of audio code, including:The audio code is traveled through, obtains corresponding Audio coding, the audio coding includes:First audio coding and the second audio coding;By first audio coding conversion For first frequency, second audio coding is converted into second frequency, frequency queue is obtained;Using audio generating algorithm by institute State frequency queue generation audio.
Further, after special barrage information is encrypted, in order to cause client is quickly recognized described Barrage information is special barrage information or common barrage information, and the acquiring unit 21 is used to obtain the special barrage information The first encrypted indicia position;The adding device 24 is used for according in the default regular barrage information after encryption of addition Add the first encrypted indicia position.
Here, the first encrypted indicia position can include letter, numeral that server is arranged with client etc., this implementation The first encrypted indicia position in example is digital " 1 ".When adding the first encrypted indicia position, bullet after encryption can be directly added Curtain information the first character after or ultimate character after, or can be other agreement character after.
Certainly, if the judging unit 22 judges current barrage information to be sent for common barrage information, The barrage information will not be encrypted, but the acquiring unit 21 needs also exist for obtaining the second of the common barrage information Encrypted indicia position;The adding device 24 adds second encryption according to default addition rule in common barrage information and marked Remember position.Likewise, the second encrypted indicia position can include letter, numeral that server is arranged with client etc., this implementation The second encrypted indicia position in example is digital " 0 ".When adding the second encrypted indicia position, can directly it add in common barrage letter After the first character of breath or after ultimate character, or can be other agreement character after.
After the special barrage information is encrypted, the transmitting element 23 is used to believe the barrage after encryption Breath is sent to the corresponding client of all users, and default key information only is sent into client corresponding to advanced level user, The corresponding client of the advanced level user is entered based on the key information to the special barrage information after the encryption Row decryption, and then special barrage information can be caused to be watched by advanced level user, so that avoiding domestic consumer watches this Special barrage information.
Here, the transmitting element 23 by the key information before client corresponding to advanced level user is sent, institute Judging unit 22 is stated to be additionally operable to:Judge whether the corresponding user of active client is advanced level user using user's mark, if currently The corresponding user of client is advanced level user, and the transmitting element 23 then sends the key information to the client.Such as, Such as, the user's mark of the advanced level user can be vip fields etc..
The beneficial effect that the method and server of the protection barrage information that the present invention is provided are brought is at least:
The present invention provides the method and server of a kind of protection barrage information, and methods described includes:Obtain bullet to be sent Curtain information;Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information, The barrage information is encrypted using AES;The barrage information after encryption is sent corresponding to all users Client, and default key information is sent into client corresponding to advanced level user;Wherein, the barrage after the encryption Information includes:Text information, image information or audio-frequency information;In this way, server is determining that barrage information to be sent is spy After different barrage information, then the barrage information is encrypted, and key information is only sent into client corresponding to advanced level user, The corresponding client of advanced level user is checked after the barrage information after encryption is decrypted according to key information;And it is common Even if user receives the barrage information, it also can not see specific content because of no key information, thus further may be used To increase the quantity of advanced level user, and then add the income of live platform.Further, since being added to special barrage information It is close, the special barrage information is got even if hacker and will not also be cracked easily, the security of data transfer is further ensure that.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention, it is all Any modifications, equivalent substitutions and improvements made within the spirit and principles in the present invention etc., should be included in the protection of the present invention Within the scope of.

Claims (10)

1. a kind of method for protecting barrage information, it is characterised in that methods described includes:
Obtain barrage information to be sent;
Whether be special barrage information, if the barrage information is the special barrage information if judging the barrage information, profit The barrage information is encrypted with AES;
The barrage information after encryption is sent into client corresponding to all users, and by default key information send to The corresponding client of advanced level user;Wherein, the barrage information after the encryption includes:Text information, image information or sound Frequency information.
2. the method as described in claim 1, it is characterised in that described to be added using AES to the barrage information It is close, including:
The barrage information is encrypted using algorithm TEA.encrypt (Chatmessage, KEY), wherein, it is described Chatmessage is the barrage information, and the KEY is the key information.
3. the method as described in claim 1, it is characterised in that the barrage information is encrypted the utilization AES Afterwards, in addition to:
Obtain the first encrypted indicia position of the special barrage information;
The first encrypted indicia position is added in the barrage information of rule after encryption according to default add.
4. the method as described in claim 1, it is characterised in that described to be added using AES to the barrage information It is close, in addition to:
Obtain key information;
Additional information is generated according to the key information at random, the key information is combined with the additional information, shape Into combination key;
The cleartext information of the special barrage information is converted to by cipher-text information according to the combination key;
The additional information is inserted in the cipher-text information according to the key information.
5. method as claimed in claim 4, it is characterised in that described to be inserted the additional information according to the key information In the cipher-text information, specifically include:
Insertion position of the additional information in the cipher-text information is determined based on Obfuscating Algorithms according to the key information;
The insertion position that the additional information is inserted in the cipher-text information.
6. method as claimed in claim 5, it is characterised in that described to be determined according to the key information based on Obfuscating Algorithms Insertion position of the additional information in the cipher-text information, including:
Determine the reference position of the key information;
Obtain character of the key information with reference to position;
The character is converted into a numerical value according to default first transformation rule;
The insertion position is determined based on the numerical value.
7. the method as described in claim 4-6 is any, it is characterised in that described generation one is attached at random according to the key information Plus information, including:The length for the additional information for determining to be generated according to the key information.
8. the method as described in claim 1, it is characterised in that described to be added using AES to the barrage information It is close, in addition to:
Obtain the cleartext information of the barrage information;
The cleartext information is converted into character code;
The character code is converted into corresponding digital information;
The digital information is converted to by least one set of color value according to the second transformation rule;
Image is generated by least one set of color value, described image is the encryption knot that the cleartext information is encrypted Really.
9. the method as described in claim 1, it is characterised in that described to be added using AES to the barrage information It is close, in addition to:
Obtain the cleartext information of the barrage information;
The cleartext information is converted to by least one set of audio code according to the 3rd transformation rule;
Audio is generated by least one set of audio code;The audio is the encryption knot that the cleartext information is encrypted Really.
10. a kind of server, it is characterised in that the server includes:
Acquiring unit, the barrage information to be sent for obtaining;
Judging unit, for judging whether the barrage information is special barrage information, if the barrage information is described special Barrage information, then the barrage information is encrypted using AES;
Transmitting element, for the barrage information after encryption to be sent into client corresponding to all users, and will be default Key information sends client corresponding to advanced level user;Wherein, the barrage information after the encryption includes:Word is believed Breath, image information or audio-frequency information.
CN201710206454.8A 2017-03-31 2017-03-31 Method and server for protecting bullet screen information Active CN107155113B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710206454.8A CN107155113B (en) 2017-03-31 2017-03-31 Method and server for protecting bullet screen information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710206454.8A CN107155113B (en) 2017-03-31 2017-03-31 Method and server for protecting bullet screen information

Publications (2)

Publication Number Publication Date
CN107155113A true CN107155113A (en) 2017-09-12
CN107155113B CN107155113B (en) 2021-03-16

Family

ID=59793317

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710206454.8A Active CN107155113B (en) 2017-03-31 2017-03-31 Method and server for protecting bullet screen information

Country Status (1)

Country Link
CN (1) CN107155113B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108471557A (en) * 2018-03-28 2018-08-31 武汉斗鱼网络科技有限公司 A kind of barrage broadcasting method, device, server and medium
CN108769720A (en) * 2018-04-10 2018-11-06 武汉斗鱼网络科技有限公司 A kind of barrage verification method, computer equipment and storage medium
CN108769719A (en) * 2018-04-10 2018-11-06 武汉斗鱼网络科技有限公司 A kind of barrage verification method, computer equipment and storage medium
CN108769718A (en) * 2018-04-10 2018-11-06 武汉斗鱼网络科技有限公司 A kind of barrage verification method, computer equipment and storage medium
CN109788161A (en) * 2018-12-18 2019-05-21 张亦茹 A kind of image processing method and system of hiding voice data

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030026421A1 (en) * 2000-03-08 2003-02-06 Jean-Noel Morlet Method for transmitting data with digital watermark access control and devices therefor
CN101102462A (en) * 2007-01-04 2008-01-09 深圳清华大学研究院 Wireless digital TV encryption communication system based on mobile phone TV safety module and its working method
CN105653909A (en) * 2016-01-26 2016-06-08 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal, server and system
CN105848001A (en) * 2016-03-28 2016-08-10 乐视控股(北京)有限公司 Video playback control method and video playback control device
CN105898054A (en) * 2016-04-08 2016-08-24 惠州Tcl移动通信有限公司 Verification-based message display method and communication terminal
CN106231115A (en) * 2016-08-29 2016-12-14 深圳市金立通信设备有限公司 A kind of information protecting method and terminal
CN106330976A (en) * 2016-11-03 2017-01-11 武汉斗鱼网络科技有限公司 Information encryption and decryption method and device
CN106452607A (en) * 2016-11-03 2017-02-22 武汉斗鱼网络科技有限公司 Method and device for transmitting and resolving information
CN106506487A (en) * 2016-11-03 2017-03-15 武汉斗鱼网络科技有限公司 A kind of information Encrypt and Decrypt method and device
CN106534570A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Privacy protection method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030026421A1 (en) * 2000-03-08 2003-02-06 Jean-Noel Morlet Method for transmitting data with digital watermark access control and devices therefor
CN101102462A (en) * 2007-01-04 2008-01-09 深圳清华大学研究院 Wireless digital TV encryption communication system based on mobile phone TV safety module and its working method
CN105653909A (en) * 2016-01-26 2016-06-08 腾讯科技(深圳)有限公司 Information processing method, first terminal, second terminal, server and system
CN105848001A (en) * 2016-03-28 2016-08-10 乐视控股(北京)有限公司 Video playback control method and video playback control device
CN105898054A (en) * 2016-04-08 2016-08-24 惠州Tcl移动通信有限公司 Verification-based message display method and communication terminal
CN106231115A (en) * 2016-08-29 2016-12-14 深圳市金立通信设备有限公司 A kind of information protecting method and terminal
CN106330976A (en) * 2016-11-03 2017-01-11 武汉斗鱼网络科技有限公司 Information encryption and decryption method and device
CN106452607A (en) * 2016-11-03 2017-02-22 武汉斗鱼网络科技有限公司 Method and device for transmitting and resolving information
CN106506487A (en) * 2016-11-03 2017-03-15 武汉斗鱼网络科技有限公司 A kind of information Encrypt and Decrypt method and device
CN106534570A (en) * 2016-11-30 2017-03-22 广东欧珀移动通信有限公司 Privacy protection method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108471557A (en) * 2018-03-28 2018-08-31 武汉斗鱼网络科技有限公司 A kind of barrage broadcasting method, device, server and medium
CN108769720A (en) * 2018-04-10 2018-11-06 武汉斗鱼网络科技有限公司 A kind of barrage verification method, computer equipment and storage medium
CN108769719A (en) * 2018-04-10 2018-11-06 武汉斗鱼网络科技有限公司 A kind of barrage verification method, computer equipment and storage medium
CN108769718A (en) * 2018-04-10 2018-11-06 武汉斗鱼网络科技有限公司 A kind of barrage verification method, computer equipment and storage medium
CN108769720B (en) * 2018-04-10 2020-10-16 武汉斗鱼网络科技有限公司 Barrage verification method, computer equipment and storage medium
CN108769719B (en) * 2018-04-10 2020-12-15 武汉斗鱼网络科技有限公司 Barrage verification method, computer equipment and storage medium
CN109788161A (en) * 2018-12-18 2019-05-21 张亦茹 A kind of image processing method and system of hiding voice data
CN109788161B (en) * 2018-12-18 2020-01-03 张亦茹 Image processing method and system for hiding voice data

Also Published As

Publication number Publication date
CN107155113B (en) 2021-03-16

Similar Documents

Publication Publication Date Title
Zhang et al. Research on a covert communication model realized by using smart contracts in blockchain environment
CN107155113A (en) The method and server of a kind of protection barrage information
EP3676988B1 (en) Systems and methods for communication, storage and processing of data provided by an entity over a blockchain network
US20110055585A1 (en) Methods and Systems to Create Big Memorizable Secrets and Their Applications in Information Engineering
CN103778590B (en) Using digital picture storage and the method and apparatus of transmission information
CN102724041B (en) Steganography-based key transmission and key updating method
CN106411525A (en) Message authentication method and system
CN108769067A (en) A kind of authentication method of calibration, device, equipment and medium
CN101022337A (en) Network identification card realizing method
JP2016528845A (en) ID authentication system, apparatus, method, and ID authentication request apparatus
CN108768653A (en) Identity authorization system based on quantum key card
CN108154365A (en) A kind of safety equipment for generating dynamic two-dimension code, method and system
CN107294964B (en) Information transmission method
CN107809436A (en) Authority discrimination method, encryption method, the apparatus and system of Internet video access
CN108566273A (en) Identity authorization system based on quantum network
CN107105324B (en) Method and client for protecting bullet screen information
CN106598882A (en) Secure memory data protection method and device
JP6701359B2 (en) Dynamic graphical password-based network registration method and system
JP4663676B2 (en) One-time password device and system
CN105119924B (en) A kind of information transferring method
US7219229B2 (en) Protected communication system
CN107333262A (en) A kind of system and method based on CN39 code authentication phone numbers
CN108600152A (en) Modified Kerberos identity authorization systems based on quantum communication network and method
CN104753918B (en) A kind of method of mobile phone offline authentication
CN116108410A (en) Identity credential generation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant