CN107613316A - A kind of network direct broadcasting plug-flow verification method and system - Google Patents

A kind of network direct broadcasting plug-flow verification method and system Download PDF

Info

Publication number
CN107613316A
CN107613316A CN201710801661.8A CN201710801661A CN107613316A CN 107613316 A CN107613316 A CN 107613316A CN 201710801661 A CN201710801661 A CN 201710801661A CN 107613316 A CN107613316 A CN 107613316A
Authority
CN
China
Prior art keywords
main broadcaster
client
plug
flow
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710801661.8A
Other languages
Chinese (zh)
Other versions
CN107613316B (en
Inventor
周志刚
张文明
陈少杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiao Hua
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710801661.8A priority Critical patent/CN107613316B/en
Publication of CN107613316A publication Critical patent/CN107613316A/en
Application granted granted Critical
Publication of CN107613316B publication Critical patent/CN107613316B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention, which provides a kind of network direct broadcasting plug-flow verification method and system, methods described, to be included:S1, according to the request of main broadcaster's client, plug-flow address and plug-flow code are issued to main broadcaster's client, wherein, the plug-flow code includes multiple critical fielies;S2, the Video stream information that main broadcaster's client is reported by plug-flow address is received, plug-flow code and main broadcaster's client-side information are carried in the Video stream information;S3, multiple critical fielies and main broadcaster's client-side information in the plug-flow code reported to main broadcaster's client verify, and when verification passes through, then allow the plug-flow of main broadcaster's client, otherwise, refuse the plug-flow of main broadcaster's client.The present invention devises a sets of plan to be protected to the plug-flow process of network direct broadcasting, so as to prevent hacker attacks or plug-flow address is compromised and it is live to cause non-main broadcaster to carry out, so as to some live illegal contents, damage the interests of main broadcaster.

Description

A kind of network direct broadcasting plug-flow verification method and system
Technical field
The present invention relates to network direct broadcasting technical field, more particularly, to a kind of network direct broadcasting plug-flow verification method and is System.
Background technology
At present, network direct broadcasting is live using internet and stream media technology progress that main broadcaster's client, which passes through, gathers shooting The data of head, and data are subjected to Video coding, by the CDN (Content of the pushing video streaming of coding to live platform Delivery Network, content delivery network service device) server.Other spectators then can pull video flowing from CDN server Watched.
It can be registered in live platform for each main broadcaster, so as to which live platform can give each main broadcaster to distribute one Room number and a plug-flow address, the live caused video flowing of main broadcaster can then be pushed to live platform CDN by plug-flow address Server.
In practice, live Platform Server be easy to the plug-flow address that main broadcaster's client issues by hacker attacks or Leakage, so as to cause non-main broadcaster progress live, may some live illegal contents, damage the interests of main broadcaster.
The content of the invention
The present invention provides a kind of network direct broadcasting plug-flow for overcoming above mentioned problem or solving the above problems at least in part and tested Method and system are demonstrate,proved, overcome the unsafe problem of network direct broadcasting of prior art.
According to the first aspect of the invention, there is provided a kind of network direct broadcasting plug-flow verification method, including:
S1, according to the request of main broadcaster's client, plug-flow address and plug-flow code are issued to main broadcaster's client, wherein, it is described to push away Stream code includes multiple critical fielies;
S2, the Video stream information that main broadcaster's client is reported by plug-flow address is received, is carried in the Video stream information Plug-flow code and main broadcaster's client-side information;
S3, multiple critical fielies and main broadcaster's client-side information in the plug-flow code reported to main broadcaster's client carry out school Test, when verification passes through, then the plug-flow of permission main broadcaster's client, otherwise, refuses the plug-flow of main broadcaster's client.
Beneficial effects of the present invention are:Main broadcaster's client to server during live plug-flow is carried out, server meeting Plug-flow code is issued to main broadcaster's client, wherein, plug-flow code includes multiple critical fielies, when main broadcaster's user end to server plug-flow When, plug-flow code and main broadcaster's client-side information can be reported to server, server can be to plug-flow code and main broadcaster client in the lump Client information is verified, and after only verification passes through, just allows main broadcaster's user end to server to carry out plug-flow, network direct broadcasting is pushed away Stream process is protected, so as to prevent hacker or plug-flow address is compromised and it is live to cause non-main broadcaster to carry out, so as to Some live illegal contents of energy, damage the interests of main broadcaster.
On the basis of above-mentioned technical proposal, the present invention can also improve as follows.
Further, multiple critical fielies in the plug-flow code include server generation plug-flow code plaintext timestamp, The timestamp after server node path values and encryption after the public key Key values of asymmetric encryption, encryption.
Further, the step S1 also includes:
Using rivest, shamir, adelman generate corresponding to public key Key values and private key Key values, and using public key key values to take The plaintext timestamp of business device generation plug-flow code is encrypted, the timestamp formed after encryption;
Server node path values are encrypted using symmetric encipherment algorithm, the server node path formed after encryption Value;
After the server node path values after plaintext timestamp, the public key Key values of asymmetric encryption, encryption and encryption Timestamp composition plug-flow code, and packing is handed down to main broadcaster's client after being encrypted.
Further, the step S2 also includes:
The plug-flow code that main broadcaster's client issues according to server, obtain plug-flow code in plaintext timestamp, encryption after when Between stamp and server node path values and public key Key values, and obtain main broadcaster's client-side information, wherein, main broadcaster's client Information includes main broadcaster's client ip address, main broadcaster's client token Token and the unique ID of main broadcaster's client device;
After being encrypted using public key Key values to the timestamp after plaintext timestamp, encryption and main broadcaster's client-side information, carry Video stream information is formed in video flowing, and according to server node path values, is reported Video stream information by plug-flow address To server.
Further, the step S3 also includes:
Server receives the Video stream information that main broadcaster's client reports, using private key Key values corresponding with public key key values Be decrypted, therefrom obtain the P address of main broadcaster's client, main broadcaster's client token Token, the unique ID of main broadcaster's client device, Plaintext timestamp and encryption times stamp.
Further, the step S3 further comprises:
Respectively to main broadcaster's client token Token, main broadcaster's client ip address, the unique ID of main broadcaster's client device and bright Literary timestamp and encryption times stamp verified, if checking by, allow main broadcaster's user end to server plug-flow, otherwise, Refuse main broadcaster's user end to server plug-flow.
Further, it is described that main broadcaster's client token Token, main broadcaster's client ip address, main broadcaster's client are set respectively Standby unique ID and timestamp and encryption times stamp carry out checking and further comprised:
Compared with main broadcaster's client token Token is handed down into the token Token of main broadcaster's client with server, if one Cause, be then verified, otherwise, checking does not pass through;
Encryption times stamp is decrypted using private key Key values, decryption time stamp is obtained, when decryption time is stabbed with plaintext Between stab and contrasted, if unanimously, being verified, otherwise, checking does not pass through;
Judge main broadcaster's client ip address and main broadcaster to main broadcaster's platform register when IP address or with the main broadcaster last time Whether the IP address when main broadcaster's client is live is consistent, if unanimously, being verified, otherwise, short-message verification is carried out, according to short The result of letter checking determines this time to verify whether to pass through;
Judge the unique ID of main broadcaster's client device whether with main broadcaster to main broadcaster's platform register when the unique ID of equipment whether one Cause, if unanimously, being verified, otherwise, carry out short-message verification, determine this time to verify whether to lead to according to the result of short-message verification Cross.
Further, the step S3 also includes:
When server receives the Video stream information that main broadcaster's client reports, current time stamp is obtained;
The current time stamp of acquisition and decryption time stamp are contrasted, if time tolerance within a preset range, is tested Card passes through, and otherwise, checking does not pass through.
According to the second aspect of the invention, a kind of network direct broadcasting plug-flow checking system, including main broadcaster's client are additionally provided And server, the server include issuing module, receiving module and authentication module;
Module is issued, for the request according to main broadcaster's client, plug-flow address and plug-flow code are issued to main broadcaster's client, its In, the plug-flow code includes multiple critical fielies;
Receiving module, the Video stream information reported for receiving main broadcaster's client by plug-flow address, the video flowing letter Plug-flow code and main broadcaster's client-side information are carried in breath;
Authentication module, for being verified to multiple critical fielies in plug-flow code and main broadcaster's client-side information, work as school Test by then allowing the plug-flow of main broadcaster's client, otherwise, refusing the plug-flow of main broadcaster's client.
According to the third aspect of the present invention, a kind of non-transient computer readable storage medium storing program for executing is additionally provided, it is described non-temporary State computer-readable recording medium storage computer instruction, the computer instruction make the computer perform as above network direct broadcasting Plug-flow verification method.
Brief description of the drawings
Fig. 1 is the network direct broadcasting plug-flow verification method flow chart of one embodiment of the invention;
Fig. 2 is that the network direct broadcasting plug-flow of another embodiment of the present invention verifies that system connects block diagram;
Fig. 3 is that the network direct broadcasting plug-flow of another embodiment of the invention verifies that system is connected block diagram;
Fig. 4 connects frame for the inside of authentication module in the network direct broadcasting plug-flow checking system of further embodiment of the present invention Figure;
Fig. 5 is that the equipment of the network direct broadcasting plug-flow verification method of another embodiment of the invention connects block diagram.
Embodiment
With reference to the accompanying drawings and examples, the embodiment of the present invention is described in further detail.Implement below Example is used to illustrate the present invention, but is not limited to the scope of the present invention.
Referring to Fig. 1, there is provided the network direct broadcasting plug-flow verification method of one embodiment of the invention, including:S1, according to main broadcaster The request of client, plug-flow address and plug-flow code are issued to main broadcaster's client, wherein, the plug-flow code includes multiple keywords Section;S2, the Video stream information that main broadcaster's client is reported by plug-flow address is received, plug-flow code is carried in the Video stream information With main broadcaster's client-side information;S3, multiple critical fielies in plug-flow code and main broadcaster's client-side information are verified, work as verification By then allowing the plug-flow of main broadcaster's client, otherwise, refusing the plug-flow of main broadcaster's client.
In network direct broadcasting field, data are carried out Video coding by main broadcaster's client by the data of acquisition camera, will Video stream data after coding pushes to the CDN server of live platform.When main broadcaster's user end to server carries out plug-flow, clothes Business device can issue plug-flow address to main broadcaster's client, and main broadcaster's client carries out plug-flow, the plug-flow by plug-flow address to server Address easily by hack or is compromised, and causes live loss.
Therefore, the present embodiment provides a set of method that can prevent plug-flow address from being invaded, and the main of this method was realized Cheng Wei, when main broadcaster is registered as main broadcaster in live platform, main broadcaster can carry out the registration of username and password on live platform, Including inserting phone number and the registration of identity card real name.After succeeding in registration, live platform can distribute a room number to main broadcaster, It is live in this room to indicate after main broadcaster.Meanwhile server can also distribute a plug-flow address, sign main broadcaster visitor to main broadcaster Family end plug-flow is to the address of CDN server.When main broadcaster starts live, according to the request of main broadcaster's client, to main broadcaster's client Plug-flow address and plug-flow code are issued, wherein, plug-flow code includes multiple critical fielies, and the plurality of field is used for subsequent check.Clothes Business device receives the Video stream information that main broadcaster's client is reported by plug-flow address, wherein, plug-flow code is carried in Video stream information With main broadcaster's client-side information.Server verifies to multiple critical fielies in plug-flow code and main broadcaster's client-side information, if Verification passes through, then allows main broadcaster's user end to server plug-flow, if verification is by the way that refusal main broadcaster's user end to server pushes away Stream.
The present embodiment devises a sets of plan to be protected to the plug-flow process of network direct broadcasting, so as to prevent hacker or Plug-flow address is compromised and to cause non-main broadcaster to carry out live, so as to some live illegal contents, damages the profit of main broadcaster Benefit.
On the basis of above-described embodiment, in one embodiment of the present of invention, multiple critical fielies in the plug-flow code The server node path after the plaintext timestamp of plug-flow code, the public key Key values of asymmetric encryption, encryption is generated including server Timestamp after value and encryption.
Wherein, server issues plug-flow code to main broadcaster's client, and plug-flow code includes multiple critical fielies, multiple keywords Section includes the server node road after the plaintext timestamp of server generation plug-flow code, the public key Key values of asymmetric encryption, encryption Timestamp after footpath value and encryption.
On the basis of above-mentioned each embodiment, in an alternative embodiment of the invention, the step S1 also includes:Utilize Public key Key values and private key Key values corresponding to rivest, shamir, adelman generation, and plug-flow is generated to server using public key key values The plaintext timestamp of code is encrypted, the timestamp formed after encryption;Server node path is entered using symmetric encipherment algorithm Row encryption, the server node path values formed after encryption;Server by plaintext timestamp, asymmetric encryption public key Key values, Timestamp composition plug-flow code after server node path values and encryption after encryption, and packed after being encrypted and be handed down to master Broadcast client.
The legitimacy verifies for being mainly designed to complete main broadcaster's client of plug-flow code, it is in order at the angle design of security. Wherein, multiple fields are mainly included in plug-flow code, it is specific as follows:
Time&Key&ServerPath&EncryptTime;
Wherein, Time fields are the plaintext timestamps of server generation plug-flow code, and Key fields are one that server issues The public key Key values of asymmetric encryption, wherein, when server generates plug-flow code every time, then it can generate a pair of encryption keys, and by public affairs Key Key values are handed down to main broadcaster's client, secondary public key key values, then correspond to the Key values in plug-flow code.Using public key Key values to Time Field is encrypted, so as to generate the timestamp after encryption, i.e. EncryptTime fields.ServerPath fields are then by taking It is engaged in specific CDN node path on device, using the result after public key encryption, hence in this plug-flow code, server therein Need what is encrypted during the timestamp of CDN node path and plug-flow code.
In the present embodiment, the detailed process of server generation plug-flow code, because the field that plug-flow code includes has in plain text The timestamp after server node path values and encryption after timestamp, plug-flow Key values, encryption.Therefore, server obtains first Current time stamp Time during generation plug-flow code is taken, then, server can use rivest, shamir, adelman to generate a pair of Key, tool Body is a public key Key value and a private key Key value.In the present embodiment, rivest, shamir, adelman uses RSA Algorithm, according to RSA.CreatePairKey (SecretKey, PublicKey) generates a public key Key value and a private key Key value, subsequently Data can be encrypted using public key Key values, be decrypted using corresponding private key Key values.
Then, using public key come encrypting plaintext timestamp, EncryptTime=RSA.Encrypt (Time, PublicKey), current time stamp is encrypted using public key by calling RSA Algorithm Encrypt.Meeting in plug-flow code Subsidiary encryption times stamp is to prevent main broadcaster's modification time stamp from bypassing follow-up verification.
Wherein, server CDN node path is encrypted, specially ServerPath=Encrypt (Path, PublicKey), wherein Path is then the node path in CDN server.Then this node path is added using public key CDN node path values that are close, being formed after encryption.In the present embodiment, CDN node path is added using symmetric encipherment algorithm It is close, can be then specifically TEA AESs or des encryption algorithm etc., main broadcaster's client can then use same symmetric cryptography The path of node is decrypted algorithm.
After server generates above-mentioned multiple fields, after plaintext timestamp, the public key Key values of asymmetric encryption, encryption Timestamp composition plug-flow code after server node path values and encryption, and beaten after plug-flow code and plug-flow address are encrypted Bag is handed down to main broadcaster's client.
On the basis of above-mentioned each embodiment, in one embodiment of the present of invention, the step S2 also includes:Main broadcaster visitor The plug-flow code that family end issues according to server, obtain the plaintext timestamp in plug-flow code, the timestamp and server after encryption Node path value and public key Key values, and main broadcaster's client-side information is obtained, wherein, main broadcaster's client-side information includes main broadcaster visitor Family end IP address, main broadcaster's client token Token and the unique ID of main broadcaster's client device;During using public key Key values to plaintext Between after timestamp after stamp, encryption and the encryption of main broadcaster's client-side information, be carried in video flowing and form Video stream information, and root According to server node path values, Video stream information is reported by server by plug-flow address.
The plug-flow code of generation and plug-flow address are handed down to main broadcaster's client by server, and main broadcaster's client is obtained in plug-flow code Plaintext timestamp, the timestamp after encryption, the server node path values and public key Key values of encryption, and it is objective to obtain main broadcaster Family client information.Wherein, main broadcaster's client-side information mainly include main broadcaster's client ip address, main broadcaster's client token Token and The unique ID of main broadcaster's client device.Public key Key values in the plug-flow code that main broadcaster's client is issued using server are under server Timestamp and main broadcaster's client-side information after the plaintext timestamp of hair, encryption are encrypted, and the information after encryption is carried on Video stream information is formed in video flowing, Video stream information is pushed on server by plug-flow address corresponding with node path value Node.
On the basis of above-mentioned individual embodiment, in an alternative embodiment of the invention, the step S3 further comprises:Point It is other to main broadcaster's client token Token, main broadcaster's client ip address, the unique ID of main broadcaster's client device and plaintext timestamp and Encryption times stamp is verified, if checking is by allowing main broadcaster's user end to server plug-flow, otherwise, refusal main broadcaster is objective Family end is to server plug-flow.
After Video stream information is reported server by main broadcaster's client, private key corresponding to server use is decrypted, and obtains Stabbed to main broadcaster's client-side information and plaintext timestamp and encryption times.Server is respectively to main broadcaster's client token Token, master Broadcast client ip address, the unique ID of main broadcaster's client device and plaintext timestamp and encryption times stamp is verified, if verification By, then allow main broadcaster's user end to server plug-flow, as long as an item data therein verification failure, then verification can't pass, Then refuse main broadcaster's user end to server plug-flow.
The plug-flow code and main broadcaster's client-side information that the present embodiment issues to server verify, and verification passes through, and just permit Perhaps main broadcaster's user end to server plug-flow, otherwise, main broadcaster's user end to server plug-flow is not allowed, this prevents due to pushing away Address is flowed by the illegal plug-flow of the carry out such as hacker attacks or leakage, damages the interests of main broadcaster.
On the basis of above-mentioned each embodiment, in an alternative embodiment of the invention, server is respectively to main broadcaster client End token Token, main broadcaster's client ip address, the unique ID of main broadcaster's client device and plaintext timestamp and encryption times stab into The detailed process of row verification is that main broadcaster's client token Token and server are handed down to main broadcaster's client token by server Token is compared, if unanimously, being verified, otherwise, checking does not pass through.
Encryption times stamp is decrypted using private key Key values, decryption time stamp is obtained, when decryption time is stabbed with plaintext Between stab and contrasted, if unanimously, being verified, if plaintext timestamp and decryption timestamp are inconsistent, show the plaintext time Stamp may be changed by hacker, and hacker is easy to change the timestamp of plaintext, and can not change encryption times stamp.Therefore, taking Both include plaintext timestamp in the plug-flow code that business device issues to main broadcaster's client, also stabbed including encryption times.In main broadcaster's client, Hacker can change plaintext timestamp, but can not change encryption times stamp, and therefore, what main broadcaster's user end to server reported adds Close timestamp is accurate, and the plaintext timestamp reported is likely to be modified, therefore server is by main broadcaster's client Plaintext timestamp and the encryption times stamp of report are compared, and unanimously, then show that plaintext timestamp is not changed, if inconsistent, Show that plaintext timestamp has been tampered with.
Judge main broadcaster's client ip address and main broadcaster to main broadcaster's platform register when IP address or with the main broadcaster last time Whether the IP address when main broadcaster's client is live is consistent, if unanimously, being verified, otherwise, short-message verification is carried out, according to short The result of letter checking determines this time to verify whether to pass through.Similarly, judge whether the unique ID of equipment of main broadcaster's client is objective with main broadcaster Family end to main broadcaster's platform register when the unique ID of equipment it is whether consistent, if unanimously, being verified, otherwise, carry out short-message verification, Determine this time to verify whether to pass through according to the result of short-message verification.Even the IP address of main broadcaster's client gives master with server-assignment Broadcast client IP address is inconsistent or the unique ID of main broadcaster's client device and main broadcaster's client to main broadcaster's platform register when The unique ID of equipment is inconsistent, then sends short-message verification to the cell phone of main broadcaster, prevents main broadcaster's plug-flow code is usurped from directly carrying out directly Broadcast, just allow to carry out live plug-flow as long as receiving the correct short-message verification of main broadcaster's transmission.
On the basis of above-mentioned each embodiment, in one embodiment of the present of invention, the step S3 also includes:Work as service When device receives the Video stream information that main broadcaster's client reports, current time stamp is obtained;By the current time stamp of acquisition and decryption Timestamp is contrasted, if time tolerance within a preset range, is verified, otherwise, checking does not pass through.
In the present embodiment, server can also stab decryption time and current time stamp is compared, and judge two times Within a preset range whether the difference of stamp.Specifically, after server receives the Video stream information that main broadcaster's client reports, from regarding Encryption times stamp is obtained in frequency stream information, private key corresponding to encryption times stamp use is decrypted, obtains decryption time stamp.This When server also obtain current time stamp, calculate current time stamp and decrypt the difference between timestamp, if the difference is default In the range of, such as, the difference then allowed main broadcaster's user end to server plug-flow within 5 minutes, otherwise, refused main broadcaster client Hold to server plug-flow.Now, main broadcaster's client is needed to the new plug-flow code of server re-request.
Referring to Fig. 2, there is provided the network direct broadcasting plug-flow checking system of another embodiment of the present invention, including main broadcaster's client 1 and server 2, wherein, server 2 includes issuing module 21, receiving module 22 and authentication module 23.
Module 21 is issued, for the request according to main broadcaster's client, plug-flow address and plug-flow are issued to main broadcaster's client 1 Code, wherein, the plug-flow code includes multiple critical fielies.
Receiving module 22, the Video stream information reported for receiving main broadcaster's client 1 by plug-flow address, the video flowing Plug-flow code and main broadcaster's client-side information are carried in information.
Authentication module 23, for being verified to multiple critical fielies in plug-flow code and main broadcaster's client-side information, when Verification passes through, then allows the plug-flow of main broadcaster's client 1, otherwise, the plug-flow of refusal main broadcaster client 1.
Wherein, multiple critical fielies in plug-flow code include server generation plug-flow code plaintext timestamp, it is asymmetric plus The timestamp after server node path values and encryption after close public key Key values, encryption.
Referring to Fig. 3, also include the first encrypting module 24 and the second encrypting module 25 in server 2.Wherein, the first encryption mould Block 24, for utilizing public key Key values and private key Key values corresponding to rivest, shamir, adelman generation, and using public key key values to clothes The timestamp that business device 2 generates plug-flow code is encrypted, the timestamp formed after encryption.
Second encrypting module 25, for server CDN node path to be encrypted using symmetric encipherment algorithm, formed and added Server node path values after close.
Accordingly, module 21 is issued, is additionally operable to the clothes after plaintext timestamp, the public key Key values of asymmetric encryption, encryption Timestamp composition plug-flow code after device node path value of being engaged in and encryption, and packed after being encrypted and be handed down to main broadcaster's client.
As shown in figure 3, acquisition module 11 and reporting module 12 are specifically included in main broadcaster's client 1, wherein, acquisition module 11, for the plug-flow code issued according to server 2, obtain the plaintext timestamp in plug-flow code, the timestamp after encryption and public affairs Key Key values, and main broadcaster's client-side information is obtained, wherein, main broadcaster's client-side information includes main broadcaster's client ip address, main broadcaster The client token Token and unique ID of main broadcaster's client device.
Reporting module 12, for using public key Key values to the timestamp and main broadcaster's client-side information after timestamp, encryption After encryption, it is carried in video flowing and forms Video stream information, and server is reported by plug-flow address.
As shown in figure 3, server 2 also includes deciphering module 26, the video flowing letter reported for receiving main broadcaster's client 1 Breath, is decrypted using private key Key values corresponding with public key key values, therefrom obtains main broadcaster's client ip address, main broadcaster's client Token Token, the unique ID of main broadcaster's client device, plaintext timestamp and encryption times stamp.
Referring to Fig. 4, authentication module 23 includes the first authentication unit 231, the second authentication unit 232, the 3rd authentication unit 233rd, the 4th authentication unit 234 and the 5th authentication unit 235.
Wherein, authentication module 23, specifically for respectively to main broadcaster's client token Token, main broadcaster's client ip address, master Broadcast the unique ID of client device and plaintext timestamp and encryption times stamp is verified, if checking is by allowing main broadcaster Otherwise client 1, refuses main broadcaster's client 1 to the plug-flow of server 2 to the plug-flow of server 2.
First authentication unit 231, for main broadcaster's client token Token and server 2 to be handed down into main broadcaster's client Token Token is compared, if unanimously, being verified, otherwise, checking does not pass through.
Second authentication unit 232, for encryption times stamp to be decrypted using private key Key values, decryption time stamp is obtained, Decryption time is stabbed and contrasted with plaintext timestamp, if unanimously, being verified, otherwise, checking does not pass through.
3rd authentication unit 233, for verify main broadcaster's client ip address and main broadcaster to main broadcaster's platform register when IP Whether location or IP address with main broadcaster's last time when main broadcaster's client is live are consistent, no if unanimously, being verified Then, short-message verification is carried out, determines this time to verify whether to pass through according to the result of short-message verification.
4th authentication unit 234, for verify the unique ID of main broadcaster's client device whether with main broadcaster to main broadcaster's platform register When the unique ID of equipment it is whether consistent, if unanimously, being verified, otherwise, carry out short-message verification, according to the result of short-message verification It is determined that this time verify whether to pass through.
5th authentication unit 235, for the current time stamp of acquisition and decryption time stamp to be contrasted, if timestamp is poor Value within a preset range, then be verified, otherwise, checking not by, wherein, the current time stamp refers to that server receives The time during Video stream information that main broadcaster's client reports.
Referring to Fig. 5, the structured flowchart of the equipment of the network direct broadcasting plug-flow verification method of the embodiment of the present application is shown.
Reference picture 5, the equipment of network direct broadcasting plug-flow verification method include:Processor (processor) 501, memory (memory) 502 and bus 503;Wherein, the processor 501 and memory 502 are completed mutual by the bus 503 Communication.
The processor 501 is used to call the programmed instruction in the memory 502, to perform above-mentioned each method embodiment The method provided, such as including:According to the request of main broadcaster's client, plug-flow address and plug-flow code are issued to main broadcaster's client, Wherein, the plug-flow code includes multiple critical fielies;The Video stream information that main broadcaster's client is reported by plug-flow address is received, Plug-flow code and main broadcaster's client-side information are carried in the Video stream information;To multiple critical fielies in plug-flow code and main broadcaster Client-side information is verified, and when verification passes through, then the plug-flow of permission main broadcaster's client, otherwise, refuses pushing away for main broadcaster's client Stream.
The present invention discloses a kind of computer program product, and the computer program product can including being stored in non-transient computer The computer program in storage medium is read, the computer program includes programmed instruction, when programmed instruction is computer-executed, meter Calculation machine is able to carry out the network direct broadcasting plug-flow verification method that above-mentioned corresponding embodiment is provided, such as including:According to main broadcaster client The request at end, plug-flow address and plug-flow code are issued to main broadcaster's client, wherein, the plug-flow code includes multiple critical fielies; The Video stream information that main broadcaster's client is reported by plug-flow address is received, plug-flow code and main broadcaster are carried in the Video stream information Client-side information;Multiple critical fielies in plug-flow code and main broadcaster's client-side information are verified, when verification passes through, then permitted Perhaps the plug-flow of main broadcaster's client, otherwise, the plug-flow of main broadcaster's client is refused.
The present invention also provides a kind of non-transient computer readable storage medium storing program for executing, and the non-transient computer readable storage medium storing program for executing is deposited Computer instruction is stored up, the computer instruction makes computer perform the network direct broadcasting plug-flow authentication that above-mentioned corresponding embodiment is provided Method, such as including:According to the request of main broadcaster's client, plug-flow address and plug-flow code are issued to main broadcaster's client, wherein, it is described to push away Stream code includes multiple critical fielies;Receive the Video stream information that main broadcaster's client is reported by plug-flow address, the video flowing Plug-flow code and main broadcaster's client-side information are carried in information;To the multiple critical fielies and main broadcaster's client-side information in plug-flow code Verified, when verification passes through, then the plug-flow of permission main broadcaster's client, otherwise, refuses the plug-flow of main broadcaster's client.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above method embodiment can pass through Programmed instruction related hardware is completed, and foregoing program can be stored in a computer read/write memory medium, the program Upon execution, the step of execution includes above method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or light Disk etc. is various can be with the medium of store program codes.
The embodiments such as the equipment of network direct broadcasting plug-flow verification method described above are only schematical, wherein conduct The unit that separating component illustrates can be or may not be it is physically separate, can be as the part that unit is shown or Person may not be physical location, you can with positioned at a place, or can also be distributed on multiple NEs.Can root Factually border needs to select some or all of module therein realize the purpose of this embodiment scheme.Ordinary skill Personnel are not in the case where paying performing creative labour, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Make to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation Some Part Methods of example or embodiment.
A kind of network direct broadcasting plug-flow verification method provided by the invention and system, main broadcaster's client are carried out directly to server During broadcasting plug-flow, server can issue plug-flow code to main broadcaster's client, wherein, plug-flow code includes multiple critical fielies, When main broadcaster's user end to server plug-flow, plug-flow code and main broadcaster's client-side information can be reported server in the lump, serviced Device can verify to plug-flow code and main broadcaster's client-side information, after only verification passes through, just allow main broadcaster's client to service Device carries out plug-flow, and the plug-flow process of network direct broadcasting is protected, so as to prevent hacker or plug-flow address is compromised and is caused Non- main broadcaster carries out live, so as to some live illegal contents, damages the interests of main broadcaster.
Finally, the present processes are only preferable embodiment, are not intended to limit the scope of the present invention.It is all Within the spirit and principles in the present invention, any modification, equivalent substitution and improvements made etc., the protection of the present invention should be included in Within the scope of.

Claims (10)

  1. A kind of 1. network direct broadcasting plug-flow verification method, it is characterised in that including:
    S1, according to the request of main broadcaster's client, plug-flow address and plug-flow code are issued to main broadcaster's client, wherein, the plug-flow code Include multiple critical fielies;
    S2, the Video stream information that main broadcaster's client is reported by plug-flow address is received, plug-flow is carried in the Video stream information Code and main broadcaster's client-side information;
    S3, multiple critical fielies and main broadcaster's client-side information in the plug-flow code reported to main broadcaster's client verify, when Verification passes through, then allows the plug-flow of main broadcaster's client, otherwise, refuses the plug-flow of main broadcaster's client.
  2. 2. network direct broadcasting plug-flow verification method as claimed in claim 1, it is characterised in that multiple keys in the plug-flow code Field includes the server node after the plaintext timestamp of server generation plug-flow code, the public key Key values of asymmetric encryption, encryption Timestamp after path values and encryption.
  3. 3. network direct broadcasting plug-flow verification method as claimed in claim 2, it is characterised in that the step S1 also includes:
    Using rivest, shamir, adelman generate corresponding to public key Key values and private key Key values, and using public key key values to server The plaintext timestamp of generation plug-flow code is encrypted, the timestamp formed after encryption;
    Server node path values are encrypted using symmetric encipherment algorithm, the server node path values formed after encryption;
    By plaintext timestamp, asymmetric encryption public key Key values, encryption after server node path values and encryption after when Between stamp composition plug-flow code, and packing is handed down to main broadcaster's client after being encrypted.
  4. 4. network direct broadcasting plug-flow verification method as claimed in claim 3, it is characterised in that the step S2 also includes:
    The plug-flow code that main broadcaster's client issues according to server, obtain the plaintext timestamp in plug-flow code, the timestamp after encryption And server node path values and public key Key values, and main broadcaster's client-side information is obtained, wherein, main broadcaster's client-side information Including main broadcaster's client ip address, main broadcaster's client token Token and the unique ID of main broadcaster's client device;
    After being encrypted using public key Key values to the timestamp after plaintext timestamp, encryption and main broadcaster's client-side information, it is carried on and regards Frequency forms Video stream information in flowing, and according to server node path values, Video stream information is reported into clothes by plug-flow address Business device.
  5. 5. network direct broadcasting plug-flow verification method as claimed in claim 4, it is characterised in that the step S3 also includes:
    Server receives the Video stream information that main broadcaster's client reports, and is carried out using private key Key values corresponding with public key key values Decryption, when therefrom obtaining main broadcaster's client ip address, main broadcaster's client token Token, the unique ID of main broadcaster's client device, plaintext Between stamp and encryption times stamp.
  6. 6. network direct broadcasting plug-flow verification method as claimed in claim 5, it is characterised in that the step S3 further comprises:
    When respectively to main broadcaster's client token Token, main broadcaster's client ip address, the unique ID of main broadcaster's client device and plaintext Between stamp and encryption times stamp verified, if checking by, allow main broadcaster's user end to server plug-flow, otherwise, refusal Main broadcaster's user end to server plug-flow.
  7. 7. network direct broadcasting plug-flow verification method as claimed in claim 6, it is characterised in that described to be made respectively to main broadcaster's client Board Token, main broadcaster's client ip address, the unique ID of main broadcaster's client device and timestamp and encryption times stamp verify into One step includes:
    Compared with main broadcaster's client token Token is handed down into the token Token of main broadcaster's client with server, if unanimously, Then it is verified, otherwise, checking does not pass through;
    Encryption times stamp is decrypted using private key Key values, obtains decryption time stamp, by decryption time stamp and plaintext timestamp Contrasted, if unanimously, being verified, otherwise, checking does not pass through;
    Judge main broadcaster's client ip address and main broadcaster to main broadcaster's platform register when IP address or with main broadcaster's last time in master Broadcast client it is live when IP address it is whether consistent, if unanimously, being verified, otherwise, carry out short-message verification, tested according to short message The result of card determines this time to verify whether to pass through;
    Judge the unique ID of main broadcaster's client device whether with main broadcaster to main broadcaster's platform register when the unique ID of equipment it is whether consistent, if Unanimously, then it is verified, otherwise, carries out short-message verification, determines this time to verify whether to pass through according to the result of short-message verification.
  8. 8. network direct broadcasting plug-flow verification method as claimed in claim 7, it is characterised in that the step S3 also includes:
    When server receives the Video stream information that main broadcaster's client reports, current time stamp is obtained;
    The current time stamp of acquisition and decryption time stamp are contrasted, if time tolerance is within a preset range, checking is logical Cross, otherwise, checking does not pass through.
  9. 9. a kind of network direct broadcasting plug-flow verifies system, it is characterised in that including main broadcaster's client and server, the server bag Include and issue module, receiving module and authentication module;
    Module is issued, for the request according to main broadcaster's client, plug-flow address and plug-flow code are issued to main broadcaster's client, wherein, The plug-flow code includes multiple critical fielies;
    Receiving module, the Video stream information reported for receiving main broadcaster's client by plug-flow address, in the Video stream information Carry plug-flow code and main broadcaster's client-side information;
    Authentication module, for being verified to multiple critical fielies in plug-flow code and main broadcaster's client-side information, when verification is logical Cross, then allow the plug-flow of main broadcaster's client, otherwise, refuse the plug-flow of main broadcaster's client.
  10. 10. a kind of non-transient computer readable storage medium storing program for executing, it is characterised in that the non-transient computer readable storage medium storing program for executing is deposited Computer instruction is stored up, the computer instruction makes the computer perform the method as described in claim 1 to 8 is any.
CN201710801661.8A 2017-09-07 2017-09-07 Live network push stream verification method and system Active CN107613316B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710801661.8A CN107613316B (en) 2017-09-07 2017-09-07 Live network push stream verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710801661.8A CN107613316B (en) 2017-09-07 2017-09-07 Live network push stream verification method and system

Publications (2)

Publication Number Publication Date
CN107613316A true CN107613316A (en) 2018-01-19
CN107613316B CN107613316B (en) 2020-01-03

Family

ID=61062550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710801661.8A Active CN107613316B (en) 2017-09-07 2017-09-07 Live network push stream verification method and system

Country Status (1)

Country Link
CN (1) CN107613316B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769728A (en) * 2018-06-15 2018-11-06 京信通信系统(中国)有限公司 Live broadcasting method, device, system and computer readable storage medium
CN109862382A (en) * 2019-02-25 2019-06-07 广州虎牙信息科技有限公司 Multi-person speech method, server and computer storage medium
CN110662091A (en) * 2018-06-29 2020-01-07 武汉斗鱼网络科技有限公司 Third-party live video access method, storage medium, electronic device and system
CN111314725A (en) * 2020-02-19 2020-06-19 安徽文香信息技术有限公司 Live broadcast access method, system, equipment and computer storage medium
CN111669606A (en) * 2019-03-09 2020-09-15 苏州知了信息科技有限公司 Live broadcast system for offline and online synchronous teaching
EP4125272A1 (en) * 2021-07-30 2023-02-01 Beijing Dajia Internet Information Technology Co., Ltd. Method and apparatus for displaying page, electronic device and storage medium
EP4135331A1 (en) * 2021-08-10 2023-02-15 Beijing Dajia Internet Information Technology Co., Ltd. Method for processing live broadcast information stream, electronic device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070269047A1 (en) * 2003-10-20 2007-11-22 Aesop Corporation Information Encryption Transmission/Reception Method
CN102624740A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 Data interaction method, client and server
CN105872639A (en) * 2016-04-20 2016-08-17 乐视控股(北京)有限公司 Live broadcast method and live broadcast terminal
CN106686395A (en) * 2016-12-29 2017-05-17 北京奇艺世纪科技有限公司 Illegal-video live-broadcast detection method and system
CN106954079A (en) * 2017-03-14 2017-07-14 北京潘达互娱科技有限公司 Live record statistical method and device
CN106993201A (en) * 2017-03-17 2017-07-28 武汉斗鱼网络科技有限公司 The authorization check method and device of video playback

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070269047A1 (en) * 2003-10-20 2007-11-22 Aesop Corporation Information Encryption Transmission/Reception Method
CN102624740A (en) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 Data interaction method, client and server
CN105872639A (en) * 2016-04-20 2016-08-17 乐视控股(北京)有限公司 Live broadcast method and live broadcast terminal
CN106686395A (en) * 2016-12-29 2017-05-17 北京奇艺世纪科技有限公司 Illegal-video live-broadcast detection method and system
CN106954079A (en) * 2017-03-14 2017-07-14 北京潘达互娱科技有限公司 Live record statistical method and device
CN106993201A (en) * 2017-03-17 2017-07-28 武汉斗鱼网络科技有限公司 The authorization check method and device of video playback

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108769728A (en) * 2018-06-15 2018-11-06 京信通信系统(中国)有限公司 Live broadcasting method, device, system and computer readable storage medium
CN110662091A (en) * 2018-06-29 2020-01-07 武汉斗鱼网络科技有限公司 Third-party live video access method, storage medium, electronic device and system
CN110662091B (en) * 2018-06-29 2022-03-25 武汉斗鱼网络科技有限公司 Third-party live video access method, storage medium, electronic device and system
CN109862382A (en) * 2019-02-25 2019-06-07 广州虎牙信息科技有限公司 Multi-person speech method, server and computer storage medium
CN111669606A (en) * 2019-03-09 2020-09-15 苏州知了信息科技有限公司 Live broadcast system for offline and online synchronous teaching
CN111314725A (en) * 2020-02-19 2020-06-19 安徽文香信息技术有限公司 Live broadcast access method, system, equipment and computer storage medium
EP4125272A1 (en) * 2021-07-30 2023-02-01 Beijing Dajia Internet Information Technology Co., Ltd. Method and apparatus for displaying page, electronic device and storage medium
EP4135331A1 (en) * 2021-08-10 2023-02-15 Beijing Dajia Internet Information Technology Co., Ltd. Method for processing live broadcast information stream, electronic device

Also Published As

Publication number Publication date
CN107613316B (en) 2020-01-03

Similar Documents

Publication Publication Date Title
CN107613316A (en) A kind of network direct broadcasting plug-flow verification method and system
CN107911216B (en) Block chain transaction privacy protection method and system
KR102034449B1 (en) Method for managing and distributing content cryptographic keys in blockchain
CN110022217B (en) Advertisement media service data credible storage system based on block chain
CN100592678C (en) Key management for network elements
WO2018040758A1 (en) Authentication method, authentication apparatus and authentication system
KR101985179B1 (en) Blockchain based id as a service
CN101977190B (en) Digital content encryption transmission method and server side
JP6950745B2 (en) Key exchange device, key exchange system, key exchange method, and key exchange program
CN109242404B (en) Resume information management method, resume information management device, computer equipment and readable storage medium
CN113128999B (en) Block chain privacy protection method and device
CN105049877A (en) Encryption method and device for live and recorded broadcast interaction system
CN109151508A (en) A kind of video encryption method
CN113326541B (en) Cloud edge collaborative multi-mode private data transfer method based on intelligent contract
CN105721903A (en) Method and system for playing online videos
JP2011524676A (en) Encryption key distribution method in mobile broadcast system, method for receiving distribution of encryption key, and system therefor
CN109151507A (en) Audio/video player system and method
KR20170019308A (en) Method for providing trusted right information, method for issuing user credential including trusted right information, and method for obtaining user credential
CN102546528B (en) Stream media playing method and stream media playing equipment
CN103237010A (en) Server side for providing digital content in encryption mode
CN103237011B (en) Digital content encryption transmission method and server end
CN105868987B (en) A kind of method and system of shared information between devices
Khan et al. Buyer seller watermarking protocols issues and challenges–a survey
CN106027254A (en) Secret key use method for identity card reading terminal in identity card authentication system
CN107426589A (en) A kind of video request, video broadcasting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240105

Address after: Room 202, 1st Floor, Building 10, Huancheng West Second Street, Huancheng West Road, Panyu District, Guangzhou City, Guangdong Province, 511400

Patentee after: Xiao Hua

Address before: 430000 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4.1 Phase B1 Building 11 Building

Patentee before: WUHAN DOUYU NETWORK TECHNOLOGY Co.,Ltd.