CN107888623A - The live anti-abduction method and device of software audio and video data streams - Google Patents
The live anti-abduction method and device of software audio and video data streams Download PDFInfo
- Publication number
- CN107888623A CN107888623A CN201711373573.9A CN201711373573A CN107888623A CN 107888623 A CN107888623 A CN 107888623A CN 201711373573 A CN201711373573 A CN 201711373573A CN 107888623 A CN107888623 A CN 107888623A
- Authority
- CN
- China
- Prior art keywords
- authorization code
- access request
- client
- url addresses
- transmission times
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The present invention provides a kind of live anti-abduction method and device of software audio and video data streams, wherein, method includes:Receive the first access request that client is sent;According to the first access request, the first authorization code is generated, and the first authorization code is sent to client;Receive the second access request that client is sent;Verify whether the first authorization code is identical with the second authorization code, it is if identical, judge in authorization code record sheet, whether uniform resource position mark URL address transmission times corresponding to the second authorization code is equal to 0, if, URL addresses are sent to client, and URL addresses transmission times corresponding to the second authorization code is added 1 in authorization code record sheet;Authorization code record sheet includes the second authorization code and corresponding URL addresses transmission times.The above method and device effectively avoid the risk that audio and video data streams are held as a hostage.
Description
Technical field
The present invention relates to field of computer technology, more particularly to a kind of anti-abduction method of live software audio and video data streams and
Device.
Background technology
With the rapid development of Internet, network security is increasingly becoming a potential huge problem.It is simplest at its
In form, its major concern is to ensure that unrelated person can not be read, and can not change the information for sending other recipients to.This
When, the object that it is concerned about is that those have no right to use, but attempts to obtain the people of information service.Security also handles legitimate messages quilt
Intercept and capture and the problem of replay, and the problem of whether sender was once transmitted across this message.Therefore, contemporary information systems are being enjoyed
Bring it is quick and easy while, how fully to take precautions against the damage of information and steal, it has also become current enterprise is in the urgent need to address
The problem of.
The content of the invention
The present invention provides a kind of live anti-abduction method and device of software audio and video data streams, prevents other people from kidnapping or changing
Rear mold is asked to intend acquisition request audio, video data.
First aspect present invention provides a kind of live anti-abduction method of software audio and video data streams, including:
Step 101, the first access request that client is sent is received, first access request includes ID and close
Code;
Step 102, according to first access request, the first authorization code is generated, and first authorization code is sent to
The client;
Step 103, the second access request that client is sent is received, second access request includes described second and authorized
Code;
Step 104, verify whether first authorization code and second authorization code are identical, if identical, judge authorization code
In record sheet, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0, if so, to institute
State client and send URL addresses, and add URL addresses transmission times corresponding to second authorization code in authorization code record sheet
1;Authorization code record sheet includes the second authorization code and corresponding URL addresses transmission times.
Further, first access request also includes IP address, and step 102 specifically includes:
Step 1021, the ID in the first access request and password are verified, when being verified, performs step
1022;
Step 1022, judge whether IP address is the IP address stored in malicious IP addresses list, if it is not, performing step
Rapid 1023;
Step 1023, the first authorization code is generated, and first authorization code is sent to the client.
Further, step 104 also includes:If URL addresses transmission times corresponding to second authorization code is not equal to 0,
URL addresses transmission times corresponding to second authorization code is added 1 in authorization code record sheet, if URL addresses transmission times is big
In predetermined threshold value, then the IP address for the client for sending the second access request is stored into malicious IP addresses list.
Further, first access request also includes timestamp, and step 1023 specifically includes:
Combination to the ID, password and timestamp carries out md5 encryption, to obtain the first authorization code.
Second aspect of the present invention provides a kind of live software audio and video data streams antihijacking device, including the first child servers
With the second child servers, the first child servers include the first receiving module and authorization code generation module, and the second child servers include
Authorization code receiving module, the second receiving module, authentication module and URL addresses sending module;
First receiving module, for receiving the first access request of client transmission, first access request includes using
Family ID and password;
Authorization code generation module, for according to first access request, generating the first authorization code, and described first is awarded
Weighted code is sent to the client and second child servers;
Authorization code receiving module, the first mandate that the authorization code generation module for receiving first child servers is sent
Code;
Second receiving module, for receiving the second access request of client transmission, second access request includes institute
State the second authorization code;
Authentication module, for verifying whether first authorization code and second authorization code are identical, if identical, judge to award
In weighted code record sheet, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0, if so,
Trigger URL addresses sending module;
URL addresses sending module, for sending URL addresses to the client, and in authorization code record sheet by described in
URL addresses transmission times increase by 1 corresponding to second authorization code;Authorization code record sheet is with including the second authorization code and corresponding URL
Location transmission times.
Further, first access request also includes IP address, and the authorization code generation module specifically includes:
Submodule is verified, for being verified to the ID in the first access request and password, when being verified, is touched
Send out judging submodule;
Judging submodule, for judging whether IP address is the IP address that is stored in malicious IP addresses list, if it is not,
Generate submodule;
Submodule is generated, the client is sent to for generating the first authorization code, and by first authorization code.
Further, URL addresses sending module is additionally operable to:If URL addresses transmission times corresponding to second authorization code
Not equal to 0, URL addresses transmission times corresponding to second authorization code is added 1 in authorization code record sheet, if URL addresses are sent out
Send number to be more than predetermined threshold value, then the IP address for the client for sending the second access request is stored to malicious IP addresses and arranged
In table.
Further, first access request also includes timestamp, and generation submodule specifically includes:To the user
ID, password and timestamp combination carry out md5 encryption, to obtain the first authorization code.
Third aspect present invention provides a kind of live software audio and video data streams antihijacking device, including:Memory and place
Device is managed, wherein, the memory is used for storage program, and the processor is used to perform described program, and described program includes above-mentioned
Step in method.
The anti-abduction method and device of live software audio and video data streams provided by the invention, first sent according to client
Access request generates the first authorization code, and the first authorization code is sent into client;The second access that client is sent is received to ask
Ask, and verify whether the first authorization code and the second authorization code carried in the second access request are identical, if identical, determine whether
In authorization code record sheet, whether URL addresses transmission times corresponding to the second authorization code is equal to 0, if 0, is then sent to client
URL addresses, so that client carries out audio, video data access according to URL addresses.In the above method, even if there is malicious user to pass through
Improper means obtains the second authorization code, using the second authorization code to server access, in the feelings of validated user normal use
Under condition, malicious user can not also get corresponding URL addresses, effectively avoid the risk that audio and video data streams are held as a hostage.
Brief description of the drawings
The invention will be described in more detail below based on embodiments and refering to the accompanying drawings.Wherein:
Fig. 1 is a schematic flow sheet of the live anti-abduction method of software audio and video data streams provided in an embodiment of the present invention;
Fig. 2 is that another flow of the live anti-abduction method of software audio and video data streams provided in an embodiment of the present invention is illustrated
Figure;
Fig. 3 is a structural representation of live software audio and video data streams antihijacking device provided in an embodiment of the present invention;
Fig. 4 is another structural representation of live software audio and video data streams antihijacking device provided in an embodiment of the present invention
Figure.
In the accompanying drawings, identical part uses identical reference.Accompanying drawing is not drawn according to the ratio of reality.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained all other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Embodiment one
Executive agent in the present embodiment is server.
Fig. 1 is a schematic flow sheet of the live anti-abduction method of software audio and video data streams provided in an embodiment of the present invention,
As shown in figure 1, the embodiment of the present invention provides a kind of live anti-abduction method of software audio and video data streams, including step 101- steps
104。
Wherein, step 101, the first access request that client is sent is received, first access request includes ID
And password.
Specifically, the first access request includes ID and password, and to realize that user logs in, after logining successfully, clothes
Business device could be responded to the request of client, and respective service is provided for client.
Step 102, according to first access request, the first authorization code is generated, and first authorization code is sent to
The client.
First access request also includes IP address, as shown in Fig. 2 step 102 specifically includes:
Step 1021, the ID in the first access request and password are verified, when being verified, performs step
1022。
Specifically, server is verified to the ID and password that are carried in the first access request, if ID is not deposited
, then user's " user is not present " is prompted, and prompt user to be registered simultaneously, if ID is present, password bad, then
Prompt user's " Password Input mistake ";If ID and password are correct, that is, it is verified, performs step 1022.
Step 1022, judge whether IP address is the IP address stored in malicious IP addresses list, if it is not, performing step
Rapid 1023.
Specifically, verified to the IP address carried in the first access request, judge whether it is malice IP
The IP address stored in the list of location, if so, showing that the IP address has malicious attack, in order to prevent server access to be robbed
Hold, the first access request transmitted by IP address of the reply with malicious attack behavior is disregarded;If the User IP
Location does not record in malicious IP addresses list, then performs step 1023.
Step 1023, the first authorization code is generated, and first authorization code is sent to the client.
Specifically, first access request also includes timestamp, step 1023 specifically includes:
Combination to the ID, password and timestamp carries out md5 encryption, to obtain the first authorization code.I.e. by user
The character string that ID, password and timestamp combination generated after md5 encryption is as the first authorization code.
Step 103, the second access request that client is sent is received, second access request includes described second and authorized
Code.
Specifically, user end to server sends the first access request, the first authorization code is logged in and obtained for user;Visitor
Family end sends the second access request to server, for obtaining the URL (Uniform of audio, video data access
Resource Locator, abbreviation URL) address.Method for generating the first authorization code and the second authorization code is the same.For area
Point, server is sent to the authorization code of client the first authorization code, and the authorization code that client is sent to server is awarded second
Weighted code.
Step 104 includes step 104a- steps 104c.
Step 104a, verify whether first authorization code and second authorization code are identical, if identical, go to step 104b
Perform.This step is used to verify whether the second identifying code that client is sent is that server is sent to client.
Step 104b, judge in authorization code record sheet, URL addresses transmission times corresponding to second authorization code whether etc.
In 0, if so, going to step 104c execution.
Step 104c, URL addresses are sent to the client, and by second authorization code pair in authorization code record sheet
The URL addresses transmission times answered adds 1;Authorization code record sheet includes the second authorization code and corresponding URL addresses transmission times.
Further, step 104 also includes:If URL addresses transmission times corresponding to second authorization code is not equal to 0,
Go to step 104d execution;
Step 104d, URL addresses transmission times corresponding to second authorization code is added 1 in authorization code record sheet, if
URL addresses transmission times is more than predetermined threshold value, then stores the IP address for the client for sending the second access request to evil
In meaning IP address list.Predetermined threshold value can be configured according to actual conditions, not limited herein.When URL addresses transmission times
During more than predetermined threshold value, illustrate the visitor in the case where server has issued URL addresses transmission times, carrying the second authorization code
Family end has repeatedly carried out access request to server, and the client for carrying the second authorization code has the possibility of malicious access
It is very big, the IP address of the client should be stored into malicious IP addresses list, with further in server generation the
The request of the client is ignored before one authorization code.
The anti-abduction method of live software audio and video data streams provided in an embodiment of the present invention, first sent according to client
Access request generates the first authorization code, and the first authorization code is sent into client;The second access that client is sent is received to ask
Ask, and verify whether the first authorization code and the second authorization code carried in the second access request are identical, if identical, determine whether
In authorization code record sheet, whether URL addresses transmission times corresponding to the second authorization code is equal to 0, if 0, is then sent to client
URL addresses, so that client carries out audio, video data access according to URL addresses.In the above method, even if there is malicious user to pass through
Improper means obtains the second authorization code, using the second authorization code to server access, in the feelings of validated user normal use
Under condition (i.e. validated user obtains the URL addresses), malicious user can not also get corresponding URL addresses, effectively avoid
The risk that audio and video data streams are held as a hostage.
Embodiment two
The present embodiment is the device embodiment of above method embodiment, for performing the method in above-described embodiment.
Fig. 3 is a structural representation of live software audio and video data streams antihijacking device provided in an embodiment of the present invention,
As shown in figure 3, the embodiment of the present invention provides a kind of live software audio and video data streams antihijacking device, including the first child servers
A and the second child servers B, the first child servers A include the first receiving module 201 and authorization code generation module 202, the second son clothes
Business device B includes authorization code receiving module 203, the second receiving module 204, authentication module 205 and URL addresses sending module 206.
Wherein, the first receiving module 201, for receiving the first access request of client transmission, first access please
Ask including ID and password;
Authorization code generation module 202, for according to first access request, generating the first authorization code, and by described the
One authorization code is sent to the client and the second child servers B.
In the present embodiment, the first child servers A and the second child servers B can be same server, or different
Server.
Authorization code receiving module 203, what the authorization code generation module 202 for receiving the first child servers A was sent
First authorization code;
Second receiving module 204, for receiving the second access request of client transmission, second access request includes
Second authorization code;
Authentication module 205, for verifying whether first authorization code and second authorization code are identical, if identical, sentence
In disconnected authorization code record sheet, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0,
If so, triggering URL addresses sending module 206;
URL addresses sending module 206, for sending URL addresses to the client, and by institute in authorization code record sheet
State URL addresses transmission times increase by 1 corresponding to the second authorization code;Authorization code record sheet includes the second authorization code and corresponding URL
Address transmission times.
Further, first access request also includes IP address, and the authorization code generation module 202 specifically wraps
Include:
Submodule is verified, for being verified to the ID in the first access request and password, when being verified, is touched
Send out judging submodule;
Judging submodule, for judging whether IP address is the IP address that is stored in malicious IP addresses list, if it is not,
Generate submodule;
Submodule is generated, the client is sent to for generating the first authorization code, and by first authorization code.
Further, URL addresses sending module 206 is additionally operable to:If URL addresses corresponding to second authorization code send secondary
Number is not equal to 0, URL addresses transmission times corresponding to second authorization code is added into 1 in authorization code record sheet, if URL addresses
Transmission times is more than predetermined threshold value, then stores the IP address for the client for sending the second access request to malicious IP addresses
In list.
Further, first access request also includes timestamp, and generation submodule specifically includes:To the user
ID, password and timestamp combination carry out md5 encryption, to obtain the first authorization code.
Because the present embodiment is device embodiment corresponding with the embodiment of the method for embodiment one, detail can be found in reality
The corresponding description in example one is applied, will not be repeated here.
Live software audio and video data streams antihijacking device provided in an embodiment of the present invention, first sent according to client
Access request generates the first authorization code, and the first authorization code is sent into client;The second access that client is sent is received to ask
Ask, and verify whether the first authorization code and the second authorization code carried in the second access request are identical, if identical, determine whether
In authorization code record sheet, whether URL addresses transmission times corresponding to the second authorization code is equal to 0, if 0, is then sent to client
URL addresses, so that client carries out audio, video data access according to URL addresses.In the above method, even if there is malicious user to pass through
Improper means obtains the second authorization code, using the second authorization code to server access, in the feelings of validated user normal use
Under condition, malicious user can not also get corresponding URL addresses, effectively avoid the risk that audio and video data streams are held as a hostage.
Embodiment three
Fig. 4 is another structural representation of live software audio and video data streams antihijacking device provided in an embodiment of the present invention
Figure, as shown in figure 4, the embodiment of the present invention provides a kind of live software audio and video data streams antihijacking device, including:Memory 11
With processor 22, wherein, the memory 11 is used for storage program 111, and the processor 22 is used to perform described program 111,
Described program 111 includes the step of method described in embodiment one.Specific steps can be found in the record in embodiment one, herein not
Repeat again.
It should be understood that disclosed embodiment of this invention is not limited to specific structure disclosed herein, processing step
Or material, and the equivalent substitute for these features that those of ordinary skill in the related art are understood should be extended to.It should also manage
Solution, term as used herein are only used for describing the purpose of specific embodiment, and are not intended to limit.
" one embodiment " or " embodiment " mentioned in specification means special characteristic, the structure described in conjunction with the embodiments
Or during characteristic is included at least one embodiment of the present invention.Therefore, the phrase " reality that specification various places throughout occurs
Apply example " or " embodiment " same embodiment might not be referred both to.
In addition, described feature, structure or characteristic can be attached to one or more in any other suitable manner in fact
Apply in example.In superincumbent description, there is provided some concrete details, such as material etc., to provide to embodiments of the invention
Comprehensive understanding.However, those skilled in the relevant art are readily apparent that, the present invention is without said one or multiple concrete details
Realize, or can also use other methods, component, material etc. to realize.In other examples, known structure, material or operation
It is not shown or described in detail in order to avoid obscuring various aspects of the invention.
Although above-mentioned example is used to illustrate principle of the present invention in one or more apply, for the technology of this area
For personnel, in the case of without departing substantially from the principle and thought of the present invention, hence it is evident that can in form, the details of usage and implementation
It is upper that various modifications may be made and does not have to pay creative work.Therefore, the present invention is defined by the appended claims.
Claims (9)
- A kind of 1. anti-abduction method of live software audio and video data streams, it is characterised in that including:Step 101, the first access request that client is sent is received, first access request includes ID and password;Step 102, according to first access request, the first authorization code is generated, and first authorization code is sent to described Client;Step 103, the second access request that client is sent is received, second access request includes second authorization code;Step 104, verify whether first authorization code and second authorization code are identical, if identical, judge that authorization code records In table, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0, if so, to the visitor Family end sends URL addresses, and URL addresses transmission times corresponding to second authorization code is added into 1 in authorization code record sheet;Award Weighted code record sheet includes the second authorization code and corresponding URL addresses transmission times.
- 2. according to the method for claim 1, it is characterised in that first access request also includes IP address, step Rapid 102 specifically include:Step 1021, the ID in the first access request and password are verified, when being verified, performs step 1022;Step 1022, judge whether IP address is the IP address stored in malicious IP addresses list, if it is not, performing step 1023;Step 1023, the first authorization code is generated, and first authorization code is sent to the client.
- 3. according to the method for claim 2, it is characterised in that step 104 also includes:If corresponding to second authorization code URL addresses transmission times is not equal to 0, by URL addresses transmission times corresponding to second authorization code in authorization code record sheet Add 1, if URL addresses transmission times is more than predetermined threshold value, the IP address for the client for sending the second access request is deposited Storage is into malicious IP addresses list.
- 4. according to the method for claim 2, it is characterised in that first access request also includes timestamp, step 1023 specifically include:Combination to the ID, password and timestamp carries out md5 encryption, to obtain the first authorization code.
- 5. a kind of live software audio and video data streams antihijacking device, it is characterised in that including the first child servers and the second son Server, the first child servers include the first receiving module and authorization code generation module, and the second child servers connect including authorization code Receive module, the second receiving module, authentication module and URL addresses sending module;First receiving module, for receiving the first access request of client transmission, first access request includes ID And password;Authorization code generation module, for according to first access request, generating the first authorization code, and by first authorization code It is sent to the client and second child servers;Authorization code receiving module, the first authorization code that the authorization code generation module for receiving first child servers is sent;Second receiving module, for receiving the second access request of client transmission, second access request includes described the Two authorization codes;Authentication module, for verifying whether first authorization code and second authorization code are identical, if identical, judge authorization code In record sheet, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0, if so, triggering URL addresses sending module;URL addresses sending module, for sending URL addresses to the client, and by described second in authorization code record sheet URL addresses transmission times increase by 1 corresponding to authorization code;Authorization code record sheet includes the second authorization code and corresponding URL addresses are sent out Send number.
- 6. device according to claim 5, it is characterised in that first access request also includes IP address, institute Authorization code generation module is stated to specifically include:Submodule is verified, for being verified to the ID in the first access request and password, when being verified, triggering is sentenced Disconnected submodule;Judging submodule, for judging whether IP address is the IP address that is stored in malicious IP addresses list, if it is not, generation Submodule;Submodule is generated, the client is sent to for generating the first authorization code, and by first authorization code.
- 7. device according to claim 6, it is characterised in that URL addresses sending module is additionally operable to:If described second authorizes URL addresses transmission times is not equal to 0 corresponding to code, by URL addresses corresponding to second authorization code in authorization code record sheet Transmission times adds 1, if URL addresses transmission times is more than predetermined threshold value, will send the user of the client of the second access request IP address is stored into malicious IP addresses list.
- 8. device according to claim 6, it is characterised in that first access request also includes timestamp, generation Module specifically includes:Combination to the ID, password and timestamp carries out md5 encryption, to obtain the first authorization code.
- A kind of 9. live software audio and video data streams antihijacking device, it is characterised in that including:Memory and processor, wherein, The memory is used for storage program, and the processor is used to perform described program, and described program is included as in claim 1-4 The step of any one methods described.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711373573.9A CN107888623B (en) | 2017-12-19 | 2017-12-19 | Method and device for preventing hijacking of audio and video data streams of live broadcast software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711373573.9A CN107888623B (en) | 2017-12-19 | 2017-12-19 | Method and device for preventing hijacking of audio and video data streams of live broadcast software |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107888623A true CN107888623A (en) | 2018-04-06 |
CN107888623B CN107888623B (en) | 2020-12-18 |
Family
ID=61771914
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711373573.9A Active CN107888623B (en) | 2017-12-19 | 2017-12-19 | Method and device for preventing hijacking of audio and video data streams of live broadcast software |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107888623B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110381375A (en) * | 2018-04-13 | 2019-10-25 | 武汉斗鱼网络科技有限公司 | A kind of determining method, client and server for stealing brush data |
CN111193895A (en) * | 2019-12-20 | 2020-05-22 | 视联动力信息技术股份有限公司 | Recording and broadcasting method, recording and broadcasting system, client, electronic equipment and storage medium |
CN111917787A (en) * | 2020-08-06 | 2020-11-10 | 北京奇艺世纪科技有限公司 | Request detection method and device, electronic equipment and computer-readable storage medium |
CN112770136A (en) * | 2021-01-27 | 2021-05-07 | 北京龙商公社互联网科技发展股份有限公司 | Community electronic commerce video live broadcast delivery service system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102394839A (en) * | 2011-11-17 | 2012-03-28 | 中兴通讯股份有限公司 | Downloading method of email attachment and email system |
CN103986735A (en) * | 2014-06-05 | 2014-08-13 | 北京赛维安讯科技发展有限公司 | CDN (content distribution network) antitheft system and antitheft method |
CN104284213A (en) * | 2014-09-26 | 2015-01-14 | 深圳市同洲电子股份有限公司 | Hotlink protection method, client side and system |
US20150052588A1 (en) * | 2011-01-13 | 2015-02-19 | International Business Machines Corporation | Serialized authentication and authorization services |
US20150150038A1 (en) * | 2013-11-22 | 2015-05-28 | Verizon Patent And Licensing Inc. | Video content protection |
CN106791986A (en) * | 2017-01-10 | 2017-05-31 | 环球智达科技(北京)有限公司 | A kind of live index list encrypted antitheft catenary systems of HLS and method |
US20170324729A1 (en) * | 2013-10-28 | 2017-11-09 | Singou Technology Ltd. | Method and Device for Information System Access Authentication |
-
2017
- 2017-12-19 CN CN201711373573.9A patent/CN107888623B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150052588A1 (en) * | 2011-01-13 | 2015-02-19 | International Business Machines Corporation | Serialized authentication and authorization services |
CN102394839A (en) * | 2011-11-17 | 2012-03-28 | 中兴通讯股份有限公司 | Downloading method of email attachment and email system |
US20170324729A1 (en) * | 2013-10-28 | 2017-11-09 | Singou Technology Ltd. | Method and Device for Information System Access Authentication |
US20150150038A1 (en) * | 2013-11-22 | 2015-05-28 | Verizon Patent And Licensing Inc. | Video content protection |
CN103986735A (en) * | 2014-06-05 | 2014-08-13 | 北京赛维安讯科技发展有限公司 | CDN (content distribution network) antitheft system and antitheft method |
CN104284213A (en) * | 2014-09-26 | 2015-01-14 | 深圳市同洲电子股份有限公司 | Hotlink protection method, client side and system |
CN106791986A (en) * | 2017-01-10 | 2017-05-31 | 环球智达科技(北京)有限公司 | A kind of live index list encrypted antitheft catenary systems of HLS and method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110381375A (en) * | 2018-04-13 | 2019-10-25 | 武汉斗鱼网络科技有限公司 | A kind of determining method, client and server for stealing brush data |
CN111193895A (en) * | 2019-12-20 | 2020-05-22 | 视联动力信息技术股份有限公司 | Recording and broadcasting method, recording and broadcasting system, client, electronic equipment and storage medium |
CN111917787A (en) * | 2020-08-06 | 2020-11-10 | 北京奇艺世纪科技有限公司 | Request detection method and device, electronic equipment and computer-readable storage medium |
CN112770136A (en) * | 2021-01-27 | 2021-05-07 | 北京龙商公社互联网科技发展股份有限公司 | Community electronic commerce video live broadcast delivery service system |
Also Published As
Publication number | Publication date |
---|---|
CN107888623B (en) | 2020-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104954330B (en) | A kind of methods, devices and systems to be conducted interviews to data resource | |
CN103916244B (en) | Verification method and device | |
KR102150750B1 (en) | Trusted login method and device | |
CN107888623A (en) | The live anti-abduction method and device of software audio and video data streams | |
CN102572815B (en) | Method, system and device for processing terminal application request | |
CN105407074A (en) | Authentication method, apparatus and system | |
CN105897782A (en) | Method and device for treating call request of interface | |
CN106034104A (en) | Verification method, verification device and verification system for network application accessing | |
CN105939326A (en) | Message processing method and device | |
US20160285781A1 (en) | Data processing method, apparatus, client, server and system | |
CN110690972B (en) | Token authentication method and device, electronic equipment and storage medium | |
Van Delft et al. | A security analysis of OpenID | |
CN104767613A (en) | Signature verification method, device and system | |
CN103905399A (en) | Account registration management method and apparatus | |
CN103312664A (en) | Form verification method, device and system | |
CN106559405B (en) | Portal authentication method and equipment | |
CN108259406A (en) | Examine the method and system of SSL certificate | |
CN107835160A (en) | Third party's user authen method based on Quick Response Code | |
CN103825863A (en) | Account management method and account management device | |
CN110943840B (en) | Signature verification method | |
CN102833247A (en) | Method for anti-sweeping ciphers in user login system and device thereof | |
CN105095729B (en) | A kind of Quick Response Code login method, server and system | |
CN112929388B (en) | Network identity cross-device application rapid authentication method and system, and user agent device | |
CN103957189A (en) | Application program interaction method and device | |
CN109040129A (en) | A kind of method and server obtaining identifying code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210525 Address after: Room 1801-7, F4 building, luguyuyuan, No.27 Wenxuan Road, high tech Development Zone, Changsha, Hunan 410000 Patentee after: Hunan Yuyi Technology Co.,Ltd. Address before: 410000 room F4 1801, Lugu Enterprise Square, Yuelu District, Changsha City, Hunan Province Patentee before: HUNAN JIYOU TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |