CN107888623A - The live anti-abduction method and device of software audio and video data streams - Google Patents

The live anti-abduction method and device of software audio and video data streams Download PDF

Info

Publication number
CN107888623A
CN107888623A CN201711373573.9A CN201711373573A CN107888623A CN 107888623 A CN107888623 A CN 107888623A CN 201711373573 A CN201711373573 A CN 201711373573A CN 107888623 A CN107888623 A CN 107888623A
Authority
CN
China
Prior art keywords
authorization code
access request
client
url addresses
transmission times
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711373573.9A
Other languages
Chinese (zh)
Other versions
CN107888623B (en
Inventor
陶伟胜
张婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Yuyi Technology Co.,Ltd.
Original Assignee
Hunan Friend Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Friend Technology Co Ltd filed Critical Hunan Friend Technology Co Ltd
Priority to CN201711373573.9A priority Critical patent/CN107888623B/en
Publication of CN107888623A publication Critical patent/CN107888623A/en
Application granted granted Critical
Publication of CN107888623B publication Critical patent/CN107888623B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention provides a kind of live anti-abduction method and device of software audio and video data streams, wherein, method includes:Receive the first access request that client is sent;According to the first access request, the first authorization code is generated, and the first authorization code is sent to client;Receive the second access request that client is sent;Verify whether the first authorization code is identical with the second authorization code, it is if identical, judge in authorization code record sheet, whether uniform resource position mark URL address transmission times corresponding to the second authorization code is equal to 0, if, URL addresses are sent to client, and URL addresses transmission times corresponding to the second authorization code is added 1 in authorization code record sheet;Authorization code record sheet includes the second authorization code and corresponding URL addresses transmission times.The above method and device effectively avoid the risk that audio and video data streams are held as a hostage.

Description

The live anti-abduction method and device of software audio and video data streams
Technical field
The present invention relates to field of computer technology, more particularly to a kind of anti-abduction method of live software audio and video data streams and Device.
Background technology
With the rapid development of Internet, network security is increasingly becoming a potential huge problem.It is simplest at its In form, its major concern is to ensure that unrelated person can not be read, and can not change the information for sending other recipients to.This When, the object that it is concerned about is that those have no right to use, but attempts to obtain the people of information service.Security also handles legitimate messages quilt Intercept and capture and the problem of replay, and the problem of whether sender was once transmitted across this message.Therefore, contemporary information systems are being enjoyed Bring it is quick and easy while, how fully to take precautions against the damage of information and steal, it has also become current enterprise is in the urgent need to address The problem of.
The content of the invention
The present invention provides a kind of live anti-abduction method and device of software audio and video data streams, prevents other people from kidnapping or changing Rear mold is asked to intend acquisition request audio, video data.
First aspect present invention provides a kind of live anti-abduction method of software audio and video data streams, including:
Step 101, the first access request that client is sent is received, first access request includes ID and close Code;
Step 102, according to first access request, the first authorization code is generated, and first authorization code is sent to The client;
Step 103, the second access request that client is sent is received, second access request includes described second and authorized Code;
Step 104, verify whether first authorization code and second authorization code are identical, if identical, judge authorization code In record sheet, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0, if so, to institute State client and send URL addresses, and add URL addresses transmission times corresponding to second authorization code in authorization code record sheet 1;Authorization code record sheet includes the second authorization code and corresponding URL addresses transmission times.
Further, first access request also includes IP address, and step 102 specifically includes:
Step 1021, the ID in the first access request and password are verified, when being verified, performs step 1022;
Step 1022, judge whether IP address is the IP address stored in malicious IP addresses list, if it is not, performing step Rapid 1023;
Step 1023, the first authorization code is generated, and first authorization code is sent to the client.
Further, step 104 also includes:If URL addresses transmission times corresponding to second authorization code is not equal to 0, URL addresses transmission times corresponding to second authorization code is added 1 in authorization code record sheet, if URL addresses transmission times is big In predetermined threshold value, then the IP address for the client for sending the second access request is stored into malicious IP addresses list.
Further, first access request also includes timestamp, and step 1023 specifically includes:
Combination to the ID, password and timestamp carries out md5 encryption, to obtain the first authorization code.
Second aspect of the present invention provides a kind of live software audio and video data streams antihijacking device, including the first child servers With the second child servers, the first child servers include the first receiving module and authorization code generation module, and the second child servers include Authorization code receiving module, the second receiving module, authentication module and URL addresses sending module;
First receiving module, for receiving the first access request of client transmission, first access request includes using Family ID and password;
Authorization code generation module, for according to first access request, generating the first authorization code, and described first is awarded Weighted code is sent to the client and second child servers;
Authorization code receiving module, the first mandate that the authorization code generation module for receiving first child servers is sent Code;
Second receiving module, for receiving the second access request of client transmission, second access request includes institute State the second authorization code;
Authentication module, for verifying whether first authorization code and second authorization code are identical, if identical, judge to award In weighted code record sheet, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0, if so, Trigger URL addresses sending module;
URL addresses sending module, for sending URL addresses to the client, and in authorization code record sheet by described in URL addresses transmission times increase by 1 corresponding to second authorization code;Authorization code record sheet is with including the second authorization code and corresponding URL Location transmission times.
Further, first access request also includes IP address, and the authorization code generation module specifically includes:
Submodule is verified, for being verified to the ID in the first access request and password, when being verified, is touched Send out judging submodule;
Judging submodule, for judging whether IP address is the IP address that is stored in malicious IP addresses list, if it is not, Generate submodule;
Submodule is generated, the client is sent to for generating the first authorization code, and by first authorization code.
Further, URL addresses sending module is additionally operable to:If URL addresses transmission times corresponding to second authorization code Not equal to 0, URL addresses transmission times corresponding to second authorization code is added 1 in authorization code record sheet, if URL addresses are sent out Send number to be more than predetermined threshold value, then the IP address for the client for sending the second access request is stored to malicious IP addresses and arranged In table.
Further, first access request also includes timestamp, and generation submodule specifically includes:To the user ID, password and timestamp combination carry out md5 encryption, to obtain the first authorization code.
Third aspect present invention provides a kind of live software audio and video data streams antihijacking device, including:Memory and place Device is managed, wherein, the memory is used for storage program, and the processor is used to perform described program, and described program includes above-mentioned Step in method.
The anti-abduction method and device of live software audio and video data streams provided by the invention, first sent according to client Access request generates the first authorization code, and the first authorization code is sent into client;The second access that client is sent is received to ask Ask, and verify whether the first authorization code and the second authorization code carried in the second access request are identical, if identical, determine whether In authorization code record sheet, whether URL addresses transmission times corresponding to the second authorization code is equal to 0, if 0, is then sent to client URL addresses, so that client carries out audio, video data access according to URL addresses.In the above method, even if there is malicious user to pass through Improper means obtains the second authorization code, using the second authorization code to server access, in the feelings of validated user normal use Under condition, malicious user can not also get corresponding URL addresses, effectively avoid the risk that audio and video data streams are held as a hostage.
Brief description of the drawings
The invention will be described in more detail below based on embodiments and refering to the accompanying drawings.Wherein:
Fig. 1 is a schematic flow sheet of the live anti-abduction method of software audio and video data streams provided in an embodiment of the present invention;
Fig. 2 is that another flow of the live anti-abduction method of software audio and video data streams provided in an embodiment of the present invention is illustrated Figure;
Fig. 3 is a structural representation of live software audio and video data streams antihijacking device provided in an embodiment of the present invention;
Fig. 4 is another structural representation of live software audio and video data streams antihijacking device provided in an embodiment of the present invention Figure.
In the accompanying drawings, identical part uses identical reference.Accompanying drawing is not drawn according to the ratio of reality.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained all other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Embodiment one
Executive agent in the present embodiment is server.
Fig. 1 is a schematic flow sheet of the live anti-abduction method of software audio and video data streams provided in an embodiment of the present invention, As shown in figure 1, the embodiment of the present invention provides a kind of live anti-abduction method of software audio and video data streams, including step 101- steps 104。
Wherein, step 101, the first access request that client is sent is received, first access request includes ID And password.
Specifically, the first access request includes ID and password, and to realize that user logs in, after logining successfully, clothes Business device could be responded to the request of client, and respective service is provided for client.
Step 102, according to first access request, the first authorization code is generated, and first authorization code is sent to The client.
First access request also includes IP address, as shown in Fig. 2 step 102 specifically includes:
Step 1021, the ID in the first access request and password are verified, when being verified, performs step 1022。
Specifically, server is verified to the ID and password that are carried in the first access request, if ID is not deposited , then user's " user is not present " is prompted, and prompt user to be registered simultaneously, if ID is present, password bad, then Prompt user's " Password Input mistake ";If ID and password are correct, that is, it is verified, performs step 1022.
Step 1022, judge whether IP address is the IP address stored in malicious IP addresses list, if it is not, performing step Rapid 1023.
Specifically, verified to the IP address carried in the first access request, judge whether it is malice IP The IP address stored in the list of location, if so, showing that the IP address has malicious attack, in order to prevent server access to be robbed Hold, the first access request transmitted by IP address of the reply with malicious attack behavior is disregarded;If the User IP Location does not record in malicious IP addresses list, then performs step 1023.
Step 1023, the first authorization code is generated, and first authorization code is sent to the client.
Specifically, first access request also includes timestamp, step 1023 specifically includes:
Combination to the ID, password and timestamp carries out md5 encryption, to obtain the first authorization code.I.e. by user The character string that ID, password and timestamp combination generated after md5 encryption is as the first authorization code.
Step 103, the second access request that client is sent is received, second access request includes described second and authorized Code.
Specifically, user end to server sends the first access request, the first authorization code is logged in and obtained for user;Visitor Family end sends the second access request to server, for obtaining the URL (Uniform of audio, video data access Resource Locator, abbreviation URL) address.Method for generating the first authorization code and the second authorization code is the same.For area Point, server is sent to the authorization code of client the first authorization code, and the authorization code that client is sent to server is awarded second Weighted code.
Step 104 includes step 104a- steps 104c.
Step 104a, verify whether first authorization code and second authorization code are identical, if identical, go to step 104b Perform.This step is used to verify whether the second identifying code that client is sent is that server is sent to client.
Step 104b, judge in authorization code record sheet, URL addresses transmission times corresponding to second authorization code whether etc. In 0, if so, going to step 104c execution.
Step 104c, URL addresses are sent to the client, and by second authorization code pair in authorization code record sheet The URL addresses transmission times answered adds 1;Authorization code record sheet includes the second authorization code and corresponding URL addresses transmission times.
Further, step 104 also includes:If URL addresses transmission times corresponding to second authorization code is not equal to 0, Go to step 104d execution;
Step 104d, URL addresses transmission times corresponding to second authorization code is added 1 in authorization code record sheet, if URL addresses transmission times is more than predetermined threshold value, then stores the IP address for the client for sending the second access request to evil In meaning IP address list.Predetermined threshold value can be configured according to actual conditions, not limited herein.When URL addresses transmission times During more than predetermined threshold value, illustrate the visitor in the case where server has issued URL addresses transmission times, carrying the second authorization code Family end has repeatedly carried out access request to server, and the client for carrying the second authorization code has the possibility of malicious access It is very big, the IP address of the client should be stored into malicious IP addresses list, with further in server generation the The request of the client is ignored before one authorization code.
The anti-abduction method of live software audio and video data streams provided in an embodiment of the present invention, first sent according to client Access request generates the first authorization code, and the first authorization code is sent into client;The second access that client is sent is received to ask Ask, and verify whether the first authorization code and the second authorization code carried in the second access request are identical, if identical, determine whether In authorization code record sheet, whether URL addresses transmission times corresponding to the second authorization code is equal to 0, if 0, is then sent to client URL addresses, so that client carries out audio, video data access according to URL addresses.In the above method, even if there is malicious user to pass through Improper means obtains the second authorization code, using the second authorization code to server access, in the feelings of validated user normal use Under condition (i.e. validated user obtains the URL addresses), malicious user can not also get corresponding URL addresses, effectively avoid The risk that audio and video data streams are held as a hostage.
Embodiment two
The present embodiment is the device embodiment of above method embodiment, for performing the method in above-described embodiment.
Fig. 3 is a structural representation of live software audio and video data streams antihijacking device provided in an embodiment of the present invention, As shown in figure 3, the embodiment of the present invention provides a kind of live software audio and video data streams antihijacking device, including the first child servers A and the second child servers B, the first child servers A include the first receiving module 201 and authorization code generation module 202, the second son clothes Business device B includes authorization code receiving module 203, the second receiving module 204, authentication module 205 and URL addresses sending module 206.
Wherein, the first receiving module 201, for receiving the first access request of client transmission, first access please Ask including ID and password;
Authorization code generation module 202, for according to first access request, generating the first authorization code, and by described the One authorization code is sent to the client and the second child servers B.
In the present embodiment, the first child servers A and the second child servers B can be same server, or different Server.
Authorization code receiving module 203, what the authorization code generation module 202 for receiving the first child servers A was sent First authorization code;
Second receiving module 204, for receiving the second access request of client transmission, second access request includes Second authorization code;
Authentication module 205, for verifying whether first authorization code and second authorization code are identical, if identical, sentence In disconnected authorization code record sheet, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0, If so, triggering URL addresses sending module 206;
URL addresses sending module 206, for sending URL addresses to the client, and by institute in authorization code record sheet State URL addresses transmission times increase by 1 corresponding to the second authorization code;Authorization code record sheet includes the second authorization code and corresponding URL Address transmission times.
Further, first access request also includes IP address, and the authorization code generation module 202 specifically wraps Include:
Submodule is verified, for being verified to the ID in the first access request and password, when being verified, is touched Send out judging submodule;
Judging submodule, for judging whether IP address is the IP address that is stored in malicious IP addresses list, if it is not, Generate submodule;
Submodule is generated, the client is sent to for generating the first authorization code, and by first authorization code.
Further, URL addresses sending module 206 is additionally operable to:If URL addresses corresponding to second authorization code send secondary Number is not equal to 0, URL addresses transmission times corresponding to second authorization code is added into 1 in authorization code record sheet, if URL addresses Transmission times is more than predetermined threshold value, then stores the IP address for the client for sending the second access request to malicious IP addresses In list.
Further, first access request also includes timestamp, and generation submodule specifically includes:To the user ID, password and timestamp combination carry out md5 encryption, to obtain the first authorization code.
Because the present embodiment is device embodiment corresponding with the embodiment of the method for embodiment one, detail can be found in reality The corresponding description in example one is applied, will not be repeated here.
Live software audio and video data streams antihijacking device provided in an embodiment of the present invention, first sent according to client Access request generates the first authorization code, and the first authorization code is sent into client;The second access that client is sent is received to ask Ask, and verify whether the first authorization code and the second authorization code carried in the second access request are identical, if identical, determine whether In authorization code record sheet, whether URL addresses transmission times corresponding to the second authorization code is equal to 0, if 0, is then sent to client URL addresses, so that client carries out audio, video data access according to URL addresses.In the above method, even if there is malicious user to pass through Improper means obtains the second authorization code, using the second authorization code to server access, in the feelings of validated user normal use Under condition, malicious user can not also get corresponding URL addresses, effectively avoid the risk that audio and video data streams are held as a hostage.
Embodiment three
Fig. 4 is another structural representation of live software audio and video data streams antihijacking device provided in an embodiment of the present invention Figure, as shown in figure 4, the embodiment of the present invention provides a kind of live software audio and video data streams antihijacking device, including:Memory 11 With processor 22, wherein, the memory 11 is used for storage program 111, and the processor 22 is used to perform described program 111, Described program 111 includes the step of method described in embodiment one.Specific steps can be found in the record in embodiment one, herein not Repeat again.
It should be understood that disclosed embodiment of this invention is not limited to specific structure disclosed herein, processing step Or material, and the equivalent substitute for these features that those of ordinary skill in the related art are understood should be extended to.It should also manage Solution, term as used herein are only used for describing the purpose of specific embodiment, and are not intended to limit.
" one embodiment " or " embodiment " mentioned in specification means special characteristic, the structure described in conjunction with the embodiments Or during characteristic is included at least one embodiment of the present invention.Therefore, the phrase " reality that specification various places throughout occurs Apply example " or " embodiment " same embodiment might not be referred both to.
In addition, described feature, structure or characteristic can be attached to one or more in any other suitable manner in fact Apply in example.In superincumbent description, there is provided some concrete details, such as material etc., to provide to embodiments of the invention Comprehensive understanding.However, those skilled in the relevant art are readily apparent that, the present invention is without said one or multiple concrete details Realize, or can also use other methods, component, material etc. to realize.In other examples, known structure, material or operation It is not shown or described in detail in order to avoid obscuring various aspects of the invention.
Although above-mentioned example is used to illustrate principle of the present invention in one or more apply, for the technology of this area For personnel, in the case of without departing substantially from the principle and thought of the present invention, hence it is evident that can in form, the details of usage and implementation It is upper that various modifications may be made and does not have to pay creative work.Therefore, the present invention is defined by the appended claims.

Claims (9)

  1. A kind of 1. anti-abduction method of live software audio and video data streams, it is characterised in that including:
    Step 101, the first access request that client is sent is received, first access request includes ID and password;
    Step 102, according to first access request, the first authorization code is generated, and first authorization code is sent to described Client;
    Step 103, the second access request that client is sent is received, second access request includes second authorization code;
    Step 104, verify whether first authorization code and second authorization code are identical, if identical, judge that authorization code records In table, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0, if so, to the visitor Family end sends URL addresses, and URL addresses transmission times corresponding to second authorization code is added into 1 in authorization code record sheet;Award Weighted code record sheet includes the second authorization code and corresponding URL addresses transmission times.
  2. 2. according to the method for claim 1, it is characterised in that first access request also includes IP address, step Rapid 102 specifically include:
    Step 1021, the ID in the first access request and password are verified, when being verified, performs step 1022;
    Step 1022, judge whether IP address is the IP address stored in malicious IP addresses list, if it is not, performing step 1023;
    Step 1023, the first authorization code is generated, and first authorization code is sent to the client.
  3. 3. according to the method for claim 2, it is characterised in that step 104 also includes:If corresponding to second authorization code URL addresses transmission times is not equal to 0, by URL addresses transmission times corresponding to second authorization code in authorization code record sheet Add 1, if URL addresses transmission times is more than predetermined threshold value, the IP address for the client for sending the second access request is deposited Storage is into malicious IP addresses list.
  4. 4. according to the method for claim 2, it is characterised in that first access request also includes timestamp, step 1023 specifically include:
    Combination to the ID, password and timestamp carries out md5 encryption, to obtain the first authorization code.
  5. 5. a kind of live software audio and video data streams antihijacking device, it is characterised in that including the first child servers and the second son Server, the first child servers include the first receiving module and authorization code generation module, and the second child servers connect including authorization code Receive module, the second receiving module, authentication module and URL addresses sending module;
    First receiving module, for receiving the first access request of client transmission, first access request includes ID And password;
    Authorization code generation module, for according to first access request, generating the first authorization code, and by first authorization code It is sent to the client and second child servers;
    Authorization code receiving module, the first authorization code that the authorization code generation module for receiving first child servers is sent;
    Second receiving module, for receiving the second access request of client transmission, second access request includes described the Two authorization codes;
    Authentication module, for verifying whether first authorization code and second authorization code are identical, if identical, judge authorization code In record sheet, whether uniform resource position mark URL address transmission times corresponding to second authorization code is equal to 0, if so, triggering URL addresses sending module;
    URL addresses sending module, for sending URL addresses to the client, and by described second in authorization code record sheet URL addresses transmission times increase by 1 corresponding to authorization code;Authorization code record sheet includes the second authorization code and corresponding URL addresses are sent out Send number.
  6. 6. device according to claim 5, it is characterised in that first access request also includes IP address, institute Authorization code generation module is stated to specifically include:
    Submodule is verified, for being verified to the ID in the first access request and password, when being verified, triggering is sentenced Disconnected submodule;
    Judging submodule, for judging whether IP address is the IP address that is stored in malicious IP addresses list, if it is not, generation Submodule;
    Submodule is generated, the client is sent to for generating the first authorization code, and by first authorization code.
  7. 7. device according to claim 6, it is characterised in that URL addresses sending module is additionally operable to:If described second authorizes URL addresses transmission times is not equal to 0 corresponding to code, by URL addresses corresponding to second authorization code in authorization code record sheet Transmission times adds 1, if URL addresses transmission times is more than predetermined threshold value, will send the user of the client of the second access request IP address is stored into malicious IP addresses list.
  8. 8. device according to claim 6, it is characterised in that first access request also includes timestamp, generation Module specifically includes:Combination to the ID, password and timestamp carries out md5 encryption, to obtain the first authorization code.
  9. A kind of 9. live software audio and video data streams antihijacking device, it is characterised in that including:Memory and processor, wherein, The memory is used for storage program, and the processor is used to perform described program, and described program is included as in claim 1-4 The step of any one methods described.
CN201711373573.9A 2017-12-19 2017-12-19 Method and device for preventing hijacking of audio and video data streams of live broadcast software Active CN107888623B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711373573.9A CN107888623B (en) 2017-12-19 2017-12-19 Method and device for preventing hijacking of audio and video data streams of live broadcast software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711373573.9A CN107888623B (en) 2017-12-19 2017-12-19 Method and device for preventing hijacking of audio and video data streams of live broadcast software

Publications (2)

Publication Number Publication Date
CN107888623A true CN107888623A (en) 2018-04-06
CN107888623B CN107888623B (en) 2020-12-18

Family

ID=61771914

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711373573.9A Active CN107888623B (en) 2017-12-19 2017-12-19 Method and device for preventing hijacking of audio and video data streams of live broadcast software

Country Status (1)

Country Link
CN (1) CN107888623B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381375A (en) * 2018-04-13 2019-10-25 武汉斗鱼网络科技有限公司 A kind of determining method, client and server for stealing brush data
CN111193895A (en) * 2019-12-20 2020-05-22 视联动力信息技术股份有限公司 Recording and broadcasting method, recording and broadcasting system, client, electronic equipment and storage medium
CN111917787A (en) * 2020-08-06 2020-11-10 北京奇艺世纪科技有限公司 Request detection method and device, electronic equipment and computer-readable storage medium
CN112770136A (en) * 2021-01-27 2021-05-07 北京龙商公社互联网科技发展股份有限公司 Community electronic commerce video live broadcast delivery service system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102394839A (en) * 2011-11-17 2012-03-28 中兴通讯股份有限公司 Downloading method of email attachment and email system
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method
CN104284213A (en) * 2014-09-26 2015-01-14 深圳市同洲电子股份有限公司 Hotlink protection method, client side and system
US20150052588A1 (en) * 2011-01-13 2015-02-19 International Business Machines Corporation Serialized authentication and authorization services
US20150150038A1 (en) * 2013-11-22 2015-05-28 Verizon Patent And Licensing Inc. Video content protection
CN106791986A (en) * 2017-01-10 2017-05-31 环球智达科技(北京)有限公司 A kind of live index list encrypted antitheft catenary systems of HLS and method
US20170324729A1 (en) * 2013-10-28 2017-11-09 Singou Technology Ltd. Method and Device for Information System Access Authentication

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150052588A1 (en) * 2011-01-13 2015-02-19 International Business Machines Corporation Serialized authentication and authorization services
CN102394839A (en) * 2011-11-17 2012-03-28 中兴通讯股份有限公司 Downloading method of email attachment and email system
US20170324729A1 (en) * 2013-10-28 2017-11-09 Singou Technology Ltd. Method and Device for Information System Access Authentication
US20150150038A1 (en) * 2013-11-22 2015-05-28 Verizon Patent And Licensing Inc. Video content protection
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method
CN104284213A (en) * 2014-09-26 2015-01-14 深圳市同洲电子股份有限公司 Hotlink protection method, client side and system
CN106791986A (en) * 2017-01-10 2017-05-31 环球智达科技(北京)有限公司 A kind of live index list encrypted antitheft catenary systems of HLS and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381375A (en) * 2018-04-13 2019-10-25 武汉斗鱼网络科技有限公司 A kind of determining method, client and server for stealing brush data
CN111193895A (en) * 2019-12-20 2020-05-22 视联动力信息技术股份有限公司 Recording and broadcasting method, recording and broadcasting system, client, electronic equipment and storage medium
CN111917787A (en) * 2020-08-06 2020-11-10 北京奇艺世纪科技有限公司 Request detection method and device, electronic equipment and computer-readable storage medium
CN112770136A (en) * 2021-01-27 2021-05-07 北京龙商公社互联网科技发展股份有限公司 Community electronic commerce video live broadcast delivery service system

Also Published As

Publication number Publication date
CN107888623B (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN104954330B (en) A kind of methods, devices and systems to be conducted interviews to data resource
CN103916244B (en) Verification method and device
KR102150750B1 (en) Trusted login method and device
CN107888623A (en) The live anti-abduction method and device of software audio and video data streams
CN102572815B (en) Method, system and device for processing terminal application request
CN105407074A (en) Authentication method, apparatus and system
CN105897782A (en) Method and device for treating call request of interface
CN106034104A (en) Verification method, verification device and verification system for network application accessing
CN105939326A (en) Message processing method and device
US20160285781A1 (en) Data processing method, apparatus, client, server and system
CN110690972B (en) Token authentication method and device, electronic equipment and storage medium
Van Delft et al. A security analysis of OpenID
CN104767613A (en) Signature verification method, device and system
CN103905399A (en) Account registration management method and apparatus
CN103312664A (en) Form verification method, device and system
CN106559405B (en) Portal authentication method and equipment
CN108259406A (en) Examine the method and system of SSL certificate
CN107835160A (en) Third party's user authen method based on Quick Response Code
CN103825863A (en) Account management method and account management device
CN110943840B (en) Signature verification method
CN102833247A (en) Method for anti-sweeping ciphers in user login system and device thereof
CN105095729B (en) A kind of Quick Response Code login method, server and system
CN112929388B (en) Network identity cross-device application rapid authentication method and system, and user agent device
CN103957189A (en) Application program interaction method and device
CN109040129A (en) A kind of method and server obtaining identifying code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210525

Address after: Room 1801-7, F4 building, luguyuyuan, No.27 Wenxuan Road, high tech Development Zone, Changsha, Hunan 410000

Patentee after: Hunan Yuyi Technology Co.,Ltd.

Address before: 410000 room F4 1801, Lugu Enterprise Square, Yuelu District, Changsha City, Hunan Province

Patentee before: HUNAN JIYOU TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right